Social Networks and how to be safe

Slides:



Advertisements
Similar presentations
Avoid Identity Theft TCU Technology Resources
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Identity Theft. MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Identity Theft Both Offline And Online It’s Not New Just Easier…
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Protecting your money: Identity Theft
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity theft: Real or Virtual? By: Alex Metzler.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
By: Asfa Khan and Huda Mukhtar
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
You. are at risk for the fastest growing crimes crime.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Jeff loses his identity! Lesson 5: Identity Theft.
National Crime Prevention Council 1 Identity Theft and Cybersafety.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Beware! Identity Theft. Imagine getting a letter from the Internal Revenue Service (IRS) demanding that you pay $5,700 in back taxes. That’s what happened.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
Protecting Your Credit Identity
Fraud Protection.
Fraud protection.
Appropriate Use of Technology
When you get caught for Identity Theft
By: Johnathan Rowse, Jacob Palmer, Kayla Morgan, Paige Frasier
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Internet Safety – Social Media
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Identity Theft Samuel H. Slater.
Presentation transcript:

Social Networks and how to be safe

Identity Theft Identity theft is a crime Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain

Prevention on Identity Theft 1. Buy a cross-cut type shredder (you can purchase cross-cut type shredder very cost effectively for approximately $60 - $70.) Shred all your important papers and especially pre-approved credit applications received in your name and other financial information that provides access to your private information. Don't forget to shred your credit card receipts. 2. Be careful of "Dumpster Diving." Make sure that you do not throw anything away that someone could use to become you. Anything with your identifiers must be shredded (cross-cut) before throwing away. 3. Be careful at ATM's and using Phone Cards. "Shoulder Surfers" can get your "Pin Number" and get access to your accounts. 4. Get all of your checks delivered to your bank - not to your home address. 5. Do not put checks in the mail from your home mailbox. Drop them off at a U.S. Mailbox or the U.S. Post Office. Mail theft is common. It's easy to change the name of the recipient on the check with an acid wash.

Prevention Cont. 6. When you order new credit cards in the mail, or your previous ones have expired, watch the calendar to make sure that you get the card within the appropriate time. If it is not received by a certain date, call the credit card grantor immediately and find out if the card was sent. Find out if a change of address was filed if you don't receive the card or a billing statement. 7. Cancel all credit cards that you do not use or have not used in 6 months. Thieves use these very easily - open credit is a prime target. 8. Put passwords on all your accounts and do not use your mother's maiden name. Make up a fictitious word. 9. Get a post office box or a locked mailbox, if you possibly can. 10. Ask all financial institutions, doctors' offices, etc., what they do with your private information and make sure that they shred it and protect your information. Tell them why. 11. Empty your wallet of all extra credit cards and social security numbers, etc. Do not carry any identifiers you do not need. Don't carry your birth certificate, social security card, or passport, unless necessary. 12. Memorize social security numbers and passwords.

Prevention Cont. 13. When a person calls you at home or at work, and you do not know this person, never give out any of your personal information. If they tell you they are a credit grantor of yours call them back at the number that you know is the true number, and ask for that party to discuss personal information. Provide only information that you believe is absolutely necessary. 14. Do not put your social security number on your checks or your credit receipts. If a business requests your social security number, give them an alternate number and tell them why. They do not need that to identify you. If a government agency requests your social security number, there must be a privacy notice accompanying the request. 15. Do not put your telephone number on your checks. 16. Get credit cards and business cards with your picture on them. 17. Do not put your credit card account number on the Internet (unless it is encrypted on a secured site.) Don't put account numbers on the outside of envelopes, or on your checks. 18. When you are asked to identify yourself at schools, employers, or any other kind of institutional identification, ask to have an alternative to your social security number. Unfortunately, your health insurance carrier often uses your social security number as your identification number. Try to change that if you can.

Prevention Cont. 19. In conjunction with a credit card sale do not put your address, telephone number, or driver's license number on the statement. 20. Monitor all your bank statements from every credit card every month. Check to see if there is anything that you do not recognize and call the credit grantor to verify that it is truly yours. 21. Order your credit report at least twice a year (I have enclosed the addresses for you on the sample letter.) Review it carefully. If you see anything that appears fraudulent, immediately put a fraud alert on your reports by calling the numbers below. 22. Immediately correct all mistakes on your credit reports in writing. Send those letters Return Receipt Requested, and identify the problems item by item with a copy of the credit report back to the credit reporting agency. You should hear from them within 30 days. 23. Take your name off all promotional lists. Call the three credit reporting agency numbers to opt out of pre-approved offers.

Predators They contact kids through conversations in chat rooms, instant messaging, e-mail, or discussion boards. Predators often go to these online areas to look for vulnerable victims. They gradually seduce their targets through attention, affection, kindness, and even gifts, and often devote considerable time, money, and energy to this effort. They know the latest music and hobbies likely to interest kids.

Predators Cont. They listen and sympathize with kids' problems. They also try to ease the kids shyness by gradually introducing sexual content into their conversations or by showing them sexually explicit material. Some predators work faster than others, engaging in sexually explicit conversations immediately. By this direct approach it may include harassment or stalking. Predators may also assess the kids they meet online for future face-to-face contact. A girl named Kyra got a cell phone when she was 12 years old. Her mom thought it would be safer than a computer because of online predators. But a sexually predator find Kyra anyways. A 20 year old man texted her saying he gets off work in 20 mins and wanted to know if she wanted to meet someone, Kyra said yes. The man went and picked her up and sexually assaulted her. The reason why she went and met him was because she had trouble saying no. They have a new software called radar, that goes onto your phone and it stores incoming and out going text messages so they can build up a criminal record

How to stay away from Predators Stay away from chat room Don’t add people to face book or MySpace if you don’t know them

Chat rooms a branch of a computer network in which participants can engage in real-time discussions with one another.

Problems with chat rooms Kids make friends easily They are often willing to give out personal details like their email address, home address and phone numbers to characters that they meet online, especially if the child is using the Internet from a place that they think is "safe", like home or school. Most schools try to block children from getting onto chat services using the school Internet connection, but this is not foolproof and children may just go to a friend's house or other place instead.

How to be safe on chat rooms listen carefully to what is being said. after a while you can tell if someone is lying or is really becoming a friend. You also have to listen to the questions that are being asked, because many adults pretend they are young and friendly just to lure the unsuspecting into a trap to meet them for sex. .