Identity Theft Chelsea Weser.

Slides:



Advertisements
Similar presentations
Identity Theft and Online Identity Solutions Heidi Inman May 29, 2008.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
Identity Theft By: Caroline Branton, Laura Hunter, Sinead McFarlane.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Protect Yourself from Identity Theft
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Beware! Consumer Fraud Module 9.1.
Protecting Your Identity While Attending College.
Identity theft By: Blake D uncan.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
©2010 Destina Games, Inc. Financial Literacy Jeopardy $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100.
Unethical use of Computers and Networks
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT: WHO’S AT FAULT? ERIC LAMBERT. THESIS I BELIEVE THAT IDENTITY THEFT IS A HUGE PROBLEM THAT IS AFFECTING SOCIETY AND THAT WE NEED TO FIND.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Identity Theft.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding.
Identity Theft:“Taking on another person’s persona for illegal purposes. Usually includes the use of Social Security.
ICT & Crime Identity theft & fraud. Homework Worksheet – due back on Monday.
By: Asfa Khan and Huda Mukhtar
Identity Theft How it happens and how to avoid it.
You. are at risk for the fastest growing crimes crime.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Computer crimes.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft By: Andrew Hicks. Contents What is Identity theft? History Types of Identity Theft Are you safe? (The most common ways Identity theft is.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
By: Micah Stevens Identity Theft in the World Today.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Assets By Preventing Identity Theft
It’s More Than Just Your Wallet…
Identity Theft It’s a crime!
Security, Social and Legal Issues Regarding Software and Internet
Antisocial use of ICT and Computer Fraud
#1 Consumer Fraud Complaint – 5th straight year!
Chapter 11 crime and security in the networked economy
Avoiding scams and identity theft
Lesson 2- Protecting Yourself Online
When you get caught for Identity Theft
Five Unethical Uses of Computers
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Cybersecurity and Personal Finance
Protecting Your Identity
Lesson 2- Protecting Yourself Online
Identity Theft By Omer Ersen.
Credit History Pay bills on time. Use online and automatic bill pay to avoid late payments. Keep your debt (the amount of money you owe on credit cards)
Identity Theft and Credit Safety
Presentation transcript:

Identity Theft Chelsea Weser

Definition Fraud leading to the acquisition of money or other benefits by pretending to be another person.

The 4 Types of Identity Theft Descriptions Financial identity theft Using another's identity to obtain goods and services Criminal identity theft Posing as another when apprehended for a crime Identity cloning Using another's information to assume his or her identity in daily life Business/Commercial identity theft Using another's business name to obtain credit

Crimes illegal immigration terrorism espionage blackmail to attack payment systems, including online credit card processing and medical insurance

How Criminals Get Your Information In most cases, a criminal needs to obtain personally identifiable information or documents about an individual in order to impersonate them. Stealing mail or trash Researching about the victim in government registers or internet search engines Stealing payment or identification cards Eavesdropping on public transactions to obtain personal data Stealing personal information in computer databases Advertising bogus job offers (either full-time or work from home based) to which the victims will reply with their information Infiltration of organizations that store large amounts of personal information Browsing sites, online for personal details that have been posted by users

How to Protect Yourself: Go over this checklist - http://www.bouldercounty.org/da/consumer/idtheft.htm

Impact The average fraud per person decreased from $4,789 in 2003 to $1,882 in 2006. Total value of identity fraud from US$47.6 billion in 2003 to $15.6 billion in 2006

Case Study (CBS) A restaurant busboy is accused of using the Internet and Forbes Magazine's list of the richest people in America in a scheme to steal millions from such figures as Steven Spielberg, Martha Stewart, Oprah Winfrey and Ted Turner. http://www.cbsnews.com/stories/2001/03/20/archive/technology/main280107.shtml