Financial Bootcamp – Part 5 Avoiding Common Scams

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
An introduction to Child Protection and Safeguarding
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
SEARCHING FOR A JOB CCM Mission Station F.I.T. Program 2015.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Social Media Policies and Evaluation Tools. We can acquire a sense of who makes up our community We can gain more direct information about what people.
1.3 Safeguarding Your Privacy Identity Theft is the illegal use of an individual’s personal information.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identifying and Avoiding Scams 1. What a scam is Why scams work Types of scams Warning signs of scams Building scam defenses What We’ll Discuss 2.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Top 5 Scams Against Small Businesses Myriam Cruz September 1, 2016.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Internet Safety.
What’s a Credit Score? And how to use credit wisely.
Financial Bootcamp – Module 2 Ethical Financial Management
Fraud Protection.
Scams & Schemes Common Sense Media.
Identifying and Avoiding Scams
Fraud protection.
How To Avoid Fundraising Scams.
Learn how to protect yourself against common attacks
How To Be Safe On The Internet
Consumer Purchasing and Protection
Digital Citizenship Middle School
the influence of advertising
The Influence of Advertising
Chapter Section Deception & Fraud   Pages   ~People sometimes buy products that don’t meet their needs.   ~Products that the quality.
Phishing is a form of social engineering that attempts to steal sensitive information.
Online Safety.
CONTENT CREATION Standard 3.
Safe Online Dating – Tips Every Women Should Know
Internet Fraud By (NAMES).
Passwords & Behavioral Ads
When you get caught for Identity Theft
Robert Leonard Information Security Manager Hamilton
Code of Conduct/ Fraud, Waste & Abuse
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Red Flags Rule An Introduction County College of Morris
SafeSurfing Module 5 September 2016.
UCO BANK HONOURS YOUR TRUST
Section 1.4 Being a Wise Health Consumer Objectives
Advocacy 101: Tips for a Productive Meeting
lesson ten the influence of advertising presentation slides Teens
Protecting Yourself from Fraud including Identity Theft
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Don’t Get Scammed on Your Way to College and Avoiding Identity Theft
Protecting Yourself from Fraud including Identity Theft
Shellie Carnal Business Consultant - Texas
College Prep Source: US News and World Report
E SAFETY ASSEMBLY.
Lesson 2- Protecting Yourself Online
Protecting Yourself from Fraud including Identity Theft
A Quick Look at the Risks for Virtual Scams and Fraud!
Presentation transcript:

Financial Bootcamp – Part 5 Avoiding Common Scams

Objectives Identify common scams affiliates encounter Explain how to avoid and/or respond to scams Provide recommended safeguards to prevent scams and/or mismanagement (intentional or unintentional)

Definition “A scam is a dishonest and misleading attempt to entice a person to part with their money or personal details.” - Habitat for Humanity International

Definition Illegal, immoral, or unethical Rely on emotional vulnerability and/or ignorance Always involve some degree of falsehood or deception Not necessarily monetary, as scammers want private information, too

General Tips It is better to be safe than sorry If something doesn’t feel right then something probably isn’t right You don’t owe anyone anything Don’t let scammers guilt you out of your time or use deceptive language to lure you into listening to them. The more you listen, the more chance there is they will convince you of their scam. If you suspect something is not right about a situation, politely end the conversation immediately.

Signs of a Scam A person provides conflicting, unreliable, or unconvincing information You are unable to verify someone’s credentials Requests personal information (including banking information) and/or asks for you to verify your information Unprofessional correspondence (free e-mail address, syntax, grammar, spelling, etc.)

Signs of a Scam The situation “high-pressure” or urgent, needing you to act or decide immediately The scammer uses threatening language The scammer attempts to illicit sympathy for their “cause” The promised benefit far outweighs the investment

Common Scams “Vendors” selling merchandise far below market-rate Claims of an individual winning a lottery, receiving an inheritance, etc. “Official” documents from an institution requesting to be provided with verification of private information “Emergency” situations that require immediate financial assistance

Social Media Scams Social media attract scammers because of: Wider audience and constant availability Perceived credibility due to association with others Perceived “personal” touch with photographs, names of families, awareness of significant events, etc.

Social Media Scams Scammers utilize social media by: Referring to your direct circle of contacts Referencing the work of your affiliate Adding a “personal” touch to their scam Accessing the information you already have made available to them

Social Media Scams Signs of a social media scam: Individuals with few “friends” and businesses with few “followers / likes” Sudden appearance of a company, brand, or product Larger-than-life advertising and “too good to be true” results Upfront solicitations for money or information and/or desire for contact outside of the social media platform

Social Media Scams If you suspect a social media scam: Utilize search engines to investigate the company or person Contact the social media support staff to report the person and issue Locate associates of the potential scammer and investigate them for validity (are they real people, companies, etc.?) Do a business search through the Secretary of State and the Better Business Bureau

Best Practices Have Board-approved financial and information control policies that are implemented and regularly audited Limit access to private information to only those on a “need-to-know” basis Keep private information securely stored (locked cabinets, password-protected files, etc.)

Best Practices Verify the credentials of anyone attempting to buy, sell, or trade goods or services with the affiliate Ask for at least two references and multiple points of contact for each reference Never provide private information (passwords, social security numbers, etc.) over the telephone or via e-mail Use common sense and good judgment

Affiliate Responsibilities Educate staff and Board members on potential scams Educate homeowners on potential scams Stay alert to scams in your area by reading local newspapers, watching local TV, etc. Contact relevant parties immediately if you believe they have been involved in a scam