Avoid Identity Theft TCU Technology Resources

Slides:



Advertisements
Similar presentations
Identity Theft If you are a victim of identity theft, take the following four steps as soon as possible!
Advertisements

Presented (insert date) By (insert organizations name)
An Educational Partnership of Consumer Action and Chase
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Identity Theft A CyberAngels Quick Tutorial A CyberAngels Quick Tutorial Adapted from the Federal Trade Commission Website Press the Next Button to Continue.
How to Deter, Detect & Defend Against Identity Theft Presented by: Kira Buffa Marketing Associate Richmond Brothers Financial Management Specialists, Inc.
IDENTITY THEFT Protect Yourself and Your Good Name ITT Employees Federal Credit Union.
[your name, organization] Protecting Your Identity: What to Know, What to Do.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Presented By The Plano Police Department Crime Prevention Unit.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Internet Safety Dr. Steve Broskoske Misericordia University.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Be Cautious of Identity Theft By: Sydney Langley.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Presented By Plano Police Department Crime Prevention Unit.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Fraud: Identity Theft G.1 List and explain consumer protection laws, including credit reporting, debt collection, and privacy. G.2 Define common, unfair.
Beware! Identity Theft. Imagine getting a letter from the Internal Revenue Service (IRS) demanding that you pay $5,700 in back taxes. That’s what happened.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Assets By Preventing Identity Theft
IDENTITY THEFT.
Identity Theft It’s a crime!
Protecting Your Identity:
Protecting Your Identity:
Presented (insert date) By (insert organization’s name)
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Protecting Your Identity
Protecting Your Credit Identity
Presentation transcript:

Avoid Identity Theft TCU Technology Resources Information Security Services

Old Fashioned Stealing It only takes a few bits of information for thieves to steal your identity. Dumpster Diving Skimming Phishing Pretexting Changing Your Address Old Fashioned Stealing TCU Information Security Services

Dumpster diving Thieves rummage through trash looking for bills or other paper with personal information. TCU Information Security Services

Skimming Identity thieves steal credit/debit card numbers when processing your card. TCU Information Security Services

Phishing They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information. TCU Information Security Services

Pretexting Using false pretenses, thieves obtain your personal information from financial institutions, telephone companies, and other sources. TCU Information Security Services

Changing Your Address They divert your billing statements to another location by completing a “change of address” form. TCU Information Security Services

“Old fashioned” stealing They steal wallets and purses; mail, including bank and credit card statements; pre- approved credit offers; and new checks or tax information. They steal personnel records from their employers, or bribe employees who have access. TCU Information Security Services

Personal Information Don’t give out personal information on the phone, through mail, email or over the Internet unless you know who you are dealing with. Shred financial documents, preapproved credit applications, insurance forms, bank statements, credit and debit card receipts and other paperwork with personal information. Do not carry your social security card or put the number on check or credit receipts. Give it out only if necessary. Do not put your telephone number on checks. Keep your personal information in a safe, secure place at home. TCU Information Security Services

Credit card and bank security Make a list or photo copies of your credit and debit cards (front and back) and the contact numbers so you can quickly cancel them if stolen. Keep in a safe place. Carry only one credit card if you can. Use credit rather than debit bank cards. Most credit cards will not charge you if they are used fraudulently. This also reduces the risk of giving criminals direct access to your bank accounts. Review monthly credit card and bank statements for suspicious activity. TCU Information Security Services

Credit card and bank security (continued) Watch your mail for statements. If statements do not arrive when expected it is possible an identity thief has taken over your credit card account and changed your billing address. Be careful using ATM’s. Someone may look over your shoulder to get your PIN. Do not put your credit card number on the Internet unless you are on a secured site (look for a yellow padlock displayed in your browser window or https in the URL). Pick up ordered checks at the bank. TCU Information Security Services

Passwords and Pins Do not use passwords like your birth date, you mother’s maiden name or the last four digits of your social security number. Choose security questions that no one can look up. If your mother’s maiden name is the only choice, use a different name, such as your grandmother’s name. Change your passwords frequently, do not share you passwords with anyone and do not write down your password. TCU Technology Resources staff will never ask for your TCU password, either by phone, in an email or in person. TCU Information Security Services

Email and the internet Be suspicious of unsolicited emails from supposedly legitimate organizations requesting personal financial information. Contact the organization directly to verify a request for information. Do not click on links within emails unless you are absolutely certain of the source. If you want to follow a link emailed to you, copy and paste it in your browser. Still be wary of entering in any personal information. TCU Information Security Services

Email and the internet (continued) Do not fill out forms in email messages that ask for personal financial information. Do not open email attachments unless you know who sent them and what they are. Do not enter personal information in a pop- up screen. When conducting any kind of financial transaction, rather than using a displayed link, type in the address of a web site. TCU Information Security Services

Social networking sites such as MySpace and Facebook Limit the amount of personal information you post. Do not provide information that can be used to answer security questions. Avoid providing information that will allow a person to stalk you (your address, class schedule or phone number). Do not provide personal identifying information such as your social security number, birth date, or your mother’s maiden name. TCU Information Security Services

Social networking sites such as MySpace and Facebook (continued) Be aware that anything you post online may be copied to other places. If you delete it from your site, it is not necessarily REALLY deleted from the Internet. Be skeptical of people who may misrepresent who they are. Don’t believe everything you read. TCU Information Security Services

Monitor your financial accounts and billing statements Watch for bills or statements that don’t arrive in the mail as expected. Examine bills for purchases you didn’t make. Be alert to denials of credit for no apparent reason. Watch for inquiries from companies you haven’t contacted, accounts you didn’t open, debts you can’t explain. TCU Information Security Services

Get a credit report Inspect the accounts and financial activity for inaccurate information. The law requires the major nationwide consumer reporting companies—Equifax, Experian, and TransUnion—to give you a free copy of your credit report each year if you ask for it. Visit www.AnnualCreditReport.com or call 1-877- 322-8228, a service created by these three companies, to order your free credit reports each year. You can also write: Annual Credit Report Request Service, P.O. Box 105281, Atlanta, GA 30348-5281. TCU Information Security Services

Suspect id theft? Follow these steps FRAUD ALERT Place a fraud alert on your credit reports and review the reports carefully. The alert tells creditors to follow certain procedures before they open new accounts in your name or make changes to your existing accounts. The three nationwide consumer reporting companies have toll-free numbers for placing an initial 90-day fraud alert; a call to one company is sufficient. Equifax 1-800-525-6285 Experian 1-888-397-3742 TransUnion 1-800-680-7289 TCU Information Security Services

Suspect id theft? Follow these steps CLOSE ACCOUNTS Call the companies where accounts were opened or changed without your permission. Follow-up in writing. Go to www.ftc.gov/idtheft for an ID Theft Affidavit. Verify that disputed accounts have been closed and debts discharged. Keep copies of all correspondence and notes of calls and conversations. FILE A POLICE REPORT File a report with law enforcement officials to help you with creditors who may want proof of the crime. TCU Information Security Services

Suspect id theft? Follow these steps INFORM THE FEDERAL TRADE COMMISSION www.ftc.gov/idtheft 1-877-ID-THEFT By mail: Identity Theft Clearinghouse, Federal Trade Commission, Washington, DC 20580 TCU Information Security Services

resources TCU Information Security Services TCU Computer Help Desk security.tcu.edu TCU Computer Help Desk tr.tcu.edu/help Federal Trade Commission www.ftc.gov/idtheft Credit Report www.annualcreditreport.com TCU Information Security Services