Mystery of The Stolen Identity

Slides:



Advertisements
Similar presentations
Awareness and Prevention
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Identity Theft Mystery of The Stolen Identity Take Charge of Your Finances.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Protecting Yourself from Fraud including Identity Theft
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
7.3.1.G1 According to The federal Trade Commission, Identity theft Affects Approximately 12.6Million People Every year.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Protecting Yourself from Fraud Including Identity Theft Advanced Level.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Jeff loses his identity! Lesson 8: Identity Theft.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
Protecting Yourself from Fraud Including Identity Theft Advanced Level.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Journal #21 If this class were your job, based on your class performance, would you still have a job? Would you have been fired, put on probation, received.
Jeff loses his identity! Lesson 5: Identity Theft.
Identity Theft Mystery of The Stolen Identity Take Charge of Your Finances.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Beware! Identity Theft. Imagine getting a letter from the Internal Revenue Service (IRS) demanding that you pay $5,700 in back taxes. That’s what happened.
Protecting Your Assets By Preventing Identity Theft
IDENTITY THEFT.
Identity Theft It’s a crime!
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity:
Mystery of The Stolen Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity:
Presented (insert date) By (insert organization’s name)
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Jeff loses his identity!
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Mystery of The Stolen Identity
Protecting Yourself from Fraud including Identity Theft
Veteran and Military Identity Theft Training Program
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Identity Theft Essentials
Presentation transcript:

Mystery of The Stolen Identity 7.03 Identity Theft Mystery of The Stolen Identity Take Charge of Your Finances Identity Theft Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

“Unlucky” Lucy is one of the many victims of identity theft Solve the Mystery “Unlucky” Lucy is one of the many victims of identity theft What is identity theft?

Identity Theft According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information The FTC is a government agency that focuses on consumer protection Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

Identity Theft Statistics Take a guess! According to the U.S. Department of Commerce, what percentage of identity theft victims in 2008 were under the age of 20? According to the Federal Trade Commission, how many identity theft complaints were filed in 2008? 313, 982 identity theft complaints 7% of identity theft victims were under 20 years of age Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

7.03 Identity Theft Identity Theft Victims may have to spend time and money trying to fix the problems that are caused by thieves 10% of identity theft victims during 2005 reported personal expenses of more than $1200 11% of victims in 2005 reported that it took 3 or more months to resolve the problems associated with identity theft after they discovered that their information was being misused Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

7.03 Identity Theft Personal Information Name Address & Telephone Number Social Security Number Driver’s License Number Birth Date Credit Card Numbers Bank Account Numbers Identity thieves try to obtain personal information from victims in order to steal their identities. Personal Information Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

Personal Information Search your purses, wallets, and backpacks. 7.03 Identity Theft Personal Information Search your purses, wallets, and backpacks. What are you carrying with you right now that reveals your personal information? Drivers License Social Security Card Checkbook Insurance Cards Credit and Debit Cards Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

Personal Information What daily activities require an individual Making purchases with a check, credit or debit card Applying for a credit card or loan Online or telephone shopping Paying bills through the mail or online Going to the doctor What daily activities require an individual to share personal information?

“Mystery of the Stolen Identity” Act 2 Solve the Mystery “Mystery of the Stolen Identity” Act 2 Listen carefully and take very accurate notes to help Lucy find the person who stole her identity

How Do They Do It? The inspector has identified 4 suspects in Lucy’s case. How does the inspector believe the suspects stole Lucy’s identity? Mrs. White Searched through Lucy’s discarded mail Colonel Mustard Searched through Lucy’s outgoing mail Professor Plum Searched Lucy’s online banking website Mrs. Peacock Guessed Lucy’s PIN number

7.03 Identity Theft How Do They Do It? Thieves obtain personal information through a variety of methods: Stealing - Information is taken from a purse or wallet, personnel records from a workplace, tax information, bank or credit card statements, or pre-approved credit card offers from the mail. Diverting Mail - Thieves can complete a change of address form and have the victim’s bills and statements mailed to a different location. “Dumpster Diving” - Personal information is discarded and thieves remove it from the trash. Skimming - Thieves attach a device to card processors to steal credit and debit card information Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

How Do They Do It? Methods continued... 7.03 Identity Theft How Do They Do It? Methods continued... Phishing - Thieves use a form of electronic communication (usually email) to pretend to be a company or depository institution in order to get the victim to give up their personal information. Pretexting - Thieves use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.  Spyware - Software installed on the victim’s computer, without their knowledge or consent, that monitors internet use, sends pop up ads, re-directs the computer to other sites, and tracks key strokes. Hacking - Information is stolen by breaking into a computer system. Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

What Identity Thieves Do With Information What has the identity thief done with Lucy’s personal information so far? The thief has been using Lucy’s credit card to make their own purchases

What Identity Thieves Do With Information 7.03 Identity Theft What Identity Thieves Do With Information Apply for a new driver’s license Open new bank accounts Apply for credit cards or store credit accounts Obtain cash with bank cards Get a job Rent an apartment Take out student loans File for bankruptcy What can identity thieves do if they obtain personal information? Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

Preventing Identity Theft Many actions can be taken to help minimize the risk of identity theft Mail her documents from a secure post office location Use a PIN number that is not easy to guess Shred documents that contain personal information Make sure to log out of any online banking sites Never give personal information out over the phone or email What could Lucy have done to help prevent her identity from being stolen?

Preventing Identity Theft Wallets and Purses Only carry what is necessary- do NOT carry social security cards, passports, or birth certificates Do not hang purses from a chair in a public place Use purses that close securely

Preventing Identity Theft Credit and Debit Cards Close unwanted accounts in writing and by phone and cut up the card Memorize the PIN number and do not use easily accessible numbers (date of birth, address, etc.) Sign back of cards with signature &“Please see ID” Do not give out account numbers unless making a transaction that is initiated by the consumer rather than responding to telephone or e-mail solicitations Check statements regularly for any errors or signs of fraudulent use

Preventing Identity Theft Credit Card Offers Shred credit card offers and applications. *a cross-cut shredder is safest because it is more difficult to reassemble Cut up or shred pre-approved credit card offers that are not used “Opt-out” of pre-screened credit offers for five years at www.optoutprescreen.com

Preventing Identity Theft Mail Shred all credit card offers, bills, statements, and anything else that contains personal information Deposit outgoing mail in secure post office collection boxes Contact the post office and request a vacation hold when unable to pick up mail Do not leave mail in an unsecured mailbox overnight or for a long period of time

Preventing Identity Theft Email Keep your username and password protected Use a password that is a combination of words, numbers, and symbols and cannot be easily found (do not use names, birthdays, addresses, etc.) Verify the source of an email asking for personal information by calling the company to confirm the email is from them

Preventing Identity Theft Telephone Verify the source of any phone call asking for personal information by calling the company to confirm the phone call is from them and not a potential identity thief using their name. Use the phone number listed on your account statement or in the telephone book.

Preventing Identity Theft Computer Security Use anti-virus and anti-spyware software and update them regularly Do not click on links found in pop-up ads Only download software from trusted websites Set web browser security to medium-high or high Keep operating system and web browser software updated Do not give out any personal information unless making a purchase Choose security questions with answers only you would know

Preventing Identity Theft Computer Security- Continued Watch for clues that might indicate a computer is infected with spyware. such as a stream of pop-up ads, random error messages, and sluggish performance when opening programs or saving files. If it is suspected that a computer is infected with spyware, immediately stop shopping, banking or doing any other online activity that involves user names, passwords, or other sensitive information. Then, confirm that the security software is active and current and run it to scan the computer for viruses and spyware, deleting anything the program identifies as a problem.

Preventing Identity Theft Social Networks, Blogs, & Chat Rooms Consider joining only sites that limit access to posts to a defined group of users. Make sure you know how the site access works before joining. Don’t join sites that allow anyone to view postings. Never post your full name, Social Security Number, bank or credit card information, address, or phone number. Avoiding posting information that could be used to indentify you offline such as school, work, or other locations where you spend time.

Preventing Identity Theft Social Networks, Blogs, & Chat Rooms- Continued Use privacy settings to restrict who can access personal sites Remember that once information is posted online, it cannot be taken back. Even if information is deleted, older versions may still exist on other people's computers and be circulated online Only post information that you are comfortable with anyone viewing

Preventing Identity Theft Internet Purchases Look for “https” or a picture of a lock after the URL or in the bottom right hand corner indicating the site is secure Do not give any personal information on a site if it is not secure Enter the website address yourself rather than following a link from an email or internet advertisement Use a credit card instead of a debit card when making online purchases “https” s = secure

Preventing Identity Theft Social Security Number Memorize Social Security number Keep Social Security card in a safe place (do not carry it in wallet) Only give a Social Security number when absolutely necessary- ask why a Social Security number is needed and how the information will be protected Do not print a social security number on check blanks

Preventing Identity Theft Credit Reports Check credit reports with each of the three reporting agencies at least once a year Consumers receive one free credit report from each of the reporting agencies every year, so ordering one credit report from one agency every four months will keep consumers up to date and constantly alerted to their credit report status Immediately dispute any wrong information

3 Credit Reporting Agencies 7.03 Identity Theft 3 Credit Reporting Agencies Experian PO Box 2104 Allen, TX 75013-2104 Report Order: 1-888-397-3742 Fraud Hotline: 1-888-397-3745 www.experian.com Equifax PO Box 105873 Atlanta, GA 30348 Report Order: 1-800-685-1111 Fraud Hotline: 1-800-525-6285 www.equifax.com Trans Union PO Box 390 Springfield, PA 19064-0390 Report Order: 1-800-888-4213 Fraud Hotline: 1-800-6807289 www.tuc.com To order a credit report from any of the three reporting agencies, use the following website: www.annualcreditreport.com Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

Preventing Identity Theft Key Guidelines Protect your Social Security number by only giving it out when absolutely necessary Keep usernames and passwords safe- use a combination of letters, numbers, and symbols that are not easily identified Select security check questions with answers only you would know Don't give out personal information over the phone, through the mail, or on the Internet unless you've initiated the contact and are sure you know who you're dealing with

Preventing Identity Theft Key Guidelines Check credit reports at least once per year Shred all documents that contain personal information Be careful using the Internet. Only give out personal information when making a purchase on a secure website Search your name occasionally to see if any unusual information appears Be observant and follow your instincts

Recognizing Identity Theft How did Lucy find out that her identity had been stolen? Her credit card was denied in a store Could Lucy have recognized the identity theft earlier? If so, how? She could have checked her online banking more often and then she would have recognized the extra charges on her credit card

Recognizing Identity Theft Early detection is key! Watch for the following signs New accounts or charges you didn’t make Calls from collection agencies Incorrect information on your credit report Being denied credit when there is no reason to be Missing bills or mailed statements

What To Do If Identity Theft Happens What steps did Lucy take when she discovered her identity had been stolen? She filed a report with the local police What should have Lucy done when she discovered the identity theft?

What To Do If Identity Theft Happens 1. Act immediately! 2. Keep a detailed record of correspondence and phone records. Follow up all communication with letters sent via certified mail 3. Contact the three major credit bureaus and request a free fraud alert be added to credit report. Fraud alert - warns creditors to verify an individual’s identity before issuing credit Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

What To Do If Identity Theft Happens 4. Close all accounts which have been tampered with or opened fraudulently 5. File a police report with the local police 6. File a complaint with the FTC: www.ftccomplaintassistant.gov Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

Deter, Detect, Defend- Avoid Identity theft Hear stories from real-life identity theft victims on the FTC’s “Deter, Detect, Defend- Avoid Identity Theft” video http://www.consumer.ftc.gov/media

Personal Liability Credit Cards 7.03 Identity Theft Personal Liability Since Lucy discovered the theft very quickly, she will only be liable for $50.00 in charges on her credit card! Credit Cards Truth in Lending Act limits liability for unauthorized charges to $50.00 per card A letter must be received by the creditor within 60 days of the first bill containing the error The dispute must be resolved within 90 days of the creditor receiving the letter Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

Personal Liability ATM and Debit Cards 7.03 Identity Theft Personal Liability ATM and Debit Cards The Electronic Funds Transfer Act provides protection The amount a person is liable for depends upon how quickly the loss is reported Within two days: maximum $50.00 Within sixty days: maximum $500.00 After sixty days a person may be liable for everything Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

Personal Liability Checks 7.03 Identity Theft Personal Liability Checks Contact the financial institution and stop payment Most states hold the financial institution responsible for losses of a forged check Instructors: Garrett, Lo. Long, Hubbard, Roberts, Torain

Identity Theft Protection Offered by banks and other companies Services Closely monitor accounts and personal information Alert consumer when there is a change Help resolve any problems if identity theft does occur

Identity Theft Protection Cost $5.00 to $35.00 per month Depends on amount of services provided Can NOT eliminate identity theft but can help prevent it

Identity Theft Protection What are the pros and cons of identity theft protection? Pros Cons Convenient Cost Saves consumer time because they don’t have to monitor their own accounts and credit reports Most of the services offered can be completed by the consumer for no cost

Identity Theft Insurance Services Limits liability of identity theft victims Reimburses victims for some or all out of pocket expenses caused by the theft Choosing identity theft insurance Research exactly what the company covers Check to see if there are any complaints against the company (Better Business Bureau, consumer protection agency, and state Attorney General)

“Solve the Mystery” Activity Directions Divide into 4 groups Each group will take turns verbally answering a question about identity theft If the question is answered correctly, the group will receive a clue that will help reveal Lucy’s identity thief If the question is answered incorrectly, play will move on to the next group and the group that answered incorrectly will not receive a clue Play will continue until all 12 clues have been won- each group will have at least 3 chances to receive a clue

Who Did It? Who is Lucy’s identity thief? Mrs. White Colonel Mustard Make your guess! Mrs. White Searched Lucy’s discarded mail in the kitchen Colonel Mustard Searched Lucy’s outgoing mail in the conservatory Professor Plum Searched Lucy’s online banking website in the library Mrs. Peacock Guessed Lucy’s PIN number in the hall

“Mystery of the Stolen Identity” Solve the Mystery “Mystery of the Stolen Identity” Act 3 Find out who the true identity thief is!