Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.

Slides:



Advertisements
Similar presentations
Electronic Crimes on the E-Information Highway. Violent Crimes.
Advertisements

How to protect yourself, your computer, and others on the internet
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
CYBER CRIME. is a CRIMINAL activity done using COMPUTERS and INTERNET.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Staffordshire Police Corporate PowerPoint Template by Carl Uttley Staffordshire Police Cyber Crime ACC Nick Baker.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Internet Fraud By: Noelle Woodman.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Your Identity While Attending College.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Scams & Schemes Common Sense Media.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Digital Citizenship Multimedia II Ann Darling. Digital Citizenship What is Digital citizenship? – “Digital citizenship can be defined as the norms of.
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
WEST COMMUNITY COHESION TEAM Pc Ian Ashton and Helen Chadwick.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
Understanding e-Commerce A-Level Ict. E-Commerce is impossible to avoid now days.Almost everyone in the western world is at one point a consumer of the.
Get Safe Online Expert advice for everyone In association with.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cybersecurity Test Review Introduction to Digital Technology.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
IRS, CRIMINAL INVESTIGATION AND IDENTITY THEFT/DATA BREACHES
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
SELECT COMMITTEE PRESENTATION ON SCAMS Trading Standards Service Regulatory Services Regeneration & Resources Directorate.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Mass Media – the Internet  Role of media  Types of media  What is the Internet  www  Information on the Internet  Usage of the Internet  Favourite.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Identity Thefts: Opinion of the Lithuanian Population Dr. Zita Čeponytė 1.
Identity Theft It’s a crime!
Done by… Hanoof Al-Khaldi Information Assurance
Digital Citizenship Middle School
Cyber Security Awareness Workshop
Internet Safety Vocabulary
Internet Safety By: Ayana Shiggs.
Internet Safety By: Ayana Shiggs.
Presentation transcript:

Jennifer Perry

We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice sets the right expectations for consumers. – We direct victims to the appropriate organisations for help We are not-for-profit Community Interest Company

Online incidents are increasing: Fraud Offensive material Sexual harassment Cyber bullying Malware Data leaks Impersonation – identity theft E-shopping disputes Online auction complaints Home working scams Counterfeit goods Money Laundering Downloads Premium rate services

Consumers perspective Criminals are targeting Internet users by exploiting every aspect of their Internet experience. – phishing, spam, viruses, malware – Compromised or fraudulent websites E-commerce Advertising networks – google adwords Social networks - YouTube – Social networks being targeted – Mobile phones

Where do e-victims go to report incidents? – Local police – Trading standards – Information Commissioner – CEOP – PhonePay Plus – IWF – Office of Fair Trading – Financial Service Ombudsman – Advertising Standards Authority – Office of the Telecommunications Ombudsman – Communications & Internet Service Adjudication Scheme – Gambling Commission – Credit card company – Bank – Ebay/Paypal – Publishers Association, FAST, FACT – 2009 Internet Fraud Reporting Service

Problems in reporting an incident – Conflict of interest – Not clear on remit regarding online incidents – Lack of knowledge – Lack of training – Lack of resources

Reporting agencies do not provide support or advice – Most consumers believe enforcement agencies are there to help – Victims need practical advice – They could use some support – They want to protect others