1 If You Are Me, Then Who Am I? Beating Identity Theft Office of the California Attorney General.

Slides:



Advertisements
Similar presentations
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Advertisements

By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Using Information at the University University Secretarys Office
ZMQS ZMQS
How To Use OPAC.
Banking Services AVAILABLE FOR A SMALL BUSINESS. BANKING SERVICES 2 Welcome 1. Agenda 2. Ground Rules 3. Introductions.
The ABCs of Credit Card Finance Essential Facts for Students 2007 Carol A. Carolan, Ph.D.
The ABCs of Credit Card Finance Essential Facts for Students 2012 Carol A. Carolan, Ph.D.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
ABC Technology Project
© John Wallace Mobile and Online Banking Security John Wallace Consultant, Resources Global Professionals.
Squares and Square Root WALK. Solve each problem REVIEW:
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
25 seconds left…...
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Week 1.
[your name, organization] Protecting Your Identity: What to Know, What to Do.
We will resume in: 25 Minutes.
1 Unit 1 Kinematics Chapter 1 Day
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Parachute Neighborhood Watch Presentation February 9, 2010.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
Identity theft By Joey Pawoll. intro DeterDetectDefend.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Be Cautious of Identity Theft By: Sydney Langley.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
By: Asfa Khan and Huda Mukhtar
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Identity Theft How it happens and how to avoid it.
You. are at risk for the fastest growing crimes crime.
Cyber Safety Jamie Salazar.
BBB IDENTITY THEFT By Blake Bowland Computers III.
SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity.
Identity Theft It’s a crime!
Scams & Schemes Common Sense Media.
Protecting What’s Yours: Your Identity
Protecting Your Identity:
IDENTITY Theft Financial Literacy Identity Theft.
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

1 If You Are Me, Then Who Am I? Beating Identity Theft Office of the California Attorney General

No one to tell you what to do. 2

3 BODY MIND YOUR IDENTITY

Your Personal Information Name Address Passwords Date of birth Mother’s maiden name Credit card number Bank account number Driver’s license number Social Security number Medical information 4

What is identity theft? Identity theft is taking someone’s personal information …. –Credit card number –Bank account number –Driver’s license number –Social Security number –Medical information –Etc. Without permission… 5

What is identity theft? … and using it for an unlawful purpose. –Opening credit accounts –Renting an apartment –Applying for a job –Making charges on an existing account –Getting medical care –Providing identity on arrest 6 6

13.1 million in 2013 – 1 victim every 2 seconds 7 How often does it happen? Source: Javelin Research & Strategy, 2/14

Consequences of ID Theft “Your request is denied.” “Please hold” “Press 9 to return to the main menu.” “We are going to need cash – in full.” “Is there anyone who can sign for you?” “This account is overdrawn.” “We show you owe $11,300 to Best Buy in Daytona.” “You have a right to remain silent…” 8

Consequences of ID Theft Having your identity stolen can stop you from: –Getting college loans, car loans, and credit cards –Renting an apartment –Getting a job 9 What do you mean I can’t get the loan?

Teens Care About Privacy 10 68% Privacy of personal info top concern re online activity 51% Very concerned about identity theft FOSI & Hart Research Associates, 2013

9 THINGS YOU CAN DO … to reduce your risk of identity theft 11

Don’t carry your Social Security card or anything with your Social Security number in your wallet or bag. 12 NUMBER 1 PROTECT YOUR SSN… THE KEY TO ID THEFT

Report problems promptly. 13 NUMBER 2 LOOK AT YOUR BILLS…ASAP!

NUMBER 3 Lock up your phone – use a passcode. 14

NUMBER 4 Firewall Anti-virus Anti-spyware Prompt updates and patches Lock down your computer. 15

NUMBER 5 Hmwc1wcc? Use strong passwords. 16

NUMBER 6 Brush up your privacy settings. (And know your “friends.”) 17

NUMBER 7 Toss stinky phish. 18

NUMBER 8 Protect personal information at home. 19 Six Degrees of Identity Theft

NUMBER 9 Don’t Do Your Banking Where You Have Your Latte. 20

I’M SMART. I WATCH OUT FOR MYSELF. GIVE ME A BREAK. I KNOW MORE ABOUT THE INTERNET THAN YOU. I COULD TEACH YOU HOW TO USE YOUR PHONE. 21

Who will you teach? 1.Protect Your SSN. 2.Open your bills right away. 3.Lock up your phone. 4.Lock-down your computer. 5.Use strong passwords. 6.Brush up you privacy settings. 7.Toss stinky phish. 8.6 Degrees of Identity Theft 9.Don’t do your banking where you have your latte. 22

23