Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.

Slides:



Advertisements
Similar presentations
Avoid Identity Theft TCU Technology Resources
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft. MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
Identity theft: Real or Virtual? By: Alex Metzler.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Be Cautious of Identity Theft By: Sydney Langley.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Identity Theft: Protect Yourself By Rachel Gaines.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Understanding and Preventing.  Acquiring someone’s identifying information and impersonating them for gain.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
By: Asfa Khan and Huda Mukhtar
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Identity Theft The fastest growing type of fraud..
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
Jeff loses his identity! Lesson 5: Identity Theft.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Fraud: Identity Theft G.1 List and explain consumer protection laws, including credit reporting, debt collection, and privacy. G.2 Define common, unfair.
Beware! Identity Theft. Imagine getting a letter from the Internal Revenue Service (IRS) demanding that you pay $5,700 in back taxes. That’s what happened.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Assets By Preventing Identity Theft
IDENTITY THEFT.
Identity Theft It’s a crime!
Protecting Your Identity:
IDENTITY Theft Financial Literacy Identity Theft.
Protecting Your Identity:
Presented (insert date) By (insert organization’s name)
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Protecting Your Identity
Protecting Your Credit Identity
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Identity Theft: How to Protect Yourself

Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another person for the purpose of assuming that person's name to make purchases. Identity theft statistics (2010):  8.1 million victims  $37 billion total costs  Average out-of-pocket costs $631  26 million records exposed through data breaches  “Friendly” fraud is up – the victim know the thief

How does it happen? Identity thieves might: Steal mail from your mailbox. File a change of address form in your name to redirect your mail.

Other identity thief tricks They might: Steal pre-approved credit card applications from the trash. Go “dumpster diving” for bank statements or cancelled checks. Steal wallets and purses.

What information do you share? Have you:  Signed up for a loyalty card program?  Ordered a pizza at your home?  Given your phone number to a cashier?  Participated in a sweepstakes?  Donated to a charity and given your address and phone number?  Registered a product warranty?  Signed up on Facebook or MySpace?

Most identity theft is low tech, but there are high tech methods: Phish ing – An authentic-looking that directs you to a web site to “update your information.” Pharming – “Hijacking” web domains to the thief’s own sites to gather personal information.  This can occur in 2 ways: 1. directly on users' computers 2. on domain name servers that resolve web site addresses for users

Phone Scams How this happens: Someone pretending to be from the government contacts you. They ask for personal information for a legitimate reason (i.e., census research). Someone contacts you asking for a donation to a fictitious charity.

Data Breaches Personal information from a business or organization data base. More than 155 million data records lost or stolen since  Over 3 million from college and universities  No notice required if data are encrypted How?  Hackers  Accidental postings of personal information  Stolen/lost laptops and data storage devices  Employees steal data

Twin Wi-Fi Hotspots Hacker creates a hotspot with the same (or similar) name as a legitimate hotspot – at airports, coffee shops, etc. Users connect to the hacker’s hotspot instead of the legitimate one Hackers collect personal information

How to Protect Yourself Mail: Put outgoing mail in secured mailboxes -- U.S. Postal Service mailboxes or the post office. Monitor your mail. If a bill or statement doesn’t arrive on time, find out why not. Buy a shredder. SHRED all billing statements and pre-approved credit card offers.

How Prepared Are You? True or False: 1. I use a computer with a firewall. 2. I don’t have a password or pin that is based on easily available information. 3. I shred all documents with personal information on it. 4. I never give out my SSN unless I initiate the contact. 5. I use a mailbox with a lock on it.

How to Protect Yourself Banking: Have new checks mailed to a P.O. Box or pick up them from the bank unless you have a secured mailbox. If you get an or phone call asking you to update your banking records, do not give out personal information. Call your bank yourself.

How to Protect Yourself Check out s before answering. Never open an attachment unless you expected it or know what it contains. Never click on a web link in an . Check it out by opening a new browser window and typing in the URL. Watch that the URL doesn’t change when the site comes up. Check out scams at

How to Protect Yourself Don’t use easily available information (mother’s maiden name, birth date, the last 4 digits of your SSN or phone number, or consecutive numbers) for passwords and PINs. Pay attention to announcements about data breaches. Learn what legitimate hotspot web pages look like. Don’t send sensitive information through public Wi-Fi networks.

How to Protect Yourself: Credit Freeze: puts a lock on access to your account.  $3 in Georgia for each credit bureau  Unless you are 65+ or a victim of identity theft  Credit “thaw” within 15 minutes: $3 Some companies aren’t affected by the freeze  Insurance companies  Existing creditors  Law enforcement agencies

How to Protect Yourself: Identity Theft Prevention Products  Life Lock  Loud Siren  Many more! Check to make sure they are legitimate

Monitor Your Personal Information Check your credit card statements and bank records for unfamiliar transactions and report them. Check your credit report! Visit If you must give out personal information via phone, do so in a secure area. You never know who could be listening.

Reporting Identity Theft If you think your identity has been stolen: Contact one of the three major credit reporting agencies to create a fraud alert with all three:  Equifax:  Experian:  TransUnion: Close accounts that have been tampered with. File a complaint with the Federal Trade Commission. File a report with the police.

Other Tips for Reporting Identity Theft Act quickly! Keep a record of all conversations. Keep copies of s. Make a copy of all documents you send and use certified mail.

For individual help contact: The Peer Financial Counseling Program (insert web address, phone number, and/or )

Special Thanks to...