Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

Slides:



Advertisements
Similar presentations
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
Parachute Neighborhood Watch Presentation February 9, 2010.
Presented By Drexel and FMFCU.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
©2005 Qwest Communications International, Inc. NOTE: Qwest is providing the above information as a customer service for educational purposes only. Qwest.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft By: Nakeisha Barnett Thursday 2-3:15 3/4/06.
PRIORITIES. AARP Tax-Aide Priorities BudgetsTraining E-Filing Reimbursements Security Accuracy Developing Leaders CertificationDonations Recruitment.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
Presented By The Plano Police Department Crime Prevention Unit.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
Identity theft: Real or Virtual? By: Alex Metzler.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
IDENTITY THEFT. Identity Theft Defined When someone uses another person’s name, address, social security number, bank or credit card account number, or.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
By: Taylor Budwash.. o Identity Theft is the unorganized gain and use of a true person’s identity and personal information for unlawful purpose.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
By: Asfa Khan and Huda Mukhtar
Identity Theft How it happens and how to avoid it.
You. are at risk for the fastest growing crimes crime.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Narkeya White. WHAT IS IDENTITY THEFT? Occurs when a person gathers personal information to assume the identity of another person for illicit reasons.
BBB IDENTITY THEFT By Blake Bowland Computers III.
Presented By Plano Police Department Crime Prevention Unit.
Identity Theft One of America's fastest growing crimes.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Identity Theft The fastest growing type of fraud..
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
Jeff loses his identity! Lesson 5: Identity Theft.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Protecting Your Identity:
#1 Consumer Fraud Complaint – 5th straight year!
Tax Identity Theft Presenter Date
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Identity Theft Samuel H. Slater.
Presentation transcript:

Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

What is Identity Theft or Identity Fraud? Identity theft or identity fraud (true name fraud) is the criminal act of taking a victim's identity for the purpose of obtaining credit, credit cards from banks and/or retailers, stealing money from the victim's existing accounts, applying for loans in the victim's name, establishing accounts with utility companies, leasing automobiles and residences, filing bankruptcy, and/or even obtaining employment.

THE IDENTITY THIEF IS LOOKING FOR YOU!

How Does Identity Theft Occur? All that is needed is a little information, such as your social security number, birth date, address, phone number, or any other information which can be discovered. All that is needed is a little information, such as your social security number, birth date, address, phone number, or any other information which can be discovered.

Protect Your Identity Protect Your Identity A good security plan has two parts: one focused on security rules to prevent identity theft and another focused on all the things you need to do when you discover a theft. The plan doesn't need to be longer than a page or two.

Plan one: Precautions You should establish security precautions for yourself and your family, in the home and elsewhere. You should establish security precautions for yourself and your family, in the home and elsewhere.

Plan one: Precautions Protect your household: Create security rules for your house. Include a plan for how mail should be handled, who shreds credit card offers, what happens when everyone goes on vacation, and where friends and neighbors cannot go in the house. Protect your household: Create security rules for your house. Include a plan for how mail should be handled, who shreds credit card offers, what happens when everyone goes on vacation, and where friends and neighbors cannot go in the house. Protect yourself: Have everyone check their credit reports regularly. I recommend at least every three months. Learn how to read your report and understand what it tells you. Protect yourself: Have everyone check their credit reports regularly. I recommend at least every three months. Learn how to read your report and understand what it tells you.

Plan one: Precautions Secure the house: Burglars increasingly focus on identity theft for bigger payoffs. Make sure to keep yourself and your documents safe. Consider a burglar alarm, security lights, window and door locks, data safes, locked filing cabinets, and which floorboard you want to hide your tax returns under. Secure the house: Burglars increasingly focus on identity theft for bigger payoffs. Make sure to keep yourself and your documents safe. Consider a burglar alarm, security lights, window and door locks, data safes, locked filing cabinets, and which floorboard you want to hide your tax returns under. Protect your PC: Use security technology. Firewalls keep hackers out. Antivirus software keeps viruses and worms out. Encryption protects sensitive data. Web filters keep your family members (especially the young ones) away from websites they probably shouldn't see. Protect your PC: Use security technology. Firewalls keep hackers out. Antivirus software keeps viruses and worms out. Encryption protects sensitive data. Web filters keep your family members (especially the young ones) away from websites they probably shouldn't see.

Plan two: Know who to call If you realize someone stole your identity, you'll probably panic. Most people do. Don't waste a lot of valuable time trying to gather the information you need to minimize the impact of the crime. Before you become a victim, make a checklist of the following. If you realize someone stole your identity, you'll probably panic. Most people do. Don't waste a lot of valuable time trying to gather the information you need to minimize the impact of the crime. Before you become a victim, make a checklist of the following.

Plan two: Know who to call All your accounts and account contacts All your accounts and account contacts The credit and legal agencies you need to contact if something happens The credit and legal agencies you need to contact if something happens The forms you'll need to fill out if you become a victim The forms you'll need to fill out if you become a victim

How Identity Thieves Operate How Identity Thieves Operate Some scammers buy fake birth certificates and IDs while others hack into databases. In March 2001, the FBI reported that 40 corporations in 20 states were targeted by hackers operating outside the United States. Activities compromised the security of more than 1 million credit card numbers stored by the hacked corporations. Most of the hacking activity originated in Eastern Europe, China, and the former Soviet republics. Some scammers buy fake birth certificates and IDs while others hack into databases. In March 2001, the FBI reported that 40 corporations in 20 states were targeted by hackers operating outside the United States. Activities compromised the security of more than 1 million credit card numbers stored by the hacked corporations. Most of the hacking activity originated in Eastern Europe, China, and the former Soviet republics.

How Identity Thieves Operate But the latest trend in identity theft is "skimming." Take a restaurant as an example. A waiter swipes your credit card two times: once for the meal, and once to copy all the data off the magnetic strip into a small device. But the latest trend in identity theft is "skimming." Take a restaurant as an example. A waiter swipes your credit card two times: once for the meal, and once to copy all the data off the magnetic strip into a small device.

How Identity Thieves Operate The criminal who supplied the waiter with the skimming device then downloads the swiped card's information into his or her computer, puts the information on counterfeit cards, and uses those cards to buy goods and services using your account. The criminal who supplied the waiter with the skimming device then downloads the swiped card's information into his or her computer, puts the information on counterfeit cards, and uses those cards to buy goods and services using your account.

How Identity Thieves Operate Even more computer-savvy crooks are loading merchants' credit card machines with "skimmer bugs" that program the machine to transmit card information to a remote location. Even more computer-savvy crooks are loading merchants' credit card machines with "skimmer bugs" that program the machine to transmit card information to a remote location.