DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

How to protect yourself, your computer, and others on the internet
Part I: Making Good Online Choices
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
SECURITY CHECK Protecting Your System and Yourself Source:
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
BALANCING LIFE’S ISSUES, INC. Identity Theft Protection, Prevention and Self Help.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Your Identity While Attending College.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
How can you protect yourself from online identity theft?
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
You. are at risk for the fastest growing crimes crime.
Cyber Safety Jamie Salazar.
Identity Theft One of America's fastest growing crimes.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Protecting Your Assets By Preventing Identity Theft 1.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Protecting Your Assets By Preventing Identity Theft
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Lesson 2- Protecting Yourself Online
Scams and Schemes.
Being Aware of What You Share
Personal Safety Online
Lesson 2- Protecting Yourself Online
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?

SCAMS & SCHEMES  Learning Objectives:  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access private information.  Learn how to guard against phishing and identity theft.

SCAMS & SCHEMES  Key Vocabulary  Scam: an attempt to trick someone, usually with the intention of stealing money or private information.  Things to Think About  Share Personal Scam Story  What is the purpose of a Scam? What tricks do people use to carry out a scam?  The ultimate purpose of a scam is to get someone to give the scammer money, or information that can help the scammer steal money (credit card number, ATM code, or passwords)  Scammers tell lies and often pretend to be someone they are not.  Can people get scammed on the Internet? How?  Someone can be tricked into buying a bad or fake product online.  Someone can be lured into sharing information that a scammer can use to steal form them.

WHAT IS IDENTITY THEFT?  People who scam other online don’t always have to get money.  They use a variety of strategies to trick people into giving out private information.  They use this information to access their bank accounts or other personal accounts.  They can even recreate someone’s identity to produce false documents like: social security cards, credit cards, or even a driver’s license in someone else’s name.  Key Vocabulary  Identity Theft: a type of crime in which your private information is stolen and used for criminal activity.  Vulnerable: in a position that makes it easier for you to be harmed or attacked.  What kind of personal information might identity thieves look for?  Full Name  Date of Birth  Place of Birth  Current or previous addresses & phone numbers  Driver’s license or passport number  Account numbers, plus who you have accounts with.  Passwords  Social Security Number

WHAT IS IDENTITY THEFT?  ANYONE is vulnerable to an online scam.  Reasons why teens could be vulnerable to identity theft and why it matters.  Identity thieves look for “clean” Social Security numbers that haven’t yet been used to get credit. They target teens and kids, who often have Social Security numbers that have no credit history yet. Identity thieves might sell or use these numbers, which would allow someone else to get a credit card or loan and build up debt under your name.  Being a victim of identity theft can ruin your financial future and your ability to obtain loans and purchase things. For example, it could affect your ability to get a student loan for college or a loan to buy a car.  In addition, if you use your parents’ accounts and credit cards online, or fill out forms with your parents’ information, you are sharing information that could potentially put your parents’ identities at risk.  It can take months, even years, to recover your identity if it’s stolen. Cleaning up such a mess takes a lot of time and energy, and it can also be expensive.

HOW TO CATCH A PHISH  Key Vocabulary  Phishing: when people send phony s, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information.  *Note: phishing s can be very convincing, and some may not contain many of the clues you just learned. A smart rule of thumb is to distrust any that asks you to provide private information.  The best way to avoid phishing scams is to be skeptical about any online request for personal information.  Be skeptical of online messages or posts from friends that seem out of character for them, which is a warning sign their accounts may have been hacked.

PROTECT YOURSELF FROM ONLINE SCAMS  If you ever encounter something online that you believe might be a phishing scam, you should observe the following rules.  Avoid opening the message or in the first place  Don’t click on any links or download any attachments. They might contain viruses or spyware.  Don’t reply  Mark as “junk mail” or “spam” for your provider, or report it to your social network site.  If you are concerned about an account you have with a company, contact its customer service by phone. Make sure you verify the company’s contact information elsewhere online first.

SCAMS & SCHEMES RECAP  What kind of information do identity thieves look for?  Private information such as: full name, address, date of birth, account numbers, and passwords.  How do thieves try to get at your information?  Thieves use phishing to try to get people’s personal information.  What can you do to avoid falling for online scams?  Be suspicious of online communication that asks for private information or posts from friends that seem out of character.  Do not Reply, click on any links, or open any attachments.  Notify your social network provider.  Contact the company's customer service by phone.  *Note the following website & *  (for people who feel their identity may have been stolen)  ( for continuous spam s)