Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Protecting Your Identity: What to Know, What to Do.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Debit cards Shumate – 5th Period.
S T R I C T L Y P R I V A T E A N D C O N F I D E N T I A LS T R I C T L Y P R I V A T E A N D C O N F I D E N T I A L © 2008 JPMorgan Chase & Co. All.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Session 16 Fraud Alert: Avoiding Scholarship Scams, Phishing, and Identity Theft Cindy Forbes Cameron Steven Horn Natalie Forbort (San Diego) Steven Borders.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Collegezone.com The trusted source for college information. Paying for College The Financial Aid Process.
Financial Aid 101 EVERYTHING YOU NEED TO KNOW ABOUT FINANCIAL AID.
What is Identity Theft? The theft, misrepresentation or hijacking of another person or business’ Identity It is a growing problem in Canada Fraud Provides.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Cybersafety.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Scams & Schemes Common Sense Media.
Identity theft: Real or Virtual? By: Alex Metzler.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Financial Aid 101 EVERYTHING YOU NEED TO KNOW ABOUT FINANCIAL AID.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Beware! Identity Theft. Imagine getting a letter from the Internal Revenue Service (IRS) demanding that you pay $5,700 in back taxes. That’s what happened.
Protecting Your Assets By Preventing Identity Theft
Done by… Hanoof Al-Khaldi Information Assurance
Phishing, what you should know
FJUHSD Teacher Librarian
Phishing is a form of social engineering that attempts to steal sensitive information.
Social Media Cybersafety.
When you get caught for Identity Theft
Protecting Yourself from Fraud including Identity Theft
Don’t Get Scammed on Your Way to College and Avoiding Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost

Common Financial Aid Programs Common Aid Programs Federal Pell Grant Academic Competitiveness Grant (ACG) National Science and Mathematics Access to Retain Talent Grant (SMART) Federal Supplemental Educational Opportunity Grant (SEOG) Minnesota State Grant Federal Perkins Loan Federal/State Work-Study Stafford Loans PLUS Loans SELF Loans Alternative Loans

Scholarship Resources Colleges High School Private business scholarships Civic organization scholarships Religious groups Local library resources Place of employment

Other things to know about applying for financial aid: Apply early The information reported on the FAFSA is confidential and is used ONLY to determine financial aid eligibility You may be asked to submit documentation to the financial aid office for verification purposes Supplemental applications or forms may be required Keep track of application DEADLINES! Keep a copy of everything you submit You must reapply every year

Avoid Scholarship Scams Avoid scholarship scams For information and tips to avoid scholarship scams: Students.htm Federal Trade Commission: U. S. Department of Education:

What types of questionable practices are out there? Older Schemes: ◦Paid Search Services ◦Scholarships For Profit ◦Claims Made:  “You can’t get this info anywhere else”  “We’ll do all the work” More Recent: ◦Financial Aid “Seminars”  General, common-sense info to group, then one-on-one sales pitch  Claims include “the process is too complicated; you need our help” 7

Avoid Scholarship Scams View with caution any service that requires you to pay Report Scams While most scholarship services are legitimate, some may be fraudulent and might charge a lot of money for little information. Better Business Bureau High School Counselor Financial Aid Office Friends

What is phishing? Typical social engineering schemes use “spoofed” s to direct users to counterfeit Web sites. Use of spyware, key loggers to capture personal data. 10 Use of social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials.

Phishing Prevention Don't use links in an to get to any Web page if you suspect the message might not be authentic ◦Instead, call the company on the telephone or log onto its Web site directly by typing in the Web address in your browser 11

Phishing Prevention Always ensure you're using a secure Web site when submitting credit card or other sensitive information via your Web browser ◦To make sure you're on a secure Web server, check the beginning of the Web address in your browser’s address bar - it should be " rather than just " Avoid filling out forms in messages that ask for personal financial information ◦You should only communicate information such as credit card numbers or account information via a secure Web site or the telephone 12

Phishing Prevention Regularly log into your online accounts ◦Don't leave it for as long as a month before you check each account Regularly check your bank, credit and debit card statements to ensure that all transactions are legitimate ◦If anything is suspicious, contact your bank and all card issuers Ensure that your browser is up to date and security patches applied Consider installing a Web browser tool bar to help protect you from known phishing fraud Web sites 13

What Can be Done? Be suspicious of any with urgent requests for personal financial information ◦Unless is digitally signed, you can't be sure it wasn't forged or “spoofed” ◦Phishers typically include upsetting or exciting (but false) statements in s to get people to react immediately ◦They typically ask for info such as usernames, passwords, credit card numbers, Social Security numbers, etc. ◦Phisher s are typically NOT personalized, while valid messages from your bank or e- commerce company generally are 14

Identity Theft – What is it? When someone, without lawful authority, knowingly transfers or uses a “means of identification” of another person with the intent to commit, or aid or abet, any unlawful activity that violates federal law, or that constitutes a felony under any state or local law. Identity Theft and Assumption Deterrence Act of USC § 1028a (7) 16

A review of the problem What is the problem? ◦Fastest growing crime in the country ◦25 million victims, 10 million in 2004 ◦Sheer numbers swamp law enforcement 17

Further thoughts on the problem What’s the harm? ◦600 hours spent to restore identity and credit ◦$1,400 out-of-pocket costs to victim ◦$16,000 in lost productivity of victim ◦$40,000-$92,000 business community losses per stolen identity Source: Identity Theft Resource Center 18

How do they get the information? Dumpster divers Mail thieves Burglary and personal theft Insider compromises Phishing Internet sources and hacking 19

Reducing risk Drop outgoing mail in a USPS box, not your home mailbox Limit the number of credit cards you carry Don’t carry your Social Security card We DO NOT know who might look through our trash Shred sensitive documents Secure shred barrels and make sure that proper handling procedures are in place 20