WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.

Slides:



Advertisements
Similar presentations
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Advertisements

Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
C REDIT H ISTORY A ND R ATINGS 1 Copyright © Texas Education Agency, All rights reserved.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
BY REBECCA HIGGINS Identity Theft. What is Identity Theft? Identity Theft is when someone illegally steals your personal information, usually for personal.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Beware! Consumer Fraud Module 9.1.
Protecting Your Identity While Attending College.
Identity theft By: Blake D uncan.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Jeff loses his identity! Lesson 8: Identity Theft.
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Computer crimes.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Identity Theft One of America's fastest growing crimes.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft!!! Bill Ketjen Matt Grodhaus Two forms of crime IDENTITY THEFT  Using personal information for deception IDENTITY FRAUD  Using personal.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
Protecting Your Identity From Fraud Clarissa Goins, VP Compliance Karen Osterhoudt, VP Operations.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
Done by… Hanoof Al-Khaldi Information Assurance
IT Security  .
Protecting Your Identity:
When you get caught for Identity Theft
Identity Theft Samuel H. Slater.
Presentation transcript:

WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security number, or any other part of a persons identity. The term was first coined in 1964 Considered the fastest growing crime in America

WHAT MOTIVATES IDENTITY THEFT? More often than not, criminals are motivated by the financial gain that they can receive. Many use the stolen information to obtain a line of credit under the victims name, or use the information to gain access to the victims bank accounts, or they sell it to someone else who has the same intentions It is very hard to track the criminal, due to the anonymity of the internet and because many victims may not notice the damages until it is too late

COMMON METHODOLOGIES Historically, dumpster diving, “shoulder surfing”, and postal theft were the most common methods used by thieves. With the advent of computers, the internet, and online banking/billing, the battle has moved to the internet

COMMON METHODOLOGIES CONT’D Now the thieves have moved to cyber space to commit their crimes. Commonly use a tactic called “phishing” This type of theft has caused $5 billion in damages worldwide. Usually try to target the elderly, or less technologically literate users.

BUT IT’S NOT ALWAYS ABOUT THE MONEY… A form of identity theft known as Medical Identity Theft has been emerging in recent years. Medical identity theft is when someone uses an individual’s name and personal identity to fraudulently receive medical service or prescription drugs and goods 29 percent of all identity theft was found in medical records in 2013

MEDICAL IDENTITY THEFT Many consider this a victimless crime, however this is not the case. Leads to an inaccurate medical history, which can cause a misdiagnosis, mistreatment, or the victim to be given incorrect prescriptions. 313,000 reported cases so far in 2013, with 1.84 reported cases to date.

WHAT CAN BE DONE? There are many things that an individual can do to mitigate their risks: Check bank balances and transaction history often Do not divulge sensitive information without full knowledge of how it will be used and why it is needed Put all personal information in a paper shredder before throwing it away Be weary of s asking for banking/personal information and report them immediately. When in doubt, call your bank