How can you protect yourself from online identity theft?

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Part I: Making Good Online Choices
Keep It Private VISD COMMON SENSE MEDIA CATEGORY: PRIVACY & SECURITY.
Ali Hammoud rd hour. Change your screen name Block that person from chatting with you Tell a parent or trusted adult Use Common Sense.
Internet Online Safety How to have FUN and Stay in Control.
Lathrop Intermediate School Cyber Savvy Week December 1 – December 5, 2014 Be RespectfulBe ResponsibleBe Safe College Prep Period – Wednesday, December.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
INTERNET SAFETY.
What is identity theft, and how can you protect yourself from it?
INTERNET SAFETY FOR STUDENTS
Identity Theft By: Caroline Branton, Laura Hunter, Sinead McFarlane.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Talking Safely Online Let’s Chat!. Share Your Online Experiences! Can you ever really know if an online-only friend is male or female? Can you know for.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
Identity Theft Kayla Brooks 7 th Grade Marshall Middle School Mr. Dryer.
Scams & Schemes Common Sense Media.
Safety! Jessica Brown. What Is the Point of Having an Online Space? It needs to be Safe Clean And Efficient.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Private and Personal Information Common Sense Unit l – Lesson 2 (Cross-Curricular Categories) Privacy and Security Information Literacy.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Internet Safety & Online Citizenship
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
A Creator’s Rights Essential Question: What rights do you have as a creator?
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Internet Survival Tips for Kids and Teens
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Safety and Security Online: Private Information. Identify private information Recall that private information should not be given out in cyberspace.
Rings of Responsibility
Cyber Safety Jamie Salazar.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Private Information Stay Safe Online. Having Fun Online There are lots of websites where you can go to do fun things To participate on many websites,
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
By Hessahn yousofi.  Internet is a global system of interconnected computer networks, a computer that connects to the internet can access information.
E- SAFETY PRESENTATION By: Mohamed Fathy Tip 1Tip 2Tip 3Tip 4Tip 5 And the What is e safety.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Safe and Secure: Choosing a Safe Screen Name
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
Appropriate Use of Technology
Scams, Identity Theft, and Viruses Kelly & Caitlin
Internet Safety Vocabulary
Internet Safety – Social Media
Online Safety: Rights and Responsibilities
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

How can you protect yourself from online identity theft?

 Learning Objectives ◦ Learn about the benefits of sharing information online, but also about the safety and security risks of sharing certain types of information. ◦ Understand what type of information can put them at risk for identity theft and other scams. ◦ Distinguish between personal information, which is safe to share online, and private information, which is unsafe to share.

 What types of information is okay to share publicly online, on a profile that others will see? ◦ Interests & Activities ◦ Opinions about games or movies ◦ First Name  What are some examples of websites where you must register in order to participate? ◦ Social Networking sites ◦ Video-sharing sites ◦ Youth discussion sites ◦ Ask-an-expert sites ◦ Game sites  Key Vocabulary ◦ Register (online): to enter your information in order to sign up and get access to a website.

 1) What information is required and why do you think it is required?  2) What information is optional, and why do you think it is optional?  3) Why do you think websites ask for this kind of information?  Note: when registering online for anything only the boxes marked with an (*) are required, everything else is optional.  1) This may include first name, user name, password, password hint, birth date, gender, the state you live in, parents permission, etc. Information may be required because it helps distinguish one person from another, or the website is keeping records of who uses it.  2) This may include parents , birthday, state, country, gender, etc. This is optional because the website does not require it for payment, distinguish one person from another.  3) Answers may vary, but typically they want to get people to pay for use, so they can send messages to registered users, or try to sell add- ons.

 Key Vocabulary ◦ Personal Information: info. that can’t be used to identify you, such as your age, gender, how many siblings you have, your favorite food, etc. (safe to share online) ◦ Private Information: info. that can be used to identify you, such as your social security number, street address, , phone number, etc. (unsafe to share online) SAFE – Personal Information UNSAFE – Private Information -Favorite Food -Your opinion (done respectfully) -First Name -Gender -Mother’s maiden name -Social Security # -Date of Birth -Parents’ credit card info. -Phone #

 Why would someone want to steal someone else’s identity on the internet? ◦ To steal money ◦ To do something bad or mean ◦ To hide their real identity  Key Vocabulary ◦ Identity Theft: when a thief steals someone’s private information in order to pretend to be that person  An identity thief uses private info. to pretend to be the person whose identity they stole.  They use the stolen identity to get a driver’s license & credit cards. (even if the original person is not old enough)  Identity thieves often target children & teens because they have clean credit and many parents are unlikely to be aware their child’s identity has been stolen.

 What kinds of private information could an identity thief use to find out and steal your identity? ◦ First & Last name ◦ Postal Address ◦ address ◦ Phone # ◦ Passwords ◦ Credit card #’s ◦ Social Security # ◦ Mother’s maiden name  What kinds of personal information could you share about yourself without showing your identity? ◦ Age ◦ Gender ◦ # of siblings ◦ Favorite band, food, or movie ◦ Pet type & name ◦ Your opinion (done respectfully)