Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Financial Recordkeeping
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
The Risks of Identity Theft IDENTITY THEFT VICTIMS COULD: Have any and all of their financial accounts invaded and emptied.Have any and all of their financial.
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
SECURITY CHECK Protecting Your System and Yourself Source:
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft Identity theft occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information. Individuals.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Modules 9.1.  When someone knowingly deceives you for their own personal gain.  They convince you that something is true when it isn’t.  They make.
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
NEFE High School Financial Planning Program Unit 5 – Your Money: Keeping it Safe and Secure Credit Unions and Banks For-profit companies owned by shareholders.
Internet Safety Dr. Steve Broskoske Misericordia University.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Unit Five Your Money: Keeping It Safe and Secure Part IV Info from: NEFE High School Financial Planning Program.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
St. NEFE High School Financial Planning Program Unit 5 – Your Money: Keeping it Safe and Secure Credit Unions and Banks For-profit companies owned by.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Unit 5 Protecting Your Money Starting on p. 59. What Do You Think? Complete the “What Do You Think?” activity on p. 60.
Identity theft: Real or Virtual? By: Alex Metzler.
NEFE High School Financial Planning Program Unit 5 – Your Money: Keeping it Safe and Secure Bellwork K WL List 5 items you already KNOW about banks, credit.
Unit Five Your Money: Keeping It Safe and Sound Part I Info from: NEFE High School Financial Planning Program.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Be Cautious of Identity Theft By: Sydney Langley.
The Risks of Identity Theft IDENTITY THEFT VICTIMS COULD: Have any and all of their financial accounts invaded and emptied Be asked to repay debts they.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
The Risks of Identity Theft IDENTITY THEFT VICTIMS COULD: Have any and all of their financial accounts invaded and emptied.Have any and all of their financial.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Protecting Your Identity Anders Olson Computers III September 18, 2008.
You. are at risk for the fastest growing crimes crime.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
BBB IDENTITY THEFT By Blake Bowland Computers III.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Credit and debt management. Student Learning Objective Compare and contrast the financial benefits of different products and services offered by a variety.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
NEFE High School Financial Planning Program Unit 5 – Your Money: Keeping it Safe and Secure Credit Unions and Banks For-profit companies owned by shareholders.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Banking & financial Institutions
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Unit 5 - Your Money: Keeping it Safe and Secure.
Protecting Yourself from Fraud including Identity Theft
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Fraud

Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create huge problems for you…

Cleaning up the mess People whose identities have been stolen can spend… Months to even YEARS and can cost THOUSANDS of dollars to clean up the mess thieves leave.

Once your identity is stolen… Thieves have many options once they have your identity, INCLUDING: 1) Open new credit card accounts – When they don’t pay, it shows up on your credit report 2) Opening new checking accounts and writing bad checks in your name 3) Forging your signature on blank checks and draining all the money in your account

Thieves may… 4) File for bankruptcy under your name to avoid paying debts they’ve incurred under your name to avoid eviction.

Thieves may… 5) Buy a car buy taking out a loan under your name and information

Thieves may… 6) Get a driver’s license issued in your name but have their picture.

Thieves may… 7) Give your name during an arrest. If they don’t show up for their court date, then you have a warrant out for your arrest.

Thieves may… 8) Changing the billing address on your credit card. – They may also complete a “change of address” form at the post office – This will make all your bills go to their house which will allow them free range of all your personal information.

Crafty Thieves “Fishing for Mail”

Crafty Thieves “Dumpster Divers”

Crafty Thieves “Skimming” Use of electronic devices that thieves put in ATMs and many now are inserting them into Gas Pumps.

Crafty Thieves “Pretexting” Thieves call to tell you there’s been a “problem” with one of your financial accounts. They then ask, “Please give us your address and account number to verify your identity.” Real companies verify your identity by asking “mother’s maiden name,” not your account #. Only give out personal information if you call the company.

Internet Thieves “PHISHING” or pop-up message that looks like a bank or other financial institution, indicating there is a problem with your account. Will have a link to “click” to “update” your account information.

1 SCAMMED! 5-N The news of my father death, and my uncle,s involvement in an air crash in december 2002 while on a business trip to benin republic caused my mother heartfailure and other related complications of which she later died in the hospital After we have spent a lot of money on her. Before our mother died, she told us that our father deposited some money which he made from diamond sales and contracts at this bank here in Ivory Coast and that we should pray and find a trust worthy foreign business partner who would help us to transfer and invest this money in profitable business venture overseas.She told us to do this quickly so that we can leave Ivory Coast and, then settle down abroad. She gave us the bank document to prove the deposit and then told us that my father used my name as the next of kin and beneficiary to the money in the bank in the event of his death. If you are willing to assist us, please let us know immediately so that you will arrange the transfer of the money to your account with the bank. What’s Going on Here? What’s Going on Here? 2

Internet Thieves “FREEWARE or FREE SOFTWARE” Example: LIMEWIRE File sharing freeware is especially bad as it allows criminal’s free rein of your computer. Check the software’s sharing permissions. – If you don’t, you may not notice that you are giving others access to your entire hard drive, including tax returns. Not all “freeware” is bad, but you must be careful with it. If you intend to use this, make sure you read the agreements to see what you’re saying “yes” to.

Internet Thieves “SPYWARE” Bad side effect of free downloads – even those sent to you by friends or co-workers. Spyware monitors or can even control your computer use. Spyware is used to send you pop-up ads, redirect your computer to unwanted Web sites, monitor your Internet surfing, or record your keystrokes, which could lead to identity theft.

Dealing With Deception You walk up to an ATM and a guy who appears to be waiting his turn walks up behind you. But he’s uncomfortably close—right over your shoulder—as you get ready to enter your PIN. 5-O-1 What should you do? 1 of 7

You’re at a cash register in a store and have given the clerk your credit card. She holds on to it, probably to verify your signature. But then she says she needs to grab something from the back and starts to walk away with your card in hand. 5-O-2 What should you do? Dealing With Deception 2 of 7

A caller says she’s from your credit card company and wants to offer you a higher credit limit for being such a good customer. You reply, “Great, what do I have to do?” And she tells you to give her your Social Security number for verification. 5-O-3 What should you do? Dealing With Deception 3 of 7

You’ve found a pair of shoes at a great price on a Web site you just found. You start the check-out process and notice that the padlock at the bottom of your computer screen is open and that the Web page address starts with “http” instead of “https.” 5-O-4 What should you do? Dealing With Deception 4 of 7

You get an from an online bookstore you frequently buy from. It says that the credit card on your account has expired and gives you a link to update your information. 5-O-5 What should you do? Dealing with Deception 5 of 7

Your friend sends you an about cool new software that lets you share music with others for free. He sends you the link to download the software, which is from a site you’ve never heard of. 5-O-6 What should you do? Dealing With Deception 6 of 7

You’re bummed out about losing in an online auction. But then you get an stating the winner backed out and that you can have the item if you still want it, and to just send your credit card information via . 5-O-7 What should you do? Dealing With Deception 7 of 7

10 SMART STEPS to PROTECT YOUR IDENTITY

Step 1 Don’t leave your wallet, credit card statements, checkbook, lying around – Even in your car. – Also, don’t carry your SS card with you. FTC (Federal Trade Commission) estimates that 25% of victims know the identity thief.

Step 2 Sign new credit cards as soon as you receive them. Cut up and discard expired cards. Tear/Shred unwanted “pre-approved” credit card applications.

Step 3 When you sign receipts, draw a line through any blank spaces above the total.

Step 4 Never give your Credit card # or SSN to anyone over the phone unless you initiated the call. NEVER SEND THESE VIA …. IS RARELY SECURE.

Step 5 Always keep PINs for your credit/debit card completely confidential. DON’T WRITE THEM ON YOUR CARDS.

Step 6 Review your monthly bank statements carefully to make sure you don’t have any unauthorized charges.

Step 7 Shred any information that has your SSN or any account # on it that you don’t need. Best optimal shredder is Diamond Cut Shredder

Step 8 On your computer, install and use FIREWALL, ANTI-VIRUS, and ANTI-SPYWARE software. Keep these up to date

Step 9 Don’t fall for scams. Legitimate businesses that call you WON’T ask you for your account # or your SSN.

Step 10 When you buy something on the Internet, check that the page is SECURE before entering your credit card number. You will see a symbol of a “padlock” or “unbroken key” in the bottom browser. OR, the sites address starts with “https” – NOTICE THE “s.” That stands for “secure”