IDENTITY THEFT. Identity Theft Defined When someone uses another person’s name, address, social security number, bank or credit card account number, or.

Slides:



Advertisements
Similar presentations
IDENTITY THEFT Protect Yourself and Your Good Name ITT Employees Federal Credit Union.
Advertisements

Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
Parachute Neighborhood Watch Presentation February 9, 2010.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
Identity Theft “When Bad Things Happen To Your Good Name” El Camino Community College Police Department Sgt. Kirk Johnston Josh Armstrong.
1 Identity Theft and Phishing: What You Need to Know.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Identity Theft and the Impact on the Telecom Industry Debbie Ogle Corporate Security Fraud Manager January 27, 2005.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft By: Nakeisha Barnett Thursday 2-3:15 3/4/06.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Presented By The Plano Police Department Crime Prevention Unit.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 13-1 Today’s Topics n Consumer Fraud.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Fraud Examination, 3E Chapter 15: Consumer Fraud COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Identity Theft Project Erin L. Caraway Jacob Locke.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Understanding and Preventing.  Acquiring someone’s identifying information and impersonating them for gain.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
CHAPTER 9 CREDIT PROBLEMS AND LAWS LESSON 9-1: RESOLVING CREDIT PROBLEMS Learning Goals -Explain how to dispute errors on billing statements and list ways.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Presented By Plano Police Department Crime Prevention Unit.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Chapter 6 What is identity theft?.  What are the three Credit Bureaus which you can obtain your FICO SCORE?  Is a high FICO score a measure of winning.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Beware! Identity Theft. Imagine getting a letter from the Internal Revenue Service (IRS) demanding that you pay $5,700 in back taxes. That’s what happened.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Assets By Preventing Identity Theft
IDENTITY THEFT.
Identity Theft It’s a crime!
#1 Consumer Fraud Complaint – 5th straight year!
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Identity Theft and Credit Safety
15 Consumer Fraud.
Presentation transcript:

IDENTITY THEFT

Identity Theft Defined When someone uses another person’s name, address, social security number, bank or credit card account number, or other identifying information to commit fraud or other crimes.

Consequences of Identity Theft Generally, the loss of credit, reputation, and erroneous information included in a person’s credit report and/or police file are more significant than the actual loss of money.Generally, the loss of credit, reputation, and erroneous information included in a person’s credit report and/or police file are more significant than the actual loss of money. We should all strive to prevent identity theft because once it happens, it is difficult, expensive and time consuming to investigate and resolve it.We should all strive to prevent identity theft because once it happens, it is difficult, expensive and time consuming to investigate and resolve it.

Common activities of identity theft perpetrators include the following: Buys big-ticket items like big-screen TV’s, etc.Buys big-ticket items like big-screen TV’s, etc. Takes out car/home/other loansTakes out car/home/other loans Establishes phone/cell phone/internet service in the victim’s nameEstablishes phone/cell phone/internet service in the victim’s name Opens a new bank account and then “bounce” checksOpens a new bank account and then “bounce” checks Files bankruptcy so the victim won’t know about the new “unpaid” accountsFiles bankruptcy so the victim won’t know about the new “unpaid” accounts Gives the victim’s name to police when arrested and then skips bailGives the victim’s name to police when arrested and then skips bail Opens new credit card accountsOpens new credit card accounts Changes mailing addresses on current credit card accountsChanges mailing addresses on current credit card accounts

Fraudster’s Get Personal Information By Posing as a legitimate employee, government official, or representative of an organizationPosing as a legitimate employee, government official, or representative of an organization Rummaging through consumers’ trashRummaging through consumers’ trash Skimming credit cards when victims pay their bills (involves using an information storage device to gain access to credit card information when processing your credit card)Skimming credit cards when victims pay their bills (involves using an information storage device to gain access to credit card information when processing your credit card) Stealing information from an employer, hacking into a company’s computers or bribing an employee with access to confidential recordsStealing information from an employer, hacking into a company’s computers or bribing an employee with access to confidential records

Fraudster’s Get Personal Information By Stealing wallets/pursesStealing wallets/purses Sneaking into victims’ homes to steal informationSneaking into victims’ homes to steal information Completing a “change of address form” and having the victims’ mail delivered to either a PO box or the fraudsters’ addressCompleting a “change of address form” and having the victims’ mail delivered to either a PO box or the fraudsters’ address PhishingPhishing – app/shared/assets/page/example_messages app/shared/assets/page/example_messageshttp:// app/shared/assets/page/example_messages

Minimize the Risk Guard your mail from theft – have the post office hold your mail when you’re out of townGuard your mail from theft – have the post office hold your mail when you’re out of town Opt out of pre-approved credit cards (call )Opt out of pre-approved credit cards (call ) Guard Social Security cards and numbersGuard Social Security cards and numbers Safeguard all personal informationSafeguard all personal information Guard trash from theft (shred receipts, bank & credit card statements, etc.)Guard trash from theft (shred receipts, bank & credit card statements, etc.) Protect your home, wallet, and other valuablesProtect your home, wallet, and other valuables Protect passwords/personal computersProtect passwords/personal computers

After Identity Theft Occurs 1.Immediately contact the Federal Trade Commission (FTC) at Call the local FBI office and/or Secret Service agency 3.Call the local police 4.For tax related matters, call the IRS at Notify the Social Security Administration at Notify your bank, credit card companies, etc.

Federal Trade Commission Identify Theft website: Identify Theft website:

Chase Websites Chase Identify Theft Kit Website: Identify Theft Kit Website: Chase definition of “Phishing” page/PhishingChase definition of “Phishing” page/Phishing page/Phishing page/Phishing Chase warnings page/fraud_ sChase warnings page/fraud_ s page/fraud_ s page/fraud_ s Chase “Phishing” examples page/example_messagesChase “Phishing” examples page/example_messages page/example_messages page/example_messages Chase: Identify Theft FAQ page/Report_FraudChase: Identify Theft FAQ page/Report_Fraud page/Report_Fraud page/Report_Fraud

References Fraud Examination (2 nd ed) by Albrecht, Albrecht, and Albrecht, pgs Fraud Examination (2 nd ed) by Albrecht, Albrecht, and Albrecht, pgs Chase websitesChase websites FTC websiteFTC website