“ ” Once in debt, interest is your companion every minute of the day and night; you cannot shun it or slip away from it; you cannot dismiss it; it yields.

Slides:



Advertisements
Similar presentations
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
Advertisements

1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Parachute Neighborhood Watch Presentation February 9, 2010.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft & Consumer Protection. Questions to Consider What are consumers rights and responsibilities? What are consumers rights and responsibilities?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Modules 9.1.  When someone knowingly deceives you for their own personal gain.  They convince you that something is true when it isn’t.  They make.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Identity Theft Andrew Schreiber Alex Demetriou Jessica Ferrell.
Be Cautious of Identity Theft By: Sydney Langley.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Identity Theft Project Erin L. Caraway Jacob Locke.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
By: Asfa Khan and Huda Mukhtar
Jeff loses his identity! Lesson 8: Identity Theft.
Identity Theft How it happens and how to avoid it.
You. are at risk for the fastest growing crimes crime.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
BBB IDENTITY THEFT By Blake Bowland Computers III.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Protecting Your Assets By Preventing Identity Theft
IDENTITY THEFT.
Identity Theft It’s a crime!
Protecting Your Identity:
When you get caught for Identity Theft
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Identity Theft & Consumer Protection
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

“ ” Once in debt, interest is your companion every minute of the day and night; you cannot shun it or slip away from it; you cannot dismiss it; it yields neither to entreaties, demands, or orders, and whenever you get in its way or cross its course or fail to meet its demands it crushes you. ~ J. Ruben Clark

Identity Theft “The crime of the 21 st century”

What is Identity Theft?  Identity theft happens when someone steals your personal information and uses it without your permission. It’s a serious crime that can wreak havoc with your finances, credit history, and reputation — and can take time, money, and patience to resolve.

CitiBank Identity Theft Protection commercials 

Statistics  More than 15 million US residents have their identities used fraudulently each year  Financial losses totaling upwards of $50 billion  About 7% of people age 16 or older were victims of identity theft in 2012  The majority of identity theft incidents (85%) involved a fraudulent use of existing account information, such as credit card or bank account information.

Zach Friesen  Applied for a job at 19  The store manager turned him down because of his terrible credit record—when he’s never had credit in his life!  Someone had rung up about $40,000 worth of bills under his name—when he was 7 years old.

Judith Collins professor of criminal justice at Michigan State University  Someone obtained her Social Security number in 1999 and used it to open 33 credit card accounts, ordering masses of merchandise to a post office box in California.  She uncovered about 25 other victims living within 45 miles of her home who all went to the same medical clinic.

Collins tells a story of a young woman at Michigan State…  She was studying in the library and left her backpack to go to the bathroom.  Someone stole her purse. Police believed she was casing the campus looking for someone who resembled her.  The thief used the student’s driver’s license to cash a bad check— unknown to the victim. Until the police showed up at her door on Christmas and arrested her.

18- to 29-year-olds are the Most Vulnerable  In 2003, 28% of identity theft cases  Why?  Lack of Knowledge  Teens typically don’t have credit reports, having never applied for a loan or a credit card. Their Social Security numbers lie dormant for years.  Invincibility Belief  According to the National Cybersecurity Alliance, 40% of Americans under 25 believe that they are more likely to be hit by lightning, audited by the IRS, or win the lottery.

How does Identity Theft Happen?  Lift records from workplaces  Stealing mail containing bank statements, credit card offers, and tax information  Rummage through trash  Use change of address forms to divert mail  Steal purses and wallets  Obtain credit reports by posing as a landlord or an employer.  Find a mother’s maiden name

Phishing Scams 

Once they collect enough personal information  change the billing address on an account, then run up charges  Open credit cards under the assumed name  Accounts become part of the victim’s credit report  Apply for phone or wireless service under stolen names  Open bank accounts and write bad checks on them  Buy cars  Get jobs  File fraudulent tax returns or file for bankruptcy  Criminal Identity Theft

Criminal Identity Theft  The use of any form of identification to deceive a law enforcement officer or agency into assigning a criminal act to the name of an identity theft victim.  Thieves use the identity of an innocent victim during the commission of other crimes. Those crimes may result in the innocent victim receiving a criminal record that they’re unaware of.  Once the name of an innocent identity theft victim is assigned to the criminal act, it can be very difficult for the identity theft victim to convince authorities that they are not the individuals who committed the crime.

A Horrifying Story   A woman had her ID stolen and then was charged for theft

Social Media/Technology/Smart Phones   “Technology breeds crime, it always does, it always will.”   How to protect your self from Facebook Identity Theft

5 Easy Things You Can Do   1. Read credit card statement carefully and often  2. Know your payment due dates  3. Read your health insurance plan statements  4. Shred documents with personal information  5. Review your credit reports at least one a year

7 More Easy Ways to Protect Yourself From Online Identity Fraud 

 1. Password protect login for all devices  2. Use strong passwords  3. Use an online/mobile password keeper  4. Add computer safety software to your devices  5. Be wary of personal information on social media  6. Only friend people that you know  7. Set ground rules for your kids  8. Check suspicious websites to avoid phishing

What To Do if You’re a Victim of Identity Theft   1. Place a Fraud Alert  2. Order your Credit Reports  3. File a complaint, then a police report

 Bethany purchased a new pair of shoes from the Internet. What steps should she take to ensure her identity was protected while making the purchase?

 Dana went out to dinner and left her credit card there. The next day she called the restaurant and they said they didn’t have the card. What should she do?

 Jacob has just finished writing bills. What steps should he take to ensure the bills reach their destination safely?

 Sam purchased a bicycle on credit. When he received his credit card statement, he noticed several charges he did not make. What should he do?