Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Part I: Making Good Online Choices
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
SECURITY CHECK Protecting Your System and Yourself Source:
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
BALANCING LIFE’S ISSUES, INC. Identity Theft Protection, Prevention and Self Help.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
How It Applies In A Virtual World
Identity Theft Kayla Brooks 7 th Grade Marshall Middle School Mr. Dryer.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
How can you protect yourself from online identity theft?
Scams & Schemes Common Sense Media.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
By: Asfa Khan and Huda Mukhtar
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
You. are at risk for the fastest growing crimes crime.
Narkeya White. WHAT IS IDENTITY THEFT? Occurs when a person gathers personal information to assume the identity of another person for illicit reasons.
Cyber Safety Jamie Salazar.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Jeff loses his identity! Lesson 5: Identity Theft.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Protecting Your Assets By Preventing Identity Theft
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
Protecting Your Identity:
Scams and Schemes.
Being Aware of What You Share
What is Phishing? Pronounced “Fishing”
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?

Warm-up – in your journal Do you know someone who has been scammed? What happened? What is the purpose of a scam? What tricksdo people use to carry out a scam? Can people get scammed on the Internet? How?

Learning Objectives Students will be able to... Students will be able to... understand what identity theft is and why it is important to guard against it. learn to recognize strategies that scam artists use to access private information. learn how to guard against phishing and identity theft.

What is Identity Theft? Identity Theft- The use of a variety of strategies to trick people into giving out their private information to: access their bank & credit card accounts access their bank & credit card accounts “recreate” someone else’s identity “recreate” someone else’s identity

What kind of information might identity theives look for? Full name Date of birth & where you live Current and previous addresses & phone numbers Driver’s license or passport numbers Account #’s & company names of accounts you have (e.g. Amazon, PayPal, etc.) Passwords Social Security #

Are you vulnerable? ANYONE ANYONE is at risk to an online scam.

IMPORTANT reasons why they are vulnerable- Identity thieves look for “clean” Social Security numbers that haven’t yet been used to get credit. They target teens and kids, who often have Social Security numbers that have no credit history yet. Identity thieves might sell or use these numbers, which would allow someone else to get a credit card or loan and build up debt under your name.

And Being a victim of identity theft can ruin your financial future and your ability to obtain loans and purchase things. For example, it could affect your ability to get a student loan for college or a loan to buy a car.

In addition, if you use your parents’ accounts and credit cards online, or fill out forms with your parents’ information, you are sharing information that could potentially put your parents’ identities at risk.

And It can take months, even years, to recover your identity if it’s stolen. Cleaning up such a mess takes a lot of time and energy, and it can also be expensive.

How to Catch a Phish Phishing - trying to obtain personal information online the best way to avoid phishing scams is to be skeptical about any online request for personal information.

Activity: Spotting Scams Work with a partner to complete your handouts. When finished, have your whole table group work together to compare your answers.

Protect Yourself from Online Scams Avoid opening the message or in the first place. Don’t click on any links or download any attachments. They might contain viruses or spyware. Don’t reply. Mark as “junk mail” or “spam” for your provider, or report it to your social network site. If you are concerned about an account you have with a company, contact its customer service by phone. Make sure you verify the company’s contact information elsewhere online first.

Wrap-up : In your journal What kinds of information do identity thieves look for?Why? How do thieves try to get at your information? What can you do to avoid falling for online scams?