 people will go through your trash to get credit card numbers. Like old mail that you threw away, had your number on it a lot of the time its with.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Your Credit History consumer.gov. You and your credit Have you ever had: – Credit card? – Loan? – Utilities in your name? – Cell phone with a monthly.
Debt is when you owe someone money. The someone can be a bank (like a house loanalso known as a mortgage, or a car loan), OR the someone can be a credit.
Chapter 23.1 Use your Money Wisely
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
INTERNET SAFETY.
Debit cards Shumate – 5th Period.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Fastest Growing Crime in America. IDENTITY THEFT IS COSTING YOU BIG MONEY. 10 million people are effected by identity theft each year. More than 46 million.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
Threats to I.T Internet security By Cameron Mundy.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
Unit 5 Protecting Your Money Starting on p. 59. What Do You Think? Complete the “What Do You Think?” activity on p. 60.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
ICT Impact on Society By Charlotte Lee 7A2. Introduction The impact on society is very great. With all the new gadgets and devices, the world cant live.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
EEmployers check your Facebook or twitter page to look at way you talk about colleges or customer. they are looking at your privy and binness. And never.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Protecting Your Identity Anders Olson Computers III September 18, 2008.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
By: Asfa Khan and Huda Mukhtar
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
VALHALLA PTSA November 17, 2015 Dr. Amy Fox. Teens spend a 'mind-boggling' 9 hours a day using media
What is a Virus? A virus is something that you get in any shape or form. You could receive an that has an interesting title, but not know who is.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Activity 3 Identifying the Risks. Questions What do you do online? What sort of sites do you visit? Have you ever had a bad experience online?
By: Nikki Tucker MARSHALL MIDDLE SCHOOL 7 TH GRADE MR. DRYER.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Category.
Mrs. Esman Computer Special
Phishing, identity theft, and more
 Evolution is a personal information management application that provides integrated mail, address book and calendaring functionalities.
Unit 4 IT Security.
Safe Internet Mechatronika Budapest.
Find The Best Yahoo customer service number
Cybercrime By: Kimberly Foreiter
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

 people will go through your trash to get credit card numbers. Like old mail that you threw away, had your number on it a lot of the time its with bills. They will take your credit card number and charge stuff from your account.  +

Sometimes you might get a fake call telling you that you won a trip to something or you won a certain product, wanting you to give them your credit card number. All they are trying to do is get you to give them your credit card so they can steel it and charge your account.

 An easy way to get your credit card number is to take your mail. Your mail can get taken from you very easily. They can just go up to your mailbox and take the number and the check.

 Thefts also take checks. They can take it through your mail, very easily. They can put tape over your signature, put the check in chemicals and everything you wrote on the check will be gone but the signature. They will then have the power to buy whatever they want with the check because your name is on it.

 Phishing is when you get scammed with an . The type that say stuff like “ Hey! Congrats! You just won a free trip to Hawaii! All we need if your credit card number so we can book the flight!” They wont give you a free trip to Hawaii, all they want is your credit card.

 Your credit card can also be stolen by a pop up coming up about buying something and right when you put your credit card number in to buy it, they have it and they will charge your account and not send you what they were supposed to get.

 If you are paying for something over the phone you should be careful because there are cell phone hackers and they can listen to your whole conversation.

 You can get your identity stolen through hackers too. They can hack into your computer and find it.

 People can steel your address and get your mail, then take your bills and credit card number.

 7kbD_W8  Here is a video about identity theft, and how to prevent it.