BBB IDENTITY THEFT By Blake Bowland Computers III.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Protect Your Good Name Reduce Your Risk of Identity Theft Kevin Lewis
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity theft: Real or Virtual? By: Alex Metzler.
Identity theft By Joey Pawoll. intro DeterDetectDefend.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Be Cautious of Identity Theft By: Sydney Langley.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
Identity Theft: Protect Yourself By Rachel Gaines.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Protecting Your Identity Anders Olson Computers III September 18, 2008.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
By Austin Kellogg DeterDetectDefend 1.RealReal 2.VirtualVirtual 3.FTCFTC.
By: Asfa Khan and Huda Mukhtar
Identity Theft How it happens and how to avoid it.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Cyber Safety Jamie Salazar.
Presented By Plano Police Department Crime Prevention Unit.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protect Your Good Name Reduce your Risk of Identity Theft.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Identity Theft It’s a crime!
Reduce Your Risk of Identity Theft
Protecting Your Identity:
Reduce Your Risk of Identity Theft
Protecting Your Identity:
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Reduce Your Risk of Identity Theft
Protecting Your Credit Identity
Reduce Your Risk Of Identity Theft
Identity Theft By Kerry Freeman, EA.
Presentation transcript:

BBB IDENTITY THEFT By Blake Bowland Computers III

TYPES OF IDENTITY THEFT Virtual World Real World

VIRTUAL WORLD What does the virtual thief want? Where does the virtual thief find these? How can you defend yourself?

WHAT DOES THE VIRTUAL THIEF WANT? The thief wants to Capture information Create a new identity based on that information Use that identity to his or her own purposes

WHERE DOES THE VIRTUAL THIEF FIND THESE? On a personal computer such as Bank account numbers Electronic tax returns Family genealogy PDA data Insurance information Spreadsheets Word processing documents

HOW CAN YOU DEFEND YOURSELF? Your login/password/pin –Use unique passwords –Use passwords wherever you can –Change passwords regularly –Don’t set your system to “Remember my password” –Remember passwords, don’t write them down

HOW CAN YOU DEFEND YOURSELF? (CONT.) Purchase anti-virus software Keep operating system software updated Install a firewall Take precautions with Wi-Fi Be careful when using a file sharing program

TAKE INTO CONSIDERATION Beware of “Phishing” Be wary when using public internet kiosks or other people’s computers Don’t give personal information over the internet unless the site is secure

REAL WORLD What does the identity thief want? Where does the identity thief find these? How are these used? How can you defend yourself?

WHAT DOES THE IDENTITY THIEF WANT? Your social security card Your driver’s license Your account numbers (bank, credit card and others), PIN(s) and passwords

WHERE DOES THE IDENTITY THIEF FIND THESE? Your wallet or purse Your mailbox Your glove compartment Your trash You

HOW ARE THESE USED? Use your credit card for a buying spree Open new credit card accounts Change the mailing address on your existing credit card account Buy cars and take out auto loans Establish telephone or wireless phone service in your name

HOW ARE THESE USED? (CONT.) Open a bank account in your name File for bankruptcy under your name Apply for a job under your name Give your name to the police during an arrest

HOW CAN YOU DEFEND YOURSELF? Don’t carry your social security card or a document with your social security number on it in your wallet or purse Be careful with your credit/debit cards. Take self-defense measures for your mail. Be careful what you keep in your glove compartment

HOW CAN YOU DEFEND YOURSELF? (CONT.) Shred all of your trash containing personal information because some thieves go dumpster diving Don’t give out personal information in person, over the phone, by mail or on the internet unless you made initial contact or you trust the person to whom you are giving the information

FTC Click the logo to the right to view a power point from the FTC on ID theft

WHAT NOW? Now that you have learned how to protect your identity in the real and virtual world, go do it!

CITATION