Download presentation
Presentation is loading. Please wait.
1
Protecting Your Identity
Identity Theft Protecting Your Identity © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
2
Identity Theft The dollar loss suffered because of identity theft and consumer fraud was $1.8 billion in 2008. Federal Trade Commission The number of identity theft complaints filed in 2008 was 313,982. Approximately 7% of identity theft victims in 2008 were under 20 years of age. United States Department of Commerce © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
3
Identity Theft IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
4
Personal Identification Information Includes
Name Address and Telephone Number Social Security number Driver’s license number Bank account numbers Credit card numbers Passwords Bills © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
5
Ways Identity Thieves Acquire Information
Wallet/Purse Loss or Theft - Information is taken from a lost or stolen wallet/purse (most common method). Mail and Phones - Information is taken from mailboxes, a change of address form is completed, or personal information is solicited by phone. “Dumpster Diving” - Personal information is discarded carelessly either at home or by businesses and thieves remove it from the trash. “Insider Access” - Dishonest employees steal the information and either sell it or use it. Internet - Personal data taken off the Internet. Credit Reports – A credit report containing personal information may be obtained fraudulently. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
6
How Information Can Be Used
To apply for a new driver’s license To open new bank accounts To apply for credit cards or store credit accounts To obtain cash with bank cards To get a job To rent an apartment To make retail purchases © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
7
Identity Theft How Identity Theft Occurs & Prevention
© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
8
Credit Reports How Theft Occurs:
Thief fraudulently orders a credit report. Credit Reports – include all the accounts a person has, social security number, & personal information. Prevention: Check credit report once per year. Don’t leave reports lying around. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
9
3 Credit Reporting Agencies
© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
10
Mail How Theft Occurs: Thief steals mail to learn account numbers and personal information. Prevention: Deposit outgoing mail in post office collection boxes not unsecured mailboxes. Promptly remove mail from mailboxes. If on vacation, put a hold on mail. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
11
Wallets and Pocketbooks
How Theft Occurs: Thief steals a wallet or pocketbook containing a wealth of personal information. Prevention: Don’t leave it in plain site. Don’t hang from chair at public place. Use a purse which closes securely. Carry only what is absolutely needed. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
12
Bills How Theft Occurs:
A thief may steal bills containing consumer’s name, address, phone number, bank or credit account numbers, or social security. May use information to open new accounts. Prevention: Don’t leave statements lying around. Pay attention to billing cycles and follow up if bill does not arrive on time. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
13
Calling Cards How Theft Occurs:
If a thief has a calling card and personal identification number, it may be used to make long distance calls anywhere. Prevention: Use only cards which require a personal identification number. Block numbers from others view while dialing. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
14
Passwords How Theft Occurs:
If a thief has access to passwords, he/she can access accounts, send messages, and sell or purchase items. Prevention: Don’t give password to anyone. Don’t write passwords down where others may find them. Create unique passwords using a combination of numbers and letters. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
15
Work Records How Theft Occurs:
A thief who has access to work records may have a person’s personal information, social security numbers, or bank information. Prevention: Ensure personal records are locked securely with limited access by employees. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
16
Pre-Approved Credit Cards
How Theft Occurs: A thief may activate credit cards using pre-approved credit card offers and have the statements sent to a different address. Prevention: Shred any credit card offers received and not used. Cut up any pre-approved credit cards not used. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
17
Bank Account Information
How Theft Occurs: If a thief has a person’s bank account and routing number, he/she may create fake checks, withdraw money, or access savings accounts. Prevention: Don’t leave statements lying around. Use passwords. Don’t have checks mailed home. Pick them up at the bank. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
18
Social Security Number
How Theft Occurs: A social security number is the key to a person’s identity. It opens new accounts, obtain driver’s license, file bankruptcy, etc. Prevention: Never give our social security number. Ask for alternate number on driver’s license, insurance cards, and other materials. Do not carry social security card unless necessary. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
19
ATM, Credit, and Debit Cards
How Theft Occurs: A thief may withdraw money with both an ATM card and PIN number. Credit and debit cards are easy to use because most stores do not compare cards with another form of identification. Can easily be used to purchase merchandise over the phone or internet. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
20
ATM, Credit and Debit Cards
Prevention: Don’t leave cards lying around. Carry only those which will be used. Use debit cards which require a PIN number. Do not write PIN number down in same place debit card is kept. Carry cards in separate holder from wallet. Sign back of cards stating “Please see I.D.” © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
21
ATM, Credit and Debit Cards
Prevention cont.: Have a list of all cards and account numbers. Don’t give out account number unless making a purchase. Keep track of all receipts. Destroy papers with card numbers on them. Check statements for unauthorized charges. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
22
Identity Protection Shopping Online
© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
23
Why People Shop Online and Risks
Order products from around the world. Easily research items and compare prices. Can be done at any time in the convenience of own home. Risks Personal information including credit card numbers, social security number, financial records, and bank numbers can be used. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
24
Safety Tips for Shopping Online
Know the real deal Get all details before buying including prices, delivery time, warranty information, and return policies. Look for clues about security Make sure the browser states “https” or “shttp” indicating it is secure. Use a credit card Credit cards are the safest way because a person has the legal right to dispute charges. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
25
Safety Tips for Shopping Online
Use an escrow service An escrow service will hold a person’s money until confirmation of the product or services has been received. Keep proof handy Print and file all information in case needed later. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
26
Safety Tips for Shopping Online
Ask about “substitute” or “single use” card numbers Allows a person to use his/her credit card number without putting the real account number online. Get the scoop on the seller Check complaint numbers at the state or local consumer protection agency and Better Business Bureau. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
27
What to Do if Identity Theft Happens
© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
28
Immediate Steps Act immediately!
Keep a detailed record of correspondence and phone records. Contact the three major credit bureaus and request a “fraud alert.” Follow with a letter sent by certified mail. Close all accounts which have been tampered with or opened fraudulently. File a police report. File a complaint with the Federal Trade Commission. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
29
Credit Card Liability Truth in Lending Act limits liability for unauthorized charges to $50.00 per card. A letter must be received within 60 days of the first bill containing the error. The dispute must be resolved within 90 days of the creditor receiving the letter. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
30
ATM & Debit Cards, Electronic Transfers
The Electronic Funds Transfer Act provides protection. The amount a person is liable depends upon how quickly the loss is reported. Within two days is a maximum of $50.00. Within sixty days is a maximum of $ After sixty days a person may be liable for everything. To report a loss call the financial institution and follow up in writing. Get new bank numbers, personal identification numbers, and passwords. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
31
Check Liability Checks
Contact the financial institution and stop payment. Notify the check verification service. Most states hold the financial institution responsible for losses of a forged check. © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
32
STAY ALERT BE CAREFUL BE SMART
Identity Theft STAY ALERT BE CAREFUL BE SMART © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.