Download presentation
Presentation is loading. Please wait.
Published byIris Dixon Modified over 10 years ago
3
Using someone else’s personal identifying information Usually for a financial benefit Can ruin your credit rating
4
Anybody Children The Elderly
5
Financial Insurance Medical Criminal Drivers License Social Security Synthetic Child
6
Most common 15 Million victims 50 Billion dollars Results: Credit card fraud Checking account fraud Savings account fraud Mortgage fraud Loan fraud Tax fraud
7
See a doctor Get prescription drugs Get other health care benefits Could threaten your life Could threaten your health Could lose health coverage
8
Use of a different name upon arrest Failed court appearance from victim Result in jail time for the innocent victim
9
Most complicated Steals bits and pieces of identity Creates a “new Person” Can then establish credit to use
10
Use of a child’s social security number Open bank accounts Credit card accounts Apply for a loan Rent a place to live
11
Jail Prison Repay Money
12
Do not carry important documents Keep them at home Check bank statements Shred receipts/returned checks Passwords
13
How thieves steal your personal and financial information: › They hack into computers to find names, important dates etc. › Look through garbage to find financial information such as a bank statement › Burglary-stealing wallets/purses/credit cards to find personal information
14
Open up new cards in your name Use your credit card to rack up charges Wire money out of your account Get a license in your name Collect government money due to you Rent/Lease cars and homes in your name
15
You see withdrawals from your bank account that you can’t explain Debt collectors call you about debts that aren’t yours Your account is flagged There is a warrant out for your arrest
16
Emotional stress and trauma Excessively paranoid Making new credit accounts in your name Hurts your credit score
17
FIRST, contact the fraud departments of each of the three major credit bureaus: › Equifax: www.equifax.comwww.equifax.com › Experian: www.experian.comwww.experian.com › TransUnion: www.transunion.comwww.transunion.com SECOND, close the accounts THIRD, file a police report
18
"The 8 Types of Identity Theft." About.com Identity Theft. N.p., n.d. Web. 03 June 2013. "Google." Google. N.p., n.d. Web. 03 June 2013. "Identity Theft." Definition. N.p., n.d. Web. 03 June 2013. "Financial Identity Theft Is the Most Common Form of ID Theft." Financial Identity Theft Is the Most Common Form of ID Theft. N.p., n.d. Web. 03 June 2013. "Consumer Information." Medical Identity Theft. N.p., n.d. Web. 03 June 2013. "Fact Sheet 17g: Criminal Identity Theft: What to Do If It Happens to You." Criminal Identity Theft: What to Do If It Happens to You. Privacy Rights Clearinghouse, n.d. Web. 03 June 2013. "Types of Identity Fraud." Synthetic Identity Theft. N.p., n.d. Web. 03 June 2013. "Consumer Information." Child Identity Theft. N.p., n.d. Web. 03 June 2013. http://www.pandemoniumonline.org/wp-content/uploads/2013/02/lock-and-key.png http://www.pandemoniumonline.org/wp-content/uploads/2013/02/lock-and-key.png http://www.micash.net/wp-content/uploads/2011/02/identitytheft.jpg http://www.micash.net/wp-content/uploads/2011/02/identitytheft.jpg http://appraisalnewsonline.typepad.com/photos/uncategorized/2007/11/18/idtheft.jpg http://appraisalnewsonline.typepad.com/photos/uncategorized/2007/11/18/idtheft.jpg http://blog.myid.com/wp-content/uploads/2011/05/child-identity-theft-victim.jpg http://blog.myid.com/wp-content/uploads/2011/05/child-identity-theft-victim.jpg http://www.stolenlostfound.org/images/identity-theft.jpg http://www.stolenlostfound.org/images/identity-theft.jpg http://www.ehow.com/facts_6049817_happens-people-commit-identity-theft_.html http://www.ehow.com/facts_6049817_happens-people-commit-identity-theft_.html http://www.identity-theft-scout.com/images/identity-theft-fraud.jpg http://www.identity-theft-scout.com/images/identity-theft-fraud.jpg http://www.credit.com/credit-reports/identity-theft/how-to-credit-report/what-do-thieves-do-with- stolen-identities.jsp http://www.privacymatters.com/identity-theft-information/how-identity-theft-committed.aspx
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.