Download presentation
Presentation is loading. Please wait.
Published byChristina Murphy Modified over 9 years ago
1
Identity theft: Real or Virtual? By: Alex Metzler
3
Real Or Virtual The decision is yours…
4
Real Table of Contents What are the three pieces of information thieves look for?What are the three pieces of information thieves look for? Where do they get personal information? How is it used? How can you protect yourself?
5
What are three pieces of information thieves look for? Account number Driver’s license Social Security number
6
Where do they get personal information? Wallet or Purse Mailbox Glove Compartment Trash You
7
How is it used? Credit Cards –Go on a buying spree –Open new accounts –Change the credit card mailing address –Buy cars –Counterfeit debit cards
8
How is it used? (Cont.) Other personal documents –Establish telephone lines in your name –Counterfeit checks –Open bank account in your name –File bankruptcy under your name –Use your name when arrested
9
How can you protect yourself? Wallet or Purse –Don’t carry personal information unless needed Credit/Debit Cards –Cancel unused cards Cut up into tiny pieces Throw away
10
How can you protect yourself? (Cont.) –Don’t carry excess cards unless needed –Don’t write (PIN) on the card Have them use your photo ID Make copy of cards; Keep them safe –You can cancel cards if stolen –Keep credit reporting agencies from sending offers
11
How can you protect yourself? (Cont.) –http://www.equifax.com/home/en_us, http://www.experian.com/, http://www.transunion.com/ are three credit reporting agencieshttp://www.equifax.com/home/en_us http://www.experian.com/http://www.transunion.com/ Mailbox –Take outgoing mail to Post Office Also Postal Box Glove Compartment –Remove any/all personal information
12
How can you protect yourself? (Cont.) Trash –Shred all personal papers You –Don’t give out personal information i.e. in person, telephone, mail, or internet –Secure personal papers
13
How can you protect yourself? (Cont.) –i.e. safe, locked drawer, locked box If personal information needed, ask questions: –How is it going to be used? –How is it going to be protected? –What happens if not provided?
14
Virtual Table of Contents What does a thief want? Where do they get it? How do you protect yourself?
15
What does a thief want? Capture your personal information Create a new identity –Based on you –Use that identity for own purposes
16
Where do they get it? Anywhere from your personal computer They can get your: –Bank account information or e-tax returns –PDA data or spreadsheets –Anything with personal information they want
17
How do you protect yourself? Use unique passwords –Use one when you can –Change them regularly –Don’t set to “Remember My Password” –Don’t write them down
18
How do you protect yourself? (Cont.) Get Anti-Virus software –Always keep up to date Keep OS system up-to-date Install firewall –“Software barrier” Take caution with Wi-Fi
19
How do you protect yourself? (Cont.) P2P –You get files, so can they From others or yourself DON’T GIVE OUT PERSONAL INFORMATION Beware of “Phishing” –Use fake emails, trick you for information
20
How do you protect yourself? (Cont.) Pay attention to “caching” –Computer remembers where you have been Secure site will have an “s” –Always after http; i.e. https://
21
Keeping Your Computer Safe Since 1976!
22
DETER Shred all personal papers Protect Social Security Number Keep important information locked up Never give out personal information unless secure Use hard Passwords
23
Detect Signs of ID theft: –Bills don’t arrive –New credit card accounts Check your credit score often Review Financial statement
24
Defend Place Fraud Alert on credit report Close tampered with accounts –Call company’s fraud department File a police report Report theft to FTC
25
Additional Information: ID Theft: What It’s All About Deter, Detect, Defend Brochure
26
Thanks For The Help BBBOnline. http://www.bbbonlince.org/IDTheft/virtual.asp. 2003 BBBOnline. http://www.bbbonlince.org/IDTheft/protect.asp. 2003 Federal Trade Commission. www.ftc.gov/idtheft. Federal Trade Commission. http://www.ftc.gov/bcp/edu/microsites/idtheft/images/iden tity-theft-symbols.gif
27
Keeping Your Computer Safe Since 1976!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.