Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identity theft: Real or Virtual? By: Alex Metzler.

Similar presentations


Presentation on theme: "Identity theft: Real or Virtual? By: Alex Metzler."— Presentation transcript:

1 Identity theft: Real or Virtual? By: Alex Metzler

2

3 Real Or Virtual The decision is yours…

4 Real Table of Contents What are the three pieces of information thieves look for?What are the three pieces of information thieves look for? Where do they get personal information? How is it used? How can you protect yourself?

5 What are three pieces of information thieves look for? Account number Driver’s license Social Security number

6 Where do they get personal information? Wallet or Purse Mailbox Glove Compartment Trash You

7 How is it used? Credit Cards –Go on a buying spree –Open new accounts –Change the credit card mailing address –Buy cars –Counterfeit debit cards

8 How is it used? (Cont.) Other personal documents –Establish telephone lines in your name –Counterfeit checks –Open bank account in your name –File bankruptcy under your name –Use your name when arrested

9 How can you protect yourself? Wallet or Purse –Don’t carry personal information unless needed Credit/Debit Cards –Cancel unused cards Cut up into tiny pieces Throw away

10 How can you protect yourself? (Cont.) –Don’t carry excess cards unless needed –Don’t write (PIN) on the card Have them use your photo ID Make copy of cards; Keep them safe –You can cancel cards if stolen –Keep credit reporting agencies from sending offers

11 How can you protect yourself? (Cont.) –http://www.equifax.com/home/en_us, http://www.experian.com/, http://www.transunion.com/ are three credit reporting agencieshttp://www.equifax.com/home/en_us http://www.experian.com/http://www.transunion.com/ Mailbox –Take outgoing mail to Post Office Also Postal Box Glove Compartment –Remove any/all personal information

12 How can you protect yourself? (Cont.) Trash –Shred all personal papers You –Don’t give out personal information i.e. in person, telephone, mail, or internet –Secure personal papers

13 How can you protect yourself? (Cont.) –i.e. safe, locked drawer, locked box If personal information needed, ask questions: –How is it going to be used? –How is it going to be protected? –What happens if not provided?

14 Virtual Table of Contents What does a thief want? Where do they get it? How do you protect yourself?

15 What does a thief want? Capture your personal information Create a new identity –Based on you –Use that identity for own purposes

16 Where do they get it? Anywhere from your personal computer They can get your: –Bank account information or e-tax returns –PDA data or spreadsheets –Anything with personal information they want

17 How do you protect yourself? Use unique passwords –Use one when you can –Change them regularly –Don’t set to “Remember My Password” –Don’t write them down

18 How do you protect yourself? (Cont.) Get Anti-Virus software –Always keep up to date Keep OS system up-to-date Install firewall –“Software barrier” Take caution with Wi-Fi

19 How do you protect yourself? (Cont.) P2P –You get files, so can they From others or yourself DON’T GIVE OUT PERSONAL INFORMATION Beware of “Phishing” –Use fake emails, trick you for information

20 How do you protect yourself? (Cont.) Pay attention to “caching” –Computer remembers where you have been Secure site will have an “s” –Always after http; i.e. https://

21 Keeping Your Computer Safe Since 1976!

22 DETER Shred all personal papers Protect Social Security Number Keep important information locked up Never give out personal information unless secure Use hard Passwords

23 Detect Signs of ID theft: –Bills don’t arrive –New credit card accounts Check your credit score often Review Financial statement

24 Defend Place Fraud Alert on credit report Close tampered with accounts –Call company’s fraud department File a police report Report theft to FTC

25 Additional Information: ID Theft: What It’s All About Deter, Detect, Defend Brochure

26 Thanks For The Help BBBOnline. http://www.bbbonlince.org/IDTheft/virtual.asp. 2003 BBBOnline. http://www.bbbonlince.org/IDTheft/protect.asp. 2003 Federal Trade Commission. www.ftc.gov/idtheft. Federal Trade Commission. http://www.ftc.gov/bcp/edu/microsites/idtheft/images/iden tity-theft-symbols.gif

27 Keeping Your Computer Safe Since 1976!


Download ppt "Identity theft: Real or Virtual? By: Alex Metzler."

Similar presentations


Ads by Google