Download presentation
Presentation is loading. Please wait.
Published byMelina Edwards Modified over 8 years ago
1
Protecting Yourself Against Identity Theft By Sierra Monif Next
2
Back DETERDETECTDEFEND AVOID THEFT NEXT
3
Virtual World Real World GO
4
Virtual World Virtual World – The whole idea What Virtual thief actually wants Where thief finds information How to defend yourself Word about you NextBack
5
Real World Real World – The whole idea What thief actually wants Where identity thief finds your information What thieves use your information for How to defend yourself Agencies NextBack
6
Virtual World – The Whole Idea We enjoy online banking, easy bill paying, wireless connections, ability to take pictures, ect. Unfortunately, most of us are only dimly aware of exactly how these technologies actually work NextBack
7
What The Thief Actually Wants He wants to... –Capture your information –Create a new identity based on that information –Use your identity to his or her own purposes NextBack
8
Where Thief Finds Information New technologies can create major gaps in your personal information security If you have a personal computer, think of the info you’ve probably stored there NextBack
9
How to Defend Yourself Tips... –Use unique passwords whenever possible –Change passwords regularly –Remember passwords –Purchase Anti-Virus Software –Keep operating system software updated NextBack
10
How to Defend Yourself (Cont.) –Install a firewall –Take precautions with wireless networks –Be wary when using other people’s computers –Don’t give information over Internet unless site is secure NextBack
11
A Word About You If all steps taken, you’ve officially made it much harder for someone to use your technology NextBack
12
Real World – The Whole Idea Thieves still rely on tried-and-true methods to get hands on document Thieves are after your identity – not your money NextBack
13
What The Thief Wants The thief wants to be you The thief is looking for... –Your Social Security Card –Your driver’s license –Your account numbers, PIN(s) and passwords NextBack
14
Where Thieves Get Information They obtain personal information from... –Your wallet or purse –Your mailbox –Your glove department –Your trash –You NextBack
15
What Thieves Use Information For Credit cards to go on a buying spree Open new credit card accounts Change mailing address on account Buy cars and take out auto loans Establish telephone service in your name Counterfeit checks or debit cards NextBack
16
What Thieves Use Information For (Cont.) File for bankruptcy Apply for job under your name Give your name to police during an arrest Open account in your names with bad checks NextBack
17
How to Defend Yourself Be careful on what you keep in wallet of purse Don’t write PIN on back of credit cards Check credit card bills and bank statements Make copies of all credit and debit cards Pick up incoming mail ASAP NextBack
18
How to Defend Yourself (Cont.) Purchase paper shredder Don’t give out personal information in person, over phone, by mail or on Internet unless contact was made When reordering personal checks, arrange to pick them up at bank instead of having them sent to your home Write “check photo id” on back of credit/debit card NextBack
19
Agencies Equifax http://equifax.com/3bureaureportsandscores/?CMP=KNC- Google&HBX_PK=equifax&HBX_OU=50&gclid=CNG0n4PnlqQCFYTu7Qod LCuPCA Experian http://www.experian.com/lp/credit-report-r.html TransUnion http://www.transunion.com/corporate/business/emarketing/truecredit.page? bn=24&kw=&gacid=6291434221&gclid=CImIsa7nlqQCFQpe7AodZ0nzHw Back
20
Deter Safeguard your information by... –Shedding documents and personal info –Protecting social security number –Not giving out info unless you know who you’re dealing with –Typing web address instead of clicking on links sent in emails –Not using obvious passwords –Keeping personal info in secure place
21
Detect Monitor financial accounts and billing statements Be alert to signs that require attention –Bills that don’t arrive as expected –Unexpected credit cards –Denials of credit for no apparent reason –Calls about purchase you didn’t make Inspect –Your credit report –Your financial statements
22
Defend If infected... –Place “Fraud Alert” on credit reports Equifax- 1-800-525-6285 Experian- 1-888-EXPERIAN TransUnion- 1-800-680-7289 –Close accounts –File police report –Report to Federal Trade Commission Online: ftc.gov/idtheft
23
Sources ID Theft: What It’s All About Deter, Detect, Defend Brochure
24
Identity theft is the fastest- growing crime in the United States. Stop it now.
25
Citations Federal Trade Commission. Deter, Detect, Defend. [Online] http://www.ftc.gov/bcp/edu/microsites/idthe ft/ http://www.ftc.gov/bcp/edu/microsites/idthe ft/ Back Back to MAIN POWERPOINT
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.