Download presentation
Presentation is loading. Please wait.
Published byHugo Atkinson Modified over 8 years ago
1
Be Cautious of Identity Theft By: Sydney Langley
2
Avoid Identity Theft Deter Detect Defend
3
Deter Shred financial documents Protect your Social Security number Don’t give out information on the phone, emails, or over the Internet Never click on links in unsolicited emails Don’t use obvious passwords Keep your person information in a secure place
4
Detect Be alert to signs that require immediate attention: –Bills that do not arrive as accepted –Unexpected credit cards or account statements –Denials of credit for no apparent reason –Calls or letters about purchases you don’t make
5
Detect (cont.) Inspect: –Your credit report Visit www. AnnualCreditReport.com or call 1-877- 322-8228 –Your financial statements regularly
6
Defend Place a “Fraud Alert” on your credit reports and review reports carefully Close any accounts that have been messed with File a police report Report the theft to the Federal Trade Commissions
8
The Virtual World What does a virtual thief want Where does the thief find information How to defend yourself
9
What a Virtual Thief Wants To capture your personal information Create new identity based on your information To use your identity
10
Where the Virtual Thief finds Information Personal information on your computer –Bank account information –Electronic tax returns –PDA data –Insurance information –Saved documents
11
Defend Yourself Now! Use unique passwords Change passwords frequently Don’t set system to “Remember my password” Remember passwords don’t write them down
12
Defend Yourself Now! (cont.) Purchase anti-virus software Keep Operating system software updated Install a firewall Take precautions with wireless networks Be cautions when file sharing
13
Defend Yourself Now! (cont.) Be aware of phishing Be wary when using public Internet Don’t give out personal information over Internet
14
The Real World What the identity theft wants Where the thief finds the information How the information is used Defending yourself
15
What a Thief Wants Your Social Security card and number Drivers license Your account numbers and passwords –Bank, credit card, and PIN’s Credit Cards- Instead of signing the back of your credit/debit card, write "check photo id" in the signature block 3 major agencies are Equifax, Experian, and TransUnion
16
Where the Thief Finds These Wallet or purse Your mailbox Your glove compartment Your trash From YOU!
17
How the Information is used Credit cards- buying expensive things Open new credit card accounts using your name Change your mailing address of credit card Buy cars, and take out loan on your name Establish telephone service in your name
18
How Information is used (cont.) Drain your bank account Open bank account in your name File bankruptcy under your name Under your name, apply for a job During arrest, give your name to police
19
How to Defend Yourself Be careful about what you have in wallet or purse Only carry credit/debit cards you need or use Remove personal information from glove compartment Pick up your mail ASAP Shred your paper before throwing away
20
The virtual and real world of identity theft Virtual- steal identity on cyberspace Real- steal real documents in real world Remember, there is know way to entirely protect yourself
21
Learn More ID theft: What It’s All About Deter, Detect, Defend Brochure
22
Works Cited Federal Trade Commission. Deter Detect Defend Avoid ID Theft. [Online] http://www.ftc.gov/bcp/edu/pubs/consum er/idtheft/idt01.shtm
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.