Presentation is loading. Please wait.

Presentation is loading. Please wait.

7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.

Similar presentations


Presentation on theme: "7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide."— Presentation transcript:

1 7.3.1.G1

2 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 2 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1 According to the Federal Trade Commission (FTC): personal identification, credit, or account information IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information The FTC is a government agency that promotes consumer protection

3 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 3 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1 The FTC provides a consumer identity theft education website: http://www.ftc.gov/idtheft Includes great information for those who suspect they may be a victim of identity theft, are a victim of identity theft, or want to learn more about identity theft Has a “Deter, Detect, Defend” theme

4 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 4 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1Name Address & Telephone Number Social Security Number Driver’s License Number Birth Date Credit Card Numbers Bank Account Numbers Identity thieves try to obtain personal information from victims in order to steal their identities Personal Information

5 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 5 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1 Making purchases with a check, credit or debit card credit Applying for a credit card or loan shopping Online or telephone shopping mailonline Paying bills through the mail or online doctor Going to the doctor What daily activities require an individual to share personal information? What daily activities require an individual to share personal information?

6 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 6 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1  Thieves obtain personal information through a variety of methods:  Stealing - Information is taken from a purse or wallet, personnel records from a workplace, tax information, bank or credit card statements, or pre-approved credit card offers from the mail change  Diverting Mail - Thieves can complete a change of address form and have the victim’s bills and statements mailed to a different location Personal information is discarded and thieves remove it from the trash  “Dumpster Diving” - Personal information is discarded and thieves remove it from the trash Thieves attach a device to card processors to “skim” credit and debit card information  Skimming - Thieves attach a device to card processors to “skim” credit and debit card information

7 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 7 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1  Methods continued... personal information  Phishing - Thieves use a form of electronic communication (usually email) to pretend to be a company or depository institution in order to get the victim to give up their personal information  Pretexting - Thieves use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources  Spyware - Software installed on the victim’s computer, without their knowledge or consent, that monitors internet use, sends pop up ads, re- directs the computer to other sites, and tracks key strokes Information is stolen by breaking into a computer system  Hacking - Information is stolen by breaking into a computer system

8 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 8 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1  Apply for a new driver’s license  Open new bank accounts or Obtain cash with bank cards creditstore  Apply for credit cards or store credit accounts  File for bankruptcy apartment  Get a job or Rent an apartment  Take out student loans What can identity thieves do if they obtain personal information? What can identity thieves do if they obtain personal information?

9 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 9 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1  New accounts or charges you didn’t make  Calls from collection agencies  Incorrect information on your credit report  Being denied credit when there is no reason to be  Missing bills or mailed statements Early detection is key! Watch for the following signs

10 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 10 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1 Key Guidelines  Protect your Social Security number trusted necessary  Only give it out to trusted organizations and only when absolutely necessary  Protect financial information  Sign the back ofcards “Please see ID”  Sign the back of credit and debit cards and “Please see ID”  Close unwanted accounts by writing and by phone  Cut up credit, debit, and ATM cards and dispose of the pieces in separate places

11 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 11 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1 Key Guidelines  Safeguard your purse and wallet need  Carry only what you'll actually need when you go out birth  Don't carry your Social Security number or card, birth certificates, or passport  Verify a source before sharing information initiated  Don't give out personal information over the phone, through the mail, or on the Internet unless you've initiated the contact

12 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 12 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1 Key Guidelines  Be careful using the Internet secure site  Only give out personal information when making a purchase and only on a secure site (indicated by a “https” or a picture of a lock after the URL or in the bottom right corner)  Use a credit card instead of a debit card when making online purchases spyware  Watch for clues that might indicate a computer is infected with spyware Many pop-up ads, unexpected toolbars or icons, keys that don't work, random error messages, and sluggish performance  If it is suspected that a computer is infected with spyware, immediately stop shopping, banking or doing any other online activity that involves sensitive information

13 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 13 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1 Key Guidelines  Keep usernames and passwords safe and select intricate passwords combination  For passwords, choose a combination of letters, numbers, and symbols that are not easily identified  Use different usernames and passwords for different sites and change them regularly  Select security check questions with answers only you would know  Treat your trash and mail carefully personal  Shred all documents that you are discarding that contain personal information A cross-cut shredder is safest secured  Deposit mail containing personal information in secured mailboxes

14 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 14 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1 Key Guidelines  Protect your identity  Search your name occasionally to see if your name, picture, or other information is being used by someone else safe  Keep all documents containing personal information in a safe place where others cannot easily access them  Check credit reports once three  Check credit reports for errors at least once a year with all three reporting agencies To stay constantly informed, request a credit report from one of the three reporting agency every four months

15 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 15 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1 Experian PO Box 2104 Allen, TX 75013-2104 Report Order: 1-888-397-3742 Fraud Hotline: 1-888-397-3745 www.experian.com Trans Union PO Box 390 Springfield, PA 19064-0390 Report Order: 1-800-888-4213 Fraud Hotline: 1-800-6807289 www.tuc.com Equifax PO Box 105873 Atlanta, GA 30348 Report Order: 1-800-685-1111 Fraud Hotline: 1-800-525-6285 www.equifax.com To order a credit report from any of the three reporting agencies, use the following website: www.annualcreditreport.comwww.annualcreditreport.com

16 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 16 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1 1. Act immediately! to prevent any further damage and limit personal liabilityAct immediately! to prevent any further damage and limit personal liability 2. recordKeep a detailed record of correspondence and phone records lettersFollow up all communication with letters sent via certified mail 3. three alertContact the three major credit bureaus and request a free fraud alert be added to credit report verifyFraud alert - warns creditors to verify an individual’s identity before issuing credit

17 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 17 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1 4. tampered fraudulentlyClose all accounts which have been tampered with or opened fraudulently 5. File a police report with the local police 6. complaintFile a complaint with the FTC: www.ftccomplaintassistant.gov www.ftccomplaintassistant.gov

18 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 18 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1  Credit Cards 50  Truth in Lending Act limits liability for unauthorized charges to $50.00 per card 60  A letter must be received by the creditor within 60 days of the first bill containing the error 90  The dispute must be resolved within 90 days of the creditor receiving the letter

19 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 19 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1  ATM and Debit Cards  The Electronic Funds Transfer Act provides protection quickly  The amount a person is liable for depends upon how quickly the loss is reported 50 Within two days: maximum $50.00 500 Within sixty days: maximum $500.00 liable After sixty days a person may be liable for everything

20 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 20 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1  Checks stop  Contact the financial institution and stop payment forged  Most states hold the financial institution responsible for losses of a forged check

21 © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide 21 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 7.3.1.G1  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information  Once an identity thief obtains personal information, they can complete many malicious acts with the information  There are many ways to DETER identity theft  Early DETECTION is key  There are basic rules to follow in order to DEFEND against identity theft if it does occur


Download ppt "7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide."

Similar presentations


Ads by Google