Download presentation
Presentation is loading. Please wait.
Published byGeorge O’Connor’ Modified over 9 years ago
1
By: Nikki Tucker MARSHALL MIDDLE SCHOOL 7 TH GRADE MR. DRYER
2
It is when someone steals your identity by taking your name, stealing your credit card number, or using a fake name or email address to get you to give them your valid information.
3
This is the practice of getting your personal information. Pretexters may sell your information to people who will use it to get credit cards in your name or make purchases in your name.
4
This is when a person goes through your trash to find bills that aren’t cut up, credit cards that have been tossed, and even medical updates.
5
This is when someone uses the internet or email to send you fake messages to ask you to give them your account passwords and valid information.
6
This is a method almost like phishing. But instead they get it via text message.
7
This is when the thief goes through your mail box, your mail at the post office, or even your trash to find old credit cards, medical bills, or your old check book.
8
1) Shred old credit cards, bills etc. 2) Look out for fake email addresses. 3) Limit the number of checks and debit / credit cards you carry to only what you will actually need. 4) Guard your purse or wallet. Never put either one down unless your hand is connected to it. 5) Check credit card and bank statements carefully
10
hhttp://101-identitytheft.com/idtheft.html hhttp://www.spamlaws.com/dumpster- diving.html hhttp://.support.hubris.net/security/pushing. html hhttp://www.webopedia.com/term/s/smishin g/html hhttp://definitions.us.legal.com/m/mail- theft/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.