SlideShare a Scribd company logo
1 of 2
Download to read offline
What is Identity (ID) Theft?
Identity theft occurs when an
unauthorized party uses your personally
identifying information, such as your
name, address, Social Security Number
(SSN), or credit card or bank account
information to assume your identity in
order to commit fraud or other criminal
acts.

What can ID thieves do with
your information?
•

•

•

How does identity theft occur?
Identity thieves can steal your personal
information directly or indirectly by:
• Stealing your wallets and purses
containing identification cards,
credit cards and bank
information.
• Stealing your mail including
credit and bank statements, phone
or utility bills, new checks, and
tax information.
• Completing a “change of address
form” to redirect the destination
of your mail.
• Rummaging through your trash
for discarded personal data in a
practice known as “dumpster
diving.”
• Taking personal information that
you share or post on the Internet.

•
•
•
•

Call your creditors and change
your mailing address on your
credit card account.
Open new lines of credit using
your personal identification
information.
Establish phone services using
your name which are charged to
you.
Open bank accounts in your name
and write bad checks.
Forge checks to wipe out your
bank account.
Apply for auto loans taken out in
your name.
Commit other crimes and then
give your name, instead of their
own, to the police during their
arrest.

What you can you do to
prevent ID theft?
Identity theft is on the rise. While there
are no guarantees that your identity will
not be stolen there are steps you can take
to minimize your risk.
• Use passwords on all your credit
card, bank, and phone accounts.
• Never keep passwords, “PINs” or
your SSN card in your wallet or
purse.

•
•

•
•
•
•

Learn about security procedures
in your workplace.
Never give out personal
information on the phone,
through mail, or over the internet
unless you know the receiver and
have initiated the contact.
Guard your mail and trash from
theft.
Shred or destroy discarded
financial statements in your trash.
Give your SSN only when
absolutely necessary.
Keep your purse or wallet in a
safe place at work.

How can you protect your
personal computer from ID
theft?
SSNs, financial records, tax information,
birth dates, and account numbers may be
stored on you personal computer.
Follow these tips to help keep your
personal information safe.
• Update your virus protection
software regularly, especially
when a new virus alert is brought
to your attention.
• Do not download files from
strangers or click hyperlinks from
people you don’t know. This
could expose your system to a
virus.
•

•

Use a firewall program. This will
stop uninvited guests from
accessing your computer.
Use a secure browser to guard the
security of your online
transactions.

What do you do if you are a
victim?
1. Contact the fraud departments of
each of the three major credit
bureaus. (This information can be
found on FTC’s ID Theft website or in
FTC’s ID Theft booklet)
2. Close the accounts that you know
or believe have been tampered with
or opened fraudulently.
3. File a police report with your local
police and/or the police in the
community where the identity theft
took place.

Where can you find more
information on this subject?
The information found in this
brochure was derived from FTC’s
Manual on ID Theft, “ID Theft: When
Bad Things Happen to Your Good
Name”, which was published in
September of 2002. It is available at:
www.consumer.gov/idtheft/. You
can also access more information in
the office of the OIG in Rm. 1135.

How can you contact the
FTC?
Internet
www.ftc.gov
FTC’s ID Theft Hotline
1-877-IDTHEFT (438-4338)

OFFICE OF
INSPECTOR GENERAL
(OIG)

Write
Identity Theft Clearinghouse
Federal Trade Commission
600 Pennsylvania Avenue, NW
Washington, DC 20580

Contact OIG
Internet
oig.nsf.gov
Telephone
703 292-7100
Fax
703 292-9158/9159
Write
National Science Foundation
Office of Inspector General
4201 Wilson Boulevard
Arlington, VA 22230

Identity Theft:
What can you do to
protect yourself?

More Related Content

What's hot

Lesson 4 What to do if your Identity Is Stolen
Lesson 4 What to do if your Identity Is StolenLesson 4 What to do if your Identity Is Stolen
Lesson 4 What to do if your Identity Is Stolen
Rob Johnson
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
nnguyen10
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
nnguyen10
 

What's hot (20)

You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
Internet scams
Internet scamsInternet scams
Internet scams
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Lesson 4 What to do if your Identity Is Stolen
Lesson 4 What to do if your Identity Is StolenLesson 4 What to do if your Identity Is Stolen
Lesson 4 What to do if your Identity Is Stolen
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Tax Filing Fraud Rampant This Tax Season
Tax Filing Fraud Rampant This Tax SeasonTax Filing Fraud Rampant This Tax Season
Tax Filing Fraud Rampant This Tax Season
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 

Viewers also liked

Viewers also liked (8)

Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Similar to What is Identity (ID) Theft ?

ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
OremDPS
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
krupp
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 

Similar to What is Identity (ID) Theft ? (20)

How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 

More from - Mark - Fullbright

Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

What is Identity (ID) Theft ?

  • 1. What is Identity (ID) Theft? Identity theft occurs when an unauthorized party uses your personally identifying information, such as your name, address, Social Security Number (SSN), or credit card or bank account information to assume your identity in order to commit fraud or other criminal acts. What can ID thieves do with your information? • • • How does identity theft occur? Identity thieves can steal your personal information directly or indirectly by: • Stealing your wallets and purses containing identification cards, credit cards and bank information. • Stealing your mail including credit and bank statements, phone or utility bills, new checks, and tax information. • Completing a “change of address form” to redirect the destination of your mail. • Rummaging through your trash for discarded personal data in a practice known as “dumpster diving.” • Taking personal information that you share or post on the Internet. • • • • Call your creditors and change your mailing address on your credit card account. Open new lines of credit using your personal identification information. Establish phone services using your name which are charged to you. Open bank accounts in your name and write bad checks. Forge checks to wipe out your bank account. Apply for auto loans taken out in your name. Commit other crimes and then give your name, instead of their own, to the police during their arrest. What you can you do to prevent ID theft? Identity theft is on the rise. While there are no guarantees that your identity will not be stolen there are steps you can take to minimize your risk. • Use passwords on all your credit card, bank, and phone accounts. • Never keep passwords, “PINs” or your SSN card in your wallet or purse. • • • • • • Learn about security procedures in your workplace. Never give out personal information on the phone, through mail, or over the internet unless you know the receiver and have initiated the contact. Guard your mail and trash from theft. Shred or destroy discarded financial statements in your trash. Give your SSN only when absolutely necessary. Keep your purse or wallet in a safe place at work. How can you protect your personal computer from ID theft? SSNs, financial records, tax information, birth dates, and account numbers may be stored on you personal computer. Follow these tips to help keep your personal information safe. • Update your virus protection software regularly, especially when a new virus alert is brought to your attention. • Do not download files from strangers or click hyperlinks from people you don’t know. This could expose your system to a virus.
  • 2. • • Use a firewall program. This will stop uninvited guests from accessing your computer. Use a secure browser to guard the security of your online transactions. What do you do if you are a victim? 1. Contact the fraud departments of each of the three major credit bureaus. (This information can be found on FTC’s ID Theft website or in FTC’s ID Theft booklet) 2. Close the accounts that you know or believe have been tampered with or opened fraudulently. 3. File a police report with your local police and/or the police in the community where the identity theft took place. Where can you find more information on this subject? The information found in this brochure was derived from FTC’s Manual on ID Theft, “ID Theft: When Bad Things Happen to Your Good Name”, which was published in September of 2002. It is available at: www.consumer.gov/idtheft/. You can also access more information in the office of the OIG in Rm. 1135. How can you contact the FTC? Internet www.ftc.gov FTC’s ID Theft Hotline 1-877-IDTHEFT (438-4338) OFFICE OF INSPECTOR GENERAL (OIG) Write Identity Theft Clearinghouse Federal Trade Commission 600 Pennsylvania Avenue, NW Washington, DC 20580 Contact OIG Internet oig.nsf.gov Telephone 703 292-7100 Fax 703 292-9158/9159 Write National Science Foundation Office of Inspector General 4201 Wilson Boulevard Arlington, VA 22230 Identity Theft: What can you do to protect yourself?