Identity theft

2,913 views

Published on

Published in: Economy & Finance, Technology
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,913
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
327
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • Identity theft

    1. 1. TOPIC #3IDENTITY THEFT By: Ashley Arkfeld
    2. 2. What is Identity Theft?The fraudulent acquisition and use of a persons privateidentifying information, usually for financial gain.Misuse of another person’s personal or financialinformation such as social security numbers, credithistory, pin numbers, lost or stolen mail, wallets, purses,identification, and credit and debit cards
    3. 3. Types of Identity TheftFinancial Identity TheftMedical Identity TheftInsurance Identity TheftCriminal Identity TheftDriver’s License Identity TheftChild Identity TheftSocial Security Identity TheftSynthetic Identity Theft
    4. 4. Financial Identity TheftWhen someone gains access to your credit cards, bankaccounts, etc.They use your accounts and credit cards to purchasethings under your name, especially online
    5. 5. Medical Identity TheftThe most dangerous form of identity theftTheft involving a victim’s insurance or used to makefalse claims for medical services.Usually results from false entries in a person’s medicalinformationHardest to fix
    6. 6. Insurance Identity TheftLeads to and results from other types of identity theftlike medical and financial identity theftProblems resulting from insurance identity theft arecombinations of medical and financial identity theftBrings in a whole new set of problems for the victim
    7. 7. Criminal Identity TheftEasiest way to find out if this has happened to you is toget a speeding ticket from a police manSomeone could commit crimes using your identityA warrant could be out for your arrest because youridentity was stolen
    8. 8. Driver’s License Identity TheftEasiest form of theft to commitYour driver’s license could be stolen and sold tosomebody who looks like youThis leads to more intense forms of identity theft, likecriminal identity theft
    9. 9. Child Identity TheftChildren are the biggest target for identity theftMost likely friends or family of the victim commitsidentity theftChildren don’t look at their credit scores or atinsuranceSo it is easier for the theft to ruin the victims creditscores and thus could ruin their future
    10. 10. Social Security Identity TheftMost valuable piece of information a thief can stealKids are being targeted to steal their social securitynumberIdentity thieves can easily commit crimes in your nameif your social security number is stolen
    11. 11. Synthetic Identity TheftLatest thing in the theft worldTake personal information from many victims andcombine the informationMaking a new identity that will affect all of the victimsIt could appear in some of the other types of theft
    12. 12. You get your identity stolen by..Giving out your social security numberGiving out your credit card numberGiving out personal informationUsing the same password for everythingUsing a computer without anti-virus or anti-spywareprograms
    13. 13. Employees’ Identities Can Be Stolen By..Personal information is usually kept in businesscomputersPersonal information is also kept in business filesWhen someone notices that their purse or wallet ismissing things like credit cards, social security card, etc.Employee’s identities being stolen is a lot alike otheridentity thefts
    14. 14. Protecting Your IdentityKeep your social security number privateDon’t lose your credit cardsUse strong passwords and different passwords foreverythingKeep your personal information privatePay attention to your bank and credit card statementsAlways report unauthorized transactions to stopsomeone from stealing your identity and to stop themfrom using your credit cards and bank accounts
    15. 15. Legitimate from Fraudulent SolicitationsLegitimate- Persons or companies that you choose todo business and know and trustFraudulent- Persons or companies who are trying to sellproducts that may never be received or phish forpersonal informationDo not give personal information to persons orbusinesses unless you have initiated the transactionResearch any new companies before dealing with thosenew companies
    16. 16. Interview of AdultIt is important to pay attention to bank and credit cardstatementsReporting unauthorized transactions to your financialinstitution immediatelyUse fraud alerts on credit cards through your financialinstitutionUnited Bank of Iowa uses Falcon Fraud to help preventfraudulent transactionsKeep all personal information secure
    17. 17. Interview of StudentIdentity Theft is when somebody pretends to besomebody else by hacking into their email and socialnetworking accountsProtect your identity by using different passwords foreverything onlineNever lose your driver’s license, social security number,and credit cardsIf you do lose them, report that you lost them to yourbank
    18. 18. Comparing/Contrasting InterviewsStudent looks more toward the ways a person’s identitycould be stolen over the internetAdult looks more toward the financial ways that aperson’s identity could be stolenBoth think that it is important to report lost or stolencredit cards and do your best not to lose credit cards orother personal informationBoth always keep their driver’s licenses with them
    19. 19. Sourceshttp://idtheft.about.com/od/Basics/a/The-8-Types-Of-Identity-Theft.htmhttp://www.cesidebtsolutions.org/2011/01/how-to-get-your-identity-stolen/http://www.identitytheft.info/ssn.aspx

    ×