SlideShare a Scribd company logo
1 of 36
Objective 7.03 Understand ways to
              avoid identity theft.
 What  is identity theft?
 How does one protect himself or herself from
  being a victim of identity theft?
 What should I do if I am victimized?
   A type of fraud
     Illegal use of a
      consumer’s personal
      identification, credit,
      or account information
     Information that
      thieves steal:
         Date of birth
         Bank and investment
          account numbers
         Social Security number
         Internet passwords
         Credit card information,
          credit cards

video link- phishing scams
video link: how stuff works-id theft
 Resultsof identity
 theft for victims:
    Financial losses of
     actual transactions
    Loss of time and
     money trying to
     correct problem
    Substantial stress
     dealing with long
     term actions to
     correct
   Technological
    Advances Increase
    Opportunities for
    Exposure to Identity
    Theft
       Electronic funds
        transfers (EFT) enable
        financial transactions by
        computer
       Direct deposits and
        withdrawals online
       Pay-by-phone transfers
       Point-of-sale transfers
        (debit card)
       Online banking:
        Account numbers, date
        of birth, passwords in
        cyberspace
 Provides     protection              Electronic Funds Transfer
  for :                      Definition:
                             carrying out financial transactions
      ATM, debit cards,     by computer rather than using checks or cash
       cash cards            Examples:
 If   loss is reported:     direct deposit payroll check
                             Automatic draft of monthly utility bill
   Within 2 days=$50
    maximum
   Within 60 days, $500           Who    is your best
    maximum, and
                                    advocate?
   After 60 days, may be
    liable for all charges         YOU ARE!
                                   It is important to
                                    pay attention to
                                    your financial
                                    transactions!
video link- problems & solutions



video link- credit card swipes
   Many businesses have                    Other businesses use personal
    legitimate reasons for                   information, such as your
    obtaining personal                       name, address, credit card
    information                              number, and information
     Payroll, human resources,              about purchasing preferences
      personnel department                   and patterns for other
     Social security, bank account #s       purposes
   Some websites use online                Marketing other products
    profiling                                   Food Lion MVP card -send
   Security of websites                         coupons, special ads

   Cautions about use of the
    Social Security number
     Partial # only printed on
      receipts, etc.
     Do not carry in your wallet
 What personal              •   Making purchases
 information are you             with a check, credit
 carrying in your                or debit card
 wallet now?                 •   Applying for a credit
    Driver’s license            card or loan
    Social security card    •   Online or telephone
    Credit cards                shopping
    Debit cards
                             •   Paying bills through
    Health Insurance card
                                 the mail or online
    Check book
    Student ID card         •   Going to the doctor
   Obtaining personal information
    submitted on the Internet
   Posing as representatives of
    banks, Internet service
    providers, or government
    agencies to get one to provide
    personal information on the
    telephone or by email
   Looking over the shoulder when
    one is writing checks or using
    teller machines                  video link - ATM skimming device
   Using phones with cameras,
    videos to photo & re-enter PIN
    codes
   Using “ATM skimmers” to
    capture credit card number
    from the magnetic strip
   Using card readers to swipe a
    card and capture the card
    number


    Pass this info on:
   This has been verified by the FBI (their link is also included below). Please pass this on to everyone
    in your email address book. It is spreading fast so be prepared should you get this call. Most of us
    take those summonses for jury duty seriously, but enough people skip out on their civic duty that a
    new and ominous kind of fraud has surfaced.

    The caller claims to be a jury DUTY coordinator. If you protest that you never
    received a summons for jury duty, the Scammer asks you for your Social Security
    number and date of birth so he or she can verify the information and cancel the
    arrest warrant. Give out any of this information and bingo; your identity was just
    stolen.
    The fraud has been reported so far in 11 states, including Oklahoma , Illinois , and Colorado , AZ
    and more. This (swindle) is particularly insidious because they use intimidation over the phone to
    try to bully people into giving information by pretending they are with the court system.
    The FBI and the federal court system have issued nationwide alerts on their web sites, warning
    consumers about the fraud.

   Check it out here:
    http://www.fbi.gov/page2/june06/jury_scams060206.htm

   And here:
    http://www.snopes.com/crime/fraud/juryduty.asp
    Yep! It's true
   Good Afternoon –

   It’s a good time to remind everyone about SCAM or PHISHING email. Phishing refers
    to the process of tricking recipients into sharing sensitive information with an
    unknown third party. Those who PHISH make an email appear legitimate.
   Security Reminders-

   1)    CCS does not send out email asking for private information (i.e., social
    security numbers, credit card numbers, etc…). Sometimes we have “vendor”
    looking logo email asking for the end user to provide information. If you receive,
    delete the email.
   2)    CCS does not send out email regarding changing of a password. Delete the
    email.
   3)    Never share your password.
   4)    When in doubt about whether or not to respond to an email, DON’T until you
    have verified legitimacy. Ask a technology facilitator or call the IT Help Desk (704-
    786-9805, ext. 2).


   Dr. Katherine Propst
   Assistant Superintendent
   Cabarrus County Schools
   Stealing wallets or purses
    containing identification
    information, credit cards,
    or checkbooks
   Stealing mail, which may
    include bank, credit card,
    payroll, and tax
    information
   Completing a change of
    address card to have mail
    sent to another address
   Going through trash from
    homes/businesses to find
    identification, bank, or
    credit information
   Obtaining personal
    information from one’s
    home mail or body…theft
 Make charges to your accounts and credit cards
 Open new credit accounts to make purchases
 To sign up for services
  such as telephone,
  cellular telephone, or
  wireless service, and
  utilities                             Get a job using your
                                         information
 Open a bank account
  and write “bad”                       Rent an apartment
  checks                                Obtain cash with bank
       The predator is stripping        cards
        whatever money is in            Obtain your tax
        your account!
                                         refund from IRS
   Write checks on one’s
    bank account
                                    video link- identity theft in Florida
Shred documents with personal information before discarding!
 Report  missing
  credit cards and
  identifying
  information to three
  credit-reporting
  agencies
 Report missing
  credit cards to
  credit card company
 Verify your credit
  card charges upon
  receipt of your card
 Contact  your bank
  if you are missing
  ATM cards or
  checks
 Reconcile your
  bank statement to
  verify all
  withdrawals are
  for your
  authorized
  transactions
 Report  missing
  Social Security
  numbers or card to
  the Social Security
  Administration
 Seek other help
  from the Federal
  Trade Commission
  and the Identity
  Theft Resource
  Center
 Don’t carry your SS
  card in wallet!
   Issue a “stop payment”
    if checks or credit cards
    are lost or stolen
   When establishing
    accounts at financial
    institutions, make sure
    they are insured by
    agencies that protect
    deposits in case the
    institution fails
     Federal Deposit Insurance
      Corporation (FDIC)
     Savings Association
      Insurance Funds (SAIF)
     National Credit Union
      Administration (NCUA)
   Definition: Method by which
    individuals can avoid
    receiving unsolicited product      I want to “OPT OUT”…
    or service info; usually
    associated with
    telemarketing, e-mail              To remove your phone # from
    marketing, online marketing         telemarketing lists use National
    or direct mail                      Registry or state registries
                                           https://www.donotcall.gov/
   Make an informed choice
    about sharing personal             To remove your personal
    information---“opt out”             information from financial
                                        institutions/insurance company
                                        lists
   Before clicking “I agree” -            Individual company privacy
    Read your online site                   statements have phone #s to
    agreement, you often give up            contact
    your right to “opt out” and
    your information is broadly
    circulated to marketers
•Use anti-virus and
anti-spyware software
and update them
regularly
•Do not click on links   •Set web browser
found in pop-up ads      security to medium-high
                         or high
•Only download
software from trusted    •Keep operating system
websites                 and web browser
                         software updated
                         •Clear hard drives
                         before discarding,
                         selling, or trading in
                         computer equipment
•When shopping online, Look for “https” or a picture of a lock after the
URL or in the bottom right hand corner indicating the site is
secure
•Enter the website address yourself rather than following a link from
an email or internet advertisement
•Use a credit card instead of a debit card when making online
purchases
•Do not give out personal information
from unsolicited contacts
  •Unsolicited = callers who contact you



•Do not give out any personal
information unless making a purchase
(when you contacted company)


•Choose security questions with
answers only you would know
•   Watch for clues that
    might indicate a                If it is suspected that a
    computer is infected             computer is infected with
    with spyware.                    spyware, immediately:
•   Examples:                           stop shopping, banking or
    •   a stream of pop-up ads           doing any other online
                                         activity that involves user
    •   random error messages
                                         names, passwords, or other
    •   sluggish performance             sensitive information
        when opening programs
                                        confirm that the security
        or saving files
                                         software is active and current
                                        run software to scan the
                                         computer for viruses and
                                         spyware, deleting anything
                                         the program identifies as a
                                         problem
Should the password be
   Email, Debit Cards, Banking        “I don’t know”?
    documents, other

   Keep your username and
    password protected

   Change passwords

   Create a Password
     Combination of words, numbers,
      and symbols
     UNIQUE
     Upper and Lower Case
     Cannot be easily found
   Do not use obvious names,
    birthdays, addresses, SS#
    etc.
 When entering your
 Password in public
 places:
    “Securely” type in PIN # at
        ATM
        Point of Sale (POS) register
        Public Online outlets

 How does predator get
 victim’s information?
  Phones with video cameras
   can replicate your
   keystrokes
  “Nosy” customers in line
  Dumpster Diving
 Predatoroften works
 with partner who “lifts”
 debit card for use with
 password later
 YOU are your own
 best ADVOCATE!
    Verify your credit
     card statement
     charges
    Reconcile your bank
     account
    KNOW WHAT YOU
     SPEND!
    Request credit
     reports from credit
     bureaus
   Respond immediately
   Keep a record of related
    phone calls, letters, and
    Emails

   Request a “fraud alert”
    with three major credit
    bureaus
       Equifax
       TransUnion
       Experian

   Renew “fraud alert” every
    90 days with credit
    bureaus
   Obtain a credit report
    from each major credit
    bureau and check for
    accuracy

   Close all accounts that
    have been involved in the
    theft

   Open new accounts with
    NEW unique passwords
    and new PIN numbers

   File a police report
 Federal   Trade Commission (FTC)
    oversees compliance with these acts
 Financial   Services Modernization Act (1999)
    requires companies involved in financial
     activities to send privacy notices to customers
 Children’s    Online Privacy Protection Act
 (1998)
    Requires websites directed to children under
     thirteen to post their privacy policy, parental
     consent and ability to monitor is required


                 Link to Children's online privacy law
 New  industry
 booming to
 assist
 consumers
 with
 themselves
 from this
 fastest
 growing crime
 Why  do you
                                   think identity
                                   theft grew
                                   significantly
                                   during the
                                   recession?
                                      Desperation
                                      No income to
                                       pay bills
                                      Time Available




video link: Stolen_Futures - 10 minute- if time allows

More Related Content

What's hot

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?tommy2tone44
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraudmiteshppt
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Data theft
Data theftData theft
Data theftLaura
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer AccountsAbbie Olson
 
Protect Yourself Against Identity Theft
Protect Yourself Against Identity TheftProtect Yourself Against Identity Theft
Protect Yourself Against Identity Theftpmass
 

What's hot (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraud
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
Data theft
Data theftData theft
Data theft
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer Accounts
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Protect Yourself Against Identity Theft
Protect Yourself Against Identity TheftProtect Yourself Against Identity Theft
Protect Yourself Against Identity Theft
 

Similar to Protect Your Identity in 3 Steps

Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation nickski51
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Id Theft
Id TheftId Theft
Id Theftmojo_5
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameSpringboard
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 

Similar to Protect Your Identity in 3 Steps (20)

Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Money Management
Money ManagementMoney Management
Money Management
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Id Theft
Id TheftId Theft
Id Theft
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 

More from DudleyDoright

Sem i 1.02 armstrong rev
Sem i 1.02 armstrong revSem i 1.02 armstrong rev
Sem i 1.02 armstrong revDudleyDoright
 
Sem i 1.07 armstrong
Sem i 1.07 armstrongSem i 1.07 armstrong
Sem i 1.07 armstrongDudleyDoright
 
Sem i 4.06 armstrong
Sem i 4.06 armstrongSem i 4.06 armstrong
Sem i 4.06 armstrongDudleyDoright
 
Semi 1.02 a-b_power_point-a._garrett
Semi 1.02 a-b_power_point-a._garrettSemi 1.02 a-b_power_point-a._garrett
Semi 1.02 a-b_power_point-a._garrettDudleyDoright
 
Sem i 1.06 armstrong
Sem i 1.06 armstrongSem i 1.06 armstrong
Sem i 1.06 armstrongDudleyDoright
 
Sem i 1.05 armstrong rev
Sem i 1.05 armstrong revSem i 1.05 armstrong rev
Sem i 1.05 armstrong revDudleyDoright
 
Personal finance 8.02 spending plans p_ptb(fefe)
Personal finance 8.02 spending plans p_ptb(fefe)Personal finance 8.02 spending plans p_ptb(fefe)
Personal finance 8.02 spending plans p_ptb(fefe)DudleyDoright
 
Per.fin.7.01 p pt.atypes of insurance
Per.fin.7.01 p pt.atypes of insurancePer.fin.7.01 p pt.atypes of insurance
Per.fin.7.01 p pt.atypes of insuranceDudleyDoright
 
Per.fin.p pt f filing a tax return
Per.fin.p pt f filing a tax returnPer.fin.p pt f filing a tax return
Per.fin.p pt f filing a tax returnDudleyDoright
 
Per.fin.4.01 p pta compensation
Per.fin.4.01 p pta compensationPer.fin.4.01 p pta compensation
Per.fin.4.01 p pta compensationDudleyDoright
 
6.02 a -transportation_options
6.02 a -transportation_options6.02 a -transportation_options
6.02 a -transportation_optionsDudleyDoright
 
6.02 c perf-choosing_right_vehicle
6.02 c perf-choosing_right_vehicle6.02 c perf-choosing_right_vehicle
6.02 c perf-choosing_right_vehicleDudleyDoright
 
Per.fin.3.01 p pt.b career crossroads
Per.fin.3.01 p pt.b career crossroadsPer.fin.3.01 p pt.b career crossroads
Per.fin.3.01 p pt.b career crossroadsDudleyDoright
 
Personal finance 8.03 p pt (use)
Personal finance 8.03 p pt (use)Personal finance 8.03 p pt (use)
Personal finance 8.03 p pt (use)DudleyDoright
 
Per.fin.7.03 p ptcidentity theft ppt (fefe)
Per.fin.7.03 p ptcidentity theft ppt (fefe)Per.fin.7.03 p ptcidentity theft ppt (fefe)
Per.fin.7.03 p ptcidentity theft ppt (fefe)DudleyDoright
 

More from DudleyDoright (20)

Sem i 1.02 armstrong rev
Sem i 1.02 armstrong revSem i 1.02 armstrong rev
Sem i 1.02 armstrong rev
 
Sem i 1.07 armstrong
Sem i 1.07 armstrongSem i 1.07 armstrong
Sem i 1.07 armstrong
 
Sem i 4.06 armstrong
Sem i 4.06 armstrongSem i 4.06 armstrong
Sem i 4.06 armstrong
 
Semi 1.02 a-b_power_point-a._garrett
Semi 1.02 a-b_power_point-a._garrettSemi 1.02 a-b_power_point-a._garrett
Semi 1.02 a-b_power_point-a._garrett
 
04.03 power point
04.03 power point04.03 power point
04.03 power point
 
Sem i 1.06 armstrong
Sem i 1.06 armstrongSem i 1.06 armstrong
Sem i 1.06 armstrong
 
Sem i 1.05 armstrong rev
Sem i 1.05 armstrong revSem i 1.05 armstrong rev
Sem i 1.05 armstrong rev
 
02.04 power point
02.04 power point02.04 power point
02.04 power point
 
Mm 2.03 use
Mm 2.03 useMm 2.03 use
Mm 2.03 use
 
Mm 2.03 1
Mm 2.03  1Mm 2.03  1
Mm 2.03 1
 
Personal finance 8.02 spending plans p_ptb(fefe)
Personal finance 8.02 spending plans p_ptb(fefe)Personal finance 8.02 spending plans p_ptb(fefe)
Personal finance 8.02 spending plans p_ptb(fefe)
 
Per.fin.7.01 p pt.atypes of insurance
Per.fin.7.01 p pt.atypes of insurancePer.fin.7.01 p pt.atypes of insurance
Per.fin.7.01 p pt.atypes of insurance
 
Per.fin.p pt f filing a tax return
Per.fin.p pt f filing a tax returnPer.fin.p pt f filing a tax return
Per.fin.p pt f filing a tax return
 
Per.fin.4.01 p pta compensation
Per.fin.4.01 p pta compensationPer.fin.4.01 p pta compensation
Per.fin.4.01 p pta compensation
 
Marketing 2.09 ppt
Marketing 2.09 pptMarketing 2.09 ppt
Marketing 2.09 ppt
 
6.02 a -transportation_options
6.02 a -transportation_options6.02 a -transportation_options
6.02 a -transportation_options
 
6.02 c perf-choosing_right_vehicle
6.02 c perf-choosing_right_vehicle6.02 c perf-choosing_right_vehicle
6.02 c perf-choosing_right_vehicle
 
Per.fin.3.01 p pt.b career crossroads
Per.fin.3.01 p pt.b career crossroadsPer.fin.3.01 p pt.b career crossroads
Per.fin.3.01 p pt.b career crossroads
 
Personal finance 8.03 p pt (use)
Personal finance 8.03 p pt (use)Personal finance 8.03 p pt (use)
Personal finance 8.03 p pt (use)
 
Per.fin.7.03 p ptcidentity theft ppt (fefe)
Per.fin.7.03 p ptcidentity theft ppt (fefe)Per.fin.7.03 p ptcidentity theft ppt (fefe)
Per.fin.7.03 p ptcidentity theft ppt (fefe)
 

Protect Your Identity in 3 Steps

  • 1. Objective 7.03 Understand ways to avoid identity theft.
  • 2.  What is identity theft?  How does one protect himself or herself from being a victim of identity theft?  What should I do if I am victimized?
  • 3. A type of fraud  Illegal use of a consumer’s personal identification, credit, or account information  Information that thieves steal:  Date of birth  Bank and investment account numbers  Social Security number  Internet passwords  Credit card information, credit cards video link- phishing scams
  • 4. video link: how stuff works-id theft
  • 5.  Resultsof identity theft for victims:  Financial losses of actual transactions  Loss of time and money trying to correct problem  Substantial stress dealing with long term actions to correct
  • 6. Technological Advances Increase Opportunities for Exposure to Identity Theft  Electronic funds transfers (EFT) enable financial transactions by computer  Direct deposits and withdrawals online  Pay-by-phone transfers  Point-of-sale transfers (debit card)  Online banking: Account numbers, date of birth, passwords in cyberspace
  • 7.  Provides protection Electronic Funds Transfer for : Definition: carrying out financial transactions  ATM, debit cards, by computer rather than using checks or cash cash cards Examples:  If loss is reported: direct deposit payroll check Automatic draft of monthly utility bill  Within 2 days=$50 maximum  Within 60 days, $500  Who is your best maximum, and advocate?  After 60 days, may be liable for all charges  YOU ARE!  It is important to pay attention to your financial transactions!
  • 8. video link- problems & solutions video link- credit card swipes
  • 9. Many businesses have  Other businesses use personal legitimate reasons for information, such as your obtaining personal name, address, credit card information number, and information  Payroll, human resources, about purchasing preferences personnel department and patterns for other  Social security, bank account #s purposes  Some websites use online  Marketing other products profiling  Food Lion MVP card -send  Security of websites coupons, special ads  Cautions about use of the Social Security number  Partial # only printed on receipts, etc.  Do not carry in your wallet
  • 10.  What personal • Making purchases information are you with a check, credit carrying in your or debit card wallet now? • Applying for a credit  Driver’s license card or loan  Social security card • Online or telephone  Credit cards shopping  Debit cards • Paying bills through  Health Insurance card the mail or online  Check book  Student ID card • Going to the doctor
  • 11. Obtaining personal information submitted on the Internet  Posing as representatives of banks, Internet service providers, or government agencies to get one to provide personal information on the telephone or by email  Looking over the shoulder when one is writing checks or using teller machines video link - ATM skimming device  Using phones with cameras, videos to photo & re-enter PIN codes  Using “ATM skimmers” to capture credit card number from the magnetic strip  Using card readers to swipe a card and capture the card number
  • 12. Pass this info on:  This has been verified by the FBI (their link is also included below). Please pass this on to everyone in your email address book. It is spreading fast so be prepared should you get this call. Most of us take those summonses for jury duty seriously, but enough people skip out on their civic duty that a new and ominous kind of fraud has surfaced. The caller claims to be a jury DUTY coordinator. If you protest that you never received a summons for jury duty, the Scammer asks you for your Social Security number and date of birth so he or she can verify the information and cancel the arrest warrant. Give out any of this information and bingo; your identity was just stolen. The fraud has been reported so far in 11 states, including Oklahoma , Illinois , and Colorado , AZ and more. This (swindle) is particularly insidious because they use intimidation over the phone to try to bully people into giving information by pretending they are with the court system. The FBI and the federal court system have issued nationwide alerts on their web sites, warning consumers about the fraud.  Check it out here: http://www.fbi.gov/page2/june06/jury_scams060206.htm  And here: http://www.snopes.com/crime/fraud/juryduty.asp Yep! It's true
  • 13. Good Afternoon –   It’s a good time to remind everyone about SCAM or PHISHING email. Phishing refers to the process of tricking recipients into sharing sensitive information with an unknown third party. Those who PHISH make an email appear legitimate.  Security Reminders-   1) CCS does not send out email asking for private information (i.e., social security numbers, credit card numbers, etc…). Sometimes we have “vendor” looking logo email asking for the end user to provide information. If you receive, delete the email.  2) CCS does not send out email regarding changing of a password. Delete the email.  3) Never share your password.  4) When in doubt about whether or not to respond to an email, DON’T until you have verified legitimacy. Ask a technology facilitator or call the IT Help Desk (704- 786-9805, ext. 2).    Dr. Katherine Propst  Assistant Superintendent  Cabarrus County Schools
  • 14. Stealing wallets or purses containing identification information, credit cards, or checkbooks  Stealing mail, which may include bank, credit card, payroll, and tax information  Completing a change of address card to have mail sent to another address  Going through trash from homes/businesses to find identification, bank, or credit information  Obtaining personal information from one’s home mail or body…theft
  • 15.  Make charges to your accounts and credit cards  Open new credit accounts to make purchases
  • 16.  To sign up for services such as telephone, cellular telephone, or wireless service, and utilities  Get a job using your information  Open a bank account and write “bad”  Rent an apartment checks  Obtain cash with bank  The predator is stripping cards whatever money is in  Obtain your tax your account! refund from IRS  Write checks on one’s bank account video link- identity theft in Florida
  • 17. Shred documents with personal information before discarding!
  • 18.
  • 19.  Report missing credit cards and identifying information to three credit-reporting agencies  Report missing credit cards to credit card company  Verify your credit card charges upon receipt of your card
  • 20.  Contact your bank if you are missing ATM cards or checks  Reconcile your bank statement to verify all withdrawals are for your authorized transactions
  • 21.  Report missing Social Security numbers or card to the Social Security Administration  Seek other help from the Federal Trade Commission and the Identity Theft Resource Center  Don’t carry your SS card in wallet!
  • 22. Issue a “stop payment” if checks or credit cards are lost or stolen  When establishing accounts at financial institutions, make sure they are insured by agencies that protect deposits in case the institution fails  Federal Deposit Insurance Corporation (FDIC)  Savings Association Insurance Funds (SAIF)  National Credit Union Administration (NCUA)
  • 23. Definition: Method by which individuals can avoid receiving unsolicited product  I want to “OPT OUT”… or service info; usually associated with telemarketing, e-mail  To remove your phone # from marketing, online marketing telemarketing lists use National or direct mail Registry or state registries  https://www.donotcall.gov/  Make an informed choice about sharing personal  To remove your personal information---“opt out” information from financial institutions/insurance company lists  Before clicking “I agree” -  Individual company privacy Read your online site statements have phone #s to agreement, you often give up contact your right to “opt out” and your information is broadly circulated to marketers
  • 24. •Use anti-virus and anti-spyware software and update them regularly •Do not click on links •Set web browser found in pop-up ads security to medium-high or high •Only download software from trusted •Keep operating system websites and web browser software updated •Clear hard drives before discarding, selling, or trading in computer equipment
  • 25. •When shopping online, Look for “https” or a picture of a lock after the URL or in the bottom right hand corner indicating the site is secure •Enter the website address yourself rather than following a link from an email or internet advertisement •Use a credit card instead of a debit card when making online purchases
  • 26. •Do not give out personal information from unsolicited contacts •Unsolicited = callers who contact you •Do not give out any personal information unless making a purchase (when you contacted company) •Choose security questions with answers only you would know
  • 27. Watch for clues that might indicate a  If it is suspected that a computer is infected computer is infected with with spyware. spyware, immediately: • Examples:  stop shopping, banking or • a stream of pop-up ads doing any other online activity that involves user • random error messages names, passwords, or other • sluggish performance sensitive information when opening programs  confirm that the security or saving files software is active and current  run software to scan the computer for viruses and spyware, deleting anything the program identifies as a problem
  • 28. Should the password be  Email, Debit Cards, Banking “I don’t know”? documents, other  Keep your username and password protected  Change passwords  Create a Password  Combination of words, numbers, and symbols  UNIQUE  Upper and Lower Case  Cannot be easily found  Do not use obvious names, birthdays, addresses, SS# etc.
  • 29.  When entering your Password in public places:  “Securely” type in PIN # at  ATM  Point of Sale (POS) register  Public Online outlets  How does predator get victim’s information?  Phones with video cameras can replicate your keystrokes  “Nosy” customers in line  Dumpster Diving  Predatoroften works with partner who “lifts” debit card for use with password later
  • 30.
  • 31.  YOU are your own best ADVOCATE!  Verify your credit card statement charges  Reconcile your bank account  KNOW WHAT YOU SPEND!  Request credit reports from credit bureaus
  • 32. Respond immediately  Keep a record of related phone calls, letters, and Emails  Request a “fraud alert” with three major credit bureaus  Equifax  TransUnion  Experian  Renew “fraud alert” every 90 days with credit bureaus
  • 33. Obtain a credit report from each major credit bureau and check for accuracy  Close all accounts that have been involved in the theft  Open new accounts with NEW unique passwords and new PIN numbers  File a police report
  • 34.  Federal Trade Commission (FTC)  oversees compliance with these acts  Financial Services Modernization Act (1999)  requires companies involved in financial activities to send privacy notices to customers  Children’s Online Privacy Protection Act (1998)  Requires websites directed to children under thirteen to post their privacy policy, parental consent and ability to monitor is required Link to Children's online privacy law
  • 35.  New industry booming to assist consumers with themselves from this fastest growing crime
  • 36.  Why do you think identity theft grew significantly during the recession?  Desperation  No income to pay bills  Time Available video link: Stolen_Futures - 10 minute- if time allows