SlideShare a Scribd company logo
1 of 12
Identity Theft
This presentation is being submitted on July 31st , 2017 for
Christine Wojdyla’s BUL2241 Section 01 Business Law.
What Is Identity Theft?
Identity theft consists in the unlawful use of another person’s identity without
consent in order to obtain financial gain, credit and diverse benefits for another
individual’s disadvantage.
Example: Farmers in the US use SSN number of deceased people to obtain legal
status for its employers without raising any suspicion with the IRS.
How does it happen?
Identity theft can as be simple as stealing a credit
card from someone else’s mail box as well as
pretending to be someone else to enter a party.
It sounds like thing we see in the movies, but this
is an extremely bad crime and some examples,
that are often punish with jail time are:
- Tax Fraud in order to obtain government
money
- Wire Fraud by utilizing stolen IDs
- Changing appearance and soliciting under
someone else's name
- Impersonating victims of kidnap in order to
take advantage of emotionally distraught family
member
Consumers, be aware!
Some scam artists are more crafty than the others. You
may be able to easily dispute a credit card charge, but
when it comes to proving you were not the person
who looks just like you and committed other
aggravated identity theft related crimes… Things
become incredibly difficult.
How does it affect
the victims?
Anndorie Cromar was victim of
medical identity theft, which caused
her to be a subject of investigation, go
to court and almost lose custody of her
children because someone stole her ID
from her car to go to the hospital and
give birth to a meth baby.
What should be
done to prevent
identity theft
crimes?
Feeling careful? Think
twice.
There are millions of online database which
contain information such as names, location,
telephone number and it is possible to find
information about your relatives as well.
Websites such as Airbnb will ask you questions
that will raise some hair on the back of your
head. NO PANIC! The measure is taken to
make sure users as host/tenants are protected
from prospects with a dirty background.
Remember when I told you not to panic? Well,
security may be compromised and any time a
website with the resource of Airbnb get hacked.
You information is made available to millions of
scammer trying to get a slice. The internet is
wonderful and convenient, but just if you know
how to use it.
Don’t give you
information to
strangers.
Remember that great
deal on Pandora
bracelets on Facebook?
STAY AWAY!!!
Preventing Identity Theft
• Make sure your PINS and password are strong: Anyone could guess a
birthday, spouse nickname, telephone number and such.
• Keep your PINS and passwords safe: It is no good to work so hard on a
strong PIN or password if you leave it out in the open.
• Protect your electronic devices: It is common to keep important e-files on
computers and smartphones and it is important to keep it away from the
thieves radar.
• Shred sensitive documents: Old bills, credit card offers or anything that may
contain personal information that can be used by dumpster divers.
• Secure your wireless password: People may trying more than just freeload on
your internet.
Preventing Identity Theft 2
• Beware of suspicious emails: We all want that cash prize or that free
subscription, what we don’t want is to find our computer got
hacked!
• Lock important documents: Birth Certificates and Passports are
expensive and a bit difficult to recover. Make sure to keep those safe
and use as need.
• Stay alert in public: A lot of times thieves will place invisible sleeves
into ATMs and wait for you to swipe your card in order to steal
your money.
EDUCATE YOURSELF ON IDENTITY THEFT
Where can you find sources?
Companies like Experian
with international data
base can provide you with
way to protect, assist and
educate when it comes to
compromised credit due
to identity theft.
Sources to Educate Yourself Against Identity Theft
• ITRC - http://www.idtheftcenter.org/
• LEXISNEXIS – www.lexisnexis.com
• OVC - https://www.ovc.gov/
• ITAC Sentinel - https://www.itacsentinel.com/
• FIRST ORION - http://firstorion.com/
• GENERALI GLOBAL ASSISTANCE - http://us.generaliglobalassistance.com/
Unfortunately there are very few specific information sources in order to prevent Identity
Theft by 100%. By taking advantage of the presented sources, consumers can find answers
and solutions if their identity gets compromised.

More Related Content

What's hot

What's hot (20)

Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Callifornia virginia fbi
Callifornia virginia fbiCallifornia virginia fbi
Callifornia virginia fbi
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Senior Citizen Crime Prevention
Senior Citizen Crime PreventionSenior Citizen Crime Prevention
Senior Citizen Crime Prevention
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Understanding identity theft
Understanding identity theftUnderstanding identity theft
Understanding identity theft
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft business
 
Credit card scams
Credit card scamsCredit card scams
Credit card scams
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 

Similar to Identity Theft

Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pntjessmc1
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 
All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 

Similar to Identity Theft (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Trilegiant 1
Trilegiant 1Trilegiant 1
Trilegiant 1
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Identity Theft

  • 1. Identity Theft This presentation is being submitted on July 31st , 2017 for Christine Wojdyla’s BUL2241 Section 01 Business Law.
  • 2. What Is Identity Theft? Identity theft consists in the unlawful use of another person’s identity without consent in order to obtain financial gain, credit and diverse benefits for another individual’s disadvantage. Example: Farmers in the US use SSN number of deceased people to obtain legal status for its employers without raising any suspicion with the IRS.
  • 3. How does it happen? Identity theft can as be simple as stealing a credit card from someone else’s mail box as well as pretending to be someone else to enter a party. It sounds like thing we see in the movies, but this is an extremely bad crime and some examples, that are often punish with jail time are: - Tax Fraud in order to obtain government money - Wire Fraud by utilizing stolen IDs - Changing appearance and soliciting under someone else's name - Impersonating victims of kidnap in order to take advantage of emotionally distraught family member
  • 4. Consumers, be aware! Some scam artists are more crafty than the others. You may be able to easily dispute a credit card charge, but when it comes to proving you were not the person who looks just like you and committed other aggravated identity theft related crimes… Things become incredibly difficult.
  • 5. How does it affect the victims? Anndorie Cromar was victim of medical identity theft, which caused her to be a subject of investigation, go to court and almost lose custody of her children because someone stole her ID from her car to go to the hospital and give birth to a meth baby.
  • 6. What should be done to prevent identity theft crimes? Feeling careful? Think twice. There are millions of online database which contain information such as names, location, telephone number and it is possible to find information about your relatives as well. Websites such as Airbnb will ask you questions that will raise some hair on the back of your head. NO PANIC! The measure is taken to make sure users as host/tenants are protected from prospects with a dirty background. Remember when I told you not to panic? Well, security may be compromised and any time a website with the resource of Airbnb get hacked. You information is made available to millions of scammer trying to get a slice. The internet is wonderful and convenient, but just if you know how to use it.
  • 7. Don’t give you information to strangers. Remember that great deal on Pandora bracelets on Facebook? STAY AWAY!!!
  • 8. Preventing Identity Theft • Make sure your PINS and password are strong: Anyone could guess a birthday, spouse nickname, telephone number and such. • Keep your PINS and passwords safe: It is no good to work so hard on a strong PIN or password if you leave it out in the open. • Protect your electronic devices: It is common to keep important e-files on computers and smartphones and it is important to keep it away from the thieves radar. • Shred sensitive documents: Old bills, credit card offers or anything that may contain personal information that can be used by dumpster divers. • Secure your wireless password: People may trying more than just freeload on your internet.
  • 9. Preventing Identity Theft 2 • Beware of suspicious emails: We all want that cash prize or that free subscription, what we don’t want is to find our computer got hacked! • Lock important documents: Birth Certificates and Passports are expensive and a bit difficult to recover. Make sure to keep those safe and use as need. • Stay alert in public: A lot of times thieves will place invisible sleeves into ATMs and wait for you to swipe your card in order to steal your money.
  • 10. EDUCATE YOURSELF ON IDENTITY THEFT
  • 11. Where can you find sources? Companies like Experian with international data base can provide you with way to protect, assist and educate when it comes to compromised credit due to identity theft.
  • 12. Sources to Educate Yourself Against Identity Theft • ITRC - http://www.idtheftcenter.org/ • LEXISNEXIS – www.lexisnexis.com • OVC - https://www.ovc.gov/ • ITAC Sentinel - https://www.itacsentinel.com/ • FIRST ORION - http://firstorion.com/ • GENERALI GLOBAL ASSISTANCE - http://us.generaliglobalassistance.com/ Unfortunately there are very few specific information sources in order to prevent Identity Theft by 100%. By taking advantage of the presented sources, consumers can find answers and solutions if their identity gets compromised.