Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

IST Presentation


Published on

Mariessa & Rochelle presented a Powerpoint presentation in IST on Identity Fraud.

Published in: Education, Business, Technology
  • Be the first to comment

IST Presentation

  1. 1. Who is that? Is his identity safe?
  2. 2. Identity Fraud ! Yes, it could happen to you. P R E S E N T E D B Y M A R I E S S A & R O C H E L L E
  3. 3. What is Identity fraud ? <ul><li>It is the use of a stolen identity in criminal activity, to obtain goods or services by deception. </li></ul><ul><li>In the blink of an eye, Identity Fraud causes a great loss to the victim, but a great benefit to the thief. </li></ul><ul><li>Without having committed any crime, the victim of identity fraud is charged. </li></ul><ul><li>Identity fraud is one of the fastest growing crimes in Australia and costs the Australian community billions of dollars every year. </li></ul>
  4. 4. How are databases involved in Identity Fraud ? <ul><li>Most companies store information about their clients in databases for easy retrieval. If a thief can access that database, the clients are at risk of identity fraud. </li></ul><ul><li>You don’t have to think hard about where YOUR personal data is stored: </li></ul><ul><li>Student information on the school database. </li></ul><ul><li>Family members’ records in an employer or landlord database. </li></ul><ul><li>Banks, utility companies, hospitals and tax offices store people’s information in databases. </li></ul>The question is- Is your personal information secure?
  5. 5. The internet has made it easier for anyone to obtain personal and financial data and trade the information. Want to know where and how your name could be found? Let’s try: <ul><li>A search engine; any social network site you have joined automatically adds your name to the online database. </li></ul>Identity Fraud is a common fear individuals don’t anticipate. This is why Mr. Lennon ensures we do not add any personal information when working online on Blogger. <ul><li>Other ways of gaining our personal information include: </li></ul><ul><li>Dumpsters & trashcans (Disposed mail can be searched ) </li></ul><ul><li>Spam programs (False promise computer advertisements) </li></ul><ul><li>Purchasing from online or offline databases </li></ul><ul><li>Bribery in companies </li></ul><ul><li>Hacking </li></ul><ul><li>Eavesdropping </li></ul><ul><li>Stealing wallets or important documents </li></ul>
  6. 6. What type of data may be stored about individuals? <ul><li>Unlike your fingerprints, which are unique to you and cannot be given to someone else for their use, your personal data can be exploited. This includes: </li></ul><ul><li>Full name & Date of Birth </li></ul><ul><li>Address </li></ul><ul><li>Contact details (Telephone/mobile no., e-mail) </li></ul><ul><li>Bank account details </li></ul><ul><li>Credit Card number </li></ul><ul><li>Past records </li></ul><ul><li>Photo ID </li></ul>
  7. 7. <ul><li>Accessing bank account information allows the thief to: </li></ul><ul><li>gain credit cards, loans, state benefits or simply take over the existing account. </li></ul><ul><li>make purchases in the victim’s name. </li></ul><ul><li>file for bankruptcy , cleaning the bank account of cash. </li></ul><ul><li>obtain genuine official documents like passports and driving licenses. </li></ul>Some of the ways in which this data can be misused
  8. 8. Ethical Responsibilities of those maintaining the database <ul><li>These are concerned by the employees who keep the records in databases. </li></ul><ul><li>The developer of the database should take action in imposing firm security rules. </li></ul><ul><li>Developers have a strict responsibility to ensure the security of the systems they develop where security is a requirement. </li></ul><ul><li>Ethical responsibility requires one to think twice before giving in to the Identity thief, and breaking the customer’s trust. </li></ul>
  9. 9. Legal Responsibilities of those maintaining the database <ul><li>On the Commonwealth level , a person is guilty of an offence if the person does anything with the intention of dishonestly causing a loss to another person </li></ul><ul><li>The person shouldn’t give access to anyone to the database without having seen genuine proof of identity </li></ul><ul><li>They must maintain a backup and recovery of all records </li></ul><ul><li>Must co-ordinate and complete regular database upgrades that will ensure reliability and security </li></ul><ul><li>Responsibility to provide final approval for those wishing to retrieve records off the database, provided it is for official reasons </li></ul>
  10. 10. Thanks for viewing our presentation! <ul><li>Case closed! =) </li></ul>
  11. 11. What can you do to prevent Identity Theft ?
  12. 12. Presentation prepared by: <ul><li>Mariessa Lai </li></ul><ul><li>& </li></ul><ul><li>Rochelle De Silva </li></ul>10IST.1