SlideShare a Scribd company logo
Identity Theft
Mystery of The
Stolen Identity
Take Charge of Your Finances
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 2
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Solve the
Mystery
“Unlucky” Lucy is one of the
many victims of identity theft
What is identity theft?
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 3
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
According to the FederalTrade Commission (FTC):
Identity Theft
IDENTITYTHEFT occurs when someone wrongfully acquires and
uses a consumer’s personal identification, credit, or account information
The FTC is a government agency that
focuses on consumer protection
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 4
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Identity Theft
Statistics
According to the Federal
Trade Commission, how many
identity theft complaints were
filed in 2008?
313, 982 identity theft
complaints
According to the U.S.
Department of Commerce,
what percentage of identity
theft victims in 2008 were
under the age of 20?
7% of identity theft victims
were under 20 years of age
Take a guess!
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 5
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
• 10% of identity theft victims during 2005 reported personal
expenses of more than $1200
• 11% of victims in 2005 reported that it took 3 or more months
to resolve the problems associated with identity theft after they
discovered that their information was being misused
Identity Theft
Victims may have to spend time and
money trying to fix the problems that are
caused by thieves
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 6
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Personal
Information
Name
Address &
Telephone
Number
Social
Security
Number
Driver’s
License
Number
Birth
Date
Credit
Card
Numbers
Bank
Account
NumbersIdentity thieves try to
obtain personal
information from
victims in order to steal
their identities.
Personal
Information
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 7
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Personal
Information
Search your purses, wallets, and backpacks.
What are you carrying with you right now
that reveals your personal information?
Drivers License
Social Security Card
Checkbook
Credit and Debit Cards
Insurance Cards
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 8
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Personal
Information
• Making purchases with a check, credit or debit card
• Applying for a credit card or loan
• Online or telephone shopping
• Paying bills through the mail or online
• Going to the doctor
What daily activities require an individual
to share personal information?
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 9
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Solve the
Mystery
Listen carefully and take very accurate notes to help Lucy find
the person who stole her identity
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 10
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
How Do They Do It?
The inspector has identified 4 suspects in Lucy’s case.
How does the inspector believe
the suspects stole Lucy’s identity?
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 11
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
• Thieves obtain personal information through a variety of methods:
– Stealing - Information is taken from a purse or wallet, personnel records from a
workplace, tax information, bank or credit card statements, or pre-approved credit
card offers from the mail.
– Diverting Mail - Thieves can complete a change of address form and have the
victim’s bills and statements mailed to a different location.
– “Dumpster Diving” - Personal information is discarded and thieves remove it from
the trash.
– Skimming - Thieves attach a device to card processors to steal credit and debit card
information
How Do They Do It?
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 12
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
• Methods continued...
– Phishing - Thieves use a form of electronic communication (usually email) to
pretend to be a company or depository institution in order to get the victim to give
up their personal information.
– Pretexting - Thieves use false pretenses to obtain your personal information from
financial institutions, telephone companies, and other sources.
– Spyware - Software installed on the victim’s computer, without their knowledge or
consent, that monitors internet use, sends pop up ads, re-directs the computer to
other sites, and tracks key strokes.
– Hacking - Information is stolen by breaking into a computer system.
How Do They Do It?
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 13
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
What Identity Thieves
Do With Information
The thief has been using Lucy’s credit card
to make their own purchases
What has the identity thief done with
Lucy’s personal information so far?
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 14
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
• Apply for a new driver’s license
• Open new bank accounts
• Apply for credit cards or store credit accounts
• Obtain cash with bank cards
• Get a job
• Rent an apartment
• Take out student loans
• File for bankruptcy
What Identity Thieves
Do With Information
What can identity thieves do if
they obtain personal information?
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 15
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Many actions can be taken to help
minimize the risk of identity theft
• Mail her documents from a secure post office location
• Use a PIN number that is not easy to guess
• Shred documents that contain personal information
• Make sure to log out of any online banking sites
• Never give personal information out over the phone or email
What could Lucy have done to help
prevent her identity from being stolen?
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 16
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Wallets and Purses
•Only carry what is necessary- do NOT carry social security cards,
passports, or birth certificates
•Do not hang purses from a chair in a public place
•Use purses that close securely
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 17
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Credit and Debit Cards
•Close unwanted accounts in writing and by phone and cut up the card
•Memorize the PIN number and do not use easily accessible numbers
(date of birth, address, etc.)
•Sign back of cards with signature &“Please see ID”
•Do not give out account numbers unless making a transaction that is
initiated by the consumer rather than responding to telephone or e-
mail solicitations
•Check statements regularly for any errors or signs of fraudulent use
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 18
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Credit Card Offers
•Shred credit card offers and applications. *a cross-cut shredder is safest
because it is more difficult to reassemble
•Cut up or shred pre-approved credit card offers that are not used
•“Opt-out” of pre-screened credit offers for five years at
www.optoutprescreen.com
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 19
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Mail
•Shred all credit card offers, bills, statements, and anything else that
contains personal information
•Deposit outgoing mail in secure post office collection boxes
•Contact the post office and request a vacation hold when unable to pick
up mail
•Do not leave mail in an unsecured mailbox overnight or for a long
period of time
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 20
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Email
•Keep your username and password protected
•Use a password that is a combination of words, numbers, and
symbols and cannot be easily found (do not use names, birthdays,
addresses, etc.)
•Verify the source of an email asking for personal information by
calling the company to confirm the email is from them
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 21
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Telephone
•Verify the source of any phone call asking for personal information
by calling the company to confirm the phone call is from them and
not a potential identity thief using their name. Use the phone number
listed on your account statement or in the telephone book.
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 22
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Computer Security
•Use anti-virus and anti-spyware software and update them regularly
•Do not click on links found in pop-up ads
•Only download software from trusted websites
•Set web browser security to medium-high or high
•Keep operating system and web browser software updated
•Do not give out any personal information unless making a purchase
•Choose security questions with answers only you would know
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 23
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Computer Security- Continued
•Watch for clues that might indicate a computer is infected with
spyware. such as a stream of pop-up ads, random error messages, and
sluggish performance when opening programs or saving files.
•If it is suspected that a computer is infected with spyware,
immediately stop shopping, banking or doing any other online activity
that involves user names, passwords, or other sensitive information.
Then, confirm that the security software is active and current and run
it to scan the computer for viruses and spyware, deleting anything the
program identifies as a problem.
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 24
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Social Networks, Blogs, & Chat Rooms
•Consider joining only sites that limit access to posts to a defined
group of users. Make sure you know how the site access works before
joining. Don’t join sites that allow anyone to view postings.
•Never post your full name, Social Security Number, bank or credit
card information, address, or phone number.
•Avoiding posting information that could be used to indentify you
offline such as school, work, or other locations where you spend time.
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 25
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Social Networks, Blogs, & Chat Rooms- Continued
•Use privacy settings to restrict who can access personal sites
•Remember that once information is posted online, it cannot be taken
back. Even if information is deleted, older versions may still exist on
other people's computers and be circulated online
•Only post information that you are comfortable with anyone viewing
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 26
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Internet Purchases
•Look for “https” or a picture of a lock after the URL or in the bottom
right hand corner indicating the site is secure
•Do not give any personal information on a site if it is not secure
•Enter the website address yourself rather than following a link from an
email or internet advertisement
•Use a credit card instead of a debit card when making online purchases
“https”
s = secure
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 27
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Social Security Number
•Memorize Social Security number
•Keep Social Security card in a safe place (do not carry it in wallet)
•Only give a Social Security number when absolutely necessary- ask
why a Social Security number is needed and how the information will
be protected
•Do not print a social security number on check blanks
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 28
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Preventing
Identity Theft
Credit Reports
•Check credit reports with each of the three reporting agencies at least
once a year
•Consumers receive one free credit report from each of the reporting
agencies every year, so ordering one credit report from one agency every
four months will keep consumers up to date and constantly alerted to
their credit report status
•Immediately dispute any wrong information
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 29
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
3 Credit
Reporting Agencies
Experian
PO Box 2104
Allen, TX 75013-2104
Report Order:
1-888-397-3742
Fraud Hotline:
1-888-397-3745
www.experian.com
Trans Union
PO Box 390
Springfield, PA 19064-0390
Report Order:
1-800-888-4213
Fraud Hotline:
1-800-6807289
www.tuc.com
Equifax
PO Box 105873
Atlanta, GA 30348
Report Order:
1-800-685-1111
Fraud Hotline:
1-800-525-6285
www.equifax.com
To order a credit report from any of the three reporting agencies,
use the following website: www.annualcreditreport.com
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 30
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
• Protect your Social Security number by only giving it out when
absolutely necessary
• Keep usernames and passwords safe- use a combination of letters,
numbers, and symbols that are not easily identified
• Select security check questions with answers only you would
know
• Don't give out personal information over the phone, through the
mail, or on the Internet unless you've initiated the contact and are
sure you know who you're dealing with
Preventing
Identity Theft
Key Guidelines
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 31
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
• Check credit reports at least once per year
• Shred all documents that contain personal information
• Be careful using the Internet. Only give out personal information
when making a purchase on a secure website
• Search your name occasionally to see if any unusual information
appears
• Be observant and follow your instincts
Preventing
Identity Theft
Key Guidelines
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 32
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Recognizing
Identity Theft
How did Lucy find out that her
identity had been stolen?
Could Lucy have recognized the
identity theft earlier? If so, how?
Her credit card was denied in a store
She could have checked her online banking
more often and then she would have
recognized the extra charges on her credit card
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 33
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Recognizing
Identity Theft
• New accounts or charges you
didn’t make
• Calls from collection
agencies
• Incorrect information on
your credit report
Early detection is key!
• Being denied credit when
there is no reason to be
• Missing bills or mailed
statements
Watch for the following signs
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 34
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
What To Do If
Identity Theft Happens
What steps did Lucy take when she
discovered her identity had been stolen?
She filed a report with the local police
What should have Lucy done when
she discovered the identity theft?
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 35
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
What To Do If
Identity Theft Happens
1.
• Act immediately!
2.
• Keep a detailed record of correspondence and phone records.
• Follow up all communication with letters sent via certified mail
3.
• Contact the three major credit bureaus and request a free fraud alert be added
to credit report.
• Fraud alert - warns creditors to verify an individual’s identity before issuing credit
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 36
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
What To Do If
Identity Theft Happens
4.
• Close all accounts which have been tampered
with or opened fraudulently
5.
• File a police report with the local police
6.
• File a complaint with the FTC:
www.ftccomplaintassistant.gov
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 37
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Deter, Detect, Defend-
Avoid Identity theft
Hear stories from real-life identity theft victims on
the FTC’s “Deter, Detect, Defend- Avoid Identity
Theft” video
http://www.ftc.gov/bcp/edu/microsites/idtheft/vid
eo/avoid-identity-theft-video.html
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 38
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Personal
Liability
• Credit Cards
– Truth in Lending Act limits liability for unauthorized charges
to $50.00 per card
– A letter must be received by the creditor within 60 days of the
first bill containing the error
– The dispute must be resolved within 90 days of the creditor
receiving the letter
Since Lucy discovered the theft very quickly, she will only
be liable for $50.00 in charges on her credit card!
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 39
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
• ATM and Debit Cards
– The Electronic Funds Transfer Act provides
protection
– The amount a person is liable for depends upon how
quickly the loss is reported
• Within two days: maximum $50.00
• Within sixty days: maximum $500.00
• After sixty days a person may be liable for everything
Personal
Liability
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 40
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
• Checks
– Contact the financial institution and stop payment
– Most states hold the financial institution responsible
for losses of a forged check
Personal
Liability
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 41
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Identity Theft
Protection
• Offered by banks and other companies
• Services
– Closely monitor accounts and personal information
– Alert consumer when there is a change
– Help resolve any problems if identity theft does
occur
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 42
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
• Cost
– $5.00 to $35.00 per month
– Depends on amount of services provided
• Can NOT eliminate identity theft but can help
prevent it
Identity Theft
Protection
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 43
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Identity Theft
Protection
Pros Cons
Convenient Cost
Saves consumer time because
they don’t have to monitor
their own accounts and credit
reports
Most of the services offered can
be completed by the consumer for
no cost
What are the pros and cons
of identity theft protection?
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 44
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Identity Theft
Insurance
Services
• Limits liability of identity theft victims
• Reimburses victims for some or all out of pocket expenses
caused by the theft
Choosing identity theft insurance
• Research exactly what the company covers
• Check to see if there are any complaints against the company
(Better Business Bureau, consumer protection agency, and state
Attorney General)
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 45
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
• Directions
– Divide into 4 groups
– Each group will take turns verbally answering a question about
identity theft
– If the question is answered correctly, the group will receive a clue
that will help reveal Lucy’s identity thief
– If the question is answered incorrectly, play will move on to the
next group and the group that answered incorrectly will not receive
a clue
– Play will continue until all 12 clues have been won- each group will
have at least 3 chances to receive a clue
“Solve the Mystery”
Activity
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 46
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Who is Lucy’s identity thief?
Make your guess!
Who Did It?
1.3.1.G1
Identity
Theft
© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 47
Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Solve the
Mystery
Find out who the true identity thief is!

More Related Content

What's hot

Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
- Mark - Fullbright
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
robinlgray
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
Lisa Sosebee
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
legalshieldofficial
 
Identity theft
Identity theftIdentity theft
Identity theft
Ashley Arkfeld
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
Rob Taylor
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
ronwolfinger
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 
Identity theft
Identity theftIdentity theft
Identity theft
Eqhball Ghazizadeh
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
Cut 2 Shreds
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
mullarkea
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
poojakalra10
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
- Mark - Fullbright
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
paulgundersen9
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Alan Greggo
 
Data theft
Data theftData theft
Data theft
Laura
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
- Mark - Fullbright
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
milfamln
 

What's hot (20)

Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Data theft
Data theftData theft
Data theft
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 

Similar to Consumer Protection: Identity Theft

6.04 protecting yourself from fraud
6.04 protecting yourself from fraud6.04 protecting yourself from fraud
6.04 protecting yourself from fraud
Jamie Norton, MEd
 
Understanding Credit Reports
Understanding Credit ReportsUnderstanding Credit Reports
Understanding Credit Reports
vcrisafulli
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
Rob Taylor
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
- Mark - Fullbright
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
Barbara O'Neill
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
- Mark - Fullbright
 
Creditcards
CreditcardsCreditcards
Creditcards
vcrisafulli
 
Take charge of credit cards power point presentation 2.4.1.g1
Take charge of credit cards power point presentation 2.4.1.g1Take charge of credit cards power point presentation 2.4.1.g1
Take charge of credit cards power point presentation 2.4.1.g1
lbonner1987
 
Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity Theft
The Identity Advocate
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
Community Legal Education Ontario (CLEO)
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
National Crime Prevention Council
 
Safeguarding Your Child's Future
Safeguarding Your Child's FutureSafeguarding Your Child's Future
Safeguarding Your Child's Future
- Mark - Fullbright
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
- Mark - Fullbright
 
Per.fin.7.03 p ptcidentity theft ppt (fefe)
Per.fin.7.03 p ptcidentity theft ppt (fefe)Per.fin.7.03 p ptcidentity theft ppt (fefe)
Per.fin.7.03 p ptcidentity theft ppt (fefe)
DudleyDoright
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Blinsink
 
Understanding your paycheck powerpoint presentation 1.13.1
Understanding your paycheck powerpoint presentation 1.13.1Understanding your paycheck powerpoint presentation 1.13.1
Understanding your paycheck powerpoint presentation 1.13.1
kdcsdross
 
ID Theft
ID TheftID Theft
ID Theft
Bill Taylor
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
- Mark - Fullbright
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
- Mark - Fullbright
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
Mindy W Gilbert 937.206.7973 megilbert@firstam.com
 

Similar to Consumer Protection: Identity Theft (20)

6.04 protecting yourself from fraud
6.04 protecting yourself from fraud6.04 protecting yourself from fraud
6.04 protecting yourself from fraud
 
Understanding Credit Reports
Understanding Credit ReportsUnderstanding Credit Reports
Understanding Credit Reports
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Creditcards
CreditcardsCreditcards
Creditcards
 
Take charge of credit cards power point presentation 2.4.1.g1
Take charge of credit cards power point presentation 2.4.1.g1Take charge of credit cards power point presentation 2.4.1.g1
Take charge of credit cards power point presentation 2.4.1.g1
 
Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity Theft
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
 
Safeguarding Your Child's Future
Safeguarding Your Child's FutureSafeguarding Your Child's Future
Safeguarding Your Child's Future
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
 
Per.fin.7.03 p ptcidentity theft ppt (fefe)
Per.fin.7.03 p ptcidentity theft ppt (fefe)Per.fin.7.03 p ptcidentity theft ppt (fefe)
Per.fin.7.03 p ptcidentity theft ppt (fefe)
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Understanding your paycheck powerpoint presentation 1.13.1
Understanding your paycheck powerpoint presentation 1.13.1Understanding your paycheck powerpoint presentation 1.13.1
Understanding your paycheck powerpoint presentation 1.13.1
 
ID Theft
ID TheftID Theft
ID Theft
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 

Recently uploaded

Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
egoetzinger
 
Donald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptxDonald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptx
SerdarHudaykuliyew
 
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
nexop1
 
DEMAND AND SUPPLY.docx Notes for Economics
DEMAND AND SUPPLY.docx Notes for EconomicsDEMAND AND SUPPLY.docx Notes for Economics
DEMAND AND SUPPLY.docx Notes for Economics
Opanga1
 
2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf
Neal Brewster
 
Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...
Labour Market Information Council | Conseil de l’information sur le marché du travail
 
1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf
Neal Brewster
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
VishnuVenugopal84
 
Who Is Abhay Bhutada, MD of Poonawalla Fincorp
Who Is Abhay Bhutada, MD of Poonawalla FincorpWho Is Abhay Bhutada, MD of Poonawalla Fincorp
Who Is Abhay Bhutada, MD of Poonawalla Fincorp
beulahfernandes8
 
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdfTumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Henry Tapper
 
Role of Information Technology in Revenue - Prof Oyedokun.pptx
Role of Information Technology in Revenue  - Prof Oyedokun.pptxRole of Information Technology in Revenue  - Prof Oyedokun.pptx
Role of Information Technology in Revenue - Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
How Non-Banking Financial Companies Empower Startups With Venture Debt Financing
How Non-Banking Financial Companies Empower Startups With Venture Debt FinancingHow Non-Banking Financial Companies Empower Startups With Venture Debt Financing
How Non-Banking Financial Companies Empower Startups With Venture Debt Financing
Vighnesh Shashtri
 
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdfPensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Henry Tapper
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
Writo-Finance
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
egoetzinger
 
G20 summit held in India. Proper presentation for G20 summit
G20 summit held in India. Proper presentation for G20 summitG20 summit held in India. Proper presentation for G20 summit
G20 summit held in India. Proper presentation for G20 summit
rohitsaxena882511
 
5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports
EasyReports
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
obyzuk
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
conose1
 
Independent Study - College of Wooster Research (2023-2024)
Independent Study - College of Wooster Research (2023-2024)Independent Study - College of Wooster Research (2023-2024)
Independent Study - College of Wooster Research (2023-2024)
AntoniaOwensDetwiler
 

Recently uploaded (20)

Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
Donald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptxDonald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptx
 
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
 
DEMAND AND SUPPLY.docx Notes for Economics
DEMAND AND SUPPLY.docx Notes for EconomicsDEMAND AND SUPPLY.docx Notes for Economics
DEMAND AND SUPPLY.docx Notes for Economics
 
2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf
 
Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...
 
1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
 
Who Is Abhay Bhutada, MD of Poonawalla Fincorp
Who Is Abhay Bhutada, MD of Poonawalla FincorpWho Is Abhay Bhutada, MD of Poonawalla Fincorp
Who Is Abhay Bhutada, MD of Poonawalla Fincorp
 
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdfTumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
 
Role of Information Technology in Revenue - Prof Oyedokun.pptx
Role of Information Technology in Revenue  - Prof Oyedokun.pptxRole of Information Technology in Revenue  - Prof Oyedokun.pptx
Role of Information Technology in Revenue - Prof Oyedokun.pptx
 
How Non-Banking Financial Companies Empower Startups With Venture Debt Financing
How Non-Banking Financial Companies Empower Startups With Venture Debt FinancingHow Non-Banking Financial Companies Empower Startups With Venture Debt Financing
How Non-Banking Financial Companies Empower Startups With Venture Debt Financing
 
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdfPensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
 
G20 summit held in India. Proper presentation for G20 summit
G20 summit held in India. Proper presentation for G20 summitG20 summit held in India. Proper presentation for G20 summit
G20 summit held in India. Proper presentation for G20 summit
 
5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
 
Independent Study - College of Wooster Research (2023-2024)
Independent Study - College of Wooster Research (2023-2024)Independent Study - College of Wooster Research (2023-2024)
Independent Study - College of Wooster Research (2023-2024)
 

Consumer Protection: Identity Theft

  • 1. Identity Theft Mystery of The Stolen Identity Take Charge of Your Finances
  • 2. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 2 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Solve the Mystery “Unlucky” Lucy is one of the many victims of identity theft What is identity theft?
  • 3. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 3 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona According to the FederalTrade Commission (FTC): Identity Theft IDENTITYTHEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information The FTC is a government agency that focuses on consumer protection
  • 4. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 4 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Identity Theft Statistics According to the Federal Trade Commission, how many identity theft complaints were filed in 2008? 313, 982 identity theft complaints According to the U.S. Department of Commerce, what percentage of identity theft victims in 2008 were under the age of 20? 7% of identity theft victims were under 20 years of age Take a guess!
  • 5. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 5 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona • 10% of identity theft victims during 2005 reported personal expenses of more than $1200 • 11% of victims in 2005 reported that it took 3 or more months to resolve the problems associated with identity theft after they discovered that their information was being misused Identity Theft Victims may have to spend time and money trying to fix the problems that are caused by thieves
  • 6. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 6 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Personal Information Name Address & Telephone Number Social Security Number Driver’s License Number Birth Date Credit Card Numbers Bank Account NumbersIdentity thieves try to obtain personal information from victims in order to steal their identities. Personal Information
  • 7. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 7 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Personal Information Search your purses, wallets, and backpacks. What are you carrying with you right now that reveals your personal information? Drivers License Social Security Card Checkbook Credit and Debit Cards Insurance Cards
  • 8. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 8 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Personal Information • Making purchases with a check, credit or debit card • Applying for a credit card or loan • Online or telephone shopping • Paying bills through the mail or online • Going to the doctor What daily activities require an individual to share personal information?
  • 9. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 9 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Solve the Mystery Listen carefully and take very accurate notes to help Lucy find the person who stole her identity
  • 10. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 10 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona How Do They Do It? The inspector has identified 4 suspects in Lucy’s case. How does the inspector believe the suspects stole Lucy’s identity?
  • 11. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 11 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona • Thieves obtain personal information through a variety of methods: – Stealing - Information is taken from a purse or wallet, personnel records from a workplace, tax information, bank or credit card statements, or pre-approved credit card offers from the mail. – Diverting Mail - Thieves can complete a change of address form and have the victim’s bills and statements mailed to a different location. – “Dumpster Diving” - Personal information is discarded and thieves remove it from the trash. – Skimming - Thieves attach a device to card processors to steal credit and debit card information How Do They Do It?
  • 12. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 12 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona • Methods continued... – Phishing - Thieves use a form of electronic communication (usually email) to pretend to be a company or depository institution in order to get the victim to give up their personal information. – Pretexting - Thieves use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources. – Spyware - Software installed on the victim’s computer, without their knowledge or consent, that monitors internet use, sends pop up ads, re-directs the computer to other sites, and tracks key strokes. – Hacking - Information is stolen by breaking into a computer system. How Do They Do It?
  • 13. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 13 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona What Identity Thieves Do With Information The thief has been using Lucy’s credit card to make their own purchases What has the identity thief done with Lucy’s personal information so far?
  • 14. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 14 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona • Apply for a new driver’s license • Open new bank accounts • Apply for credit cards or store credit accounts • Obtain cash with bank cards • Get a job • Rent an apartment • Take out student loans • File for bankruptcy What Identity Thieves Do With Information What can identity thieves do if they obtain personal information?
  • 15. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 15 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Many actions can be taken to help minimize the risk of identity theft • Mail her documents from a secure post office location • Use a PIN number that is not easy to guess • Shred documents that contain personal information • Make sure to log out of any online banking sites • Never give personal information out over the phone or email What could Lucy have done to help prevent her identity from being stolen?
  • 16. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 16 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Wallets and Purses •Only carry what is necessary- do NOT carry social security cards, passports, or birth certificates •Do not hang purses from a chair in a public place •Use purses that close securely
  • 17. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 17 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Credit and Debit Cards •Close unwanted accounts in writing and by phone and cut up the card •Memorize the PIN number and do not use easily accessible numbers (date of birth, address, etc.) •Sign back of cards with signature &“Please see ID” •Do not give out account numbers unless making a transaction that is initiated by the consumer rather than responding to telephone or e- mail solicitations •Check statements regularly for any errors or signs of fraudulent use
  • 18. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 18 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Credit Card Offers •Shred credit card offers and applications. *a cross-cut shredder is safest because it is more difficult to reassemble •Cut up or shred pre-approved credit card offers that are not used •“Opt-out” of pre-screened credit offers for five years at www.optoutprescreen.com
  • 19. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 19 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Mail •Shred all credit card offers, bills, statements, and anything else that contains personal information •Deposit outgoing mail in secure post office collection boxes •Contact the post office and request a vacation hold when unable to pick up mail •Do not leave mail in an unsecured mailbox overnight or for a long period of time
  • 20. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 20 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Email •Keep your username and password protected •Use a password that is a combination of words, numbers, and symbols and cannot be easily found (do not use names, birthdays, addresses, etc.) •Verify the source of an email asking for personal information by calling the company to confirm the email is from them
  • 21. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 21 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Telephone •Verify the source of any phone call asking for personal information by calling the company to confirm the phone call is from them and not a potential identity thief using their name. Use the phone number listed on your account statement or in the telephone book.
  • 22. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 22 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Computer Security •Use anti-virus and anti-spyware software and update them regularly •Do not click on links found in pop-up ads •Only download software from trusted websites •Set web browser security to medium-high or high •Keep operating system and web browser software updated •Do not give out any personal information unless making a purchase •Choose security questions with answers only you would know
  • 23. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 23 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Computer Security- Continued •Watch for clues that might indicate a computer is infected with spyware. such as a stream of pop-up ads, random error messages, and sluggish performance when opening programs or saving files. •If it is suspected that a computer is infected with spyware, immediately stop shopping, banking or doing any other online activity that involves user names, passwords, or other sensitive information. Then, confirm that the security software is active and current and run it to scan the computer for viruses and spyware, deleting anything the program identifies as a problem.
  • 24. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 24 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Social Networks, Blogs, & Chat Rooms •Consider joining only sites that limit access to posts to a defined group of users. Make sure you know how the site access works before joining. Don’t join sites that allow anyone to view postings. •Never post your full name, Social Security Number, bank or credit card information, address, or phone number. •Avoiding posting information that could be used to indentify you offline such as school, work, or other locations where you spend time.
  • 25. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 25 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Social Networks, Blogs, & Chat Rooms- Continued •Use privacy settings to restrict who can access personal sites •Remember that once information is posted online, it cannot be taken back. Even if information is deleted, older versions may still exist on other people's computers and be circulated online •Only post information that you are comfortable with anyone viewing
  • 26. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 26 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Internet Purchases •Look for “https” or a picture of a lock after the URL or in the bottom right hand corner indicating the site is secure •Do not give any personal information on a site if it is not secure •Enter the website address yourself rather than following a link from an email or internet advertisement •Use a credit card instead of a debit card when making online purchases “https” s = secure
  • 27. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 27 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Social Security Number •Memorize Social Security number •Keep Social Security card in a safe place (do not carry it in wallet) •Only give a Social Security number when absolutely necessary- ask why a Social Security number is needed and how the information will be protected •Do not print a social security number on check blanks
  • 28. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 28 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Preventing Identity Theft Credit Reports •Check credit reports with each of the three reporting agencies at least once a year •Consumers receive one free credit report from each of the reporting agencies every year, so ordering one credit report from one agency every four months will keep consumers up to date and constantly alerted to their credit report status •Immediately dispute any wrong information
  • 29. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 29 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona 3 Credit Reporting Agencies Experian PO Box 2104 Allen, TX 75013-2104 Report Order: 1-888-397-3742 Fraud Hotline: 1-888-397-3745 www.experian.com Trans Union PO Box 390 Springfield, PA 19064-0390 Report Order: 1-800-888-4213 Fraud Hotline: 1-800-6807289 www.tuc.com Equifax PO Box 105873 Atlanta, GA 30348 Report Order: 1-800-685-1111 Fraud Hotline: 1-800-525-6285 www.equifax.com To order a credit report from any of the three reporting agencies, use the following website: www.annualcreditreport.com
  • 30. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 30 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona • Protect your Social Security number by only giving it out when absolutely necessary • Keep usernames and passwords safe- use a combination of letters, numbers, and symbols that are not easily identified • Select security check questions with answers only you would know • Don't give out personal information over the phone, through the mail, or on the Internet unless you've initiated the contact and are sure you know who you're dealing with Preventing Identity Theft Key Guidelines
  • 31. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 31 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona • Check credit reports at least once per year • Shred all documents that contain personal information • Be careful using the Internet. Only give out personal information when making a purchase on a secure website • Search your name occasionally to see if any unusual information appears • Be observant and follow your instincts Preventing Identity Theft Key Guidelines
  • 32. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 32 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Recognizing Identity Theft How did Lucy find out that her identity had been stolen? Could Lucy have recognized the identity theft earlier? If so, how? Her credit card was denied in a store She could have checked her online banking more often and then she would have recognized the extra charges on her credit card
  • 33. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 33 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Recognizing Identity Theft • New accounts or charges you didn’t make • Calls from collection agencies • Incorrect information on your credit report Early detection is key! • Being denied credit when there is no reason to be • Missing bills or mailed statements Watch for the following signs
  • 34. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 34 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona What To Do If Identity Theft Happens What steps did Lucy take when she discovered her identity had been stolen? She filed a report with the local police What should have Lucy done when she discovered the identity theft?
  • 35. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 35 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona What To Do If Identity Theft Happens 1. • Act immediately! 2. • Keep a detailed record of correspondence and phone records. • Follow up all communication with letters sent via certified mail 3. • Contact the three major credit bureaus and request a free fraud alert be added to credit report. • Fraud alert - warns creditors to verify an individual’s identity before issuing credit
  • 36. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 36 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona What To Do If Identity Theft Happens 4. • Close all accounts which have been tampered with or opened fraudulently 5. • File a police report with the local police 6. • File a complaint with the FTC: www.ftccomplaintassistant.gov
  • 37. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 37 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Deter, Detect, Defend- Avoid Identity theft Hear stories from real-life identity theft victims on the FTC’s “Deter, Detect, Defend- Avoid Identity Theft” video http://www.ftc.gov/bcp/edu/microsites/idtheft/vid eo/avoid-identity-theft-video.html
  • 38. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 38 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Personal Liability • Credit Cards – Truth in Lending Act limits liability for unauthorized charges to $50.00 per card – A letter must be received by the creditor within 60 days of the first bill containing the error – The dispute must be resolved within 90 days of the creditor receiving the letter Since Lucy discovered the theft very quickly, she will only be liable for $50.00 in charges on her credit card!
  • 39. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 39 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona • ATM and Debit Cards – The Electronic Funds Transfer Act provides protection – The amount a person is liable for depends upon how quickly the loss is reported • Within two days: maximum $50.00 • Within sixty days: maximum $500.00 • After sixty days a person may be liable for everything Personal Liability
  • 40. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 40 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona • Checks – Contact the financial institution and stop payment – Most states hold the financial institution responsible for losses of a forged check Personal Liability
  • 41. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 41 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Identity Theft Protection • Offered by banks and other companies • Services – Closely monitor accounts and personal information – Alert consumer when there is a change – Help resolve any problems if identity theft does occur
  • 42. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 42 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona • Cost – $5.00 to $35.00 per month – Depends on amount of services provided • Can NOT eliminate identity theft but can help prevent it Identity Theft Protection
  • 43. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 43 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Identity Theft Protection Pros Cons Convenient Cost Saves consumer time because they don’t have to monitor their own accounts and credit reports Most of the services offered can be completed by the consumer for no cost What are the pros and cons of identity theft protection?
  • 44. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 44 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Identity Theft Insurance Services • Limits liability of identity theft victims • Reimburses victims for some or all out of pocket expenses caused by the theft Choosing identity theft insurance • Research exactly what the company covers • Check to see if there are any complaints against the company (Better Business Bureau, consumer protection agency, and state Attorney General)
  • 45. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 45 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona • Directions – Divide into 4 groups – Each group will take turns verbally answering a question about identity theft – If the question is answered correctly, the group will receive a clue that will help reveal Lucy’s identity thief – If the question is answered incorrectly, play will move on to the next group and the group that answered incorrectly will not receive a clue – Play will continue until all 12 clues have been won- each group will have at least 3 chances to receive a clue “Solve the Mystery” Activity
  • 46. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 46 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Who is Lucy’s identity thief? Make your guess! Who Did It?
  • 47. 1.3.1.G1 Identity Theft © Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 47 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona Solve the Mystery Find out who the true identity thief is!