SlideShare a Scribd company logo
1 of 9
Identity
WHAT IS IDENTITY THEFT?
When someone steals your personal
 information and uses it without
 your permission. It is a serious
 crime. It can ruin your
 finances, credit history, and
 reputation. It takes
 time, money, and patience to
 resolve.
Wireless ID Theft
The Black Market
BE ALERT
1. Do not share date of birth, SSN, or birth certificate.
2. Only share SSN when you trust the other party--ask
   why they want it, how long they'll keep it, how they'll
   dispose of it
3. Before sharing personal information on the
   internet, make sure you have a secure connection--a
   lock on the address bar and a URL beginning with
   "https"
4. Keep antivirus updated
5. If you use a password to sign into a website, make
   sure to log out
6. Use strong passwords
   http://netforbeginners.about.com/od/antivirusantispyw
   are/tp/5-steps-to-a-strong-password.htm
Phishing
WHAT TO DO?

   File a report with the
     FTC: www.ftc.gov
Also, alert credit reporting companies, place an
  initial fraud alert, request a credit freeze, file a
  police report
Identity Theft
Is Not A Joke

More Related Content

What's hot

Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic The TNS Group
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Phishing
PhishingPhishing
PhishingSyahida
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemNarendra Singh
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Er. Rahul Jain
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gtemi
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystemamiable_indian
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)Dhrumit Patel
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and PhishingMason Bird
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 

What's hot (20)

Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
 
Phishing
PhishingPhishing
Phishing
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Phishing
PhishingPhishing
Phishing
 

Viewers also liked

Estratégias tecnológicas para a redução de sódio em produtos cárneos
Estratégias tecnológicas para a redução de sódio em produtos cárneos Estratégias tecnológicas para a redução de sódio em produtos cárneos
Estratégias tecnológicas para a redução de sódio em produtos cárneos senaimais
 
La déclaration d'Elio Di Rupo devant la Chambre
La déclaration d'Elio Di Rupo devant la ChambreLa déclaration d'Elio Di Rupo devant la Chambre
La déclaration d'Elio Di Rupo devant la Chambrecodip
 
Melhorando a competitividade na indústria da carne
Melhorando a competitividade na indústria da carne Melhorando a competitividade na indústria da carne
Melhorando a competitividade na indústria da carne senaimais
 
Lev manovich_PAC1
Lev manovich_PAC1Lev manovich_PAC1
Lev manovich_PAC1blasm1980
 
Palestra 3 - Fabricação de moldes por micro-usinagem.
Palestra 3 - Fabricação de moldes por micro-usinagem.Palestra 3 - Fabricação de moldes por micro-usinagem.
Palestra 3 - Fabricação de moldes por micro-usinagem.senaimais
 
Tendências Futuras: Automação baseada em robótica para fabricação, montagem e...
Tendências Futuras: Automação baseada em robótica para fabricação, montagem e...Tendências Futuras: Automação baseada em robótica para fabricação, montagem e...
Tendências Futuras: Automação baseada em robótica para fabricação, montagem e...senaimais
 
Palestra 5 - Aplicação do laser como ferramenta de fabricação de moldes.
Palestra 5 - Aplicação do laser como ferramenta de fabricação de moldes.Palestra 5 - Aplicação do laser como ferramenta de fabricação de moldes.
Palestra 5 - Aplicação do laser como ferramenta de fabricação de moldes.senaimais
 
Adaptando novas tecnologias para o processamento da carne
Adaptando novas tecnologias para o processamento da carne Adaptando novas tecnologias para o processamento da carne
Adaptando novas tecnologias para o processamento da carne senaimais
 
Functional Foods: Their Role & Opportunities
Functional Foods:  Their Role & OpportunitiesFunctional Foods:  Their Role & Opportunities
Functional Foods: Their Role & Opportunitiessenaimais
 

Viewers also liked (18)

Mdbreast
MdbreastMdbreast
Mdbreast
 
Estratégias tecnológicas para a redução de sódio em produtos cárneos
Estratégias tecnológicas para a redução de sódio em produtos cárneos Estratégias tecnológicas para a redução de sódio em produtos cárneos
Estratégias tecnológicas para a redução de sódio em produtos cárneos
 
Technology and education
Technology and educationTechnology and education
Technology and education
 
YouTube: ITEC 2011
YouTube: ITEC 2011YouTube: ITEC 2011
YouTube: ITEC 2011
 
La déclaration d'Elio Di Rupo devant la Chambre
La déclaration d'Elio Di Rupo devant la ChambreLa déclaration d'Elio Di Rupo devant la Chambre
La déclaration d'Elio Di Rupo devant la Chambre
 
Copyright and Creative Commons
Copyright and Creative CommonsCopyright and Creative Commons
Copyright and Creative Commons
 
FDCSD Tech Integration
FDCSD Tech IntegrationFDCSD Tech Integration
FDCSD Tech Integration
 
Melhorando a competitividade na indústria da carne
Melhorando a competitividade na indústria da carne Melhorando a competitividade na indústria da carne
Melhorando a competitividade na indústria da carne
 
Lev manovich_PAC1
Lev manovich_PAC1Lev manovich_PAC1
Lev manovich_PAC1
 
Tech integration tools
Tech integration toolsTech integration tools
Tech integration tools
 
Take note!
Take note!Take note!
Take note!
 
Rpp smtr 2
Rpp smtr 2Rpp smtr 2
Rpp smtr 2
 
Palestra 3 - Fabricação de moldes por micro-usinagem.
Palestra 3 - Fabricação de moldes por micro-usinagem.Palestra 3 - Fabricação de moldes por micro-usinagem.
Palestra 3 - Fabricação de moldes por micro-usinagem.
 
Internet safety and ethics staff training
Internet safety and ethics staff trainingInternet safety and ethics staff training
Internet safety and ethics staff training
 
Tendências Futuras: Automação baseada em robótica para fabricação, montagem e...
Tendências Futuras: Automação baseada em robótica para fabricação, montagem e...Tendências Futuras: Automação baseada em robótica para fabricação, montagem e...
Tendências Futuras: Automação baseada em robótica para fabricação, montagem e...
 
Palestra 5 - Aplicação do laser como ferramenta de fabricação de moldes.
Palestra 5 - Aplicação do laser como ferramenta de fabricação de moldes.Palestra 5 - Aplicação do laser como ferramenta de fabricação de moldes.
Palestra 5 - Aplicação do laser como ferramenta de fabricação de moldes.
 
Adaptando novas tecnologias para o processamento da carne
Adaptando novas tecnologias para o processamento da carne Adaptando novas tecnologias para o processamento da carne
Adaptando novas tecnologias para o processamento da carne
 
Functional Foods: Their Role & Opportunities
Functional Foods:  Their Role & OpportunitiesFunctional Foods:  Their Role & Opportunities
Functional Foods: Their Role & Opportunities
 

Similar to Internet fraud and identity theft

Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.PdfSanea
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. mariotoronto
 
Tips to secure yourself from identity thefts
Tips to secure yourself from identity theftsTips to secure yourself from identity thefts
Tips to secure yourself from identity theftsweblinkindia1
 

Similar to Internet fraud and identity theft (20)

Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Idenity Theft
Idenity TheftIdenity Theft
Idenity Theft
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Tips to secure yourself from identity thefts
Tips to secure yourself from identity theftsTips to secure yourself from identity thefts
Tips to secure yourself from identity thefts
 

More from Sara Gallaher Richardson (8)

Notes
NotesNotes
Notes
 
Grade1 Reading Literacy
Grade1 Reading LiteracyGrade1 Reading Literacy
Grade1 Reading Literacy
 
Tech integration 2012 2013
Tech integration 2012 2013Tech integration 2012 2013
Tech integration 2012 2013
 
Technology Integration for Elementary Science and Technology
Technology Integration for Elementary Science and TechnologyTechnology Integration for Elementary Science and Technology
Technology Integration for Elementary Science and Technology
 
Webquest presentation, December 2011
Webquest presentation, December 2011Webquest presentation, December 2011
Webquest presentation, December 2011
 
Educational Gaming: ITEC 2011
Educational Gaming: ITEC 2011Educational Gaming: ITEC 2011
Educational Gaming: ITEC 2011
 
Creative Commons: ITEC 2011
Creative Commons:  ITEC 2011Creative Commons:  ITEC 2011
Creative Commons: ITEC 2011
 
Tech integration tools
Tech integration toolsTech integration tools
Tech integration tools
 

Recently uploaded

Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Internet fraud and identity theft

  • 1.
  • 3. WHAT IS IDENTITY THEFT? When someone steals your personal information and uses it without your permission. It is a serious crime. It can ruin your finances, credit history, and reputation. It takes time, money, and patience to resolve.
  • 6. BE ALERT 1. Do not share date of birth, SSN, or birth certificate. 2. Only share SSN when you trust the other party--ask why they want it, how long they'll keep it, how they'll dispose of it 3. Before sharing personal information on the internet, make sure you have a secure connection--a lock on the address bar and a URL beginning with "https" 4. Keep antivirus updated 5. If you use a password to sign into a website, make sure to log out 6. Use strong passwords http://netforbeginners.about.com/od/antivirusantispyw are/tp/5-steps-to-a-strong-password.htm
  • 8. WHAT TO DO? File a report with the FTC: www.ftc.gov Also, alert credit reporting companies, place an initial fraud alert, request a credit freeze, file a police report