The document discusses preventing fraud and identity theft. It outlines an agenda for a workshop with six activities. The objectives are to learn new vocabulary related to identity theft and fraud, learn what identity theft and fraud are, and how to avoid them. One activity is a vocabulary review of terms like identity theft, financial records, and credit report. Another activity involves filling in the blanks with the correct vocabulary words. The workshop also includes a dialogue about the differences between identity theft and fraud, and ways to protect personal information and financial records.
A slide show that I compiled for my post master's certificate program, through Northcentral University, in Business Administration, with a specialization on Advanced Accounting. This is assignment 5 Consumer Fraud Prevention.
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
A slide show that I compiled for my post master's certificate program, through Northcentral University, in Business Administration, with a specialization on Advanced Accounting. This is assignment 5 Consumer Fraud Prevention.
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Identity theft happens whenever someone uses your personal identification to commit fraud or other types of crimes. They may use your name, credit card number, or your Social Security number (or other identifying information).
According to the Federal Trade Commission (FTC) in the United States, some 9 million Americans have their identities stolen every year. They also state that identity theft is likely to affect most people in some way. The thief may rent an apartment using someone else's name. He/She may open a line of credit or use your own line of credit for his/her buying needs. He/She may apply for a job using your identification.
here's a video that will help you: https://oke.io/BwCr4LGX
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Protecting your privacy, identity and financial information online is critically important in today’s Internet economy. Last year, 13.1 million Americans were victims of identity theft. I have no plans on joining this group, which is what inspired us to create our latest Zing blog guide – Identity 101.
Cisco Cyber Security Course. Free Course, Any one can complete this course, All basic things of Security of Computer network, And Internet Data,Firewall and Action types.
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
Using modern methods of the electronic commerce in daily life transactions is increasing because of the growth and the comfortable access of the people to the internet and social networks. The electronic payment systems are one of the most important electronic commerce methods and the electronic payment fraud is a major problem.For example, the credit card fraud loss increases every year and is regarded as one of the important issues in the credit card institutes and corporations. Therefore, fraud detection is considered as an important research challenge. Fraud reduction is a complicated process requiring a body of knowledge in many scientific fields. Based on the kind of the fraud the banks or the credit card institutes face, different measures may be taken. This paper compares and analyzes the available recent findings on the credit card fraud detection techniques. The objectives of the present study are first to detect different credit card and electronic commerce fraud and then to investigate the strategies used for the purpose of detection.
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
Using modern methods of the electronic commerce in daily life transactions is increasing because of the
growth and the comfortable access of the people to the internet and social networks. The electronic
payment systems are one of the most important electronic commerce methods and the electronic payment
fraud is a major problem.For example, the credit card fraud loss increases every year and is regarded as
one of the important issues in the credit card institutes and corporations. Therefore, fraud detection is
considered as an important research challenge. Fraud reduction is a complicated process requiring a body
of knowledge in many scientific fields. Based on the kind of the fraud the banks or the credit card institutes
face, different measures may be taken. This paper compares and analyzes the available recent findings on
the credit card fraud detection techniques. The objectives of the present study are first to detect different
credit card and electronic commerce fraud and then to investigate the strategies used for the purpose of
detection.
Money Laundering in the Art, Collectibles, and Luxury Goods IndustryBrandonRuse1
Money laundering and fraud cases in the rare art and luxury goods industry are increasing as the gap between resources and budgets is being widened by COVID-19.
Guidance on Verification of Individual Customers for Customer Due Diligence
Anti-Money Laundering, Countering Financing of Terrorism and Targeted Financial Sanctions for Financial Institutions
IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield’s specific services and features.
Identity theft happens whenever someone uses your personal identification to commit fraud or other types of crimes. They may use your name, credit card number, or your Social Security number (or other identifying information).
According to the Federal Trade Commission (FTC) in the United States, some 9 million Americans have their identities stolen every year. They also state that identity theft is likely to affect most people in some way. The thief may rent an apartment using someone else's name. He/She may open a line of credit or use your own line of credit for his/her buying needs. He/She may apply for a job using your identification.
here's a video that will help you: https://oke.io/BwCr4LGX
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Protecting your privacy, identity and financial information online is critically important in today’s Internet economy. Last year, 13.1 million Americans were victims of identity theft. I have no plans on joining this group, which is what inspired us to create our latest Zing blog guide – Identity 101.
Cisco Cyber Security Course. Free Course, Any one can complete this course, All basic things of Security of Computer network, And Internet Data,Firewall and Action types.
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
Using modern methods of the electronic commerce in daily life transactions is increasing because of the growth and the comfortable access of the people to the internet and social networks. The electronic payment systems are one of the most important electronic commerce methods and the electronic payment fraud is a major problem.For example, the credit card fraud loss increases every year and is regarded as one of the important issues in the credit card institutes and corporations. Therefore, fraud detection is considered as an important research challenge. Fraud reduction is a complicated process requiring a body of knowledge in many scientific fields. Based on the kind of the fraud the banks or the credit card institutes face, different measures may be taken. This paper compares and analyzes the available recent findings on the credit card fraud detection techniques. The objectives of the present study are first to detect different credit card and electronic commerce fraud and then to investigate the strategies used for the purpose of detection.
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
Using modern methods of the electronic commerce in daily life transactions is increasing because of the
growth and the comfortable access of the people to the internet and social networks. The electronic
payment systems are one of the most important electronic commerce methods and the electronic payment
fraud is a major problem.For example, the credit card fraud loss increases every year and is regarded as
one of the important issues in the credit card institutes and corporations. Therefore, fraud detection is
considered as an important research challenge. Fraud reduction is a complicated process requiring a body
of knowledge in many scientific fields. Based on the kind of the fraud the banks or the credit card institutes
face, different measures may be taken. This paper compares and analyzes the available recent findings on
the credit card fraud detection techniques. The objectives of the present study are first to detect different
credit card and electronic commerce fraud and then to investigate the strategies used for the purpose of
detection.
Money Laundering in the Art, Collectibles, and Luxury Goods IndustryBrandonRuse1
Money laundering and fraud cases in the rare art and luxury goods industry are increasing as the gap between resources and budgets is being widened by COVID-19.
Guidance on Verification of Individual Customers for Customer Due Diligence
Anti-Money Laundering, Countering Financing of Terrorism and Targeted Financial Sanctions for Financial Institutions
IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield’s specific services and features.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Helpful information about what identity theft is, how to help prevent it and protect yourself from it. Designed for readers with limited knowledge. Easy to understand and share with audiences starting at age 13.
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
Your information is everywhere and criminals, such as hackers, who’ve stolen as many as 1.2 billion passwords in one crime spree, know how to get to it. Our new Identity Theft 101 infographic discusses the different types of identity theft, explains exactly how identity theft occurs, and what you can do to prevent it. Don’t leave yourself unprotected!
This was a presentation by Hewie Poplock on Tuesday, November 15th, 2016 in the Goodwill Manasota (FL) Ranch Lake Community Room, "How to Avoid Identity Theft".
A victim of identity theft himself, Hewie will provide examples of how ID theft can happen as well as suggestions and precautions on how to prevent you and your family from becoming victims of identity theft yourselves. Topics covered included:
• What is Identity Theft
• How ID Theft Happens
• How to Protect Yourself
• Phishing
• Data Breaches
• Facebook Spoofing
• Skimmers
• Security Freeze
• On Line Shopping Safety
• Credit Card Chips
• What to Do If You are a Victim
Hewie is a former teacher, college instructor, business owner and manager, IT Manager, and web designer. He is currently semi-retired, but is active in technology user groups and frequently speaks to and teaches groups who are mostly seniors. He holds a monthly Windows Special Interest Group for a group in Orlando and has several videos on YouTube. He is an active member of The Sarasota Technology User Group.
Identity theft is one of the fastest-growing and widespread crimes in the United States, and every minute, 19 more people fall victim to this deeply damaging invasion of privacy.
There are many forms of identity theft protection, but none of them are 100% effective, so knowing how to follow up after your identity is compromised is essential.
how can i use my minded pi coins I need some funds.DOT TECH
If you are interested in selling your pi coins, i have a verified pi merchant, who buys pi coins and resell them to exchanges looking forward to hold till mainnet launch.
Because the core team has announced that pi network will not be doing any pre-sale. The only way exchanges like huobi, bitmart and hotbit can get pi is by buying from miners.
Now a merchant stands in between these exchanges and the miners. As a link to make transactions smooth. Because right now in the enclosed mainnet you can't sell pi coins your self. You need the help of a merchant,
i will leave the telegram contact of my personal pi merchant below. 👇 I and my friends has traded more than 3000pi coins with him successfully.
@Pi_vendor_247
Currently pi network is not tradable on binance or any other exchange because we are still in the enclosed mainnet.
Right now the only way to sell pi coins is by trading with a verified merchant.
What is a pi merchant?
A pi merchant is someone verified by pi network team and allowed to barter pi coins for goods and services.
Since pi network is not doing any pre-sale The only way exchanges like binance/huobi or crypto whales can get pi is by buying from miners. And a merchant stands in between the exchanges and the miners.
I will leave the telegram contact of my personal pi merchant. I and my friends has traded more than 6000pi coins successfully
Tele-gram
@Pi_vendor_247
BYD SWOT Analysis and In-Depth Insights 2024.pptxmikemetalprod
Indepth analysis of the BYD 2024
BYD (Build Your Dreams) is a Chinese automaker and battery manufacturer that has snowballed over the past two decades to become a significant player in electric vehicles and global clean energy technology.
This SWOT analysis examines BYD's strengths, weaknesses, opportunities, and threats as it competes in the fast-changing automotive and energy storage industries.
Founded in 1995 and headquartered in Shenzhen, BYD started as a battery company before expanding into automobiles in the early 2000s.
Initially manufacturing gasoline-powered vehicles, BYD focused on plug-in hybrid and fully electric vehicles, leveraging its expertise in battery technology.
Today, BYD is the world’s largest electric vehicle manufacturer, delivering over 1.2 million electric cars globally. The company also produces electric buses, trucks, forklifts, and rail transit.
On the energy side, BYD is a major supplier of rechargeable batteries for cell phones, laptops, electric vehicles, and energy storage systems.
What website can I sell pi coins securely.DOT TECH
Currently there are no website or exchange that allow buying or selling of pi coins..
But you can still easily sell pi coins, by reselling it to exchanges/crypto whales interested in holding thousands of pi coins before the mainnet launch.
Who is a pi merchant?
A pi merchant is someone who buys pi coins from miners and resell to these crypto whales and holders of pi..
This is because pi network is not doing any pre-sale. The only way exchanges can get pi is by buying from miners and pi merchants stands in between the miners and the exchanges.
How can I sell my pi coins?
Selling pi coins is really easy, but first you need to migrate to mainnet wallet before you can do that. I will leave the telegram contact of my personal pi merchant to trade with.
Tele-gram.
@Pi_vendor_247
what is the best method to sell pi coins in 2024DOT TECH
The best way to sell your pi coins safely is trading with an exchange..but since pi is not launched in any exchange, and second option is through a VERIFIED pi merchant.
Who is a pi merchant?
A pi merchant is someone who buys pi coins from miners and pioneers and resell them to Investors looking forward to hold massive amounts before mainnet launch in 2026.
I will leave the telegram contact of my personal pi merchant to trade pi coins with.
@Pi_vendor_247
Yes of course, you can easily start mining pi network coin today and sell to legit pi vendors in the United States.
Here the telegram contact of my personal vendor.
@Pi_vendor_247
#pi network #pi coins #legit #passive income
#US
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfpchutichetpong
The U.S. economy is continuing its impressive recovery from the COVID-19 pandemic and not slowing down despite re-occurring bumps. The U.S. savings rate reached its highest ever recorded level at 34% in April 2020 and Americans seem ready to spend. The sectors that had been hurt the most by the pandemic specifically reduced consumer spending, like retail, leisure, hospitality, and travel, are now experiencing massive growth in revenue and job openings.
Could this growth lead to a “Roaring Twenties”? As quickly as the U.S. economy contracted, experiencing a 9.1% drop in economic output relative to the business cycle in Q2 2020, the largest in recorded history, it has rebounded beyond expectations. This surprising growth seems to be fueled by the U.S. government’s aggressive fiscal and monetary policies, and an increase in consumer spending as mobility restrictions are lifted. Unemployment rates between June 2020 and June 2021 decreased by 5.2%, while the demand for labor is increasing, coupled with increasing wages to incentivize Americans to rejoin the labor force. Schools and businesses are expected to fully reopen soon. In parallel, vaccination rates across the country and the world continue to rise, with full vaccination rates of 50% and 14.8% respectively.
However, it is not completely smooth sailing from here. According to M Capital Group, the main risks that threaten the continued growth of the U.S. economy are inflation, unsettled trade relations, and another wave of Covid-19 mutations that could shut down the world again. Have we learned from the past year of COVID-19 and adapted our economy accordingly?
“In order for the U.S. economy to continue growing, whether there is another wave or not, the U.S. needs to focus on diversifying supply chains, supporting business investment, and maintaining consumer spending,” says Grace Feeley, a research analyst at M Capital Group.
While the economic indicators are positive, the risks are coming closer to manifesting and threatening such growth. The new variants spreading throughout the world, Delta, Lambda, and Gamma, are vaccine-resistant and muddy the predictions made about the economy and health of the country. These variants bring back the feeling of uncertainty that has wreaked havoc not only on the stock market but the mindset of people around the world. MCG provides unique insight on how to mitigate these risks to possibly ensure a bright economic future.
how can I sell pi coins after successfully completing KYCDOT TECH
Pi coins is not launched yet in any exchange 💱 this means it's not swappable, the current pi displaying on coin market cap is the iou version of pi. And you can learn all about that on my previous post.
RIGHT NOW THE ONLY WAY you can sell pi coins is through verified pi merchants. A pi merchant is someone who buys pi coins and resell them to exchanges and crypto whales. Looking forward to hold massive quantities of pi coins before the mainnet launch.
This is because pi network is not doing any pre-sale or ico offerings, the only way to get my coins is from buying from miners. So a merchant facilitates the transactions between the miners and these exchanges holding pi.
I and my friends has sold more than 6000 pi coins successfully with this method. I will be happy to share the contact of my personal pi merchant. The one i trade with, if you have your own merchant you can trade with them. For those who are new.
Message: @Pi_vendor_247 on telegram.
I wouldn't advise you selling all percentage of the pi coins. Leave at least a before so its a win win during open mainnet. Have a nice day pioneers ♥️
#kyc #mainnet #picoins #pi #sellpi #piwallet
#pinetwork
If you are looking for a pi coin investor. Then look no further because I have the right one he is a pi vendor (he buy and resell to whales in China). I met him on a crypto conference and ever since I and my friends have sold more than 10k pi coins to him And he bought all and still want more. I will drop his telegram handle below just send him a message.
@Pi_vendor_247
how to sell pi coins in all Africa Countries.DOT TECH
Yes. You can sell your pi network for other cryptocurrencies like Bitcoin, usdt , Ethereum and other currencies And this is done easily with the help from a pi merchant.
What is a pi merchant ?
Since pi is not launched yet in any exchange. The only way you can sell right now is through merchants.
A verified Pi merchant is someone who buys pi network coins from miners and resell them to investors looking forward to hold massive quantities of pi coins before mainnet launch in 2026.
I will leave the telegram contact of my personal pi merchant to trade with.
@Pi_vendor_247
how to sell pi coins in South Korea profitably.DOT TECH
Yes. You can sell your pi network coins in South Korea or any other country, by finding a verified pi merchant
What is a verified pi merchant?
Since pi network is not launched yet on any exchange, the only way you can sell pi coins is by selling to a verified pi merchant, and this is because pi network is not launched yet on any exchange and no pre-sale or ico offerings Is done on pi.
Since there is no pre-sale, the only way exchanges can get pi is by buying from miners. So a pi merchant facilitates these transactions by acting as a bridge for both transactions.
How can i find a pi vendor/merchant?
Well for those who haven't traded with a pi merchant or who don't already have one. I will leave the telegram id of my personal pi merchant who i trade pi with.
Tele gram: @Pi_vendor_247
#pi #sell #nigeria #pinetwork #picoins #sellpi #Nigerian #tradepi #pinetworkcoins #sellmypi
how to sell pi coins at high rate quickly.DOT TECH
Where can I sell my pi coins at a high rate.
Pi is not launched yet on any exchange. But one can easily sell his or her pi coins to investors who want to hold pi till mainnet launch.
This means crypto whales want to hold pi. And you can get a good rate for selling pi to them. I will leave the telegram contact of my personal pi vendor below.
A vendor is someone who buys from a miner and resell it to a holder or crypto whale.
Here is the telegram contact of my vendor:
@Pi_vendor_247
10. Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft financial institution
Financial recordscareless
Identity fraud credit report
personal information document monitor
mail theft
11. Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial recordscareless
Identity fraud credit report
personal information document monitor
mail theft
12. Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial recordscareless
Identity fraud
credit report
personal information document monitor
mail theft
13. Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial records
careless
Identity fraud
credit report
personal information document monitor
mail theft
14. Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial records
careless
Identity fraud
credit report
personal information document monitor
mail theft
15. Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial records
careless
Identity fraud
credit report
personal information document monitor
mail theft
16. Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information document monitor
17. Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
18. Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
19. Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
20. Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
21. Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
22. Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documentcarelessidentity theft financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
23. Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documentcarelessidentity theft
financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
24. Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documentcarelessidentity theft
financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
25. Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documents
carelessidentity theft
financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
26. Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documents
carelessidentity theft
financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
27. Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documents
carelessidentity theft
financial records
Identity fraud
credit report
personal information
Financial institution
monitor
mail theft
28. Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your _______________ over the phone? People can use that
information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
carelessidentity theft
Identity fraud
personal information
Financial institution
29. Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your _______________ over the phone? People can use that
information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
carelessidentity theft
Identity fraud
personal information
financial institution
30. Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your ______________________ over the phone? People can use
that information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
carelessidentity theft
Identity fraud
personal information
financial institution
31. Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your ______________________ over the phone? People can use
that information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
careless
identity theft
Identity fraud
personal information
financial institution
32. Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your ______________________ over the phone? People can use
that information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
careless
identity theft
Identity fraud
personal information
financial institution
33. Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your ______________________ over the phone? People can use
that information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
careless
identity theft
Identity fraud
personal information
financial institution
35. Listen to a dialogue:
Johanna
Margarita
Johanna
Margarita
Johanna
Margarita
Johanna
Margarita
Johanna
Wow! That was a great seminar, wasn’t it?
It sure was. I learned so much! What was your favourite part?
Hmmmmmm …… I think it was the part about the importance of being
careful with our personal information.
So true. We really must be so careful with our documents.
No kidding. We sure don’t want to become a victim of identity theft or
identity fraud.
Hey! I had to step out during the part where the speaker was discussing
the difference between identity theft and identity fraud. Can you fill me in
on that?
Sure. Identity theft is when someone steals your personal information.
Identity fraud is when they actually use that information.
Got it. That makes sense. We really need to be careful!
Absolutely. We must not be careless with our personal information,
and we must monitor our financial records on a regular basis.
36. Listen to a dialogue:
Margarita
Johanna
Margarita
Johanna
Margarita
Johanna
Another point I heard that was so interesting was when he pointed out
was that a financial institution would never call us to get our personal
information.
True. They already have all kinds of information about us, so they
don’t need to call us for it. If your “bank” calls you for your birthdate,
you can be sure it’s fraud!
Yes. One thing I learned is that I really need to collect my mail everyday.
You know, sometimes I go away for days at a time without worrying about
my mail sitting in the mail box. From now on I will be sure to have a
neighbour collect it for me.
Great idea. You sure don’t want to become a victim of mail theft.
Anyway, I have to go and check my credit report!
Ok, I’ll see you later!
45. C. What kind of information is
commonly stolen?
Your full name
Your date of birth
Your social insurance number
Your full address
Your mother’s maiden name
User names and passwords
Driver’s license number
Credit card information
Bank account information
Signature
47. D. How is stolen information
used?
Access your bank accounts
Open new back accounts
Transfer account balances
Apply for loans
Make purchases
Hide criminal activity
Open new passports
48. E. What can we do to
help ensure our
personal information
is not stolen?
50. 2. Check our credit report for
unusual activity
Image shared under CC0
51. 3. We should Investigate further
if ...
1. we receive
phone calls from a
collection agency
about unfamiliar
accounts
2. We
unexpectedly get
turned down for
credit
63. Case Studies
• Read each study and discuss
• what mistake was made (if any)
• What can be done now to fix the problem
• What can be done to prevent identity theft
64. Case Study One:
Miguel and his family are moving to a new
house. They have many personal financial
documents which they feel they no longer
need. Miguel’s wife asks what they should
do with the documents. Miguel suggests
tearing them up and throwing them into
the garbage.
65. Case Study Two:
Samantha keeps all her pin numbers in her
wallet. She has so many credit cards she
cannot remember all the numbers.
66. Case Study Three:
Su Jie’s “bank” called to confirm her address
and bank account numbers. Su Jie felt
comfortable giving her account number
over the phone because the caller seemed
to already know a lot about her. She
assumed it really was a lady from the
bank.
67. Case Study Four:
Bob and Diane always had a good credit
rating. One day they decided to apply for a
small loan for a car. They were surprised
when they got a call from the bank
informing them that their application was
declined.
68. Case Study Five:
Kamaljit and Vera are very good friends.
Vera has no money with her to buy
medicine for her child. Vera asks Kamaljit
if she could borrow her Debit card to buy
the medicine. Kamaljit lends Vera her bank
card and her pin number