SlideShare a Scribd company logo
1 of 69
How to prevent identity theft
and fraud
Image shared under CC0
Our Agenda
1. Agenda
2. Objectives
3. Introductions
4. Activity 1: Class discussion
5. Activity 2: Review vocabulary
6. Activity 3: fill-in-the-blank
7. Activity 4: read a dialogue
8. Activity 5: discuss identity theft and fraud
9. Activity 6: case studies
Workshop Objectives
1. To learn 10 new words
2. To learn what identity theft and fraud is
3. To learn how we can avoid identity theft
and fraud
• What is your name?
• Where are you from?
Introductions
Join us in a group discussion
Activity 1
What do you know about identity theft or
fraud?
Group discussion
Have you ever been a victim of identity
theft or fraud?
Group discussion
Do you have any tips about how to prevent
identity theft or fraud?
Group discussion
Let’s review the vocabulary
Activity 2
Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft financial institution
Financial recordscareless
Identity fraud credit report
personal information document monitor
mail theft
Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial recordscareless
Identity fraud credit report
personal information document monitor
mail theft
Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial recordscareless
Identity fraud
credit report
personal information document monitor
mail theft
Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial records
careless
Identity fraud
credit report
personal information document monitor
mail theft
Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial records
careless
Identity fraud
credit report
personal information document monitor
mail theft
Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial records
careless
Identity fraud
credit report
personal information document monitor
mail theft
Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information document monitor
Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documentcarelessidentity theft financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documentcarelessidentity theft
financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documentcarelessidentity theft
financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documents
carelessidentity theft
financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documents
carelessidentity theft
financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documents
carelessidentity theft
financial records
Identity fraud
credit report
personal information
Financial institution
monitor
mail theft
Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your _______________ over the phone? People can use that
information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
carelessidentity theft
Identity fraud
personal information
Financial institution
Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your _______________ over the phone? People can use that
information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
carelessidentity theft
Identity fraud
personal information
financial institution
Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your ______________________ over the phone? People can use
that information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
carelessidentity theft
Identity fraud
personal information
financial institution
Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your ______________________ over the phone? People can use
that information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
careless
identity theft
Identity fraud
personal information
financial institution
Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your ______________________ over the phone? People can use
that information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
careless
identity theft
Identity fraud
personal information
financial institution
Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your ______________________ over the phone? People can use
that information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
careless
identity theft
Identity fraud
personal information
financial institution
Let’s read a dialogue
Activity 4
Listen to a dialogue:
Johanna
Margarita
Johanna
Margarita
Johanna
Margarita
Johanna
Margarita
Johanna
Wow! That was a great seminar, wasn’t it?
It sure was. I learned so much! What was your favourite part?
Hmmmmmm …… I think it was the part about the importance of being
careful with our personal information.
So true. We really must be so careful with our documents.
No kidding. We sure don’t want to become a victim of identity theft or
identity fraud.
Hey! I had to step out during the part where the speaker was discussing
the difference between identity theft and identity fraud. Can you fill me in
on that?
Sure. Identity theft is when someone steals your personal information.
Identity fraud is when they actually use that information.
Got it. That makes sense. We really need to be careful!
Absolutely. We must not be careless with our personal information,
and we must monitor our financial records on a regular basis.
Listen to a dialogue:
Margarita
Johanna
Margarita
Johanna
Margarita
Johanna
Another point I heard that was so interesting was when he pointed out
was that a financial institution would never call us to get our personal
information.
True. They already have all kinds of information about us, so they
don’t need to call us for it. If your “bank” calls you for your birthdate,
you can be sure it’s fraud!
Yes. One thing I learned is that I really need to collect my mail everyday.
You know, sometimes I go away for days at a time without worrying about
my mail sitting in the mail box. From now on I will be sure to have a
neighbour collect it for me.
Great idea. You sure don’t want to become a victim of mail theft.
Anyway, I have to go and check my credit report!
Ok, I’ll see you later!
Activity 5
Let’s discuss identity
fraud
A. What is identity fraud?
• This is when your personal
information is actually used by the
person who stole it.
B. Identity Theft
How can it happen?
How it can happen
1. Dumpster Diving
Photo© by Blaine Roberts. Used with permission
How it can happen
2. Our own carelessness
Photo© by Blaine Roberts. Used with permission
How it can happen
3. Car break-ins
Image shared under CC0
How it can happen
4. Mail theft
Photo© by Blaine Roberts. Used with permission
How it can happen
5. Financial institution fraud
Photo© by Blaine Roberts. Used with permission
C. What kind of information is
commonly stolen?
Your full name
Your date of birth
Your social insurance number
Your full address
Your mother’s maiden name
User names and passwords
Driver’s license number
Credit card information
Bank account information
Signature
One more thing!
Photo© by Blaine Roberts. Used with permission
D. How is stolen information
used?
Access your bank accounts
Open new back accounts
Transfer account balances
Apply for loans
Make purchases
Hide criminal activity
Open new passports
E. What can we do to
help ensure our
personal information
is not stolen?
1. Monitor our records
Photo© by Blaine Roberts. Used with permission
2. Check our credit report for
unusual activity
Image shared under CC0
3. We should Investigate further
if ...
1. we receive
phone calls from a
collection agency
about unfamiliar
accounts
2. We
unexpectedly get
turned down for
credit
F. How can we
prevent Identity
theft?
1. Shred all personal documents
Photo© by Blaine Roberts. Used with permission
2. Monitor financial records
Photo© by Blaine Roberts. Used with permission
3. Do not give personal
information over the phone
Image shared under CC0
4. Don’t be careless with your
personal information
Image shared under CC0
5. Don’t carry too much personal
information with you
Photo© by Blaine Roberts. Used with permission
6. Keep all personal information
numbers in a safe place
Never write them on
the cards!
7. When you change your
address be sure to notify all your
financial institutions
Image shared under CC0
8. Shield the ATM and swipe
your own card!
Photo© by Blaine Roberts. Used with permission
9. Know when your credit
card payments are due
Image shared under CC0
Case studies
Activity 6
Case Studies
• Read each study and discuss
• what mistake was made (if any)
• What can be done now to fix the problem
• What can be done to prevent identity theft
Case Study One:
Miguel and his family are moving to a new
house. They have many personal financial
documents which they feel they no longer
need. Miguel’s wife asks what they should
do with the documents. Miguel suggests
tearing them up and throwing them into
the garbage.
Case Study Two:
Samantha keeps all her pin numbers in her
wallet. She has so many credit cards she
cannot remember all the numbers.
Case Study Three:
Su Jie’s “bank” called to confirm her address
and bank account numbers. Su Jie felt
comfortable giving her account number
over the phone because the caller seemed
to already know a lot about her. She
assumed it really was a lady from the
bank.
Case Study Four:
Bob and Diane always had a good credit
rating. One day they decided to apply for a
small loan for a car. They were surprised
when they got a call from the bank
informing them that their application was
declined.
Case Study Five:
Kamaljit and Vera are very good friends.
Vera has no money with her to buy
medicine for her child. Vera asks Kamaljit
if she could borrow her Debit card to buy
the medicine. Kamaljit lends Vera her bank
card and her pin number
Thanks for Attending!
See you next time!

More Related Content

What's hot

All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity Theft Scams
Identity Theft ScamsIdentity Theft Scams
Identity Theft Scamsncpd
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Age Verificationn in the Alcohol industry
Age Verificationn in the Alcohol industry Age Verificationn in the Alcohol industry
Age Verificationn in the Alcohol industry BrandonRuse1
 
Money Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods IndustryMoney Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods IndustryBrandonRuse1
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber securitynahinworld
 

What's hot (20)

Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Trilegiant 1
Trilegiant 1Trilegiant 1
Trilegiant 1
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft Scams
Identity Theft ScamsIdentity Theft Scams
Identity Theft Scams
 
Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Age Verificationn in the Alcohol industry
Age Verificationn in the Alcohol industry Age Verificationn in the Alcohol industry
Age Verificationn in the Alcohol industry
 
Money Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods IndustryMoney Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods Industry
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber security
 

Viewers also liked

Consumer tips for the holiday season
Consumer tips for the holiday seasonConsumer tips for the holiday season
Consumer tips for the holiday seasonEnglish Online Inc.
 
Matura 2015 - informator CKE
Matura 2015 - informator CKEMatura 2015 - informator CKE
Matura 2015 - informator CKEporanny24
 
Identity theft and identity fraud
Identity theft and identity fraudIdentity theft and identity fraud
Identity theft and identity fraudmcadman
 
Soutenance Mémoire Madoff VF
Soutenance Mémoire Madoff VFSoutenance Mémoire Madoff VF
Soutenance Mémoire Madoff VFFrederic Peyrard
 
La fraude en entreprise : Tendances et risques émergents (novembre 2011)
La fraude en entreprise : Tendances et risques émergents (novembre 2011)La fraude en entreprise : Tendances et risques émergents (novembre 2011)
La fraude en entreprise : Tendances et risques émergents (novembre 2011)PwC France
 
Prévenir le risque de fraude dans l'entreprise - éléments de réflexion
Prévenir le risque de fraude dans l'entreprise - éléments de réflexionPrévenir le risque de fraude dans l'entreprise - éléments de réflexion
Prévenir le risque de fraude dans l'entreprise - éléments de réflexionAndre JACQUEMET
 

Viewers also liked (10)

Consumer tips for the holiday season
Consumer tips for the holiday seasonConsumer tips for the holiday season
Consumer tips for the holiday season
 
Matura 2015 - informator CKE
Matura 2015 - informator CKEMatura 2015 - informator CKE
Matura 2015 - informator CKE
 
Semlex Biopass - FR
Semlex Biopass - FRSemlex Biopass - FR
Semlex Biopass - FR
 
Identity theft and identity fraud
Identity theft and identity fraudIdentity theft and identity fraud
Identity theft and identity fraud
 
Immigration clandestine
Immigration  clandestineImmigration  clandestine
Immigration clandestine
 
Soutenance Mémoire Madoff VF
Soutenance Mémoire Madoff VFSoutenance Mémoire Madoff VF
Soutenance Mémoire Madoff VF
 
Histoire immigration
Histoire immigrationHistoire immigration
Histoire immigration
 
Immigration
ImmigrationImmigration
Immigration
 
La fraude en entreprise : Tendances et risques émergents (novembre 2011)
La fraude en entreprise : Tendances et risques émergents (novembre 2011)La fraude en entreprise : Tendances et risques émergents (novembre 2011)
La fraude en entreprise : Tendances et risques émergents (novembre 2011)
 
Prévenir le risque de fraude dans l'entreprise - éléments de réflexion
Prévenir le risque de fraude dans l'entreprise - éléments de réflexionPrévenir le risque de fraude dans l'entreprise - éléments de réflexion
Prévenir le risque de fraude dans l'entreprise - éléments de réflexion
 

Similar to Preventing fraud 2

Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do listSandy Kleinhenz
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overviewgaby350
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition- Mark - Fullbright
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameSpringboard
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftCost U Less Direct
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015James Kane
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 

Similar to Preventing fraud 2 (20)

Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity Theft
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 

More from English Online Inc.

PronouncingChShSoundsEnglishOnlineInc.pptx
PronouncingChShSoundsEnglishOnlineInc.pptxPronouncingChShSoundsEnglishOnlineInc.pptx
PronouncingChShSoundsEnglishOnlineInc.pptxEnglish Online Inc.
 
RegisterALessonforCLB5+LearnersEOINC.pptx
RegisterALessonforCLB5+LearnersEOINC.pptxRegisterALessonforCLB5+LearnersEOINC.pptx
RegisterALessonforCLB5+LearnersEOINC.pptxEnglish Online Inc.
 
Animal Idioms - A Canadian Idioms Lesson
Animal Idioms - A Canadian Idioms LessonAnimal Idioms - A Canadian Idioms Lesson
Animal Idioms - A Canadian Idioms LessonEnglish Online Inc.
 
AdverbsofMannerEnglishOnlineCLB5plus.pptx
AdverbsofMannerEnglishOnlineCLB5plus.pptxAdverbsofMannerEnglishOnlineCLB5plus.pptx
AdverbsofMannerEnglishOnlineCLB5plus.pptxEnglish Online Inc.
 
TheSimplePresentEnglishOnlineLunch&Learn.pptx
TheSimplePresentEnglishOnlineLunch&Learn.pptxTheSimplePresentEnglishOnlineLunch&Learn.pptx
TheSimplePresentEnglishOnlineLunch&Learn.pptxEnglish Online Inc.
 
GradableUngradableAdjectivesEnglishO.pptx
GradableUngradableAdjectivesEnglishO.pptxGradableUngradableAdjectivesEnglishO.pptx
GradableUngradableAdjectivesEnglishO.pptxEnglish Online Inc.
 
PartsofSpeech(CLB3-4)EnglishOnlineInc.pptx
PartsofSpeech(CLB3-4)EnglishOnlineInc.pptxPartsofSpeech(CLB3-4)EnglishOnlineInc.pptx
PartsofSpeech(CLB3-4)EnglishOnlineInc.pptxEnglish Online Inc.
 
Justice is blind - Based on Sorry Idioms.pptx
Justice is blind - Based on Sorry Idioms.pptxJustice is blind - Based on Sorry Idioms.pptx
Justice is blind - Based on Sorry Idioms.pptxEnglish Online Inc.
 
Landing on the Moon - based on Moon Idioms.pptx
Landing on the Moon - based on Moon Idioms.pptxLanding on the Moon - based on Moon Idioms.pptx
Landing on the Moon - based on Moon Idioms.pptxEnglish Online Inc.
 
AdverbsofTime&PlaceCLB3-4EnglishOnline.pptx
AdverbsofTime&PlaceCLB3-4EnglishOnline.pptxAdverbsofTime&PlaceCLB3-4EnglishOnline.pptx
AdverbsofTime&PlaceCLB3-4EnglishOnline.pptxEnglish Online Inc.
 
Ellipsis(CLB5+)EnglishOnlineIncLunch&Learn.pptx
Ellipsis(CLB5+)EnglishOnlineIncLunch&Learn.pptxEllipsis(CLB5+)EnglishOnlineIncLunch&Learn.pptx
Ellipsis(CLB5+)EnglishOnlineIncLunch&Learn.pptxEnglish Online Inc.
 
MakingPoliteRequests.pptxEnglishOnlineInc
MakingPoliteRequests.pptxEnglishOnlineIncMakingPoliteRequests.pptxEnglishOnlineInc
MakingPoliteRequests.pptxEnglishOnlineIncEnglish Online Inc.
 
Moon Idioms - The Canadian Idioms Lessons
Moon Idioms - The Canadian Idioms LessonsMoon Idioms - The Canadian Idioms Lessons
Moon Idioms - The Canadian Idioms LessonsEnglish Online Inc.
 
TransitionWordsPhrasesCLB5+EnglishOnline.pptx
TransitionWordsPhrasesCLB5+EnglishOnline.pptxTransitionWordsPhrasesCLB5+EnglishOnline.pptx
TransitionWordsPhrasesCLB5+EnglishOnline.pptxEnglish Online Inc.
 
TheBeVerb(CLB 3-4)EnglishOnlineLunch&Learn.pptx
TheBeVerb(CLB 3-4)EnglishOnlineLunch&Learn.pptxTheBeVerb(CLB 3-4)EnglishOnlineLunch&Learn.pptx
TheBeVerb(CLB 3-4)EnglishOnlineLunch&Learn.pptxEnglish Online Inc.
 
Quantifiers2EnglishOnlineLunch&Learn.pptx
Quantifiers2EnglishOnlineLunch&Learn.pptxQuantifiers2EnglishOnlineLunch&Learn.pptx
Quantifiers2EnglishOnlineLunch&Learn.pptxEnglish Online Inc.
 
SimplePastPastProgressiveEnglishOnline.pptx
SimplePastPastProgressiveEnglishOnline.pptxSimplePastPastProgressiveEnglishOnline.pptx
SimplePastPastProgressiveEnglishOnline.pptxEnglish Online Inc.
 
TypesofSentencesEnglishOnlineIncCLB3-4.pptx
TypesofSentencesEnglishOnlineIncCLB3-4.pptxTypesofSentencesEnglishOnlineIncCLB3-4.pptx
TypesofSentencesEnglishOnlineIncCLB3-4.pptxEnglish Online Inc.
 
PrepositionsDirectionEnglishOnlineInc.pptx
PrepositionsDirectionEnglishOnlineInc.pptxPrepositionsDirectionEnglishOnlineInc.pptx
PrepositionsDirectionEnglishOnlineInc.pptxEnglish Online Inc.
 
Saving for education - Based on May Idioms.pptx
Saving for education - Based on May Idioms.pptxSaving for education - Based on May Idioms.pptx
Saving for education - Based on May Idioms.pptxEnglish Online Inc.
 

More from English Online Inc. (20)

PronouncingChShSoundsEnglishOnlineInc.pptx
PronouncingChShSoundsEnglishOnlineInc.pptxPronouncingChShSoundsEnglishOnlineInc.pptx
PronouncingChShSoundsEnglishOnlineInc.pptx
 
RegisterALessonforCLB5+LearnersEOINC.pptx
RegisterALessonforCLB5+LearnersEOINC.pptxRegisterALessonforCLB5+LearnersEOINC.pptx
RegisterALessonforCLB5+LearnersEOINC.pptx
 
Animal Idioms - A Canadian Idioms Lesson
Animal Idioms - A Canadian Idioms LessonAnimal Idioms - A Canadian Idioms Lesson
Animal Idioms - A Canadian Idioms Lesson
 
AdverbsofMannerEnglishOnlineCLB5plus.pptx
AdverbsofMannerEnglishOnlineCLB5plus.pptxAdverbsofMannerEnglishOnlineCLB5plus.pptx
AdverbsofMannerEnglishOnlineCLB5plus.pptx
 
TheSimplePresentEnglishOnlineLunch&Learn.pptx
TheSimplePresentEnglishOnlineLunch&Learn.pptxTheSimplePresentEnglishOnlineLunch&Learn.pptx
TheSimplePresentEnglishOnlineLunch&Learn.pptx
 
GradableUngradableAdjectivesEnglishO.pptx
GradableUngradableAdjectivesEnglishO.pptxGradableUngradableAdjectivesEnglishO.pptx
GradableUngradableAdjectivesEnglishO.pptx
 
PartsofSpeech(CLB3-4)EnglishOnlineInc.pptx
PartsofSpeech(CLB3-4)EnglishOnlineInc.pptxPartsofSpeech(CLB3-4)EnglishOnlineInc.pptx
PartsofSpeech(CLB3-4)EnglishOnlineInc.pptx
 
Justice is blind - Based on Sorry Idioms.pptx
Justice is blind - Based on Sorry Idioms.pptxJustice is blind - Based on Sorry Idioms.pptx
Justice is blind - Based on Sorry Idioms.pptx
 
Landing on the Moon - based on Moon Idioms.pptx
Landing on the Moon - based on Moon Idioms.pptxLanding on the Moon - based on Moon Idioms.pptx
Landing on the Moon - based on Moon Idioms.pptx
 
AdverbsofTime&PlaceCLB3-4EnglishOnline.pptx
AdverbsofTime&PlaceCLB3-4EnglishOnline.pptxAdverbsofTime&PlaceCLB3-4EnglishOnline.pptx
AdverbsofTime&PlaceCLB3-4EnglishOnline.pptx
 
Ellipsis(CLB5+)EnglishOnlineIncLunch&Learn.pptx
Ellipsis(CLB5+)EnglishOnlineIncLunch&Learn.pptxEllipsis(CLB5+)EnglishOnlineIncLunch&Learn.pptx
Ellipsis(CLB5+)EnglishOnlineIncLunch&Learn.pptx
 
MakingPoliteRequests.pptxEnglishOnlineInc
MakingPoliteRequests.pptxEnglishOnlineIncMakingPoliteRequests.pptxEnglishOnlineInc
MakingPoliteRequests.pptxEnglishOnlineInc
 
Moon Idioms - The Canadian Idioms Lessons
Moon Idioms - The Canadian Idioms LessonsMoon Idioms - The Canadian Idioms Lessons
Moon Idioms - The Canadian Idioms Lessons
 
TransitionWordsPhrasesCLB5+EnglishOnline.pptx
TransitionWordsPhrasesCLB5+EnglishOnline.pptxTransitionWordsPhrasesCLB5+EnglishOnline.pptx
TransitionWordsPhrasesCLB5+EnglishOnline.pptx
 
TheBeVerb(CLB 3-4)EnglishOnlineLunch&Learn.pptx
TheBeVerb(CLB 3-4)EnglishOnlineLunch&Learn.pptxTheBeVerb(CLB 3-4)EnglishOnlineLunch&Learn.pptx
TheBeVerb(CLB 3-4)EnglishOnlineLunch&Learn.pptx
 
Quantifiers2EnglishOnlineLunch&Learn.pptx
Quantifiers2EnglishOnlineLunch&Learn.pptxQuantifiers2EnglishOnlineLunch&Learn.pptx
Quantifiers2EnglishOnlineLunch&Learn.pptx
 
SimplePastPastProgressiveEnglishOnline.pptx
SimplePastPastProgressiveEnglishOnline.pptxSimplePastPastProgressiveEnglishOnline.pptx
SimplePastPastProgressiveEnglishOnline.pptx
 
TypesofSentencesEnglishOnlineIncCLB3-4.pptx
TypesofSentencesEnglishOnlineIncCLB3-4.pptxTypesofSentencesEnglishOnlineIncCLB3-4.pptx
TypesofSentencesEnglishOnlineIncCLB3-4.pptx
 
PrepositionsDirectionEnglishOnlineInc.pptx
PrepositionsDirectionEnglishOnlineInc.pptxPrepositionsDirectionEnglishOnlineInc.pptx
PrepositionsDirectionEnglishOnlineInc.pptx
 
Saving for education - Based on May Idioms.pptx
Saving for education - Based on May Idioms.pptxSaving for education - Based on May Idioms.pptx
Saving for education - Based on May Idioms.pptx
 

Recently uploaded

原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Sonam Pathan
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technologyz xss
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 
Unveiling Business Expansion Trends in 2024
Unveiling Business Expansion Trends in 2024Unveiling Business Expansion Trends in 2024
Unveiling Business Expansion Trends in 2024Champak Jhagmag
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfHenry Tapper
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfMichael Silva
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)ECTIJ
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》rnrncn29
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasCherylouCamus
 
project management information system lecture notes
project management information system lecture notesproject management information system lecture notes
project management information system lecture notesongomchris
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
The AES Investment Code - the go-to counsel for the most well-informed, wise...
The AES Investment Code -  the go-to counsel for the most well-informed, wise...The AES Investment Code -  the go-to counsel for the most well-informed, wise...
The AES Investment Code - the go-to counsel for the most well-informed, wise...AES International
 

Recently uploaded (20)

原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 
Unveiling Business Expansion Trends in 2024
Unveiling Business Expansion Trends in 2024Unveiling Business Expansion Trends in 2024
Unveiling Business Expansion Trends in 2024
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
 
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth AdvisorsQ1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdf
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng Pilipinas
 
project management information system lecture notes
project management information system lecture notesproject management information system lecture notes
project management information system lecture notes
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
The AES Investment Code - the go-to counsel for the most well-informed, wise...
The AES Investment Code -  the go-to counsel for the most well-informed, wise...The AES Investment Code -  the go-to counsel for the most well-informed, wise...
The AES Investment Code - the go-to counsel for the most well-informed, wise...
 

Preventing fraud 2

  • 1. How to prevent identity theft and fraud Image shared under CC0
  • 2. Our Agenda 1. Agenda 2. Objectives 3. Introductions 4. Activity 1: Class discussion 5. Activity 2: Review vocabulary 6. Activity 3: fill-in-the-blank 7. Activity 4: read a dialogue 8. Activity 5: discuss identity theft and fraud 9. Activity 6: case studies
  • 3. Workshop Objectives 1. To learn 10 new words 2. To learn what identity theft and fraud is 3. To learn how we can avoid identity theft and fraud
  • 4. • What is your name? • Where are you from? Introductions
  • 5. Join us in a group discussion Activity 1
  • 6. What do you know about identity theft or fraud? Group discussion
  • 7. Have you ever been a victim of identity theft or fraud? Group discussion
  • 8. Do you have any tips about how to prevent identity theft or fraud? Group discussion
  • 9. Let’s review the vocabulary Activity 2
  • 10. Activity one: Vocabulary Review A crime where a criminal steals some of your personal information such as name, drivers license or social security number. your personal information is used to make purchases, withdraw cash, or set up new accounts without your approval Not careful with important things to steal a person's mail a report on a person's creditworthiness that includes identifying information, credit cards, late payments, bankruptcies, and savings balances Identity theft financial institution Financial recordscareless Identity fraud credit report personal information document monitor mail theft
  • 11. Activity one: Vocabulary Review A crime where a criminal steals some of your personal information such as name, drivers license or social security number. your personal information is used to make purchases, withdraw cash, or set up new accounts without your approval Not careful with important things to steal a person's mail a report on a person's creditworthiness that includes identifying information, credit cards, late payments, bankruptcies, and savings balances Identity theft financial institution Financial recordscareless Identity fraud credit report personal information document monitor mail theft
  • 12. Activity one: Vocabulary Review A crime where a criminal steals some of your personal information such as name, drivers license or social security number. your personal information is used to make purchases, withdraw cash, or set up new accounts without your approval Not careful with important things to steal a person's mail a report on a person's creditworthiness that includes identifying information, credit cards, late payments, bankruptcies, and savings balances Identity theft financial institution Financial recordscareless Identity fraud credit report personal information document monitor mail theft
  • 13. Activity one: Vocabulary Review A crime where a criminal steals some of your personal information such as name, drivers license or social security number. your personal information is used to make purchases, withdraw cash, or set up new accounts without your approval Not careful with important things to steal a person's mail a report on a person's creditworthiness that includes identifying information, credit cards, late payments, bankruptcies, and savings balances Identity theft financial institution Financial records careless Identity fraud credit report personal information document monitor mail theft
  • 14. Activity one: Vocabulary Review A crime where a criminal steals some of your personal information such as name, drivers license or social security number. your personal information is used to make purchases, withdraw cash, or set up new accounts without your approval Not careful with important things to steal a person's mail a report on a person's creditworthiness that includes identifying information, credit cards, late payments, bankruptcies, and savings balances Identity theft financial institution Financial records careless Identity fraud credit report personal information document monitor mail theft
  • 15. Activity one: Vocabulary Review A crime where a criminal steals some of your personal information such as name, drivers license or social security number. your personal information is used to make purchases, withdraw cash, or set up new accounts without your approval Not careful with important things to steal a person's mail a report on a person's creditworthiness that includes identifying information, credit cards, late payments, bankruptcies, and savings balances Identity theft financial institution Financial records careless Identity fraud credit report personal information document monitor mail theft
  • 16. Activity one: Vocabulary Review Legal instruments such as mortgages, contracts, deeds, options, wills, bills of sale, etc. Banks and other companies that deal with money financial documents that are used to record and analyze the financial performance of a business. to keep a close watch on something Information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information. financial institution Financial records personal information document monitor
  • 17. Activity one: Vocabulary Review Legal instruments such as mortgages, contracts, deeds, options, wills, bills of sale, etc. Banks and other companies that deal with money financial documents that are used to record and analyze the financial performance of a business. to keep a close watch on something Information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information. financial institution Financial records personal information document monitor
  • 18. Activity one: Vocabulary Review Legal instruments such as mortgages, contracts, deeds, options, wills, bills of sale, etc. Banks and other companies that deal with money financial documents that are used to record and analyze the financial performance of a business. to keep a close watch on something Information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information. financial institution Financial records personal information document monitor
  • 19. Activity one: Vocabulary Review Legal instruments such as mortgages, contracts, deeds, options, wills, bills of sale, etc. Banks and other companies that deal with money financial documents that are used to record and analyze the financial performance of a business. to keep a close watch on something Information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information. financial institution Financial records personal information document monitor
  • 20. Activity one: Vocabulary Review Legal instruments such as mortgages, contracts, deeds, options, wills, bills of sale, etc. Banks and other companies that deal with money financial documents that are used to record and analyze the financial performance of a business. to keep a close watch on something Information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information. financial institution Financial records personal information document monitor
  • 21. Activity one: Vocabulary Review Legal instruments such as mortgages, contracts, deeds, options, wills, bills of sale, etc. Banks and other companies that deal with money financial documents that are used to record and analyze the financial performance of a business. to keep a close watch on something Information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information. financial institution Financial records personal information document monitor
  • 22. Activity three: fill-in-the- blank 1. Check your _______________ to make sure nobody has used your credit card. 2. You must ____________________ your records on a regular basis. 3. Did you bring your passport and other important ________________ ? 4. I think I have been a victim of _________________ I have not received any mail for more than 5 days. This is not usual because I usually get mail at least every second day! 5. Your ____________________ may be affected by missed payments. documentcarelessidentity theft financial records Identity fraud credit report personal information financial institution monitor mail theft
  • 23. Activity three: fill-in-the- blank 1. Check your _______________ to make sure nobody has used your credit card. 2. You must ____________________ your records on a regular basis. 3. Did you bring your passport and other important ________________ ? 4. I think I have been a victim of _________________ I have not received any mail for more than 5 days. This is not usual because I usually get mail at least every second day! 5. Your ____________________ may be affected by missed payments. documentcarelessidentity theft financial records Identity fraud credit report personal information financial institution monitor mail theft
  • 24. Activity three: fill-in-the- blank 1. Check your _______________ to make sure nobody has used your credit card. 2. You must ____________________ your records on a regular basis. 3. Did you bring your passport and other important ________________ ? 4. I think I have been a victim of _________________ I have not received any mail for more than 5 days. This is not usual because I usually get mail at least every second day! 5. Your ____________________ may be affected by missed payments. documentcarelessidentity theft financial records Identity fraud credit report personal information financial institution monitor mail theft
  • 25. Activity three: fill-in-the- blank 1. Check your _______________ to make sure nobody has used your credit card. 2. You must ____________________ your records on a regular basis. 3. Did you bring your passport and other important ________________ ? 4. I think I have been a victim of _________________ I have not received any mail for more than 5 days. This is not usual because I usually get mail at least every second day! 5. Your ____________________ may be affected by missed payments. documents carelessidentity theft financial records Identity fraud credit report personal information financial institution monitor mail theft
  • 26. Activity three: fill-in-the- blank 1. Check your _______________ to make sure nobody has used your credit card. 2. You must ____________________ your records on a regular basis. 3. Did you bring your passport and other important ________________ ? 4. I think I have been a victim of _________________ I have not received any mail for more than 5 days. This is not usual because I usually get mail at least every second day! 5. Your ____________________ may be affected by missed payments. documents carelessidentity theft financial records Identity fraud credit report personal information financial institution monitor mail theft
  • 27. Activity three: fill-in-the- blank 1. Check your _______________ to make sure nobody has used your credit card. 2. You must ____________________ your records on a regular basis. 3. Did you bring your passport and other important ________________ ? 4. I think I have been a victim of _________________ I have not received any mail for more than 5 days. This is not usual because I usually get mail at least every second day! 5. Your ____________________ may be affected by missed payments. documents carelessidentity theft financial records Identity fraud credit report personal information Financial institution monitor mail theft
  • 28. Activity three: fill-in-the- blank 1. Remember that your ____________________ will never call you to get your personal information. 2. Why did you give out your _______________ over the phone? People can use that information in illegal ways! 3. Be careful with your wallet. You don’t want to a victim of _________________ . 4. I can’t believe I lost my passport! How could I be so _______________ ? 5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t take out a loan. I think I’ve become a victim of ___________________ . carelessidentity theft Identity fraud personal information Financial institution
  • 29. Activity three: fill-in-the- blank 1. Remember that your ____________________ will never call you to get your personal information. 2. Why did you give out your _______________ over the phone? People can use that information in illegal ways! 3. Be careful with your wallet. You don’t want to a victim of _________________ . 4. I can’t believe I lost my passport! How could I be so _______________ ? 5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t take out a loan. I think I’ve become a victim of ___________________ . carelessidentity theft Identity fraud personal information financial institution
  • 30. Activity three: fill-in-the- blank 1. Remember that your ____________________ will never call you to get your personal information. 2. Why did you give out your ______________________ over the phone? People can use that information in illegal ways! 3. Be careful with your wallet. You don’t want to a victim of _________________ . 4. I can’t believe I lost my passport! How could I be so _______________ ? 5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t take out a loan. I think I’ve become a victim of ___________________ . carelessidentity theft Identity fraud personal information financial institution
  • 31. Activity three: fill-in-the- blank 1. Remember that your ____________________ will never call you to get your personal information. 2. Why did you give out your ______________________ over the phone? People can use that information in illegal ways! 3. Be careful with your wallet. You don’t want to a victim of _________________ . 4. I can’t believe I lost my passport! How could I be so _______________ ? 5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t take out a loan. I think I’ve become a victim of ___________________ . careless identity theft Identity fraud personal information financial institution
  • 32. Activity three: fill-in-the- blank 1. Remember that your ____________________ will never call you to get your personal information. 2. Why did you give out your ______________________ over the phone? People can use that information in illegal ways! 3. Be careful with your wallet. You don’t want to a victim of _________________ . 4. I can’t believe I lost my passport! How could I be so _______________ ? 5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t take out a loan. I think I’ve become a victim of ___________________ . careless identity theft Identity fraud personal information financial institution
  • 33. Activity three: fill-in-the- blank 1. Remember that your ____________________ will never call you to get your personal information. 2. Why did you give out your ______________________ over the phone? People can use that information in illegal ways! 3. Be careful with your wallet. You don’t want to a victim of _________________ . 4. I can’t believe I lost my passport! How could I be so _______________ ? 5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t take out a loan. I think I’ve become a victim of ___________________ . careless identity theft Identity fraud personal information financial institution
  • 34. Let’s read a dialogue Activity 4
  • 35. Listen to a dialogue: Johanna Margarita Johanna Margarita Johanna Margarita Johanna Margarita Johanna Wow! That was a great seminar, wasn’t it? It sure was. I learned so much! What was your favourite part? Hmmmmmm …… I think it was the part about the importance of being careful with our personal information. So true. We really must be so careful with our documents. No kidding. We sure don’t want to become a victim of identity theft or identity fraud. Hey! I had to step out during the part where the speaker was discussing the difference between identity theft and identity fraud. Can you fill me in on that? Sure. Identity theft is when someone steals your personal information. Identity fraud is when they actually use that information. Got it. That makes sense. We really need to be careful! Absolutely. We must not be careless with our personal information, and we must monitor our financial records on a regular basis.
  • 36. Listen to a dialogue: Margarita Johanna Margarita Johanna Margarita Johanna Another point I heard that was so interesting was when he pointed out was that a financial institution would never call us to get our personal information. True. They already have all kinds of information about us, so they don’t need to call us for it. If your “bank” calls you for your birthdate, you can be sure it’s fraud! Yes. One thing I learned is that I really need to collect my mail everyday. You know, sometimes I go away for days at a time without worrying about my mail sitting in the mail box. From now on I will be sure to have a neighbour collect it for me. Great idea. You sure don’t want to become a victim of mail theft. Anyway, I have to go and check my credit report! Ok, I’ll see you later!
  • 37. Activity 5 Let’s discuss identity fraud
  • 38. A. What is identity fraud? • This is when your personal information is actually used by the person who stole it.
  • 39. B. Identity Theft How can it happen?
  • 40. How it can happen 1. Dumpster Diving Photo© by Blaine Roberts. Used with permission
  • 41. How it can happen 2. Our own carelessness Photo© by Blaine Roberts. Used with permission
  • 42. How it can happen 3. Car break-ins Image shared under CC0
  • 43. How it can happen 4. Mail theft Photo© by Blaine Roberts. Used with permission
  • 44. How it can happen 5. Financial institution fraud Photo© by Blaine Roberts. Used with permission
  • 45. C. What kind of information is commonly stolen? Your full name Your date of birth Your social insurance number Your full address Your mother’s maiden name User names and passwords Driver’s license number Credit card information Bank account information Signature
  • 46. One more thing! Photo© by Blaine Roberts. Used with permission
  • 47. D. How is stolen information used? Access your bank accounts Open new back accounts Transfer account balances Apply for loans Make purchases Hide criminal activity Open new passports
  • 48. E. What can we do to help ensure our personal information is not stolen?
  • 49. 1. Monitor our records Photo© by Blaine Roberts. Used with permission
  • 50. 2. Check our credit report for unusual activity Image shared under CC0
  • 51. 3. We should Investigate further if ... 1. we receive phone calls from a collection agency about unfamiliar accounts 2. We unexpectedly get turned down for credit
  • 52. F. How can we prevent Identity theft?
  • 53. 1. Shred all personal documents Photo© by Blaine Roberts. Used with permission
  • 54. 2. Monitor financial records Photo© by Blaine Roberts. Used with permission
  • 55. 3. Do not give personal information over the phone Image shared under CC0
  • 56. 4. Don’t be careless with your personal information Image shared under CC0
  • 57. 5. Don’t carry too much personal information with you Photo© by Blaine Roberts. Used with permission
  • 58. 6. Keep all personal information numbers in a safe place Never write them on the cards!
  • 59. 7. When you change your address be sure to notify all your financial institutions Image shared under CC0
  • 60. 8. Shield the ATM and swipe your own card! Photo© by Blaine Roberts. Used with permission
  • 61. 9. Know when your credit card payments are due Image shared under CC0
  • 63. Case Studies • Read each study and discuss • what mistake was made (if any) • What can be done now to fix the problem • What can be done to prevent identity theft
  • 64. Case Study One: Miguel and his family are moving to a new house. They have many personal financial documents which they feel they no longer need. Miguel’s wife asks what they should do with the documents. Miguel suggests tearing them up and throwing them into the garbage.
  • 65. Case Study Two: Samantha keeps all her pin numbers in her wallet. She has so many credit cards she cannot remember all the numbers.
  • 66. Case Study Three: Su Jie’s “bank” called to confirm her address and bank account numbers. Su Jie felt comfortable giving her account number over the phone because the caller seemed to already know a lot about her. She assumed it really was a lady from the bank.
  • 67. Case Study Four: Bob and Diane always had a good credit rating. One day they decided to apply for a small loan for a car. They were surprised when they got a call from the bank informing them that their application was declined.
  • 68. Case Study Five: Kamaljit and Vera are very good friends. Vera has no money with her to buy medicine for her child. Vera asks Kamaljit if she could borrow her Debit card to buy the medicine. Kamaljit lends Vera her bank card and her pin number
  • 69. Thanks for Attending! See you next time!