slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
The Risks of Identity Theft PowerPoint Presentation
Download Presentation
The Risks of Identity Theft

Loading in 2 Seconds...

play fullscreen
1 / 25

The Risks of Identity Theft - PowerPoint PPT Presentation


  • 104 Views
  • Uploaded on

The Risks of Identity Theft. IDENTITY THEFT VICTIMS COULD: Have any and all of their financial accounts invaded and emptied. Be asked to repay debts they did not incur. Lose job opportunities. Lose their good credit rating. Be refused loans. Be sued for things they have no part of.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'The Risks of Identity Theft' - koko


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

The Risks of Identity Theft

  • IDENTITY THEFT VICTIMS COULD:
  • Have any and all of their financial accounts invaded and emptied.
  • Be asked to repay debts they did not incur.
  • Lose job opportunities.
  • Lose their good credit rating.
  • Be refused loans.
  • Be sued for things they have no part of.
  • Even be arrested for crimes they didn’t commit.

5-M

slide2

Phishing(fish´ing) (n.) The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

  • Legitimate companies NEVER ask for this information via E-mail or pop-up message

Phishing

slide3

Free software or Freeware free computer software

  • Can be a scam to get your personal information
  • Take the time and read the end-user licensing agreement so you understand what you are saying yes to by using the software

Freeware

slide4

Spyware bad side effect of free downloads

  • Some downloads install spyware onto your hard drive without your consent
  • Some spyware monitor or control your computer use
    • Send pop-up ads
    • Redirect your computer to unwanted Websites
    • Record your keystrokes

Spyware

scammed
SCAMMED!

The news of my father death, and my uncle,s involvement in an air crash in december 2002 while on a business trip to benin republic caused my mother heartfailure and other related complications of which she later died in the hospital After we have spent a lot of money on her.

Before our mother died, she told us that our father deposited some money which he made from diamond sales and contracts at this bank here in Ivory Coast and that we should pray and find a trust worthy foreign business partner who would help us to transfer and invest this money in profitable business venture overseas.She told us to do this quickly so that we can leave Ivory Coast and, then settle down abroad. She gave us the bank document to prove the deposit and then told us that my father used my name as the next of kin and beneficiary to the money in the bank in the event of his death.

If you are willing to assist us, please let us know immediately so that you will arrange the transfer of the money to your account with the bank.

What’s Going

on Here?

What’s Going

on Here?

dealing with deception

What Should

You Do?

Dealing With Deception
  • You walk up to an ATM and a guy who appears to be waiting his turn walks up behind you. But he’s uncomfortably close—right over your shoulder—as you get ready to enter your PIN.
dealing with deception1

What Should

You Do?

Dealing With Deception
  • You’re at a cash register in a store and have given the clerk your credit card. She holds on to it, probably to verify your signature. But then she says she needs to grab something from the back and starts to walk away with your card in hand.
dealing with deception2

What Should

You Do?

Dealing With Deception
  • A caller says she’s from your credit card company and wants to offer you a higher credit limit for being such a good customer. You reply, “Great, what do I have to do?” And she tells you to give her your Social Security number for verification.
dealing with deception3

What Should

You Do?

Dealing With Deception
  • You’ve found a pair of shoes at a great price on a Web site you just found. You start the check-out process and notice that the padlock at the bottom of your computer screen is open and that the Web page address starts with “http” instead of “https.”
dealing with deception4

What Should

You Do?

Dealing With Deception
  • You get an E-mail from an online bookstore you frequently buy from. It says that the credit card on your account has expired and gives you a link to update your information.
dealing with deception5

What Should

You Do?

Dealing With Deception
  • Your friend sends you an E-mail about cool new software that lets you share music with others for free. He sends you the link to download the software, which is from a site you’ve never heard of.
dealing with deception6

What Should

You Do?

Dealing With Deception
  • You’re bummed out about losing in an online auction. But then you get an E-mail stating the winner backed out and that you can have the item if you still want it, and to just send your credit card information via E-mail.
slide13

So How Do You Keep Your

Personal Information Secure With

So Many Threats Out There???

tips to protect your identity
Tips to Protect Your Identity!

Don’t carry your Social Security card or other cards that show your SSN with you.

tips to protect your identity1
Tips to Protect Your Identity!

Shred bill statements and any documents that may have personal information on them

tips to protect your identity2
Tips to Protect Your Identity!

Sign new cards;

Destroy old ones.

tips to protect your identity3
Tips to Protect Your Identity!

Use caution on the Web. Read the privacy policy and take opportunities to opt out of information sharing. Only enter personal information on secure websites. “https” and/or closed padlock

tips to protect your identity4
Tips to Protect Your Identity!

Scan a copy of all cards and other information you keep in your wallet. Print out or keep an electronic copy in a secure place to use in case your wallet is ever stolen.

tips to protect your identity5
Tips to Protect Your Identity!

Check and review all your statements for unauthorized use. Report them right away. Call if bills don’t arrive on time. It may mean that someone has changed your contact information.

tips to protect your identity6
Tips to Protect Your Identity!

Use caution when asked for personal information over the phone, internet and mail. Scam artists “phish” for information by pretending to be legitimate banks, stores, or government agencies.

tips to protect your identity7
Tips to Protect Your Identity!

Use strong/long,

non-easily guessed passwords

tips to protect your identity8
Tips to Protect Your Identity!

Download software only from sites you know and trust and only after reading all the terms and conditions.

tips to protect your identity9
Tips to Protect Your Identity!

Use firewall, anti-virus, and anti-spyware software that you update and run regularly.

tips to protect your identity10
Tips to Protect Your Identity!

Don’t click on links in pop-up windows or in spam e-mail.

what happens when f raud comes a k nockin
What Happens When FraudComes a Knockin’?
  • Place a “Fraud Alert” on your credit reports, and review the reports carefully.
  • Cancel all your credit, debit and other card accounts.
  • Call police if you are confident your identity has been stolen.
  • Report loss to Social Security, and apply for a new SS number.
  • File a complaint with the Federal Trade Commission at www.ftc.gov/idtheft