Loading in 2 Seconds...
Loading in 2 Seconds...
Identity Theft. PRESENTED BY GREENPATH. What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim?. Jane Doe Certified Consumer Credit Counselor. What is identity theft?. WHAT IS IDENTITY THEFT?.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Identity Theft PRESENTED BY GREENPATH What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit Counselor
WHAT IS IDENTITY THEFT? When someone uses your personal or financial information to perform financial transactions in your name, without your knowledge.
WHAT IS IDENTITY THEFT? Turn to page 2 in your workbook.
WHAT IS IDENTITY THEFT? Put the 4 Types of Identity Theft in Order from most common to least common Business Leaks Document Loss Personal Betrayal Computer Crime Turn to page 2 in your workbook.
HOW IDENTITY THEFT OCCURS Turn to page 3 in your workbook.
HOW IDENTITY THEFT OCCURS • Steal wallets, backpacks, etc. • Steal mail • “Dumpster Dive” • Steal registration and insurance card • Rob your house or business • Email scams • ATM’s • “Skimming” Turn to page 4 in your workbook.
HOW IDENTITY THEFT OCCURS Pharming and Phishing
PHARMING: a process that steals information from unsuspecting internet users.
HOW IDENTITY THEFT OCCURS Pharming – What you can do: • Delete unknown emails • Don’t download attachments • Don’t email personal/financial info • Use a secure website Turn to page 4 in your workbook.
PHISHING: a practice that online fraudsters use to “fish” for confidential passwords and financial data from the “sea” of internet users using email.
HOW IDENTITY THEFT OCCURS Phishing – What you can do: Be aware Don’t be complacent Security over convenience Turn to page 5 in your workbook.
HOW THIEVES USE YOUR INFORMATION • Buy merchandise • Open new accounts • Get a cell phone • Open a bank account • Take out a loan Turn to page 6 in your workbook.
HOW TO PROTECT YOURSELF • Social Security Card • Passwords • Technology • At Home • Out and About • At Work Turn to pages 6-8 in your workbook.
ARE YOU A VICTIM OF • IDENTITY THEFT? • Unexplained charges • Not receiving bills • Receiving credit cards you did not order • Denied credit for no reason • Collection calls • Inaccuracies on credit reports Turn to page 9 in your workbook.
TAKE ACTION Turn to pages 10-11 in your workbook.
TAKE ACTION • Fair and Accurate Credit Transactions • Identity Theft and Assumption Deterrence • Identity Theft Penalty Enhancement • Fair Credit Billing Turn to pages 12-13 in your workbook.
TAKE ACTION • The Electronic Fund Transfer • Fair Credit Reporting
MONITORING YOUR CREDIT • Monitoring system • 3 credit reporting agencies: • Experian • TransUnion • Equifax Turn to pages 13-14 in your workbook.
THANK YOU Jane Doe Certified Consumer Credit Counselor firstname.lastname@example.org