identity theft n.
Skip this Video
Loading SlideShow in 5 Seconds..
IDENTITY THEFT PowerPoint Presentation
Download Presentation

Loading in 2 Seconds...

play fullscreen
1 / 51

IDENTITY THEFT - PowerPoint PPT Presentation

  • Uploaded on

IDENTITY THEFT. IDENTITY THEFT. What is it? What is it?. 1. IDENTITY THEFT. Happens when someone takes information about you and then uses it to commit fraud.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript

    2. IDENTITY THEFT What is it? What is it?

    3. 1. IDENTITY THEFT • Happens when someone takes information about you and then uses it to commit fraud. • is the crime of setting up and using bank accounts and credit facilities fraudulently in another person's name without his or her knowledge.

    4. Deter-Detech-Defend Avoid Theft •

    5. 2. IDENTITY THEFT • Identity fraud affects 10million people in any given year and costs businesses about $50 billion. • Victims of identity theft have spent about $5 billion trying to undo this harm.

    6. 3. What info do they want? • Full Name • Address • Date of Birth • Social Security Number • Passwords • Credit Card Numbers

    7. 4. How do ID thieves get info • Offline • Mail • Phone • Online • Phishing scams • Pharming • Social Networks

    8. 5. Ways to Deter ID Theft a. Protect your Social Security number. b. Shred financial documents. c. Never give out privateinformation unless it is for a very good reason.

    9. Private vs Personal 6. Private information is information that helps identify who you are. Private information should be kept PRIVATE. 7. Personal information cannot be used to identify your financial data. It is usually Okay to share personal information.

    10. Private vs Personal • Eye Color • Social Security Number • Phone Number • Favorite Band • First and Last Name • Email Address • Postal Address • Mother’s Maiden Name • Male or Female

    11. 8. Ways to Detect ID Theft a. Check your Credit Report b. Review financial charges c. Look for charges you did not make.

    12. 9. Ways to Defend ID Theft a. Place a fraud alert on your credit report. b. Close accounts. c. File a police report. d. Contact the Federal Trade Commission.

    13. The Digest Thirteen things…An Identity Thief Won’t Tell You • Watch your back while using credit cards. • The red flag tells the mail carrier and me that you have outgoing mail. • Check your bank and credit card balances. • Credit cards can be duplicated using a $50 machine.

    14. The Digest Thirteen things…An Identity Thief Won’t Tell You • If a bill doesn’t show up, question it. • Collect garbage. • Watch for a skimmer on an ATM. • Opt out of receiving pre-approved credit offers.

    15. The Digest Thirteen things…An Identity Thief Won’t Tell You • Pose as you, call , and get your personal information. • Debit cards give direct access to accounts. • Love the new credit card that showed up in your mailbox.

    16. Sources • CyberSmart! Student Curriculum. Web. 12 Apr. 2011. <>. • "Deter. Detect. Defend. Avoid ID Theft." Federal Trade Commission. Web. 12 Apr. 2011. <>.

    17. Sources • "13 Things An Identity Thief Won't Tell You | Reader's Digest Version." Health Tips, Food and Recipes, Funny Jokes and Cartoons, and Sweepstakes | Reader’s Digest Version. Web. 12 Apr. 2011. <>.

    18. Interacting Online

    19. 1. Ways to Communicate Online • Online chatting • Photo sharing • Webcams • Online gaming • Social networking sites

    20. 2. Positive Aspects Way to keep in contact with friends/family Way to interact with people who share common interests

    21. 3. Negative Aspects Exploitation CyberBullying

    22. 7. Webcams • Stay in touch with family and friends • Caution needed especially with strangers • Once webcam broadcasts video it can be captured and later viewed, posted, copied, and/or distributed • Controlled remotely

    23. 10. Stay Safe a. Never give out private information. b. Use impersonal nicknames. c. Think about your online reputation. d. Don’t believe everything you are told. e. Remember if it sounds too good to be true, it probably is.

    24. 10. Stay Safe f. Have parental permission before meeting anyone you met online. g. Any photos or videos that you share online can never be taken back. h. Cover up the web cam when you are not using.

    25. 10. Stay Safe i. Don’t let anyone convince you to do something you are uncomfortable with. j. Talk to your parents about what you do online. k. If you have concerns about things you see on the Internet, tell an adult.

    26. Internet Safety Video

    27. Internet Video • Watch again! • List Private Info • List Safety Violations

    28. Amy’s Choice Video • Compare and Contrast th movies.

    29. 11. What info that should NOT be included in your Online Profile • Full name • Address • Phone • School • Age • Sex

    30. Interacting Online 12. Your profile settings should be set to private.

    31. Interacting Online Tip Don’t believe everything you are told online. Stay in control of your reputation. Online choices have offline consequences.

    32. Sexting 13. Sexting is the act of sending sexually explicit materials between devices. 14. Sexting has legal and psychological consequences.

    33. 15. Five Things to Think about before pressing SEND • Don’t assume anything you send or post is going to remain private. • There is no changing your mind in cyberspace. • Don’t give in under pressure to do something that makes you uncomfortable. • Consider the recipient’s reaction. • Nothing is truly anonymous.

    34. Proper Netiquette

    35. Proper Netiquette 1. Be brief in your email and text messages. 2. Use sarcasm sparingly. 3. Never write in ALL caps. 4. If you are sending an attachment, make sure it is compatible to the recipient’s software. 5. Share photos by posting them online rather than attaching them to email.

    36. Proper etiquette 6. When typing group email, respect others’ privacy by typing the email addresses in BCC. 7. Fill in the subject line when sending an email. 8. If you are forwarding a message, write a brief explanation as to why you are forwarding.

    37. Proper etiquette 9. Don’t tag people in social networking sites if they asked you not to. 10. Don’t discuss anyone’s private business on a wall. 11. Think before you send an IM. It is to be a brief correspondence. 12. Don’t contribute to a news board until you “lurked”.

    38. Proper etiquette 13. Read the FAQsite before asking a question. 14. Refrain from flaming. 15. Don’t be a troll.

    39. Passwords 16. Use at least 8 characters. 17. Use a random mixture of upper and lowercase, numbers, and symbols. 18. Don’t use a word found in a dictionary. 19. Never use the same password twice.

    40. Sources • How to Follow Proper Netiquette. Youtube. Howcast, 29 May 2009. Web. 18 Oct. 2011. <>. • "Password Guidlelines." The Home Computer Security Centre., 10 July 2009. Web. 18 Oct. 2011. <>.

    41. Cyberbullying

    42. Cyberbullying 1. Involves the use of communication technologies to repeatedly intimidate or harass others. • social networking sites • websites • e-mail • text messaging • instant messaging

    43. 2. Examples of Cyberbullying • Sending mean or threatening emails/text/IMs • Posting embarrassing photos of someone online • Creating a website to make fun of others • Pretending to be someone by using his or her name • Tricking someone into revealing personal or embarrassing info and/or sending it to others

    44. NS Teens Cyberbullying • Terrible Text

    45. 3. Cyberbullyingvs Bullying? • No boundaries 24/7 • Harsher. • People hide behind technology. • Is far reaching (email, web, cell phones) • Can be anonymous

    46. 4. React to Cyberbullying • Do not reply to messages or posts. • If possible, block the sender. • Keep a copy of the messages. • Tell someone about it—trusted adult, parent, etc. • If threatening, call police

    47. 5. Prevent Cyberbullying • Refuse to pass along cyberbullying messages. • If you know a cyberbully, tell them to stop. • Report any cyberbullying to an adult.

    48. 6. Remember . . . • Never respond to harassing or rude comments. • Save or print the evidence. • Talk to your parents or guardian if you are harassed; get help reporting this to your ISP, school, or local law enforcement.

    49. Remember . . . d.Respect others online. e. Only share your password with your parent or guardian. f. Change your passwords often. g. Password protect your cell phone. h. Use privacy settings to block unwanted messages.

    50. Remember . . . i. Think before posting or sending photos – they could be used to hurt you. j. Contact the site administrator if someone creates a social networking page in your name