1 / 45

Independent Living: Managing Your Money

Independent Living: Managing Your Money. Identity Theft. Identity Theft: Are You a Victim?. Have you or your parents ever… Written a check at the local store? Charged airline tickets? Rented a car? Applied for a credit card? Mailed in tax returns? Used a cell phone to order pizza?

winola
Download Presentation

Independent Living: Managing Your Money

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Independent Living: Managing Your Money Identity Theft

  2. Identity Theft: Are You a Victim? • Have you or your parents ever… • Written a check at the local store? • Charged airline tickets? • Rented a car? • Applied for a credit card? • Mailed in tax returns? • Used a cell phone to order pizza? • Each of these transactions requires sharing personal information, increasing the possibility of identity theft.

  3. Identity Theft: Are You a Victim? • What is identity theft? • According to the FTC (Federal Trade Commission) • When some one wrongfully acquires and uses your personal identification, credit or account information.

  4. Identity Theft: Are You a Victim? • What documents and belongings contain your personal information?

  5. Personal Information • Making purchases with a check, credit or debit card • Applying for a credit card or loan • Online or telephone shopping • Paying bills through the mail or online • Going to the doctor What daily activities require an individual to share personal information?

  6. How Do They Do It? • Stealing- Information is taken from a purse or wallet, personnel records from a workplace, tax information, bank or credit card statements, or pre-approved credit card offers from the mail.

  7. How Do They Do It? • Diverting Mail -Thieves can complete a change of address form and have the victim’s bills and statements mailed to a different location.

  8. How Do They Do It? • “Dumpster Diving” - Personal information is discarded and thieves remove it from the trash.

  9. How Do they do it? • Skimming- Thieves attach a device to card processors to steal credit and debit card information

  10. How do they do it? • Phishing- Thieves use a form of electronic communication (usually email) to pretend to be a company or depository institution in order to get the victim to give up their personal information.

  11. How do they do it? • Pretexting-Thieves use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources. 

  12. How do they do it? • Spyware - Software installed on the victim’s computer, without their knowledge or consent, that monitors internet use, sends pop up ads, re-directs the computer to other sites, and tracks key strokes.

  13. How do they do it? • Hacking - Information is stolen by breaking into a computer system.

  14. How does a thief use this information? • To apply for a new driver’s license • To open new bank accounts • To apply for credit cards or store credit accounts • To obtain cash with bank cards • To get a job • To rent an apartment • To make retail purchases • To take out student loans • To apply for bankruptcy

  15. Identity Theft- Minimize the Risk Wallets and Purses • Don’t leave your wallet or purse in plain sight. • Don’t hang purse from chair at public place. • Use a purse with a secure closure. • Carry only what is absolutely needed.

  16. Identity Theft- Minimize the Risk Credit, Debit and ATM Cards • Keep a list of all cards and account numbers. • Keep track of all receipts. • Close unwanted accounts in writing and by phone and cut up the card. • Memorize PIN number • Sign back of card with signature and “see ID” • Carry cards separately from wallet • Don’t leave bills and bank statements lying around. • Pay attention to billing cycles and follow up if bill does not arrive on time. • Obtain a photo I.D. card.

  17. Identity Theft- Minimize the Risk Credit Card Offers • Shred any credit card offers received and not used. • Cut up any pre-approved credit cards not used. pre-screened credit offers for five years at ww.optoutprescreen.com

  18. Identity Theft- Minimize the Risk Mail • Deposit outgoing mail in post office collection boxes. • Promptly remove mail from mailboxes. • If on vacation, put a hold on mail.

  19. Identity Theft- Minimize the Risk • Email • Keep your username and password protected • Do not click to open any mail from an unrecognizable address

  20. Identity Theft- Minimize the Risk • Telephone • Verify the source of any phone call asking for personal information by calling the company to confirm the phone call is legitimate. • Do not give any personal information over the phone, unless you have initiated the call.

  21. Identity Theft- Minimize the Risk Computer Security • Use anti-virus and anti-spyware software and update them regularly. • Do not give out personal information unless making a purchase. • Do not click on links found in pop-up ads.

  22. Identity Theft- Minimize the Risk Social Networks, Blogs and Chat rooms • Avoid posting information that could be used to identify you offline such as school, work or other locations where you spend time. • Use privacy settings to restrict who can access personal sites • Only post information that you are comfortable with anyone viewing.

  23. Identity Theft- Minimize the Risk Internet Purchases • Limit online purchases to secure websites. • Make sure the browser states ”https” or “shttp” The s stands for secure. • Look for a picture of a lock after the URL or in the bottom right hand corner indicating the site is secure. • Use a credit card instead of a debit card.

  24. Identity Theft- Minimize the Risk Social Security Number • Memorize Social Security number • Keep card in a safe place; do not carry it in wallet. • Only give number when absolutely necessary.

  25. Identity Theft- Minimize the Risk • Credit Reports • Check with each of the 3 credit reporting agencies at least once a year. • www.annualcreditreport.com • Immediately dispute any wrong information

  26. Recognizing Identity Theft Early detection is key! Watch for the following signs New accounts or charges you didn’t make Calls from collection agencies Incorrect information on your credit report Being denied credit when there is no reason to be Missing bills or mailed statements

  27. What To Do If Identity Theft Happens

  28. What To Do If Identity Theft Happens

  29. Identity Theft Protection • Offered by banks and other companies • Services • Closely monitor accounts and personal information • Alert consumer when there is a change • Help resolve any problems if identity theft does occur

  30. Identity Theft Protection • Cost • $5.00 to $35.00 per month • Depends on amount of services provided • Can NOT eliminate identity theft but can help prevent it

  31. Identity Theft Protection What are the pros and cons of identity theft protection?

  32. Identity Theft Insurance

  33. Identity Theft Pre-test • Fraudulent- • Deceitful; not what it seems to be.

  34. Identity Theft Pre-test • Browser- • A computer program used for accessing information on a network.

  35. Identity Theft Pre-Test • Counterfeit- • Made in imitation of something else with intent to deceive.

  36. Identity Theft Pre-test • Liable • Accountable; responsible

  37. Identity Theft pre-test • Encryped- • Written in code.

  38. Identity Theft pre-test • Phishing • The use of pop-up messages that ask for personal information while using the internet.

  39. Identity Theft Pre-test • Legitimate- • In accordance with the law.

  40. Identity Theft Pre-test • Routing- • To divert in a specified direction.

  41. Identity theft Pre-test • Unsecured- • Obligation backed not by collateral but only by the integrity of the borrower.

  42. Identity Theft Pre-test • Creditor- • Person or organization which extends credit to others.

  43. Identity Theft Pre-Test • Hacking- • Breaking into a computer system

  44. Identity Theft Pre-test • Spyware- • Software that monitors internet use

More Related