Objective 7.03 Understand ways to avoid identity theft. Identity Theft.
-
Upload
jairo-stream -
Category
Documents
-
view
234 -
download
3
Transcript of Objective 7.03 Understand ways to avoid identity theft. Identity Theft.
OBJECTIVE 7.0 UNDERSTAND
WAYS TO PROTECT PERSONAL AND
FAMILY RESOURCES
Objective 7.03 Understand ways to avoid identity theft.
Identity Theft
ESSENTIAL QUESTIONS
What is identity theft? How does one protect himself or herself
from being a victim of identity theft? What should I do if I am victimized?
WHAT IS IDENTITY THEFT?
A type of fraud Illegal use of a
consumer’s personal identification, credit, or account information
Information that thieves steal: Date of birth Bank and investment
account numbers Social Security number Internet passwords Credit card information,
credit cardsvideo link- phishing scams
video link: how stuff works-id theft
RESULTS OF IDENTITY THEFT
Results of identity theft for victims: Financial losses of
actual transactionsLoss of time and
money trying to correct problem
Substantial stress dealing with long term actions to correct
TECHNOLOGY – CAUSING PROBLEMS
Technological Advances Increase Opportunities for Exposure to Identity Theft Electronic funds
transfers (EFT) enable financial transactions by computer
Direct deposits and withdrawals online
Pay-by-phone transfers Point-of-sale transfers
(debit card) Online banking:
Account numbers, date of birth, passwords in cyberspace
ELECTRONIC FUNDS TRANSFER ACT Provides protection for : ATM, debit cards,
cash cards If loss is reported:
Within 2 days=$50 maximum
Within 60 days, $500 maximum, and
After 60 days, may be liable for all charges
Who is your best advocate?
YOU ARE! It is important to
pay attention to your financial transactions!
Electronic Funds Transfer Definition: carrying out financial transactions by computer rather than using checks or cashExamples: direct deposit payroll checkAutomatic draft of monthly utility bill
TYPES OF IDENTITY THEFT
video link- problems & solutions
video link- credit card swipes
DATA COLLECTION AND PRIVACY ISSUES
Many businesses have legitimate reasons for obtaining personal information Payroll, human resources,
personnel department Social security, bank account
#s Some websites use online
profiling Security of websites Cautions about use of the
Social Security number Partial # only printed on
receipts, etc. Do not carry in your wallet
Other businesses use personal information, such as your name, address, credit card number, and information about purchasing preferences and patterns for other purposes
Marketing other products Food Lion MVP card -
send coupons, special ads
WHAT DAILY ACTIVITIES REQUIRE PROVIDING PERSONAL INFORMATION
What personal information are you carrying in your wallet now? Driver’s license Social security card Credit cards Debit cards Health Insurance
card Check book Student ID card
• Making purchases with a check, credit or debit card
• Applying for a credit card or loan
• Online or telephone shopping
• Paying bills through the mail or online
• Going to the doctor
WAYS IDENTITY THIEVES OBTAIN PERSONAL INFORMATION TO COMMIT CRIME AND FRAUD
Obtaining personal information submitted on the Internet
Posing as representatives of banks, Internet service providers, or government agencies to get one to provide personal information on the telephone or by email
Looking over the shoulder when one is writing checks or using teller machines
Using phones with cameras, videos to photo & re-enter PIN codes
Using “ATM skimmers” to capture credit card number from the magnetic strip
Using card readers to swipe a card and capture the card number
video link - ATM skimming device
SUBJECT: JURY DUTY SS# SCAM
Pass this info on: This has been verified by the FBI (their link is also included below). Please pass this on to everyone
in your email address book. It is spreading fast so be prepared should you get this call. Most of us take those summonses for jury duty seriously, but enough people skip out on their civic duty that a new and ominous kind of fraud has surfaced.
The caller claims to be a jury DUTY coordinator. If you protest that you never received a summons for jury duty, the Scammer asks you for your Social Security number and date of birth so he or she can verify the information and cancel the arrest warrant. Give out any of this information and bingo; your identity was just stolen.
The fraud has been reported so far in 11 states, including Oklahoma , Illinois , and Colorado , AZ and more. This (swindle) is particularly insidious because they use intimidation over the phone to try to bully people into giving information by pretending they are with the court system.
The FBI and the federal court system have issued nationwide alerts on their web sites, warning consumers about the fraud.
Check it out here: http://www.fbi.gov/page2/june06/jury_scams060206.htm
And here: http://www.snopes.com/crime/fraud/juryduty.aspYep! It's true
CABARRUS COUNTY SCHOOLS EMAIL SAFETY REMINDER Good Afternoon – It’s a good time to remind everyone about SCAM or PHISHING email. Phishing
refers to the process of tricking recipients into sharing sensitive information with an unknown third party. Those who PHISH make an email appear legitimate.
Security Reminders- 1) CCS does not send out email asking for private information (i.e., social
security numbers, credit card numbers, etc…). Sometimes we have “vendor” looking logo email asking for the end user to provide information. If you receive, delete the email.
2) CCS does not send out email regarding changing of a password. Delete the email.
3) Never share your password. 4) When in doubt about whether or not to respond to an email, DON’T until you
have verified legitimacy. Ask a technology facilitator or call the IT Help Desk (704-786-9805, ext. 2).
Dr. Katherine Propst Assistant Superintendent Cabarrus County Schools
WAYS IDENTITY THIEVES OBTAIN PERSONAL INFORMATION TO COMMIT CRIME AND FRAUD Stealing wallets or purses
containing identification information, credit cards, or checkbooks
Stealing mail, which may include bank, credit card, payroll, and tax information
Completing a change of address card to have mail sent to another address
Going through trash from homes/businesses to find identification, bank, or credit information
Obtaining personal information from one’s home mail or body…theft
WAYS IDENTITY THIEVES ILLEGALLY USE PERSONAL INFORMATION
Make charges to your accounts and credit cards Open new credit accounts to make purchases
WAYS IDENTITY THIEVES ILLEGALLY USE PERSONAL INFORMATION To sign up for services
such as telephone, cellular telephone, or wireless service, and utilities
Open a bank account and write “bad” checks The predator is
stripping whatever money is in your account!
Write checks on one’s bank account
Get a job using your information
Rent an apartment Obtain cash with
bank cards Obtain your tax
refund from IRSvideo link- identity theft in Florida
STEPS TO MINIMIZE POTENTIAL FOR IDENTITY THEFT
Shred documents with personal information before discarding!
DO YOU KNOW WHO YOU ARE CHATTING WITH?
STEPS TO MINIMIZE POTENTIAL FOR IDENTITY THEFT Report missing
credit cards and identifying information to three credit-reporting agencies
Report missing credit cards to credit card company
Verify your credit card charges upon receipt of your card
STEPS TO MINIMIZE POTENTIAL FOR IDENTITY THEFT Contact your
bank if you are missing ATM cards or checks
Reconcile your bank statement to verify all withdrawals are for your authorized transactions
STEPS TO MINIMIZE POTENTIAL FOR IDENTITY THEFT Report missing
Social Security numbers or card to the Social Security Administration
Seek other help from the Federal Trade Commission and the Identity Theft Resource Center
Don’t carry your SS card in wallet!
STEPS TO MINIMIZE POTENTIAL FOR IDENTITY THEFT Issue a “stop
payment” if checks or credit cards are lost or stolen
When establishing accounts at financial institutions, make sure they are insured by agencies that protect deposits in case the institution fails Federal Deposit
Insurance Corporation (FDIC)
Savings Association Insurance Funds (SAIF)
National Credit Union Administration (NCUA)
STEPS TO MINIMIZE POTENTIAL FOR IDENTITY THEFT
WHAT IS “OPT OUT”?
Definition: Method by which individuals can avoid receiving unsolicited product or service info; usually associated with telemarketing, e-mail marketing, online marketing or direct mail
Make an informed choice about sharing personal information---“opt out”
Before clicking “I agree” -Read your online site agreement, you often give up your right to “opt out” and your information is broadly circulated to marketers
I want to “OPT OUT”…
To remove your phone # from telemarketing lists use National Registry or state registries https://www.donotcall.gov/
To remove your personal information from financial institutions/insurance company lists Individual company privacy
statements have phone #s to contact
COMPUTER SECURITY•Use anti-virus and anti-spyware software and update them regularly•Do not click on links found in pop-up ads•Only download software from trusted websites
•Set web browser security to medium-high or high•Keep operating system and web browser software updated•Clear hard drives before discarding, selling, or trading in computer equipment
COMPUTER SECURITY•When shopping online, Look for “https” or a picture of a lock after the URL or in the bottom right hand corner indicating the site issecure
•Enter the website address yourself rather than following a link from an email or internet advertisement
•Use a credit card instead of a debit card when making online purchases
“https” s = secure
COMPUTER SECURITY•Do not give out personal information from unsolicited contacts
•Unsolicited = callers who contact you
•Do not give out any personal information unless making a purchase (when you contacted company)
•Choose security questions with answers only you would know
COMPUTER INFECTIONS• Watch for clues that
might indicate a computer is infected with spyware.
• Examples: • a stream of pop-up
ads• random error
messages• sluggish performance
when opening programs or saving files
If it is suspected that a computer is infected with spyware, immediately: stop shopping, banking or
doing any other online activity that involves user names, passwords, or other sensitive information
confirm that the security software is active and current
run software to scan the computer for viruses and spyware, deleting anything the program identifies as a problem
PASSWORDS Email, Debit Cards, Banking
documents, other
Keep your username and password protected
Change passwords
Create a Password Combination of words,
numbers, and symbols UNIQUE Upper and Lower Case Cannot be easily found
Do not use obvious names, birthdays, addresses, SS# etc.
Should the password be “I don’t know”?
PASSWORDS When entering your Password in public places: “Securely” type in PIN # at
ATM Point of Sale (POS) register Public Online outlets
How does predator get
victim’s information? Phones with video cameras
can replicate your keystrokes “Nosy” customers in line Dumpster Diving
Predator often works with partner who “lifts” debit card for use with password later
PASSWORDS
HOW DO I KNOW MY IDENTITY HAS BEEN STOLEN?
YOU are your own best ADVOCATE!Verify your credit
card statement charges
Reconcile your bank account
KNOW WHAT YOU SPEND!
Request credit reports from credit bureaus
WHAT TO DO IF IDENTITY THEFT OCCURS Respond immediately Keep a record of related
phone calls, letters, and Emails
Request a “fraud alert” with three major credit bureaus Equifax TransUnion Experian
Renew “fraud alert” every 90 days with credit bureaus
WHAT TO DO IF IDENTITY THEFT OCCURS
Obtain a credit report from each major credit bureau and check for accuracy
Close all accounts that have been involved in the theft
Open new accounts with NEW unique passwords and new PIN numbers
File a police report
LAWS PROTECTING CONSUMERS’ PERSONAL INFORMATION Federal Trade Commission (FTC)
oversees compliance with these acts Financial Services Modernization Act
(1999) requires companies involved in financial
activities to send privacy notices to customers Children’s Online Privacy Protection
Act (1998) Requires websites directed to children under
thirteen to post their privacy policy, parental consent and ability to monitor is required
Link to Children's online privacy law
SOFTWARE TO PROTECT ID
New industry booming to assist consumers with themselves from this fastest growing crime
EMPLOYMENT WANT ADS?
Why do you think identity theft grew significantly during the recession? DesperationNo income to
pay billsTime
Available
video link: Stolen_Futures - 10 minute- if time allows