+ All Categories
Home > Documents > IDENTITY THEFT

IDENTITY THEFT

Date post: 25-Feb-2016
Category:
Upload: mignon
View: 23 times
Download: 2 times
Share this document with a friend
Description:
IDENTITY THEFT. IDENTITY THEFT. What is it? What is it?. 1. IDENTITY THEFT. Happens when someone takes information about you and then uses it to commit fraud. - PowerPoint PPT Presentation
Popular Tags:
51
IDENTITY THEFT
Transcript

IDENTITY THEFT

IDENTITY THEFT

1IDENTITY THEFTWhat is it?What is it?

1. IDENTITY THEFTHappens when someone takes information about you and then uses it to commit fraud.is the crime of setting up and using bank accounts and credit facilities fraudulently in another person's name without his or her knowledge.Deter-Detech-Defend Avoid Thefthttp://www.youtube.com/watch?v=bC8pjXn-sWM2. IDENTITY THEFTIdentity fraud affects 10 million people in any given year and costs businesses about $50 billion.

Victims of identity theft have spent about $5 billion trying to undo this harm.

3. What info do they want? Full NameAddressDate of BirthSocial Security NumberPasswordsCredit Card Numbers4. How do ID thieves get infoOfflineMailPhoneOnlinePhishing scamsPharmingSocial Networks5. Ways to Deter ID Thefta. Protect your Social Security number.b. Shred financial documents.c. Never give out private information unless it is for a very good reason.Private vs Personal6. Private information is information that helps identify who you are. Private information should be kept PRIVATE.

7. Personal information cannot be used to identify your financial data. It is usually Okay to share personal information.Private vs Personal

Eye ColorSocial Security NumberPhone NumberFavorite BandFirst and Last NameEmail AddressPostal AddressMothers Maiden NameMale or Female

8. Ways to Detect ID Thefta. Check your Credit Reportb. Review financial chargesc. Look for charges you did not make.9. Ways to Defend ID Thefta. Place a fraud alert on your credit report.b. Close accounts.c. File a police report.d. Contact the Federal Trade Commission.The Digest Thirteen thingsAn Identity Thief Wont Tell YouWatch your back while using credit cards.

The red flag tells the mail carrier and me that you have outgoing mail.

Check your bank and credit card balances.

Credit cards can be duplicated using a $50 machine.The Digest Thirteen thingsAn Identity Thief Wont Tell YouIf a bill doesnt show up, question it.

Collect garbage.

Watch for a skimmer on an ATM.

Opt out of receiving pre-approved credit offers.The Digest Thirteen thingsAn Identity Thief Wont Tell YouPose as you, call , and get your personal information.

Debit cards give direct access to accounts.

Love the new credit card that showed up in your mailbox.

SourcesCyberSmart! Student Curriculum. Web. 12 Apr. 2011. .

"Deter. Detect. Defend. Avoid ID Theft." Federal Trade Commission. Web. 12 Apr. 2011. .

Sources"13 Things An Identity Thief Won't Tell You | Reader's Digest Version." Health Tips, Food and Recipes, Funny Jokes and Cartoons, and Sweepstakes | Readers Digest Version. Web. 12 Apr. 2011. .

Interacting Online

1. Ways to Communicate OnlineOnline chattingPhoto sharingWebcamsOnline gamingSocial networking sites2. Positive Aspects Way to keep in contact with friends/family Way to interact with people who share common interests

3. Negative Aspects Exploitation CyberBullying7. WebcamsStay in touch with family and friendsCaution needed especially with strangersOnce webcam broadcasts video it can be captured and later viewed, posted, copied, and/or distributedControlled remotely

10. Stay Safe a. Never give out private information.b. Use impersonal nicknames.c. Think about your online reputation.d. Dont believe everything you are told.e. Remember if it sounds too good to be true, it probably is.10. Stay Safef. Have parental permission before meeting anyone you met online.g. Any photos or videos that you share online can never be taken back.h. Cover up the web cam when you are not using.

10. Stay Safei. Dont let anyone convince you to do something you are uncomfortable with.j. Talk to your parents about what you do online.k. If you have concerns about things you see on the Internet, tell an adult.

Internet Safety Videohttp://www.youtube.com/watch?v=xZHq4CQekTY

http://www.zamzar.com/getFiles.php?uid=8486207359375001332528062&targetID=9Ya1O4LQot6S_Y_ZhxxTB_Z_Z8yjgVYHFyTe

Internet VideoWatch again!List Private InfoList Safety ViolationsAmys Choice VideoCompare and Contrast thhttp://www.nsteens.org/Videos/Amys%20Choicee movies.11. What info that should NOT be included in your Online ProfileFull nameAddressPhoneSchoolAgeSex

Interacting Online12. Your profile settings should be set to private. Interacting Online Tip Dont believe everything you are told online. Stay in control of your reputation. Online choices have offline consequences.Sexting13. Sexting is the act of sending sexually explicit materials between devices.

14. Sexting has legal and psychological consequences.15. Five Things to Think about before pressing SENDDont assume anything you send or post is going to remain private.There is no changing your mind in cyberspace.Dont give in under pressure to do something that makes you uncomfortable.Consider the recipients reaction.Nothing is truly anonymous.Proper NetiquetteProper Netiquette1. Be brief in your email and text messages.2. Use sarcasm sparingly.3. Never write in ALL caps.4. If you are sending an attachment, make sure it is compatible to the recipients software.5. Share photos by posting them online rather than attaching them to email.

Proper etiquette6. When typing group email, respect others privacy by typing the email addresses in BCC.7. Fill in the subject line when sending an email.8. If you are forwarding a message, write a brief explanation as to why you are forwarding.

Proper etiquette9. Dont tag people in social networking sites if they asked you not to.10. Dont discuss anyones private business on a wall.11. Think before you send an IM. It is to be a brief correspondence.12. Dont contribute to a news board until you lurked.

Proper etiquette13. Read the FAQ site before asking a question.

14. Refrain from flaming.

15. Dont be a troll.

Passwords16. Use at least 8 characters.17. Use a random mixture of upper and lowercase, numbers, and symbols.18. Dont use a word found in a dictionary.19. Never use the same password twice. SourcesHow to Follow Proper Netiquette. Youtube. Howcast, 29 May 2009. Web. 18 Oct. 2011. ."Password Guidlelines." The Home Computer Security Centre. Lockdown.co.uk, 10 July 2009. Web. 18 Oct. 2011. .

Cyberbullying

41Cyberbullying1. Involves the use of communication technologies to repeatedly intimidate or harass others.

social networking siteswebsitese-mailtext messaginginstant messaging

2. Examples of CyberbullyingSending mean or threatening emails/text/IMsPosting embarrassing photos of someone onlineCreating a website to make fun of othersPretending to be someone by using his or her nameTricking someone into revealing personal or embarrassing info and/or sending it to othersNS Teens CyberbullyingTerrible Texthttp://www.nsteens.org/Videos/TerribletEXthttp://www.nsteens.org/Videos/TerribletEXt3. Cyberbullying vs Bullying?No boundaries 24/7Harsher. People hide behind technology.Is far reaching (email, web, cell phones)Can be anonymous

r454. React to CyberbullyingDo not reply to messages or posts.If possible, block the sender.Keep a copy of the messages.Tell someone about ittrusted adult, parent, etc.If threatening, call police5. Prevent CyberbullyingRefuse to pass along cyberbullying messages.If you know a cyberbully, tell them to stop.Report any cyberbullying to an adult.6. Remember . . .Never respond to harassing or rude comments.Save or print the evidence.Talk to your parents or guardian if you are harassed; get help reporting this to your ISP, school, or local law enforcement.

Remember . . .d. Respect others online.e. Only share your password with your parent or guardian.f. Change your passwords often.g. Password protect your cell phone.h. Use privacy settings to block unwanted messages.

Remember . . .i. Think before posting or sending photos they could be used to hurt you.j. Contact the site administrator if someone creates a social networking page in your name

Sourceshttp://www.nsteens.org/Videos/Cyberbullying


Recommended