Date post: | 15-Dec-2015 |
Category: |
Documents |
Upload: | sylvia-littler |
View: | 220 times |
Download: | 0 times |
Objectives
The students will be able to…Understand what identity theft is and why it
is important to guard against it.Learn to recognize strategies that scam
artists use to access private information.Learn how to guard against phishing and
identity theft.
Vocabulary
Scam: an attempt to trick someone, usually with the intention of stealing money or private informationIdentity theft: a type of crime in which your privateinformation is stolen and used for criminal activity
Vocabulary, cont.
Vulnerable: in a position that makes it easier for you to be harmed or attacked
Phishing: when people send you phony emails,pop-up messages, social media messages, texts, calls,or links to fake websites in order to hook you intogiving out your personal and financial information
What Is Identity Theft?
People who scam don’t always get money from them directly
Use variety of strategies to trick people into giving out private information
Use information to access bank and credit card accounts
Even recreate someone’s identify Produce false documents (social security cards,
drivers’ licenses, etc.)
What Is Identity Theft?
Can you guess what kinds of personal information
identity thieves might look for?
What Is Identity Theft? Personal Information
Full nameDate of and place of birthCurrent/previous addresses/phone numbersDriver’s license or passport numbersAccount numbers, companies’ names (ex:
Amazon, iTunes, PayPal, Dillard’s)PasswordsSocial Security Number
Vulnerable
…Vulnerable: in a position that makes it easier for you to be harmed or attacked
Anyone on line is vulnerable!
How to Catch a Phish
How do you think identity thieves might try to get your information?
(Phishing: when people send you phony emails,pop-up messages, social media messages, texts,
calls,or links to fake websites in order to hook you into
giving out your personal and financial information)
Phishing Examples
Consumer Fraud Reporting Example 1
Phishing Examples
FacebookHuffington Post article, “Facebook Scams
You Need to Know About”
Protect Yourself from Online Scams
Protect yourself…follow the rules Avoid opening the message or email in the first place Don’t click on any links or download and attachments.
They might contain viruses or spyware. Don’t reply Mark as “junk mail” or “spam” for your email
provider, or report it to your social network site. If you are concerned about an account you have with a
company, contact its customer service by phone. Make sure you verify the company’s contact
information elsewhere online first.
Wrap-up
You or your family can go to www.ftc.gov/idtheft for help if identity has been stolen
Forward spam emails to [email protected]
Extension Activity
Try your luck with the Spam Scam Slam game
http://www.onguardonline.gov/media/game-0012-spam-scam-slam
Lesson Assessment
1. A type of crime in which your private information is stolen and used for criminalactivity is called:a) Identificationb) Identity theftc) Burglary
Lesson Assessment
1. A type of crime in which your private information is stolen and used for criminalactivity is called:a) Identificationb) Identity theftc) Burglary
Lesson Assessment
Which of the following is NOT a warning sign that this message is a scam:
a) The offer sounds too good to be trueb) It asks Evan for his private informationc) Evan is addressed as “Sir”
Lesson Assessment
Which of the following is NOT a warning sign that this message is a scam:
a) The offer sounds too good to be trueb) It asks Evan for his private informationc) Evan is addressed as “Sir”
Lesson Assessment
3. Sara finds a message on her phone that she thinks might be a scam. She should:a) Forward the message to her friends to see if they think it’s a scam toob) Reply and ask the sender not to send more mailc) Delete the message