Transcript
Page 1: Objective 7.0 Understand ways to protect personal and family resources

OBJECTIVE 7.0 UNDERSTAND

WAYS TO PROTECT PERSONAL AND

FAMILY RESOURCES

Objective 7.03 Understand ways to avoid identity theft.

Identity Theft

Page 2: Objective 7.0 Understand ways to protect personal and family resources

ESSENTIAL QUESTIONS

What is identity theft? How does one protect himself or herself

from being a victim of identity theft? What should I do if I am victimized?

Page 3: Objective 7.0 Understand ways to protect personal and family resources

WHAT IS IDENTITY THEFT?

A type of fraud Illegal use of a

consumer’s personal identification, credit, or account information

Information that thieves steal: Date of birth Bank and investment

account numbers Social Security number Internet passwords Credit card information,

credit cardsvideo link- phishing scams

Page 5: Objective 7.0 Understand ways to protect personal and family resources

RESULTS OF IDENTITY THEFT

Results of identity theft for victims: Financial losses of

actual transactionsLoss of time and

money trying to correct problem

Substantial stress dealing with long term actions to correct

Page 6: Objective 7.0 Understand ways to protect personal and family resources

TECHNOLOGY – CAUSING PROBLEMS

Technological Advances Increase Opportunities for Exposure to Identity Theft Electronic funds

transfers (EFT) enable financial transactions by computer

Direct deposits and withdrawals online

Pay-by-phone transfers Point-of-sale transfers

(debit card) Online banking:

Account numbers, date of birth, passwords in cyberspace

Page 7: Objective 7.0 Understand ways to protect personal and family resources

ELECTRONIC FUNDS TRANSFER ACT Provides protection for : ATM, debit cards,

cash cards If loss is reported:

Within 2 days=$50 maximum

Within 60 days, $500 maximum, and

After 60 days, may be liable for all charges

Who is your best advocate?

YOU ARE! It is important to

pay attention to your financial transactions!

Electronic Funds Transfer Definition: carrying out financial transactions by computer rather than using checks or cashExamples: direct deposit payroll checkAutomatic draft of monthly utility bill

Page 8: Objective 7.0 Understand ways to protect personal and family resources

TYPES OF IDENTITY THEFT

video link- problems & solutions

video link- credit card swipes

Page 9: Objective 7.0 Understand ways to protect personal and family resources

DATA COLLECTION AND PRIVACY ISSUES

Many businesses have legitimate reasons for obtaining personal information Payroll, human resources,

personnel department Social security, bank account

#s Some websites use online

profiling Security of websites Cautions about use of the

Social Security number Partial # only printed on

receipts, etc. Do not carry in your wallet

Other businesses use personal information, such as your name, address, credit card number, and information about purchasing preferences and patterns for other purposes

Marketing other products Food Lion MVP card -

send coupons, special ads

Page 10: Objective 7.0 Understand ways to protect personal and family resources

WHAT DAILY ACTIVITIES REQUIRE PROVIDING PERSONAL INFORMATION

What personal information are you carrying in your wallet now? Driver’s license Social security card Credit cards Debit cards Health Insurance

card Check book Student ID card

• Making purchases with a check, credit or debit card

• Applying for a credit card or loan

• Online or telephone shopping

• Paying bills through the mail or online

• Going to the doctor

Page 11: Objective 7.0 Understand ways to protect personal and family resources

WAYS IDENTITY THIEVES OBTAIN PERSONAL INFORMATION TO COMMIT CRIME AND FRAUD

Obtaining personal information submitted on the Internet

Posing as representatives of banks, Internet service providers, or government agencies to get one to provide personal information on the telephone or by email

Looking over the shoulder when one is writing checks or using teller machines

Using phones with cameras, videos to photo & re-enter PIN codes

Using “ATM skimmers” to capture credit card number from the magnetic strip

Using card readers to swipe a card and capture the card number

video link - ATM skimming device

Page 12: Objective 7.0 Understand ways to protect personal and family resources

SUBJECT: JURY DUTY SS# SCAM

Pass this info on: This has been verified by the FBI (their link is also included below). Please pass this on to everyone

in your email address book. It is spreading fast so be prepared should you get this call. Most of us take those summonses for jury duty seriously, but enough people skip out on their civic duty that a new and ominous kind of fraud has surfaced.

The caller claims to be a jury DUTY coordinator. If you protest that you never received a summons for jury duty, the Scammer asks you for your Social Security number and date of birth so he or she can verify the information and cancel the arrest warrant. Give out any of this information and bingo; your identity was just stolen.

The fraud has been reported so far in 11 states, including Oklahoma , Illinois , and Colorado , AZ and more. This (swindle) is particularly insidious because they use intimidation over the phone to try to bully people into giving information by pretending they are with the court system.

The FBI and the federal court system have issued nationwide alerts on their web sites, warning consumers about the fraud.

Check it out here: http://www.fbi.gov/page2/june06/jury_scams060206.htm

And here: http://www.snopes.com/crime/fraud/juryduty.aspYep! It's true

Page 13: Objective 7.0 Understand ways to protect personal and family resources

CABARRUS COUNTY SCHOOLS EMAIL SAFETY REMINDER Good Afternoon –   It’s a good time to remind everyone about SCAM or PHISHING email. Phishing

refers to the process of tricking recipients into sharing sensitive information with an unknown third party.   Those who PHISH make an email appear legitimate. 

Security Reminders-   1)      CCS does not send out email asking for private information (i.e., social

security numbers, credit card numbers, etc…).  Sometimes we have “vendor” looking logo email asking for the end user to provide information.   If you receive, delete the email.

2)      CCS does not send out email regarding changing of a password. Delete the email.

3)      Never share your password.  4)      When in doubt about whether or not to respond to an email, DON’T until you

have verified legitimacy. Ask a technology facilitator or call the IT Help Desk (704-786-9805, ext. 2).

    Dr. Katherine Propst Assistant Superintendent Cabarrus County Schools

Page 14: Objective 7.0 Understand ways to protect personal and family resources

WAYS IDENTITY THIEVES OBTAIN PERSONAL INFORMATION TO COMMIT CRIME AND FRAUD Stealing wallets or purses

containing identification information, credit cards, or checkbooks

Stealing mail, which may include bank, credit card, payroll, and tax information

Completing a change of address card to have mail sent to another address

Going through trash from homes/businesses to find identification, bank, or credit information

Obtaining personal information from one’s home mail or body…theft

Page 15: Objective 7.0 Understand ways to protect personal and family resources

WAYS IDENTITY THIEVES ILLEGALLY USE PERSONAL INFORMATION

Make charges to your accounts and credit cards Open new credit accounts to make purchases

Page 16: Objective 7.0 Understand ways to protect personal and family resources

WAYS IDENTITY THIEVES ILLEGALLY USE PERSONAL INFORMATION To sign up for services

such as telephone, cellular telephone, or wireless service, and utilities

Open a bank account and write “bad” checks The predator is

stripping whatever money is in your account!

Write checks on one’s bank account

Get a job using your information

Rent an apartment Obtain cash with

bank cards Obtain your tax

refund from IRSvideo link- identity theft in Florida

Page 17: Objective 7.0 Understand ways to protect personal and family resources

STEPS TO MINIMIZE POTENTIAL FOR IDENTITY THEFT

Shred documents with personal information before discarding!

Page 18: Objective 7.0 Understand ways to protect personal and family resources

DO YOU KNOW WHO YOU ARE CHATTING WITH?

Page 19: Objective 7.0 Understand ways to protect personal and family resources

STEPS TO MINIMIZE POTENTIAL FOR IDENTITY THEFT Report missing

credit cards and identifying information to three credit-reporting agencies

Report missing credit cards to credit card company

Verify your credit card charges upon receipt of your card

Page 20: Objective 7.0 Understand ways to protect personal and family resources

STEPS TO MINIMIZE POTENTIAL FOR IDENTITY THEFT Contact your

bank if you are missing ATM cards or checks

Reconcile your bank statement to verify all withdrawals are for your authorized transactions

Page 21: Objective 7.0 Understand ways to protect personal and family resources

STEPS TO MINIMIZE POTENTIAL FOR IDENTITY THEFT Report missing

Social Security numbers or card to the Social Security Administration

Seek other help from the Federal Trade Commission and the Identity Theft Resource Center

Don’t carry your SS card in wallet!

Page 22: Objective 7.0 Understand ways to protect personal and family resources

STEPS TO MINIMIZE POTENTIAL FOR IDENTITY THEFT Issue a “stop

payment” if checks or credit cards are lost or stolen

When establishing accounts at financial institutions, make sure they are insured by agencies that protect deposits in case the institution fails Federal Deposit

Insurance Corporation (FDIC)

Savings Association Insurance Funds (SAIF)

National Credit Union Administration (NCUA)

Page 23: Objective 7.0 Understand ways to protect personal and family resources

STEPS TO MINIMIZE POTENTIAL FOR IDENTITY THEFT

WHAT IS “OPT OUT”?

Definition: Method by which individuals can avoid receiving unsolicited product or service info; usually associated with telemarketing, e-mail marketing, online marketing or direct mail

Make an informed choice about sharing personal information---“opt out”

Before clicking “I agree” -Read your online site agreement, you often give up your right to “opt out” and your information is broadly circulated to marketers

I want to “OPT OUT”…

To remove your phone # from telemarketing lists use National Registry or state registries https://www.donotcall.gov/

To remove your personal information from financial institutions/insurance company lists Individual company privacy

statements have phone #s to contact

Page 24: Objective 7.0 Understand ways to protect personal and family resources

COMPUTER SECURITY•Use anti-virus and anti-spyware software and update them regularly•Do not click on links found in pop-up ads•Only download software from trusted websites

•Set web browser security to medium-high or high•Keep operating system and web browser software updated•Clear hard drives before discarding, selling, or trading in computer equipment

Page 25: Objective 7.0 Understand ways to protect personal and family resources

COMPUTER SECURITY•When shopping online, Look for “https” or a picture of a lock after the URL or in the bottom right hand corner indicating the site issecure

•Enter the website address yourself rather than following a link from an email or internet advertisement

•Use a credit card instead of a debit card when making online purchases

“https” s = secure

Page 26: Objective 7.0 Understand ways to protect personal and family resources

COMPUTER SECURITY•Do not give out personal information from unsolicited contacts

•Unsolicited = callers who contact you

•Do not give out any personal information unless making a purchase (when you contacted company)

•Choose security questions with answers only you would know

Page 27: Objective 7.0 Understand ways to protect personal and family resources

COMPUTER INFECTIONS• Watch for clues that

might indicate a computer is infected with spyware.

• Examples: • a stream of pop-up

ads• random error

messages• sluggish performance

when opening programs or saving files

If it is suspected that a computer is infected with spyware, immediately: stop shopping, banking or

doing any other online activity that involves user names, passwords, or other sensitive information

confirm that the security software is active and current

run software to scan the computer for viruses and spyware, deleting anything the program identifies as a problem

Page 28: Objective 7.0 Understand ways to protect personal and family resources

PASSWORDS Email, Debit Cards, Banking

documents, other

Keep your username and password protected

Change passwords

Create a Password Combination of words,

numbers, and symbols UNIQUE Upper and Lower Case Cannot be easily found

Do not use obvious names, birthdays, addresses, SS# etc.

Should the password be “I don’t know”?

Page 29: Objective 7.0 Understand ways to protect personal and family resources

PASSWORDS When entering your Password in public places: “Securely” type in PIN # at

ATM Point of Sale (POS) register Public Online outlets

How does predator get

victim’s information? Phones with video cameras

can replicate your keystrokes “Nosy” customers in line Dumpster Diving

Predator often works with partner who “lifts” debit card for use with password later

Page 30: Objective 7.0 Understand ways to protect personal and family resources

PASSWORDS

Page 31: Objective 7.0 Understand ways to protect personal and family resources

HOW DO I KNOW MY IDENTITY HAS BEEN STOLEN?

YOU are your own best ADVOCATE!Verify your credit

card statement charges

Reconcile your bank account

KNOW WHAT YOU SPEND!

Request credit reports from credit bureaus

Page 32: Objective 7.0 Understand ways to protect personal and family resources

WHAT TO DO IF IDENTITY THEFT OCCURS Respond immediately Keep a record of related

phone calls, letters, and Emails

Request a “fraud alert” with three major credit bureaus Equifax TransUnion Experian

Renew “fraud alert” every 90 days with credit bureaus

Page 33: Objective 7.0 Understand ways to protect personal and family resources

WHAT TO DO IF IDENTITY THEFT OCCURS

Obtain a credit report from each major credit bureau and check for accuracy

Close all accounts that have been involved in the theft

Open new accounts with NEW unique passwords and new PIN numbers

File a police report

Page 34: Objective 7.0 Understand ways to protect personal and family resources

LAWS PROTECTING CONSUMERS’ PERSONAL INFORMATION Federal Trade Commission (FTC)

oversees compliance with these acts Financial Services Modernization Act

(1999) requires companies involved in financial

activities to send privacy notices to customers Children’s Online Privacy Protection

Act (1998) Requires websites directed to children under

thirteen to post their privacy policy, parental consent and ability to monitor is required

Link to Children's online privacy law

Page 35: Objective 7.0 Understand ways to protect personal and family resources

SOFTWARE TO PROTECT ID

New industry booming to assist consumers with themselves from this fastest growing crime

Page 36: Objective 7.0 Understand ways to protect personal and family resources

EMPLOYMENT WANT ADS?

Why do you think identity theft grew significantly during the recession? DesperationNo income to

pay billsTime

Available

video link: Stolen_Futures - 10 minute- if time allows


Top Related