Download Identity Theft

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Information privacy law wikipedia , lookup

National identity cards in the European Economic Area wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Social engineering (security) wikipedia , lookup

Transcript
Identity Theft
PRESENTED BY:
ASHLEY CLOUSER (CONNER)
Definition:
 Form of fraud/cheating of another person’s identity
in which someone pretends to be someone else by
assuming that person’s identity

Typically in order to access resources or obtain credit and
other benefits in that person’s name
What is Identity?
 Foundation of one’s life
 Unique to each person
 Defines a person in society
 Makes an entity definable and recognizable
Awareness
 Rapidly becoming the most popular crime today
 It is easier than you think
 Require only a single successful attempt in order to steal
everything that is your life.
 If they get access to your data it can result in financial
ruin, or worse, criminal activities which are attributed to
you because they were committed under your identity.
 Thankfully, there are ways to prevent identity theft, and
options which you can pursue if you should ever become
a victim of this terrible crime.
It’s That Easy!
How can someone steal my identity?
 They may steal records or information while they're on
the job, bribing an employee who has access to these
records, hacking these records, conning information
out of employees
 They may steal your mail, including bank and credit
card statements, pre-approved credit card offers, new
checks, and tax information.
 They may rummage through your trash, the trash of
businesses, or public trash dumps in a practice known
as "dumpster diving."
 They may get your credit reports by abusing their
employer's authorized access to them or by posing as a
landlord, employer, or someone else who may have a
legal right to access your report.
Cont…
 They may steal your credit or debit card numbers by




capturing the information in a data storage device through
a practice known as "skimming." They may swipe your card
for an actual purchase or attach the device to an ATM
machine where you may enter or swipe your card.
They may steal your wallet or purse.
They may complete a "change of address form" to divert
your mail to another location.
They may steal personal information they find in your
home.
They may steal personal information from you through
email or phone by posing as legitimate companies and
claiming that you have a problem with your account. This
practice is known as "phishing" online or by phone.
Prevention
 Personal Information
 Postal Mail
 Computer
 Trash
 Safeguard
Personal Information
 Some information will inevitably be made public
 Full Name, Address, Phone Number, Birth Date
 Other information should be kept private
 Social Security Number, Bank Account Number, Credit Card
Number, PIN’s and Passwords
 Monitor credit closely
 Watch for suspicious signs, identity protection services
 Keep records of your financial data and transactions
Postal Mail
 Don’t leave mail in your mailbox for excessive
amounts of time
 Have trust relatives/friends get mail or have mail
held at the post office when your out of town
 Deposit of outgoing mail in proper and secure
locations
Your Personal Computer
 Use an updated web browser
 Invest in security software
 Firewall, anti-virus, anti-spyware
 Make sure online shopping sites are secure and
trustworthy

If the site doesn’t have a lock on the bottom right-hand side
don’t use it!
 Be wary of attachments
 Email and instant messages
 Firewall your wireless internet connection
 If you sell or get rid of your computer make sure to
delete the hard drive
Your Personal Trash
 Personal documents should be shredded before
discarding them into the trash.

These Included:
Bank statements
 Credit Card Statements
 Pre-approved credit card offers
 Paystubs
 Expired passports, visas, and credit cards
 Canceled credit cards
 ATM receipts
 Canceled/Voided checks
 Bills

---Like the old saying goes, “One man’s trash is another man’s treasure.”
Safeguarding Your Identity…
 Do NOT keep your Social Security card in your wallet
 Use your ATM card wisely
 If a credit or debit card gets lost or stolen report immediately
 Guard your checkbook
 Do NOT provide personal information over the phone
 Do NOT list birth date/social security number on resume
 Check your bills/bank statements when they arrive
 Check your credit reports for free
 Opt out of pre-approved offers
 Select strong passwords
 Secure personal information in your own home
 Always know who and when others have your information
What to do if victimized?
 File a police report
 Notify your banks/credit card issuers
 Notify the three major credit bureaus
 File a complaint with FTC
Questions
Please don’t hesitate to notify your supervisor if you
have any questions or suspect identity theft.
References
 http://www.yourcreditadvisor.com/blog/2006/10/t
he_ultimate_gu.html
 http://www.krollfraudsolutions.com/understanding
-id-theft/
 http://ezinearticles.com/?Identity-Theft--Awareness,-Prevention,-Recovery&id=216936