SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Identity Theft
Awareness
Workshop
By Deb Vosejpka
Lesson 1:
Identity Theft Basics
What is Identity Theft?
Identity theft is a form of stealing someone's identity in
which someone pretends to be someone else by assuming
that person's identity, usually as a method to gain access to
resources or obtain credit and other benefits in that
person's name. The victim of identity theft (here meaning
the person whose identity has been assumed by the
identity thief) can suffer adverse consequences if they are
held responsible for the perpetrator's actions. Identity theft
occurs when someone uses another's personally identifying
information, like their name, identifying number, or credit
card number, without their permission, to commit fraud or
other crimes.
http://en.wikipedia.org/wiki/Identity_theft
Is Identity Theft Preventable?
Not entirely. There are some precautions we
can take to help minimize the risk (which we’ll
discuss in other presentations), but there are
many circumstances that are not within our
control.
Identity theft can be a result of a random act or
targeted event.
How thieves get your information
Thieves strive to get your information through personal,
commercial, and government means. Let’s start with
commercial and government. To get a better sense of
how thieves acquire your information via data breaches,
visit www.privacyrights.org . Download the
pdf or spreadsheet to view the data breaches
since 2005.
There you’ll find specific events for each data
breach. Your exposed information can be the
result of a hacker, unintended disclosure,
insider theft, stolen equipment , improper
disposal of documents and a plethora of
other electronic methods.
How your data is stolen through
personal means
The top 10 scams over the past decade:
Phishing
Pretexting
Fake Job Offers
Skimming
Dumpster Diving
Pickpocketing
Purse Snatching
Malware and Spyware
Fake Tax Filing
Change of Address
How your personal information is
being used
• Commit crimes in your name
• Acquire medical care
• File tax refunds
• Apply for social security benefits
• Open bank and credit card accounts
• Secure mortgage or car loans
• Start businesses or professional contracts
• Obtain employment
What you may expect when you become a
victim of identity theft!
• Denied employment
• Denied security clearance
• Denied loans or bank accounts
• Denied health care, medicines
• Denied professional licenses or
small business opportunities
• Increased insurance costs
• Increased risk for:
-Harassment from debt collectors
-Arrest for crimes
-Negative credit reporting
• Loss of wages for time off work:
- Contact Collection Agencies
- Contact Employers
- Contact Credit Bureaus/Creditors
- Contact Attorneys
- Contact Investigators
- Contact Government Agencies
- Contact Local Law Enforcement
- Contact Banking Institutions
- Contact Retailers and Businesses
- Contact Post Office
- Contact Education Institutions
…each and every time a theft occurs
Prevention Tips
• Use strong passwords like iGfcin2009! (I graduated from college in 2009!)
and PINS.
• Open and respond to notifications of data breaches from banks, vendors,
retailers etc.
• Safeguard important documents like: social security card, passport,
medical card, gun permit, birth certificate, drivers license, student id.
• Watch for hidden cameras in brochure holders at ATM’s and skimmers at
gas pumps and bank kiosks.
• Watch for URL in websites. All legitimate sites have http(s):// (s = secure).
• Shred or burn documents before discarding them.
• Pick up mail daily. Don’t make it easy for thieves to apply for credit.
• Invest in anti-virus software. Be suspicious of malware and phishing.
• Be alert. Absence of mail, credit denial, charges on statements.
• Don’t do any financial transactions on an open WI-Fi network.
• Frequently monitor bank , credit card and investment accounts.
You could be at great risk if…
• Suddenly you stop receiving mail.
• You get phone calls from collectors regarding debts
that are not yours.
• Your bank accounts have been compromised.
• You’ve been locked out of your online accounts or
emails.
• Your automatic deposits are missing.
• You receive mail for matters not initiated by you.
• You are arrested for criminal acts you did not
commit.
How to protect yourself and help others!
• Stay alert!
• Stay informed, write to receive helpful tips,
resources, and solutions.
• Become an advocate and share your knowledge.
• Get protection.
Deb Vosejpka
www.marketcommunicationsofmn.com

Weitere ähnliche Inhalte

Was ist angesagt?

Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Data theft
Data theftData theft
Data theftLaura
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theftnewsusa01
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada- Mark - Fullbright
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 

Was ist angesagt? (20)

Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Data theft
Data theftData theft
Data theft
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 

Andere mochten auch

Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation nickski51
 
Birth & death registration - west bengal
Birth & death registration  - west bengalBirth & death registration  - west bengal
Birth & death registration - west bengalMINTU DEBNATH
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationMonikaPenkova
 
Registration of births & deaths act ppt
Registration of births & deaths act pptRegistration of births & deaths act ppt
Registration of births & deaths act ppt Dr.Priyanka Phonde
 

Andere mochten auch (6)

Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
Birth & death registration - west bengal
Birth & death registration  - west bengalBirth & death registration  - west bengal
Birth & death registration - west bengal
 
Death and birth certificate
Death and birth certificateDeath and birth certificate
Death and birth certificate
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Registration of births & deaths act ppt
Registration of births & deaths act pptRegistration of births & deaths act ppt
Registration of births & deaths act ppt
 
Identity theft
Identity theftIdentity theft
Identity theft
 

Ă„hnlich wie Identity Theft Awareness 101 - Basics

Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftCost U Less Direct
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft pptAngela Lawson
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptxraminder12_kaur
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftNorfolk Naval Shipyard
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft- Mark - Fullbright
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 

Ă„hnlich wie Identity Theft Awareness 101 - Basics (18)

Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity Theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 

KĂĽrzlich hochgeladen

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 

KĂĽrzlich hochgeladen (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 

Identity Theft Awareness 101 - Basics

  • 1. Identity Theft Awareness Workshop By Deb Vosejpka Lesson 1: Identity Theft Basics
  • 2. What is Identity Theft? Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held responsible for the perpetrator's actions. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. http://en.wikipedia.org/wiki/Identity_theft
  • 3. Is Identity Theft Preventable? Not entirely. There are some precautions we can take to help minimize the risk (which we’ll discuss in other presentations), but there are many circumstances that are not within our control. Identity theft can be a result of a random act or targeted event.
  • 4. How thieves get your information Thieves strive to get your information through personal, commercial, and government means. Let’s start with commercial and government. To get a better sense of how thieves acquire your information via data breaches, visit www.privacyrights.org . Download the pdf or spreadsheet to view the data breaches since 2005. There you’ll find specific events for each data breach. Your exposed information can be the result of a hacker, unintended disclosure, insider theft, stolen equipment , improper disposal of documents and a plethora of other electronic methods.
  • 5. How your data is stolen through personal means The top 10 scams over the past decade: Phishing Pretexting Fake Job Offers Skimming Dumpster Diving Pickpocketing Purse Snatching Malware and Spyware Fake Tax Filing Change of Address
  • 6. How your personal information is being used • Commit crimes in your name • Acquire medical care • File tax refunds • Apply for social security benefits • Open bank and credit card accounts • Secure mortgage or car loans • Start businesses or professional contracts • Obtain employment
  • 7. What you may expect when you become a victim of identity theft! • Denied employment • Denied security clearance • Denied loans or bank accounts • Denied health care, medicines • Denied professional licenses or small business opportunities • Increased insurance costs • Increased risk for: -Harassment from debt collectors -Arrest for crimes -Negative credit reporting • Loss of wages for time off work: - Contact Collection Agencies - Contact Employers - Contact Credit Bureaus/Creditors - Contact Attorneys - Contact Investigators - Contact Government Agencies - Contact Local Law Enforcement - Contact Banking Institutions - Contact Retailers and Businesses - Contact Post Office - Contact Education Institutions …each and every time a theft occurs
  • 8. Prevention Tips • Use strong passwords like iGfcin2009! (I graduated from college in 2009!) and PINS. • Open and respond to notifications of data breaches from banks, vendors, retailers etc. • Safeguard important documents like: social security card, passport, medical card, gun permit, birth certificate, drivers license, student id. • Watch for hidden cameras in brochure holders at ATM’s and skimmers at gas pumps and bank kiosks. • Watch for URL in websites. All legitimate sites have http(s):// (s = secure). • Shred or burn documents before discarding them. • Pick up mail daily. Don’t make it easy for thieves to apply for credit. • Invest in anti-virus software. Be suspicious of malware and phishing. • Be alert. Absence of mail, credit denial, charges on statements. • Don’t do any financial transactions on an open WI-Fi network. • Frequently monitor bank , credit card and investment accounts.
  • 9. You could be at great risk if… • Suddenly you stop receiving mail. • You get phone calls from collectors regarding debts that are not yours. • Your bank accounts have been compromised. • You’ve been locked out of your online accounts or emails. • Your automatic deposits are missing. • You receive mail for matters not initiated by you. • You are arrested for criminal acts you did not commit.
  • 10. How to protect yourself and help others! • Stay alert! • Stay informed, write to receive helpful tips, resources, and solutions. • Become an advocate and share your knowledge. • Get protection. Deb Vosejpka www.marketcommunicationsofmn.com