SlideShare ist ein Scribd-Unternehmen logo
1 von 16
GROUP MEMBERS


TASHA ROWENA VAZ
        LALIT GUHA
               RAM
      SUGENTHIREN
A   form of stealing someone's identity .

 Someone    pretends to be someone else.

    In order to access resources or obtain credit
    and other benefits in that person's name.

 When    someone uses your personal identifying
    information.
   Your name

   Social Security number

    credit card number, without your
    permission, to commit fraud or other crimes.
 Dumpster   Diving. They rummage through
  trash looking for bills or other paper with
  your personal information on it.
 Skimming. They steal credit/debit card
  numbers by using a special storage device
  when processing your card.
 Phishing. They pretend to be financial
  institutions or companies and send spam or
  pop-up messages to get you to reveal your
  personal information.
 Changing   Your Address. They divert your
  billing statements to another location by
  completing a change of address form.
 Old-Fashioned Stealing. They steal wallets
  and purses; mail, including bank and credit
  card statements; pre-approved credit offers;
  and new checks or tax information. They
  steal personnel records, or bribe employees
  who have access.
 Pretexting. They use false pretenses to
  obtain your personal information from
  financial institutions, telephone
  companies, and other sources
   Credit card fraud:
   They may open new credit card accounts in your
    name. When they use the cards and don't pay the
    bills, the delinquent accounts appear on your credit
    report.
   They may change the billing address on your credit
    card so that you no longer receive bills, and then run
    up charges on your account. Because your bills are
    now sent to a different address, it may be some time
    before you realize there's a problem.
   Phone or utilities fraud:
   They may open a new phone or wireless account in
    your name, or run up charges on your existing
    account.
   They may use your name to get utility services like
    electricity, heating, or cable TV.
   Bank/finance fraud:

 They  may create counterfeit checks using your
  name or account number.
 They may open a bank account in your name
  and write bad checks.
 They may clone your ATM or debit card and
  make electronic withdrawals your name,
  draining your accounts.
 They may take out a loan in your name.
 Government documents fraud:
 They may get a driver's license or official ID
  card issued in your name but with their
  picture.
 They may use your name and Social Security
  number to get government benefits.
 They may file a fraudulent tax return using
  your information.
 Other  fraud:
 They may get a job using your Social
  Security number.
 They may rent a house or get medical
  services using your name.
 They may give your personal information
  to police during an arrest. If they don't
  show up for their court date, a warrant
  for arrest is issued in your name.

    Victims must also deal with abusive collection
    agencies. They are threatened with law
    suits, garnished wages, and having their homes taken
    away from them.
   Another common experience of victims is that they
    must spend a great deal of time cleaning up the
    mess. I've talked to many who are taking the day or
    the week off work so they can make the necessary
    phone calls, write the letters, and get affidavits
    notarized. This costs them money as well. Many
    victims are saddled with this situation for years.
 There was an Hispanic man, a U.S.
 citizen, who was visiting relatives in
 Tijuana, Mexico, across the border from San
 Diego. He was taken into secondary
 inspection by U.S. Customs on his return trip
 to San Diego. A search of his SSN showed he
 was wanted for a crime in the Bay Area. He
 was transported from San Diego to San
 Francisco and put in jail. It took him 10 days
 before one of the officers believed him, took
 his fingerprints as he had requested all
 along, and realized they had the wrong
 person
The best way to find out is to monitor your
  accounts and bank statements each
  month, and check your credit report on a
  regular basis. If you check your credit report
  regularly, you may be able to limit the
  damage caused by identity theft.
 Unfortunately, many consumers learn that
  their identity has been stolen after some
  damage has been done.
 You may find out when bill collection
  agencies contact you for overdue debts you
  never incurred.
 You may find out when you apply for a
  mortgage or car loan and learn that problems
  with your credit history are holding up the
  loan.
 You may find out when you get something in
  the mail about an apartment you never
  rented, a house you never bought, or a job
  you never held.
 Personal identity thieves are very
  opportunistic. Think babysitters snooping
  through a desk drawer, or a maid rummaging
  in the basement. Beauticians, waiters and
  waitresses, your local gas station clerk, or
  anyone else you hand your credit card to are
  key people to watch as well.
 Hide important documents, keep them in a
  personal safe, or better yet in a safe deposit
  box at the bank.
 Protect social security numbers, even from
 family. Schools often ask for a child’s social
 security number, but they don’t need it. Your
 insurance company will probably need it, and
 the government will want it. Although
 neither of these institutions has a good
 reputation for protecting your
 information, there are usually laws involved
 that require you give this information away.
Be paranoid, the least a little. While dad is taking the
  babysitter home, mom might check to see if the desk
  has been rummaged after she looks in on the kids.

   Check your own information if a friend tells you
    they were a victim of identity theft recently. (It gives
    you a good excuse, and you know you need to look
    anyway.)

   Shred your personal information. Look for it on
    bills, bank statements, anything more than your
    name and address can be used by an identity thief.

   Shredding this information before you throw it to the
    curb for the trash man may be the most important
    thing you can do to
Identity theft

Weitere ähnliche Inhalte

Was ist angesagt?

What Is Financial Exploitation
What Is Financial ExploitationWhat Is Financial Exploitation
What Is Financial ExploitationLisa Sosebee
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity TheftJlove Minguez
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name- Mark - Fullbright
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NCEmilyMoar
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SINEmilyMoar
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameSpringboard
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation nickski51
 

Was ist angesagt? (20)

Sample Slides
Sample SlidesSample Slides
Sample Slides
 
What Is Financial Exploitation
What Is Financial ExploitationWhat Is Financial Exploitation
What Is Financial Exploitation
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity Theft
 
ID Theft
ID TheftID Theft
ID Theft
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Monitor Your Credit Report
Monitor Your Credit  ReportMonitor Your Credit  Report
Monitor Your Credit Report
 
IDShield
IDShieldIDShield
IDShield
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NC
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SIN
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 

Andere mochten auch (7)

System Unit
System UnitSystem Unit
System Unit
 
Wew360 power point founder -10-20-2011
Wew360 power point founder -10-20-2011Wew360 power point founder -10-20-2011
Wew360 power point founder -10-20-2011
 
It presentation
It presentationIt presentation
It presentation
 
Wew black flyer 03-02-2012 update!
Wew black flyer 03-02-2012 update!Wew black flyer 03-02-2012 update!
Wew black flyer 03-02-2012 update!
 
Dhacaini
DhacainiDhacaini
Dhacaini
 
桃太郎
桃太郎桃太郎
桃太郎
 
Chong ren jye
Chong ren jyeChong ren jye
Chong ren jye
 

Ähnlich wie Identity theft

RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pntjessmc1
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overviewgaby350
 
cian A lottery scam
cian A lottery scamcian A lottery scam
cian A lottery scampussyclaat
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 

Ähnlich wie Identity theft (18)

DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
 
cian A lottery scam
cian A lottery scamcian A lottery scam
cian A lottery scam
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Consumer fraud - Just Say No!
Consumer fraud - Just Say No!Consumer fraud - Just Say No!
Consumer fraud - Just Say No!
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 

Mehr von chrispaul8676

Mehr von chrispaul8676 (11)

Buses in a computer
Buses in a computerBuses in a computer
Buses in a computer
 
Expansion Slot
Expansion SlotExpansion Slot
Expansion Slot
 
Power Supply
Power SupplyPower Supply
Power Supply
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
data representation
data representationdata representation
data representation
 
It ppt new
It ppt newIt ppt new
It ppt new
 
System failure
System  failureSystem  failure
System failure
 
Hackers
HackersHackers
Hackers
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Software theft
Software theftSoftware theft
Software theft
 
Hardware theft
Hardware theftHardware theft
Hardware theft
 

Kürzlich hochgeladen

SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 
Current Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptxCurrent Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptxuzma244191
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...Amil baba
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasCherylouCamus
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...amilabibi1
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Sonam Pathan
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfHenry Tapper
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)ECTIJ
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economiccinemoviesu
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfMichael Silva
 

Kürzlich hochgeladen (20)

SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 
Current Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptxCurrent Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptx
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng Pilipinas
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economic
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth AdvisorsQ1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdf
 

Identity theft

  • 1. GROUP MEMBERS TASHA ROWENA VAZ LALIT GUHA RAM SUGENTHIREN
  • 2. A form of stealing someone's identity .  Someone pretends to be someone else.  In order to access resources or obtain credit and other benefits in that person's name.  When someone uses your personal identifying information.
  • 3. Your name  Social Security number  credit card number, without your permission, to commit fraud or other crimes.
  • 4.  Dumpster Diving. They rummage through trash looking for bills or other paper with your personal information on it.  Skimming. They steal credit/debit card numbers by using a special storage device when processing your card.  Phishing. They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information.
  • 5.  Changing Your Address. They divert your billing statements to another location by completing a change of address form.  Old-Fashioned Stealing. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access.  Pretexting. They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources
  • 6. Credit card fraud:  They may open new credit card accounts in your name. When they use the cards and don't pay the bills, the delinquent accounts appear on your credit report.  They may change the billing address on your credit card so that you no longer receive bills, and then run up charges on your account. Because your bills are now sent to a different address, it may be some time before you realize there's a problem.  Phone or utilities fraud:  They may open a new phone or wireless account in your name, or run up charges on your existing account.  They may use your name to get utility services like electricity, heating, or cable TV.
  • 7. Bank/finance fraud:  They may create counterfeit checks using your name or account number.  They may open a bank account in your name and write bad checks.  They may clone your ATM or debit card and make electronic withdrawals your name, draining your accounts.  They may take out a loan in your name.  Government documents fraud:  They may get a driver's license or official ID card issued in your name but with their picture.  They may use your name and Social Security number to get government benefits.  They may file a fraudulent tax return using your information.
  • 8.  Other fraud:  They may get a job using your Social Security number.  They may rent a house or get medical services using your name.  They may give your personal information to police during an arrest. If they don't show up for their court date, a warrant for arrest is issued in your name.
  • 9. Victims must also deal with abusive collection agencies. They are threatened with law suits, garnished wages, and having their homes taken away from them.  Another common experience of victims is that they must spend a great deal of time cleaning up the mess. I've talked to many who are taking the day or the week off work so they can make the necessary phone calls, write the letters, and get affidavits notarized. This costs them money as well. Many victims are saddled with this situation for years.
  • 10.  There was an Hispanic man, a U.S. citizen, who was visiting relatives in Tijuana, Mexico, across the border from San Diego. He was taken into secondary inspection by U.S. Customs on his return trip to San Diego. A search of his SSN showed he was wanted for a crime in the Bay Area. He was transported from San Diego to San Francisco and put in jail. It took him 10 days before one of the officers believed him, took his fingerprints as he had requested all along, and realized they had the wrong person
  • 11. The best way to find out is to monitor your accounts and bank statements each month, and check your credit report on a regular basis. If you check your credit report regularly, you may be able to limit the damage caused by identity theft.  Unfortunately, many consumers learn that their identity has been stolen after some damage has been done.  You may find out when bill collection agencies contact you for overdue debts you never incurred.
  • 12.  You may find out when you apply for a mortgage or car loan and learn that problems with your credit history are holding up the loan.  You may find out when you get something in the mail about an apartment you never rented, a house you never bought, or a job you never held.
  • 13.  Personal identity thieves are very opportunistic. Think babysitters snooping through a desk drawer, or a maid rummaging in the basement. Beauticians, waiters and waitresses, your local gas station clerk, or anyone else you hand your credit card to are key people to watch as well.  Hide important documents, keep them in a personal safe, or better yet in a safe deposit box at the bank.
  • 14.  Protect social security numbers, even from family. Schools often ask for a child’s social security number, but they don’t need it. Your insurance company will probably need it, and the government will want it. Although neither of these institutions has a good reputation for protecting your information, there are usually laws involved that require you give this information away.
  • 15. Be paranoid, the least a little. While dad is taking the babysitter home, mom might check to see if the desk has been rummaged after she looks in on the kids.  Check your own information if a friend tells you they were a victim of identity theft recently. (It gives you a good excuse, and you know you need to look anyway.)  Shred your personal information. Look for it on bills, bank statements, anything more than your name and address can be used by an identity thief.  Shredding this information before you throw it to the curb for the trash man may be the most important thing you can do to