SlideShare a Scribd company logo
1 of 38
In this lesson you will learn: 
What identity theft is 
The different types of identity theft 
The steps to prevent identity theft 
Ways to report it
How would you feel if you knew at this moment, that 
some criminal is using your credit card number and 
plans to charge thousands of dollars worth of 
merchandise on that credit card?
More importantly, how do you know this 
is not happening? Millions of people 
have become victims of identity theft 
and they often find out only after 
thousands of 
dollars have been stolen using their 
names. 
Identity theft is not only related to the 
loss of money, but also additional 
financial costs associated with trying to 
restore their reputation in the 
community and correcting erroneous 
information for which the criminal is 
responsible.
What is Identity Theft? 
Identity Theft is the unauthorized use of your personal identifying information 
by anyone who intends to impersonate you or to conduct any activities in your 
name. 
Online 
Mail 
Telephone 
In person
What personal information is taken? 
full name 
date of birth 
Social Insurance 
Numbers 
full address 
mother's maiden 
name 
username and 
password 
For (online services) 
driver's license 
personal 
identification 
numbers (PIN) 
credit card 
information 
(numbers, 
expiry dates and the 
last three digits 
printed on the 
signature panel) 
bank account 
numbers 
signature 
passport number
What are the ways 
of acquiring 
personal 
information? 
Click over the color boxes 
Dumpster 
Diving 
Skimming 
Phishing 
Changing 
your address 
Stealing
Digging through your trash looking for bills 
and bank statements with your personal 
information on it.
Skimming is stealing credit /debit card numbers with a device 
that reads and decodes the information encoded in the magnetic 
strip on the back of your credit or debit cards.
Blank cards can be bought and using a credit card encoder can put your 
credit card info into the blank card making available for the criminal to 
use it. 
Credit card encoder 
Blank card with 
your credit card info
Phishing: pretending to be financial institutions or companies by sending you 
spam or pop-up messages to get you to reveal your personal information
Online banking phishing scam
Changing your address: diverting your billing statements to another 
location by completing a change of address form 
My home 
My mail
Stealing: wallets, purses and mail including bank and credit card statements
What your information could be used for? 
access your bank 
accounts 
open new bank 
accounts 
transfer bank 
balances 
apply for loans, 
credit cards and 
other goods and 
services 
make purchases 
hide their criminal 
activities 
obtain passports 
or receive 
government 
benefits
Identity Theft Quiz 1 
I write my PIN (Personal Identification Number) on my cards 
when I keep my ATM cards and credit cards in my wallet 
When I go shopping I take with me all the ATM and credit 
cards for personal or business purchases 
When I get my monthly credit-card bills, I never check 
carefully at all the transactions charged to my account 
before I pay the bill 
When I get my monthly bank statements, credit-card bills, 
or other documents with personal financial information on 
them, I just put them into the trash 
Make a selection and count the number of Yes answers 
Yes No 
Ye s 
Yes 
Yes 
No 
No 
No
If you checked 2 or more
How can you find out if your identity was stolen 
monitor your hard copy or on-line financial 
accounts frequently 
check your credit report regularly for any unusual 
activities 
if you receive calls from collection agencies about 
unfamiliar accounts investigate further 
If you applied for credit and were unexpectedly 
turned down investigate further
If you are a victim...
Toll free 
1-800-465-7166 
Toll free 
1-877-525-3823
Be particularly wary of unsolicited e-mails, telephone 
calls or mail attempting to extract personal or financial 
information from you.
Carry only personal identification and credit cards you 
actually need in your purse
Review your monthly accounts, credit card statements 
and utility bills (including cellular telephone bills) for 
unauthorized charges as soon as you receive them
During transactions...
Always...
Be familiar with...
Shred personal and financial documents
Identity Theft Quiz 2.1 
When I get mail saying I have been preapproved for a credit 
card, and do not want to accept or activate that card, I just 
put them in the trash 
I usually do not request a copy of my credit report at 
least once a year 
If the volume of the mail I get at home has dropped off 
substantially, I do not check with my local post office to 
see if anyone has improperly filed a change-of-address 
card in my name 
If I think that I may be a victim of identity theft, I do not 
contact my local police department to have an officer take 
a report because Identity theft is not a serious crime 
Make a selection and count the number of Yes answers 
Yes No 
Ye s 
Yes 
Yes 
No 
No 
No
Identity Theft Quiz 2.2 
I open email from unknown sources and I usually do not use 
virus detention software 
When conducting business online, I do not pay attention 
of the secure browser that encrypts information 
I do not ask about the businesses privacy policies and how 
they will use my information 
I provide my Social Security number to anyone who calls 
me 
Make a selection and count the number of Yes answers 
Yes No 
Ye s 
Yes 
Yes 
No 
No 
No
If you checked one or two Yes 
You now know how to protect your personal information
Identity theft is on the rise, with a growing number of Canadians being 
targeted. According to the Canadian Anti-Fraud Center in April 2014 the total 
number of complaints were 3,712 reports. 
The more we do to protect our personal information the less are the chances 
in becoming a victim. 
Be your own super hero in securing your personal data. Make it a daily habit of 
protecting the information of the most important person.... YOU! 
PD
Source links 
Source Links 
http://www.rcmp-grc.gc.ca/scams-fraudes/victims-guide-victimes-eng.htm 
http://www.justice.gov/criminal/fraud/websites/idtheft.html 
http://pages.ebay.ca/securitycentre/Yourself/idthefttutorial.html 
http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx 
http://www.youtube.com/watch?v=QwKIOK-iS08 
https://www.antifraudcentre-centreantifraude.ca/english/statistics_statistics.html 
Tools Used 
Celia Garcia Font 
Microsoft office images 
PowerPoint 2007 
http://www.youtube.com/watch?v=D9Qx_L1S4Jw 
http://www.youtube.com/watch?v=ApvLgliq_lY 
http://www.youtube.com/watch?v=QKlmCLaMm7s
Design, research and development 
Gabriela Hernandez 
Special thanks to all of those who with their support and guidance made this 
amazing work possible 
Demonstration Showcase

More Related Content

What's hot

Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 
All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in EcommerceMartyn Sukys
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)Louise Hunt
 
Credit card scams
Credit card scamsCredit card scams
Credit card scamsscamtools
 
Fraud in igaming 101
Fraud in igaming 101Fraud in igaming 101
Fraud in igaming 101Martyn Sukys
 
AK FAQ_3DSECURE EN
AK FAQ_3DSECURE ENAK FAQ_3DSECURE EN
AK FAQ_3DSECURE ENTalal Sobh
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyGlass Jacobson
 
7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attackskanika sharma
 

What's hot (20)

Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
ID Theft
ID TheftID Theft
ID Theft
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in Ecommerce
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Credit card scams
Credit card scamsCredit card scams
Credit card scams
 
Fraud in igaming 101
Fraud in igaming 101Fraud in igaming 101
Fraud in igaming 101
 
ID Theft
ID TheftID Theft
ID Theft
 
AK FAQ_3DSECURE EN
AK FAQ_3DSECURE ENAK FAQ_3DSECURE EN
AK FAQ_3DSECURE EN
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Dillard bank on it
Dillard bank on itDillard bank on it
Dillard bank on it
 
Money Management
Money ManagementMoney Management
Money Management
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the Elderly
 
Internet scams
Internet scamsInternet scams
Internet scams
 
7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks
 

Similar to Identity Theft Overview

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation nickski51
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pntjessmc1
 
How to prevent identity fraud
How to prevent identity fraudHow to prevent identity fraud
How to prevent identity fraudscamtools
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 

Similar to Identity Theft Overview (20)

Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Identity theft
Identity theftIdentity theft
Identity theft
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
How to prevent identity fraud
How to prevent identity fraudHow to prevent identity fraud
How to prevent identity fraud
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

Identity Theft Overview

  • 1. In this lesson you will learn: What identity theft is The different types of identity theft The steps to prevent identity theft Ways to report it
  • 2. How would you feel if you knew at this moment, that some criminal is using your credit card number and plans to charge thousands of dollars worth of merchandise on that credit card?
  • 3. More importantly, how do you know this is not happening? Millions of people have become victims of identity theft and they often find out only after thousands of dollars have been stolen using their names. Identity theft is not only related to the loss of money, but also additional financial costs associated with trying to restore their reputation in the community and correcting erroneous information for which the criminal is responsible.
  • 4. What is Identity Theft? Identity Theft is the unauthorized use of your personal identifying information by anyone who intends to impersonate you or to conduct any activities in your name. Online Mail Telephone In person
  • 5. What personal information is taken? full name date of birth Social Insurance Numbers full address mother's maiden name username and password For (online services) driver's license personal identification numbers (PIN) credit card information (numbers, expiry dates and the last three digits printed on the signature panel) bank account numbers signature passport number
  • 6. What are the ways of acquiring personal information? Click over the color boxes Dumpster Diving Skimming Phishing Changing your address Stealing
  • 7. Digging through your trash looking for bills and bank statements with your personal information on it.
  • 8. Skimming is stealing credit /debit card numbers with a device that reads and decodes the information encoded in the magnetic strip on the back of your credit or debit cards.
  • 9. Blank cards can be bought and using a credit card encoder can put your credit card info into the blank card making available for the criminal to use it. Credit card encoder Blank card with your credit card info
  • 10. Phishing: pretending to be financial institutions or companies by sending you spam or pop-up messages to get you to reveal your personal information
  • 12. Changing your address: diverting your billing statements to another location by completing a change of address form My home My mail
  • 13. Stealing: wallets, purses and mail including bank and credit card statements
  • 14. What your information could be used for? access your bank accounts open new bank accounts transfer bank balances apply for loans, credit cards and other goods and services make purchases hide their criminal activities obtain passports or receive government benefits
  • 15. Identity Theft Quiz 1 I write my PIN (Personal Identification Number) on my cards when I keep my ATM cards and credit cards in my wallet When I go shopping I take with me all the ATM and credit cards for personal or business purchases When I get my monthly credit-card bills, I never check carefully at all the transactions charged to my account before I pay the bill When I get my monthly bank statements, credit-card bills, or other documents with personal financial information on them, I just put them into the trash Make a selection and count the number of Yes answers Yes No Ye s Yes Yes No No No
  • 16. If you checked 2 or more
  • 17. How can you find out if your identity was stolen monitor your hard copy or on-line financial accounts frequently check your credit report regularly for any unusual activities if you receive calls from collection agencies about unfamiliar accounts investigate further If you applied for credit and were unexpectedly turned down investigate further
  • 18. If you are a victim...
  • 19.
  • 20.
  • 21. Toll free 1-800-465-7166 Toll free 1-877-525-3823
  • 22.
  • 23.
  • 24. Be particularly wary of unsolicited e-mails, telephone calls or mail attempting to extract personal or financial information from you.
  • 25. Carry only personal identification and credit cards you actually need in your purse
  • 26. Review your monthly accounts, credit card statements and utility bills (including cellular telephone bills) for unauthorized charges as soon as you receive them
  • 29.
  • 31. Shred personal and financial documents
  • 32.
  • 33. Identity Theft Quiz 2.1 When I get mail saying I have been preapproved for a credit card, and do not want to accept or activate that card, I just put them in the trash I usually do not request a copy of my credit report at least once a year If the volume of the mail I get at home has dropped off substantially, I do not check with my local post office to see if anyone has improperly filed a change-of-address card in my name If I think that I may be a victim of identity theft, I do not contact my local police department to have an officer take a report because Identity theft is not a serious crime Make a selection and count the number of Yes answers Yes No Ye s Yes Yes No No No
  • 34. Identity Theft Quiz 2.2 I open email from unknown sources and I usually do not use virus detention software When conducting business online, I do not pay attention of the secure browser that encrypts information I do not ask about the businesses privacy policies and how they will use my information I provide my Social Security number to anyone who calls me Make a selection and count the number of Yes answers Yes No Ye s Yes Yes No No No
  • 35. If you checked one or two Yes You now know how to protect your personal information
  • 36. Identity theft is on the rise, with a growing number of Canadians being targeted. According to the Canadian Anti-Fraud Center in April 2014 the total number of complaints were 3,712 reports. The more we do to protect our personal information the less are the chances in becoming a victim. Be your own super hero in securing your personal data. Make it a daily habit of protecting the information of the most important person.... YOU! PD
  • 37. Source links Source Links http://www.rcmp-grc.gc.ca/scams-fraudes/victims-guide-victimes-eng.htm http://www.justice.gov/criminal/fraud/websites/idtheft.html http://pages.ebay.ca/securitycentre/Yourself/idthefttutorial.html http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx http://www.youtube.com/watch?v=QwKIOK-iS08 https://www.antifraudcentre-centreantifraude.ca/english/statistics_statistics.html Tools Used Celia Garcia Font Microsoft office images PowerPoint 2007 http://www.youtube.com/watch?v=D9Qx_L1S4Jw http://www.youtube.com/watch?v=ApvLgliq_lY http://www.youtube.com/watch?v=QKlmCLaMm7s
  • 38. Design, research and development Gabriela Hernandez Special thanks to all of those who with their support and guidance made this amazing work possible Demonstration Showcase

Editor's Notes

  1. Your information is than downloaded to a computer using the device obtaining your name and expiration date. Also, blank cards can be bought and using a credit card encoder can put your credit card info into the blank card making available for the criminal to use it.