SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
Types of Identity Theft
Pooja Kalra
SRIMCA 2013
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Financial ID Theft
• Financial ID theft include bank fraud ,credit card fraud .
• Financial ID occur when a fraudster makes a use of someone else's
identifying details ,such as name SSN and bank account.
• Fraudster can open a new credit card account in the victim’s name
and card charges up, payment is ignored, leaving the victim with bad
credit history.
• Sometime fraudster completely takeover the victim ‘s identity, which
enables the fraudster to easily open bank accounts, multiple credit
cards,purchase a vehicle ,receive a home loan or even find
employment in victim’s name.
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Criminal ID Theft
• A specific type of ID theft that occurs when a criminal gives another
person’s name or personal identification to a law enforcement.
• Criminal identity theft occurs when someone arrested for a crime uses
another person's name and identifying information, resulting in a criminal
record being created in that person's name.
• When that happens, the victim of criminal identity theft can have
problems with law enforcement or be unable to gain employment. It is a
serious, but rare, problem.
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Identity Cloning
• When a fraudster lives as the victim, getting married, working, paying
taxes and possibly committing crimes.
• Identity cloning is the act of a fraudster living a natural and usual life
similar to a victim’s life, may be at different location.
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Business ID Theft
• When most people think of identity theft, they imagine an individual
victim’s Social Security or credit card number being stolen.
• However, identity theft does not just affect individuals. Business
identity theft occurs when a business’s identity is used to transact
business and establish lines of credit with banks and/or vendors.
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Medical ID Theft
• Medical identity theft happens when someone steals your personal
information and uses it to commit health care fraud. Medical ID thieves may
use your identity to get treatment — even surgery — or to cheat insurers by
making fake claims.
• Repairing damage to your good name and credit record can be difficult
enough, but medical ID theft can have other serious consequences.
• If a scammer gets treatment in your name, that person’s health problems
could become a part of your medical record.
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Synthetic ID Theft
• This is the “latest thing” in the ID theft world.
• The thief will take parts of information from many victims and
combine it.
• The new identity isn’t any specific person, but all the victims can be
affected when it’s used. It will show up in the areas above, so look to
those sections for additional information.
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Child ID Theft
• Child identity theft occurs when a child’s Social Security number is
used by another person for the fraud’s personal gain. The fraud can
be a family member, a friend, or even a stranger who targets
children.
• A child's Social Security number can be used by identity thieves to
apply for government benefits, open bank and credit card accounts,
apply for a loan or utility service, or rent a place to live. Check for a
credit report to see if your child’s information is being misused. Take
immediate action if it is.
Case Studies
Case study 1
CHRIS FROM ARIZONA :•AllClear ID discovered that a 17-year-old girl has over $725,000 in
debt. Chris’s daughter’s Social Security number was linked to eight
different suspects living in border states. The suspects opened 42 open
accounts including auto loans, credit cards, and bills in collections
including medical, credit cards, and utilities.
•STATUS: The case is in progress.
Case study 2
STEPHANIE FROM IDAHO :•AllClear ID discovered that Stephanie, a minor, had a credit file with
unpaid debt. The suspect used Stephanie’s Social Security number to
open two different accounts with mobile phone companies, leaving
over $1,000 in unpaid bills. The unpaid bills had moved into collections
and were reported– establishing a history of bad credit for Stephanie.
•RESOLUTION: AllClear ID worked with Stephanie’s parents to file police
reports and restore her credit file and identity.
Thank You

Más contenido relacionado

Was ist angesagt?

Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 

Was ist angesagt? (20)

Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
IDShield
IDShieldIDShield
IDShield
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
online shopping
online shoppingonline shopping
online shopping
 

Andere mochten auch

Andere mochten auch (6)

Language and identity[1]
Language and identity[1]Language and identity[1]
Language and identity[1]
 
Language and Cultural Identity
Language and Cultural IdentityLanguage and Cultural Identity
Language and Cultural Identity
 
Language, culture, and identity
Language, culture, and identityLanguage, culture, and identity
Language, culture, and identity
 
Culture and Identity
Culture and IdentityCulture and Identity
Culture and Identity
 
Definition and types of research
Definition and types of researchDefinition and types of research
Definition and types of research
 
Types of Research
Types of ResearchTypes of Research
Types of Research
 

Ähnlich wie Identity theft and there types by pooja kalra

Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pntjessmc1
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the DifferencesIdentity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the DifferencesFTx Identity
 
Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftThe Identity Advocate
 

Ähnlich wie Identity theft and there types by pooja kalra (20)

Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the DifferencesIdentity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the Differences
 
Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity Theft
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 

Último

EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsDianaGray10
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxKaustubhBhavsar6
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxSatishbabu Gunukula
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdfThe Good Food Institute
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Alkin Tezuysal
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptxHansamali Gamage
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingFrancesco Corti
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfInfopole1
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveIES VE
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...DianaGray10
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Muhammad Tiham Siddiqui
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIVijayananda Mohire
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applicationsnooralam814309
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024Brian Pichman
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)codyslingerland1
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameKapil Thakar
 

Último (20)

EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projects
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptx
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is going
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdf
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applications
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
SheDev 2024
SheDev 2024SheDev 2024
SheDev 2024
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First Frame
 

Identity theft and there types by pooja kalra

  • 1. Types of Identity Theft Pooja Kalra SRIMCA 2013
  • 2. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 3. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 4. Financial ID Theft • Financial ID theft include bank fraud ,credit card fraud . • Financial ID occur when a fraudster makes a use of someone else's identifying details ,such as name SSN and bank account. • Fraudster can open a new credit card account in the victim’s name and card charges up, payment is ignored, leaving the victim with bad credit history. • Sometime fraudster completely takeover the victim ‘s identity, which enables the fraudster to easily open bank accounts, multiple credit cards,purchase a vehicle ,receive a home loan or even find employment in victim’s name.
  • 5. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 6. Criminal ID Theft • A specific type of ID theft that occurs when a criminal gives another person’s name or personal identification to a law enforcement. • Criminal identity theft occurs when someone arrested for a crime uses another person's name and identifying information, resulting in a criminal record being created in that person's name. • When that happens, the victim of criminal identity theft can have problems with law enforcement or be unable to gain employment. It is a serious, but rare, problem.
  • 7. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 8. Identity Cloning • When a fraudster lives as the victim, getting married, working, paying taxes and possibly committing crimes. • Identity cloning is the act of a fraudster living a natural and usual life similar to a victim’s life, may be at different location.
  • 9. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 10. Business ID Theft • When most people think of identity theft, they imagine an individual victim’s Social Security or credit card number being stolen. • However, identity theft does not just affect individuals. Business identity theft occurs when a business’s identity is used to transact business and establish lines of credit with banks and/or vendors.
  • 11. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 12. Medical ID Theft • Medical identity theft happens when someone steals your personal information and uses it to commit health care fraud. Medical ID thieves may use your identity to get treatment — even surgery — or to cheat insurers by making fake claims. • Repairing damage to your good name and credit record can be difficult enough, but medical ID theft can have other serious consequences. • If a scammer gets treatment in your name, that person’s health problems could become a part of your medical record.
  • 13. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 14. Synthetic ID Theft • This is the “latest thing” in the ID theft world. • The thief will take parts of information from many victims and combine it. • The new identity isn’t any specific person, but all the victims can be affected when it’s used. It will show up in the areas above, so look to those sections for additional information.
  • 15. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 16. Child ID Theft • Child identity theft occurs when a child’s Social Security number is used by another person for the fraud’s personal gain. The fraud can be a family member, a friend, or even a stranger who targets children. • A child's Social Security number can be used by identity thieves to apply for government benefits, open bank and credit card accounts, apply for a loan or utility service, or rent a place to live. Check for a credit report to see if your child’s information is being misused. Take immediate action if it is.
  • 18. Case study 1 CHRIS FROM ARIZONA :•AllClear ID discovered that a 17-year-old girl has over $725,000 in debt. Chris’s daughter’s Social Security number was linked to eight different suspects living in border states. The suspects opened 42 open accounts including auto loans, credit cards, and bills in collections including medical, credit cards, and utilities. •STATUS: The case is in progress.
  • 19. Case study 2 STEPHANIE FROM IDAHO :•AllClear ID discovered that Stephanie, a minor, had a credit file with unpaid debt. The suspect used Stephanie’s Social Security number to open two different accounts with mobile phone companies, leaving over $1,000 in unpaid bills. The unpaid bills had moved into collections and were reported– establishing a history of bad credit for Stephanie. •RESOLUTION: AllClear ID worked with Stephanie’s parents to file police reports and restore her credit file and identity.

Hinweis der Redaktion

  1. An identity cloning will be obtain as much information about the victim as possible they will look to find out what city and state the victim was born in,where attending school and what relationship he/she may have been involved in.