SlideShare a Scribd company logo
1 of 10
Identity Theft: Form of stealing an
individuals identity in which someone
pretends to be someone else by assuming
that person’s identity. (Wikipedia)
TYPES OF IDENTITY THEFT
Identity Cloning and Concealment: When and identity
thief impersonates someone else in order to conceal
their own true identity.
Examples are illegal immigrants, people hiding from
creditors, or individuals wanting to become
anonymous for personal reasons.
Criminal Identity Theft: when a criminal fraudulently
identifies himself to police as another individual.
These individuals have either stolen state-issued identity
documents or have presented a fake id.
Synthetic Identity Theft: variation of identity theft in which
identities are completely or partially fabricated.
The most common technique involves combining a real social
security number and a name and birthdate other than the
ones associated with the number.
This new form of identity theft is very difficult to track
because it does not show on a persons credit report
directly, it actually may appear as an entire new file in the
credit bureau’s file system.
Medical Identity Theft: When someone seeks medical
care under the identity of another person. In addition
to financial harm the thief's medical history may be
added to the victims medical records.
Financial Identity Theft: when an individual wrongfully
obtains and uses another person’s personal data in
some way that involves fraud for economic gain.
Each year approximately 15 million Americans are
identity theft victims with financial losses averaging
3,500.
Identity theft can happen from third parties, an
example is when a data breach has occurred and the
perpetrators obtain vital information for financial
gain. (read more in this Forbes article)
HOW TO PROTECT YOURSELF
Immediate Steps:
1) Place an initial fraud alert
2) Order your credit reports
3) Create an identity theft report
1) Federal Trade Commission shows you how
CREDIT BUREAU
The three major credit bureaus are:
1) Equifax
2) Experian
3) TransUnion
Learn more at USA.gov
SOURCES
Department of Justice

More Related Content

Similar to Identity theft

Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
jwnollet
 
Creating a New Identity (How Far Can You Go)Creating a ne.docx
Creating a New Identity (How Far Can You Go)Creating a ne.docxCreating a New Identity (How Far Can You Go)Creating a ne.docx
Creating a New Identity (How Far Can You Go)Creating a ne.docx
willcoxjanay
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
danc752
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Randall Chesnutt
 

Similar to Identity theft (17)

Identity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the DifferencesIdentity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the Differences
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Creating a New Identity (How Far Can You Go)Creating a ne.docx
Creating a New Identity (How Far Can You Go)Creating a ne.docxCreating a New Identity (How Far Can You Go)Creating a ne.docx
Creating a New Identity (How Far Can You Go)Creating a ne.docx
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Theft - If you are me, then who am I
Identity Theft - If you are me, then who am IIdentity Theft - If you are me, then who am I
Identity Theft - If you are me, then who am I
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 

Identity theft

  • 1.
  • 2. Identity Theft: Form of stealing an individuals identity in which someone pretends to be someone else by assuming that person’s identity. (Wikipedia)
  • 3. TYPES OF IDENTITY THEFT Identity Cloning and Concealment: When and identity thief impersonates someone else in order to conceal their own true identity. Examples are illegal immigrants, people hiding from creditors, or individuals wanting to become anonymous for personal reasons.
  • 4. Criminal Identity Theft: when a criminal fraudulently identifies himself to police as another individual. These individuals have either stolen state-issued identity documents or have presented a fake id.
  • 5. Synthetic Identity Theft: variation of identity theft in which identities are completely or partially fabricated. The most common technique involves combining a real social security number and a name and birthdate other than the ones associated with the number. This new form of identity theft is very difficult to track because it does not show on a persons credit report directly, it actually may appear as an entire new file in the credit bureau’s file system.
  • 6. Medical Identity Theft: When someone seeks medical care under the identity of another person. In addition to financial harm the thief's medical history may be added to the victims medical records.
  • 7. Financial Identity Theft: when an individual wrongfully obtains and uses another person’s personal data in some way that involves fraud for economic gain. Each year approximately 15 million Americans are identity theft victims with financial losses averaging 3,500. Identity theft can happen from third parties, an example is when a data breach has occurred and the perpetrators obtain vital information for financial gain. (read more in this Forbes article)
  • 8. HOW TO PROTECT YOURSELF Immediate Steps: 1) Place an initial fraud alert 2) Order your credit reports 3) Create an identity theft report 1) Federal Trade Commission shows you how
  • 9. CREDIT BUREAU The three major credit bureaus are: 1) Equifax 2) Experian 3) TransUnion Learn more at USA.gov