Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.

Similar presentations


Presentation on theme: "Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused."— Presentation transcript:

1 Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity theft or misuse of their personal information. Gr. 5 Financial Literacy

2 What information can be gained by analyzing the cartoons? (LAFS.5.RI.3.7) Image Source: https://www.cartoonstock.com/cartoonview.asp?catref=llan361 Grade 5 Financial Literacy SS.8.FL.6.7

3 Essential Questions How can we protect ourselves from the dangers of identity theft and cyber crimes? Grade 5 Financial Literacy SS.8.FL.6.7 Image Source: http://enhancedidentitytheftprotection.org/wp- content/uploads/2013/01/enhanced-identity-theft-protection.jpghttp://enhancedidentitytheftprotection.org/wp- content/uploads/2013/01/enhanced-identity-theft-protection.jpg

4 What is identity theft? If you recall Disney’s movie “The Parent Trap” identical twins traded identities in order to be able to get to live with their other parent and ultimately reunite their divorced parents. Unlike this movie, identity theft happens without your consent usually to commit crimes. Identity theft is defined as the fraudulent acquisition and use of a person's private identifying information, usually for financial gain. History of Identity Theft Grade 5 Financial Literacy SS.8.FL.6.7 Identity theft has existed throughout history but the most notorious types of identity theft have taken the form of “fake IDs” for underage drinking, going on a shopping spree using someone else’s credit card number, and assuming someone else's name and social security number for illegal immigration purposes.

5 Technology has changed the face of identity theft. Since the introduction of the internet in the early 90’s, criminals have adapted more sophisticated ways of acquiring your confidential information to commit cyber crimes. Cyber Crimes Grade 5 Financial Literacy SS.8.FL.6.7 Without leaving the comforts of their homes, cyber criminals have found innovative ways on preying on unassuming individuals. Here are a list of today’s most common cyber crimes. Have you experienced any of these in the past? Computer Viruses Phishing Websites Spam/Spyware Social Media Bullying Catfish Scams Unauthorized use of someone else’s social media profile

6 Can you name the cyber crime being described? Computer Viruses Grade 5 Financial Literacy SS.8.FL.6.7 Phishing Websites Spyware/Malware Online Bullying Catfish Scams Hacking Social Media Profiles A computer program or file that corrupts the operating system and destroys data. Fake websites that masquerade themselves as trustworthy websites in order to acquire your sensitive information for malicious reasons. Unsolicited junk email that clogs up your email inbox. A type of malicious software aimed at getting access to your computer and its sensitive files. When a person assumes a persona (or many) in order to trick another person into believing that they're really that person online. Using technology to harass, threaten, or send inapprorpriate messages, texts, and/or pictures. Spam Someone gains access to your social media profile for malicious reasons

7 Case of the Stolen Laptop Click on the link below to watch a three minute video which explains the dangers of identity theft and outlines measures that can be taken to minimize the risks associated with identity theft. Grade 5 Financial Literacy SS.8.FL.6.7 Click to watch a brief video introducing identity theft: https://www.consumer.ftc.gov/sites/default/files/games/off-site/youarehere/site.html#/mall-security-scene https://www.consumer.ftc.gov/sites/default/files/games/off-site/youarehere/site.html#/mall-security-scene

8 Ways to Protect Your Identity Online Grade 5 Financial Literacy SS.8.FL.6.7 Safety First Always get your parents permission to surf the internet, be wary of the trustworthiness of the websites you visit. “Hi there, I’d really like to meet you. Where do you live?” Never share your personal information online without your parents consent. Don’t recogize the person sending the message, don’t open any attachments. If you encounter any suspicious emails or texts, do not open them, they could be malware and viruses. You’ve just won a free IPhone! Don’t believe everything you read online. If its too good to be true, it is likely scam. Keep your personal information private! Don’t forget to logoff the computer as well as online sites you access on public computers. Password Protect your mobile devices! Keep your passwords private. This protects your personal information and files from cyber criminals.

9 Recovering Cyber Crimes and Identity Theft It can be difficult for the victim of a criminal identity theft to clear their record. Credit Card Fraud If your card is stolen/lost, or you suspect unauthorized transactions when reviewing your monthly statement, one simple phone call to your credit card company will lock the account from further charges. You will be sent a new card with a different account number. Identity Theft Did someone use your social security number to access your credit for a big purchase. Check your credit report frequently and immediately report any accounts you did not open. Yes, people have gotten away with purchasing homes and cars using other people’s credit. Be Careful where you Shop Online Are you sure you can trust the website where you are entering your credit card information. A simple Google search will help you identity suspicious merchants and phishing sites. If you are doubtful, always call your bank and inform them of the suspicious transaction. Grade 5 Financial Literacy SS.8.FL.6.7

10 Identity Theft Activity Handout Grade 5 Financial Literacy SS.8.FL.6.7

11 What information can be gained by analyzing the cartoons? (LAFS.5.RI.3.7) Image Source: https://www.cartoonstock.com/cartoonview.asp?catref=llan361 Grade 5 Financial Literacy SS.8.FL.6.7

12 Sources & Supplemental Resources Lesson Content Adapted from Identity Theft Article http://idtheft.about.com/od/identitytheft101/a/A-Brief-History-Of-Identity-Theft.htm Article: Identity Theft Evolving with Technology https://www.sjpd.org/BFO/Community/Crimeprev/crimeprevention%20forms/Identit ytheft.pdf https://www.sjpd.org/BFO/Community/Crimeprev/crimeprevention%20forms/Identit ytheft.pdf Supplemental content that accompanies video from slide 7 https://www.consumer.ftc.gov/sites/default/files/games/off- site/youarehere/site.html#/mall-security-scene Supplemental content that accompanies video from slide 7 https://www.consumer.ftc.gov/sites/default/files/games/off- site/youarehere/pages/pdf/FTC-Privicy-IdTheft-Identify-Yourself.pdf Grade 5 Financial Literacy SS.8.FL.3.7


Download ppt "Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused."

Similar presentations


Ads by Google