Presentation on theme: "IDENTITY THEFT What is it? 1. IDENTITY THEFT Happens when someone takes information about you and then uses it to commit fraud. is the crime of setting."— Presentation transcript:
IDENTITY THEFT What is it?
1. IDENTITY THEFT Happens when someone takes information about you and then uses it to commit fraud. is the crime of setting up and using bank accounts and credit facilities fraudulently in another person's name without his or her knowledge.
Deter-Detech-Defend Avoid Theft
2. IDENTITY THEFT Identity fraud affects 10 million people in any given year and costs businesses about $50 billion. Victims of identity theft have spent about $5 billion trying to undo this harm.
3. What info do they want? Full Name Address Date of Birth Social Security Number Passwords Credit Card Numbers
4. How do ID thieves get info Offline Mail Phone Online Phishing scams Pharming Social Networks
5. Ways to D eter ID Theft a. Protect your Social Security number. b. Shred financial documents. c. Never give out private information unless it is for a very good reason.
Private vs Personal 6. Private information is information that helps identify who you are. Private information should be kept PRIVATE. 7. Personal information cannot be used to identify your financial data. It is usually Okay to share personal information.
Private vs Personal Eye Color Social Security Number Phone Number Favorite Band First and Last Name Address Postal Address Mother’s Maiden Name Male or Female
8. Ways to D etect ID Theft a. Check your Credit Report b. Review financial charges c. Look for charges you did not make.
9. Ways to D efend ID Theft a. Place a fraud alert on your credit report. b. Close accounts. c. File a police report. d. Contact the Federal Trade Commission.
The Digest Thirteen things… An Identity Thief Won’t Tell You Watch your back while using credit cards. The red flag tells the mail carrier and me that you have outgoing mail. Check your bank and credit card balances. Credit cards can be duplicated using a $50 machine.
The Digest Thirteen things… An Identity Thief Won’t Tell You If a bill doesn’t show up, question it. Collect garbage. Watch for a skimmer on an ATM. Opt out of receiving pre-approved credit offers.
The Digest Thirteen things… An Identity Thief Won’t Tell You Pose as you, call, and get your personal information. Debit cards give direct access to accounts. Love the new credit card that showed up in your mailbox.
Sources CyberSmart! Student Curriculum. Web. 12 Apr "Deter. Detect. Defend. Avoid ID Theft." Federal Trade Commission. Web. 12 Apr
Sources "13 Things An Identity Thief Won't Tell You | Reader's Digest Version." Health Tips, Food and Recipes, Funny Jokes and Cartoons, and Sweepstakes | Reader’s Digest Version. Web. 12 Apr
1. Ways to Communicate Online Online chatting Photo sharing Webcams Online gaming Social networking sites
2. Positive Aspects Way to keep in contact with friends/family Way to interact with people who share common interests
7. Webcams Stay in touch with family and friends Caution needed especially with strangers Once webcam broadcasts video it can be captured and later viewed, posted, copied, and/or distributed Controlled remotely
10. Stay Safe a. Never give out private information. b. Use impersonal nicknames. c. Think about your online reputation. d. Don’t believe everything you are told. e. Remember if it sounds too good to be true, it probably is.
10. Stay Safe f. Have parental permission before meeting anyone you met online. g. Any photos or videos that you share online can never be taken back. h. Cover up the web cam when you are not using.
10. Stay Safe i. Don’t let anyone convince you to do something you are uncomfortable with. j. Talk to your parents about what you do online. k. If you have concerns about things you see on the Internet, tell an adult.
Internet Safety Video &targetID=9Ya1O4LQot6S_Y_ZhxxTB_ Z_Z8yjgVYHFyTe
Internet Video Watch again! List Private Info List Safety Violations
Amy’s Choice Video Compare and Contrast thhttp://www.nsteens.org/Videos/Amys%20Choicee movies.
11. What info that should NOT be included in your Online Profile Full name Address Phone School Age Sex
Interacting Online 12. Your profile settings should be set to private.
Interacting Online Tip Don’t believe everything you are told online. Stay in control of your reputation. Online choices have offline consequences.
Sexting 13. Sexting is the act of sending sexually explicit materials between devices. 14. Sexting has legal and psychological consequences.
15. Five Things to Think about before pressing SEND a. Don’t assume anything you send or post is going to remain private. b. There is no changing your mind in cyberspace. c. Don’t give in under pressure to do something that makes you uncomfortable. d. Consider the recipient’s reaction. e. Nothing is truly anonymous.
Proper Netiquette 1. Be brief in your and text messages. 2. Use sarcasm sparingly. 3. Never write in ALL caps. 4. If you are sending an attachment, make sure it is compatible to the recipient’s software. 5. Share photos by posting them online rather than attaching them to .
Proper etiquette 6. When typing group , respect others’ privacy by typing the addresses in BCC. 7. Fill in the subject line when sending an If you are forwarding a message, write a brief explanation as to why you are forwarding.
Proper etiquette 9. Don’t tag people in social networking sites if they asked you not to. 10. Don’t discuss anyone’s private business on a wall. 11. Think before you send an IM. It is to be a brief correspondence. 12. Don’t contribute to a news board until you “lurked”.
Proper etiquette 13. Read the FAQ site before asking a question. 14. Refrain from flaming. 15. Don’t be a troll.
Passwords 16. Use at least 8 characters. 17. Use a random mixture of upper and lowercase, numbers, and symbols. 18. Don’t use a word found in a dictionary. 19. Never use the same password twice.
Sources How to Follow Proper Netiquette. Youtube. Howcast, 29 May Web. 18 Oct "Password Guidlelines." The Home Computer Security Centre. Lockdown.co.uk, 10 July Web. 18 Oct
Cyberbullying 1. Involves the use of communication technologies to repeatedly intimidate or harass others. a. social networking sites b. websites c. d. text messaging e. instant messaging
2. Examples of Cyberbullying a. Sending mean or threatening s/text/IMs b. Posting embarrassing photos of someone online c. Creating a website to make fun of others d. Pretending to be someone by using his or her name e. Tricking someone into revealing personal or embarrassing info and/or sending it to others
NS Teens Cyberbullying Terrible Text
3. Cyberbullying vs Bullying? a. No boundaries 24/7 b. Harsher. c. People hide behind technology. d. Is far reaching ( , web, cell phones) e. Can be anonymous
4. React to Cyberbullying a. Do not reply to messages or posts. b. If possible, block the sender. c. Keep a copy of the messages. d. Tell someone about it—trusted adult, parent, etc. e. If threatening, call police
5. Prevent Cyberbullying a. Refuse to pass along cyberbullying messages. b. If you know a cyberbully, tell them to stop. c. Report any cyberbullying to an adult.
6. Remember... a. Never respond to harassing or rude comments. b. Save or print the evidence. c. Talk to your parents or guardian if you are harassed; get help reporting this to your ISP, school, or local law enforcement.
Remember... d. Respect others online. e. Only share your password with your parent or guardian. f. Change your passwords often. g. Password protect your cell phone. h. Use privacy settings to block unwanted messages.
Remember... i. Think before posting or sending photos – they could be used to hurt you. j. Contact the site administrator if someone creates a social networking page in your name