Class Discussion. Suppose your parents told you that they were going to give you an allowance and open a bank account for you. And, if you managed your.

Slides:



Advertisements
Similar presentations
Manage Your Finances Your First Year The Dos and Donts 1)DONT pay your bills late. When you dont pay bills on time, your credit score takes a negative.
Advertisements

Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
1 If You Are Me, Then Who Am I? Beating Identity Theft Office of the California Attorney General.
OVER VIEW OF BANKING FRAUDS
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Identity Theft By: Caroline Branton, Laura Hunter, Sinead McFarlane.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 13-1 Today’s Topics n Consumer Fraud.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Data Protection Act. Lesson Objectives To understand the data protection act.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Protecting Your Identity While Attending College.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
How can you protect yourself from online identity theft?
Step by Step Process. Before you begin your paper you have to make sure you have a safe accessible place to save your paper. Set up your account:
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Digital Citizen Project Katie Goodall Educational Technology 505.
Students in our 5 th grade classrooms are going to receive their own iPad to use during the school day. This allows for even more opportunities for creativity,
Identity Fraud By: Owen DeBalko. Explanation Identity fraud means the fraudulent use of an individual's identifying information to commit crimes, unlawfully.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
By: Taylor Budwash.. o Identity Theft is the unorganized gain and use of a true person’s identity and personal information for unlawful purpose.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
WHO’s IN YOUR “WALLET” WHO’s IN YOUR “WALLET” YOU BETER “RECOGNIZE” YOU BETER “RECOGNIZE” STEPPING $2o0 $300 $400 $500 $400 $300 $200 $500 $400 $300.
Passwords and more How to cope with computer passwords and avoid identity theft You can download this from Mark Cross.
By: Asfa Khan and Huda Mukhtar
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Identity Theft How it happens and how to avoid it.
You. are at risk for the fastest growing crimes crime.
Activity 3 Identifying the Risks. Questions What do you do online? What sort of sites do you visit? Have you ever had a bad experience online?
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Narkeya White. WHAT IS IDENTITY THEFT? Occurs when a person gathers personal information to assume the identity of another person for illicit reasons.
True False.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Lutheran Church of Our Saviour
When you get caught for Identity Theft
Scams, Identity Theft, and Viruses Kelly & Caitlin
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Cybersecurity and Personal Finance
Bell Ringer: Copy and answer on page 20 of your notebook.
Protecting Your Credit Identity
“Credit score vocabulary”
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Class Discussion

Suppose your parents told you that they were going to give you an allowance and open a bank account for you. And, if you managed your money well so by the time you turned 16, they would buy you a new car! So you go to the bank with your parents to open your new account. But when you get there the teller tells you that an account has already been opened for another person with your name and Social Security number. So you cannot open your account.

Please take out a sheet of paper and something to write with. Using the 3 questions below in a one-paragraph response to this scenario using the format TDDDC. What was stolen from you? Be specific How would you feel? What would you do? T: Topic1 st Sentence D: Detail #12 nd Sentence D: Detail #23 rd Sentence D: Detail #34 th Sentence C: Conclusion5 th Sentence

Identity theft is when a person takes personal information from one person and makes it their own.

Personal Information: Name Date of Birth Social Security Credit Information Bank Information Information: User Name and Password Can they steal your personal history?

Steal money from your bank Ruin your credit rating so you cant make any major purchases like buying a car or house or even renting an apartment. What else…?

Form small groups of 2 or 3 persons Collaborate with each other to make a list of Good Identity Theft Prevention Practices Then, make your own list copying down what your groups list Take your own list home and share with your family.

How do you know when a site is secured? How do you know when a site is real and not scammers? What are some programs or apps that you can use to protect users from Identity Theft and Fraud?