What is Identity Theft, and how can you protect yourself from it?

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Part I: Making Good Online Choices
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
Oklahoma’s Personal Financial Literacy Passport © Oklahoma State Department of Education. All rights reserved. 1 Teacher Presentation Series 9 Standard.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
Chapter 5 Identity Theft and related topics. Synopsis What is identity theft? What is phishing? How does phishing work? What is pharming? Whose identity.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
Protecting Your Identity While Attending College.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
How can you protect yourself from online identity theft?
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
ICT & Crime Identity theft & fraud. Homework Worksheet – due back on Monday.
Now scroll to move on to the next slide. What is e-safety? E-safety is keeping safe when you are online. It means: Not giving out personal information.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
You. are at risk for the fastest growing crimes crime.
Phishing and online fraud What parents need to know.
Identity Theft One of America's fastest growing crimes.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Scams and Schemes I can… Understand what identity theft is and why it is important to guard against it. Learn to recognize strategies that scam artists.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Jeff loses his identity! Lesson 5: Identity Theft.
SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
Scams and Schemes.
Digital Citizenship Unit 1 * Digital Life * Strategic Searches
Being Aware of What You Share
Personal Safety Online
“Credit score vocabulary”
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

What is Identity Theft, and how can you protect yourself from it?

understand what identity theft is and why it is important to guard against it. learn to recognize strategies that scam artists use to access private information. learn how to guard against phishing and identity theft.

Key Vocabulary Scam and Flim-Flam: Has it happened to you? scam: an attempt to trick someone, usually with the intention of stealing money or private information identity theft: a type of crime in which your private information is stolen and used for criminal activity vulnerable: in a position that makes it easier for you to be harmed or attacked phishing: when people send you phony s, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information

What is your identity, how can it be stolen?

 Full Name  Date and Location of Birth  Current and Previous Street Address  Home/Cell Number  Driver’s License/Passport/ Social Security Number  Bank/Credit Account Numbers  Username/Passwords

 Identity thieves look for “clean” Social Security numbers that haven’t yet been used to get credit.  They target teens and kids, who often have Social Security numbers that have no credit history yet.  Identity thieves might sell or use these numbers, which would allow someone else to get a credit card or loan and build up debt  Being a victim of identity theft can ruin your financial future and your ability to obtain loans and purchase things. For example, it could affect your ability to get a student loan for college or a loan to buy a car.

 If children use parents’ accounts and credit cards online, or fill out forms with parents’ information, they are sharing information that could potentially put parents’ identities at risk.  It can take months, even years, to recover your identity if it’s stolen. Cleaning up such a mess takes a lot of time and energy, and it can also be expensive.

How identity thieves try to get your information?

FEATURES OF A PHISHING  Need to “verify account information”  Sense of urgency  Spelling errors  “Account is in trouble”  Link in or attachment  Too good to be true  Generic greeting  address/website doesn’t match YOUR JOB:  On the next 3 Slides find one or more feature of a phishing  Answers will appear after 30 seconds  Compare answers  Give yourself 1 point for each correct answer

Generic greeting Need to verify account info Sense of urgency Spelling errors Link in

Doesn’t Match Website Generic Greeting Account is in trouble Spelling errors Need to verify account info Sense of urgency Link in

Generic greeting Too good to be true Link in

The next step…

 Avoid opening s/messages from strangers  Read all s looking for signs of phishing  Do not click links or open attachments from spam or phishing s  Don’t reply to spam/phishing s  Report phishing or “mark as spam”  Find accurate phone numbers for your accounts and verify over the phone if you have questions (do not use the phone number from the )

A final activity to help you avoid scams and schemes.

 What kind of information do identity thieves look for? Why?  How do thieves try to get that information?  What can I do to avoid scams?

 Use 4 or more of the following features of phishing s/scams and CREATE YOUR OWN phishing  Now, share that and see if someone else can spot the scam! ( Do not send via or prank anyone, use this to teach someone what you have learned. )

 - Federal Trade Commission ID Theft website  – additional security measures recommended by the government  – view the other lessons we have for you!

Please take the session evaluation survey. The title of this lesson is: Scams and Schemes Survey Website link: Participate in lessons on other topics at Lesson Plan adapted from and used with permission from Common Sense Did you learn: what identity theft is and why it is important to guard against it. to recognize strategies that scam artists use to access your information. how to guard against phishing and identity theft.