3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,

Slides:



Advertisements
Similar presentations
Awareness and Prevention
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
1.7.2.G1 © Family Economics & Financial Education – Revised February 2008 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take.
Financial Institution Frenzy G1 © Family Economics & Financial Education – April 2006 – Get Ready To Take Charge of Your Finances – Financial Institution.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Preparing for Consumer Choices
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Presented By The Plano Police Department Crime Prevention Unit.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Checking Account & Debit Card Simulation Understanding Checking Accounts and Debit Card Transactions.
Checking Account & Debit Card Simulation Understanding Checking Accounts and Debit Card Transactions.
1.7.2.G1 Electronic/Online Banking & Bill Pay Take Charge of Your Finances.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
2.4.1.G1 © Family Economics & Financial Education – December 2005 – Get Ready to Take Charge of Your Finances – Take Charge of Credit Cards Funded by a.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Unit Five Your Money: Keeping It Safe and Secure Part IV Info from: NEFE High School Financial Planning Program.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Family Economics & Financial Education G1 © Family Economics & Financial Education – Revised October 2004 – Credit Unit – Selecting a Credit Card.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
Credit statistics Average college student has 4.25 credit cards College seniors graduated with an average credit card debt of more than $4,100. Close to.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
1.7.2.G1 © Family Economics & Financial Education – Revised May 2009 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Identity theft: Real or Virtual? By: Alex Metzler.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
2.4.1.G1 © Family Economics & Financial Education – December 2005 – Get Ready to Take Charge of Your Finances – Take Charge of Credit Cards Funded by a.
2.4.1.G1 © Family Economics & Financial Education – December 2005 – Get Ready to Take Charge of Your Finances – Take Charge of Credit Cards Funded by a.
2.4.1.G1 Take Charge of Credit Cards “Get Ready to Take Charge of Your Finances” Introductory Level.
2.4.1.G1 Take Charge of Credit Cards “Get Ready to Take Charge of Your Finances” Introductory Level Objective: To identify the purpose of a credit card.
7.3.1.G1 According to The federal Trade Commission, Identity theft Affects Approximately 12.6Million People Every year.
Be Cautious of Identity Theft By: Sydney Langley.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Checking Account & Debit Card Understanding Checking Accounts and Debit Card Transactions.
Financial Institution Frenzy G1 © Family Economics & Financial Education – April 2006 – Get Ready To Take Charge of Your Finances – Financial Institution.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Checking Account & Debit Card Simulation Understanding Checking Accounts and Debit Card Transactions.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Getting a credit card. © Family Economics & Financial Education –Updated April 2009– Credit Unit – Understanding a Credit Card Funded by a grant from.
Frauds, Scams and Slams: Credit Card and ATM Fraud Prepared by Dr. Jan Park Gerontology Specialist Oklahoma Cooperative Extension service April 2002.
Journal #21 If this class were your job, based on your class performance, would you still have a job? Would you have been fired, put on probation, received.
Identity Theft Mystery of The Stolen Identity Take Charge of Your Finances.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Protecting Your Assets By Preventing Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Veteran and Military Identity Theft Training Program
Protecting Your Identity
Protecting Your Credit Identity
Protecting Your Identity
Identity Theft Essentials
Presentation transcript:

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Protecting Your Credit Identity Identity Theft

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Identity Theft The dollar loss suffered because of identity theft from consumers was 343 million in Federal Trade Commission The number of identity theft complaints filed in 2002 was 380,000 almost double from the 204,000 complaints in Federal Trade Commission Consumers spent 26 billion dollars online. United States Department of Commerce

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information. Identity Theft

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Name Address and Telephone Number Social Security number Driver’s license number Bank account numbers Credit card numbers Passwords Bills Personal Identification Information Includes

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Wallet/Purse Loss or Theft - Information is taken from a lost or stolen wallet/purse (most common method). Mail and Phones - Information is taken from mailboxes, a change of address form is completed, or personal information is solicited by phone. “Dumpster Diving” - Personal information is discarded carelessly either at home or by businesses and thieves remove it from the trash. “Insider Access” - Dishonest employees steal the information and either sell it or use it. Internet - Personal data taken off the Internet Credit Reports – A credit report containing personal information may be obtained fraudulently. Ways Identity Thieves Acquire Information

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona To apply for a new driver’s license To open new bank accounts To apply for credit cards or store credit accounts To obtain cash with bank cards To get a job To rent an apartment To make retail purchases How Information Can Be Used

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Identity Theft How Identity Theft Occurs & Prevention

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Credit Reports How Theft Occurs: Thief fraudulently orders a credit report. –Credit Reports – include all the accounts a person has, social security number, & personal information. Prevention: Check credit report once per year. Don’t leave reports lying around.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona 3 Credit Reporting Agencies

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Mail How Theft Occurs: Thief steals mail to learn account numbers and personal information. Prevention: Deposit outgoing mail in post office collection boxes not unsecured mailboxes. Promptly remove mail from mailboxes. If on vacation, put a hold on mail.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Wallets and Pocketbooks How Theft Occurs: Thief steals a wallet or pocketbook containing a wealth of personal information. Prevention: Don’t leave it in plain site. Don’t hang from chair at public place. Use a purse which closes securely. Carry only what is absolutely needed.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Bills How Theft Occurs: A thief may steal bills containing consumer’s name, address, phone number, bank or credit account numbers, or social security. May use information to open new accounts. Prevention: Don’t leave statements lying around. Pay attention to billing cycles and follow up if bill does not arrive on time.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Calling Cards How Theft Occurs: If a thief has a calling card and personal identification number, it may be used to make long distance calls anywhere. Prevention: Use only cards which require a personal identification number. Block numbers from others view while dialing.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Passwords How Theft Occurs: If a thief has access to passwords, he/she can access accounts, send messages, and sell or purchase items. Prevention: Don’t give password to anyone. Don’t write passwords down where others may find them. Create unique passwords using a combination of numbers and letters.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Work Records How Theft Occurs: A thief who has access to work records may have a person’s personal information, social security numbers, or bank information. Prevention: Ensure personal records are locked securely with limited access by employees.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Pre-Approved Credit Cards How Theft Occurs: A thief may activate credit cards using pre- approved credit card offers and have the statements sent to a different address. Prevention: Shred any credit card offers received and not used. Cut up any pre-approved credit cards not used.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Bank Account Information How Theft Occurs: If a thief has a person’s bank account and routing number, he/she may create fake checks, withdraw money, or access savings accounts. Prevention: Don’t leave statements lying around. Use passwords. Don’t have checks mailed home. Pick them up at the bank.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Social Security Number How Theft Occurs: A social security number is the key to a person’s identity. It opens new accounts, obtain driver’s license, file bankruptcy, etc. Prevention: Never give our social security number. Ask for alternate number on driver’s license, insurance cards, and other materials. Do not carry social security card unless necessary.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona ATM, Credit, and Debit Cards How Theft Occurs: A thief may withdraw money with both an ATM card and PIN number. Credit and debit cards are easy to use because most stores do not compare cards with another form of identification. –Can easily be used to purchase merchandise over the phone or internet.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona ATM, Credit and Debit Cards Prevention: Don’t leave cards lying around. Carry only those which will be used. Use debit cards which require a PIN number. –Do not write PIN number down in same place debit card is kept. Carry cards in separate holder from wallet. Sign back of cards stating “Please see I.D.”

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona ATM, Credit and Debit Cards Prevention cont.: Have a list of all cards and account numbers. Don’t give out account number unless making a purchase. Keep track of all receipts. Destroy papers with card numbers on them. Check statements for unauthorized charges.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Identity Protection Shopping Online

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Why People Shop Online and Risks Why Order products from around the world. Easily research items and compare prices. Can be done at any time in the convenience of own home. Risks Personal information including credit card numbers, social security number, financial records, and bank numbers can be used.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Safety Tips for Shopping Online 1.Know the real deal Get all details before buying including prices, delivery time, warranty information, and return policies. 2.Look for clues about security Make sure the browser states “https” or “shttp” indicating it is secure. 3.Use a credit card Credit cards are the safest way because a person has the legal right to dispute charges.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Safety Tips for Shopping Online 4.Use an escrow service An escrow service will hold a person’s money until confirmation of the product or services has been received. 5.Keep proof handy Print and file all information in case needed later.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona 6.Ask about “substitute” or “single use” card numbers Allows a person to use his/her credit card number without putting the real account number online. 7.Get the scoop on the seller Check complaint numbers at the state or local consumer protection agency and Better Business Bureau. Safety Tips for Shopping Online

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Identity Theft What to Do if Identity Theft Happens

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Immediate Steps 1.Act immediately! 2.Keep a detailed record of correspondence and phone records. 3.Contact the three major credit bureaus and request a “fraud alert.” 1.Follow with a letter sent by certified mail. 4.Close all accounts which have been tampered with or opened fraudulently. 5.File a police report. 6.File a complaint with the Federal Trade Commission.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Credit Card Liability Truth in Lending Act limits liability for unauthorized charges to $50.00 per card. –A letter must be received within 60 days of the first bill containing the error. –The dispute must be resolved within 90 days of the creditor receiving the letter.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona ATM & Debit Cards, Electronic Transfers The Electronic Funds Transfer Act provides protection. The amount a person is liable depends upon how quickly the loss is reported. –Within two days is a maximum of $ –Within sixty days is a maximum of $ –After sixty days a person may be liable for everything. To report a loss call the financial institution and follow up in writing. Get new bank numbers, personal identification numbers, and passwords.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona Check Liability Checks Contact the financial institution and stop payment. Notify the check verification service. Most states hold the financial institution responsible for losses of a forged check.

3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences at the University of Arizona STAY ALERT BE CAREFUL BE SMART Identity Theft