Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create.

Similar presentations


Presentation on theme: "Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create."— Presentation transcript:

1 Fraud

2 Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create huge problems for you…

3 Cleaning up the mess People whose identities have been stolen can spend… Months to even YEARS and can cost THOUSANDS of dollars to clean up the mess thieves leave.

4 Once your identity is stolen… Thieves have many options once they have your identity, INCLUDING: 1) Open new credit card accounts – When they don’t pay, it shows up on your credit report 2) Opening new checking accounts and writing bad checks in your name 3) Forging your signature on blank checks and draining all the money in your account

5 Thieves may… 4) File for bankruptcy under your name to avoid paying debts they’ve incurred under your name to avoid eviction.

6 Thieves may… 5) Buy a car buy taking out a loan under your name and information

7 Thieves may… 6) Get a driver’s license issued in your name but have their picture.

8 Thieves may… 7) Give your name during an arrest. If they don’t show up for their court date, then you have a warrant out for your arrest.

9 Thieves may… 8) Changing the billing address on your credit card. – They may also complete a “change of address” form at the post office – This will make all your bills go to their house which will allow them free range of all your personal information.

10 Crafty Thieves “Fishing for Mail”

11 Crafty Thieves “Dumpster Divers”

12 Crafty Thieves “Skimming” Use of electronic devices that thieves put in ATMs and many now are inserting them into Gas Pumps.

13 Crafty Thieves “Pretexting” Thieves call to tell you there’s been a “problem” with one of your financial accounts. They then ask, “Please give us your address and account number to verify your identity.” Real companies verify your identity by asking “mother’s maiden name,” not your account #. Only give out personal information if you call the company.

14 Internet Thieves “PHISHING” E-mail or pop-up message that looks like a bank or other financial institution, indicating there is a problem with your account. Will have a link to “click” to “update” your account information.

15 1 SCAMMED! 5-N The news of my father death, and my uncle,s involvement in an air crash in december 2002 while on a business trip to benin republic caused my mother heartfailure and other related complications of which she later died in the hospital After we have spent a lot of money on her. Before our mother died, she told us that our father deposited some money which he made from diamond sales and contracts at this bank here in Ivory Coast and that we should pray and find a trust worthy foreign business partner who would help us to transfer and invest this money in profitable business venture overseas.She told us to do this quickly so that we can leave Ivory Coast and, then settle down abroad. She gave us the bank document to prove the deposit and then told us that my father used my name as the next of kin and beneficiary to the money in the bank in the event of his death. If you are willing to assist us, please let us know immediately so that you will arrange the transfer of the money to your account with the bank. What’s Going on Here? What’s Going on Here? 2

16 Internet Thieves “FREEWARE or FREE SOFTWARE” Example: LIMEWIRE File sharing freeware is especially bad as it allows criminal’s free rein of your computer. Check the software’s sharing permissions. – If you don’t, you may not notice that you are giving others access to your entire hard drive, including tax returns. Not all “freeware” is bad, but you must be careful with it. If you intend to use this, make sure you read the agreements to see what you’re saying “yes” to.

17 Internet Thieves “SPYWARE” Bad side effect of free downloads – even those sent to you by friends or co-workers. Spyware monitors or can even control your computer use. Spyware is used to send you pop-up ads, redirect your computer to unwanted Web sites, monitor your Internet surfing, or record your keystrokes, which could lead to identity theft.

18 Dealing With Deception You walk up to an ATM and a guy who appears to be waiting his turn walks up behind you. But he’s uncomfortably close—right over your shoulder—as you get ready to enter your PIN. 5-O-1 What should you do? 1 of 7

19 You’re at a cash register in a store and have given the clerk your credit card. She holds on to it, probably to verify your signature. But then she says she needs to grab something from the back and starts to walk away with your card in hand. 5-O-2 What should you do? Dealing With Deception 2 of 7

20 A caller says she’s from your credit card company and wants to offer you a higher credit limit for being such a good customer. You reply, “Great, what do I have to do?” And she tells you to give her your Social Security number for verification. 5-O-3 What should you do? Dealing With Deception 3 of 7

21 You’ve found a pair of shoes at a great price on a Web site you just found. You start the check-out process and notice that the padlock at the bottom of your computer screen is open and that the Web page address starts with “http” instead of “https.” 5-O-4 What should you do? Dealing With Deception 4 of 7

22 You get an E-mail from an online bookstore you frequently buy from. It says that the credit card on your account has expired and gives you a link to update your information. 5-O-5 What should you do? Dealing with Deception 5 of 7

23 Your friend sends you an E-mail about cool new software that lets you share music with others for free. He sends you the link to download the software, which is from a site you’ve never heard of. 5-O-6 What should you do? Dealing With Deception 6 of 7

24 You’re bummed out about losing in an online auction. But then you get an E-mail stating the winner backed out and that you can have the item if you still want it, and to just send your credit card information via E-mail. 5-O-7 What should you do? Dealing With Deception 7 of 7

25 10 SMART STEPS to PROTECT YOUR IDENTITY

26 Step 1 Don’t leave your wallet, credit card statements, checkbook, lying around – Even in your car. – Also, don’t carry your SS card with you. FTC (Federal Trade Commission) estimates that 25% of victims know the identity thief.

27 Step 2 Sign new credit cards as soon as you receive them. Cut up and discard expired cards. Tear/Shred unwanted “pre-approved” credit card applications.

28 Step 3 When you sign receipts, draw a line through any blank spaces above the total.

29 Step 4 Never give your Credit card # or SSN to anyone over the phone unless you initiated the call. NEVER SEND THESE VIA EMAIL….EMAIL IS RARELY SECURE.

30 Step 5 Always keep PINs for your credit/debit card completely confidential. DON’T WRITE THEM ON YOUR CARDS.

31 Step 6 Review your monthly bank statements carefully to make sure you don’t have any unauthorized charges.

32 Step 7 Shred any information that has your SSN or any account # on it that you don’t need. Best optimal shredder is Diamond Cut Shredder

33 Step 8 On your computer, install and use FIREWALL, ANTI-VIRUS, and ANTI-SPYWARE software. Keep these up to date

34 Step 9 Don’t fall for scams. Legitimate businesses that call you WON’T ask you for your account # or your SSN.

35 Step 10 When you buy something on the Internet, check that the page is SECURE before entering your credit card number. You will see a symbol of a “padlock” or “unbroken key” in the bottom browser. OR, the sites address starts with “https” – NOTICE THE “s.” That stands for “secure”

36


Download ppt "Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create."

Similar presentations


Ads by Google