1 / 42

Identity Theft: Risks, Prevention, and Recovery

Learn about the risks of identity theft, how to protect yourself, and what to do if you become a victim. Discover the types of identity theft and the importance of safeguarding personal information. Also, find out how social media can impact college admissions decisions.

cbutler
Download Presentation

Identity Theft: Risks, Prevention, and Recovery

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Pre-Test 1. T F Identity theft mainly occurs with people in the 55-70 age bracket because they are not computer savvy. 2. T F Young children are not at risk for identity theft because they have very little information to steal.

  2. Pre-Test • T F Colleges cannot use social media information in making admission decisions. • T F Sexual predators get much of their information on their victims from their victim’s own posts online. • T F Sexual predators only prey upon junior high girls.

  3. Take This Quiz Go to this website and take this quiz: https://www.identityforce.com/resources/quizzes/identity-theft-quiz

  4. How did you do? • 1-4 True – Elevated Risk • 5-9 True – High Risk • 10 or more True – Severely at Risk

  5. What is identity theft? • Tell me what you think it is - • Identity theft occurs when a person uses your personal information, such as Social Security number and date of birth, with the intent to commit fraud or to aid an unlawful activity.

  6. Why talk about identity theft? • According to the US Federal Trade Commission, majority of the reports they receive on identity theft were filed by victims aged 20 to 29. • College students are some of the most vulnerable people of identity theft.

  7. Identity Theft Video • https://www.youtube.com/watch?v=-5aGWPRpHSI

  8. Types of Identity Theft • Financial • Drivers License • Criminal Identity • Social Security • Medical and Insurance • Child • Synthetic

  9. Types of Identity Theft • Financial – thief accesses your bank account or credit cards – takes out loans or credit cards in your identity • Drivers License – driver license is stolen and then sold to a person that looks like you. Person then uses license for victim to be liable for traffic fines, drug charges, etc.

  10. Types of Identity Theft • Criminal Identity – using a stolen identity to blame the victim for crimes committed and makes it hard for victim to get some jobs • Social Security – Thief uses the number to take out credit cards, loans, or steal benefits

  11. Types of Identity Theft • Medical and Insurance – fraud used to make false insurance claims Victim is left having to settle claims and possibly difficulty in acquiring insurance later

  12. Types of Identity Theft • Child – thieves use identities of children to defraud the government – easier target because parents don’t expect their younger children to be targets • Synthetic – thief uses information from various victims. Primary victim is a lender. Will use a SSN and combine with another street address, name, cell phone number and open up credit cards, new cell phones, new accounts, loans, etc.

  13. How can you protect yourself? • Avoid carrying your Social Security Card and Driver’s License together in your wallet • If your college uses your SSN as an ID, request an assigned number – Note: your college will need your SSN to download your FAFSA information for financial aid • Shred pre-approved credit card offers and bills before throwing them away – prevent dumpster diving by identity thieves

  14. Important Safeguards Against Identity Theft • Avoid putting outgoing mail in unsecured campus mailboxes – use US Postal Service mailboxes • Do not shop or pay bills on a public computer • Be suspicious of solicitors. Never give personal financial information or your SSN to anyone unless they have a good reason to need it

  15. Important Safeguards Against Identity Theft • Limit the amount of information that you place online on social media • Review your three credit reports once per year at: annualcreditreport.com • Know your payment due dates – if a bill doesn’t show up on time, look into it • IdentityTheft.gov – Federal Trade Commission website that has helpful information • Keep your security software on your computer up to date

  16. What if you become a victim of identity theft? • Put a fraud alert on your credit report cards • Contact any institution directly affected: bank, credit card company – good to have a list of phone numbers ahead of time • Contact the Federal Trade Commission: 877-ID THEFT • File a police report • SSN stolen? Contact Social Security Administration and the Internal Revenue Service • If you believe the thief has filed a fraudulent change of address against you, contact the Postal Inspection Service (law enforcement arm of US Postal Service)

  17. Social Media and College Admission

  18. StatisticsAccording to Ivywise.com • 27% of admissions officers surveyed said they Google prospective students • 26% said they look up applicants on Facebook • 35% said that when checking up on a student’s online presence, they found something that negatively impacted an applicant’s chances of getting in, nearly tripling from 12% last year. • A Kaplan Test Prep study found that 12% of college applicants were rejected because of what the college saw on social media

  19. Guidelines in Social Media • Does this post make me look like college material? • Would I say this on television? • Does this post court excessive commenting? • Is this funny? Is it offensive? Does it require too much explanation? • Does everyone need to read this? • Remember, just because you delete something, does not mean it goes away on the Internet

  20. Harvard University dismissed at least 10 incoming freshmen in June, 2017, for social media posts!

  21. Internet Safety • Let’s watch this video: • https://www.youtube.com/watch?v=AE9dwAr7CUE • https://www.youtube.com/watch?v=nWq7SXaXj8g

  22. Discussing the Video • What things did the girl do which helped the predator locate her and build a relationship? Soccergirl username; posted her phone number online; posted her picture online with username; using her identifying information he located on Google Maps her home; she accepted him as “Jennifer’s dad” without checking him out. In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes. (Journal of Adolescent Heatlh 47, 2010) 65% of online sex offenders used the victim's social networking site to gain home and school information about the victim (Journal of Adolescent Heatlh 47, 2010) 26% of online sex offenders used the victim's social networking site to gain information about the victim's whereabouts at a specific time. (Journal of Adolescent Health 47, 2010)

  23. Online Predator Profile • Blends into society • Is typically clean cut and outwardly law abiding • Is usually white, middle-aged or younger, and male • Uses position in society to throw off suspicion • Can rise to be a pillar of society while actively pursuing children • Often engages in activities involving children • Appears trusting to both parents and child

  24. Grooming by a Predator • Predators will: • Prey on teen’s desire for romance, adventure, and sexual information • Develop trust and secrecy: manipulate teen by listening to and sympathizing with teen’s problems and insecurities • Affirm feelings and choices of teen • Exploit natural sexual curiosities of teen • Ease inhibitions by gradually introducing sex into conversations or exposing them to pornography

  25. Grooming by a Predator • Predators will: • Flatter and compliment the teen excessively, sends gifts, and invests time, money, and energy to groom the teen to trust them • Develop an online relationship that is romantic, controlling, and upon which the child becomes dependent • Drive a wedge between the teen and his or her parents and friends • Make promises of an exciting, stress-free life, tailored to the youth’s desire • Make threats, and often will use pornography featuring their victim to blackmail them into silence

  26. Statistics • Only 18% of youth use chat rooms, however, the majority of Internet-initiated sex crimes against children are initiated in chat rooms. (Journal of Adolescent Health 47, 2010) • The majority of victims of Internet-initiated sex crimes were between 13 to 15 years old; 75% were girls and 25% were boys. • 14 percent of students in 10th-12th grade have accepted an invitation to meet an online stranger in-person and 14 percent of students, who are usually the same individuals, have invited an online stranger to meet them in-person. (www.internetsafety101.org)

  27. Protecting Yourself • Never post personal information about yourself • Don’t reply to messages to people you don’t know • NEVER meet face to face with someone you have met online • If you receive unwanted solicitations, call the police and report it immediately • Never download images from a site that is an unknown source • If something is said or done that makes you feel uncomfortable, tell a trusted adult immediately • Avoid chatrooms or discussion areas that look sketchy or proactive • If you feel uncomfortable, there is a good reason, be suspicious and make your safety the highest priority

  28. Quiz 1. Which screen name is best to have?? a. Cheergirl9393 b. ChrisP1990 c. SandySmith999 d. Horseluvr01 e. TPHSChick Answer: D – does not identify the person as a girl

  29. Quiz If someone online tells you they are a sophomore in high school, and taking driver’s education classes, they are probably how old? a. 15 b. 16 c. 35 d. There’s no way to tell! Answer: D

  30. Quiz While surfing the Internet, you get an error message from your Internet provider, and it says it will delete your account unless you type in your password again, should you send the information? a. Yes. B. No. Answer: B – probably a scam to get your password (Internet providers don’t operate like that)

  31. Quiz If someone online sends you a message that is insulting or obscene, you should: a. Erase them from your friends list. b. Delete the message. c. Insult them back d. Tell a responsible adult Answer: D – will be important to take appropriate action depending on what is said. You will want to preserve the message as possible evidence.

  32. Quiz You are talking to someone online, and they know some of the same people you know. Since they have many of the same friends as you, is it ok to give them your phone number if they ask? a. Yes b. No Answer: B – the online person may have researched you online to find names of your friends to gain your trust and they really don’t know your friends.

  33. Quiz You at are at the game of your favorite team or favorite concert. Is it ok to post pictures of the event on social media? Answer: If you do, you will be telling a lot of people where you are and especially where you are not (home) and possibly setting yourself up for someone to either steal from you or attack you. Choose the wisest option and post those photos days after the event. Once you post something, you lose control of where it goes from there.

  34. A True Story Read Bob’s Story

  35. What are some “take aways” from this lesson? • Take identity theft seriously – it can cost you money, time, your reputation, credit, and a great amount of frustration. • Be careful on the Internet as you interact with other people on social media, chat rooms, etc. Don’t assume “it” will never happen to me. • Do not post personal information about yourself on Internet sites. A savvy thief or predator will be able to target you with your own help.

  36. Post-Test

  37. Tip of the Week Video • Senior Year Alerts • Career & College Corner Blog • Social Media

  38. Post-Test • T F Colleges cannot use social media information in making admission decisions. • T F Sexual predators get much of their information on their victims from their victim’s own posts online. • T F Sexual predators only prey upon junior high girls.

More Related