1 / 0

Scams and Schemes

Scams and Schemes. Victoria ISD Common Sense Media Grade 6: Scams and schemes. Essential Question. What is identity theft, and how can you protect yourself from it?. Objectives. The students will be able to… Understand what identity theft is and why it is important to guard against it.

solada
Download Presentation

Scams and Schemes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Scams and Schemes

    Victoria ISD Common Sense Media Grade 6: Scams and schemes
  2. Essential Question What is identity theft, and how can you protect yourself from it?
  3. Objectives The students will be able to… Understand what identity theft is and why it is important to guard against it. Learn to recognize strategies that scam artists use to access private information. Learn how to guard against phishing and identity theft.
  4. Vocabulary Scam: an attempt to trick someone, usually with the intention of stealing money or private information Identity theft: a type of crime in which your private information is stolen and used for criminal activity
  5. Vocabulary, cont. Vulnerable: in a position that makes it easier for you to be harmed or attacked Phishing: when people send you phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information
  6. Introduction: Warm-up Do you know someone who has been scammed? What happened?
  7. Introduction: Warm-up What is the purpose of a scam? What tricks do people use to carry out a scam?
  8. Introduction: Warm-up Can people get scammed on the Internet? How?
  9. What Is Identity Theft? People who scam don’t always get money from them directly Use variety of strategies to trick people into giving out private information Use information to access bank and credit card accounts Even recreate someone’s identify Produce false documents (social security cards, drivers’ licenses, etc.)
  10. What Is Identity Theft? Can you guess what kinds of personal information identity thieves might look for?
  11. What Is Identity Theft? Personal Information Full name Date of and place of birth Current/previous addresses/phone numbers Driver’s license or passport numbers Account numbers, companies’ names (ex: Amazon, iTunes, PayPal, Dillard’s) Passwords Social Security Number
  12. Vulnerable …Vulnerable: in a position that makes it easier for you to be harmed or attacked Anyone on line is vulnerable!
  13. How to Catch a Phish How do you think identity thieves might try to get your information? (Phishing: when people send you phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information)
  14. How to Catch a Phish How good are you a spotting potential scams?
  15. Phishing Examples Consumer Fraud Reporting Example 1
  16. Phishing Examples Facebook Huffington Post article, “Facebook Scams You Need to Know About”
  17. Protect Yourself from Online Scams Protect yourself…follow the rules Avoid opening the message or email in the first place Don’t click on any links or download and attachments. They might contain viruses or spyware. Don’t reply Mark as “junk mail” or “spam” for your email provider, or report it to your social network site. If you are concerned about an account you have with a company, contact its customer service by phone. Make sure you verify the company’s contact information elsewhere online first.
  18. Wrap-up What kinds of information do identity thieves look for and why?
  19. Wrap-up How do thieves try to get at your information?
  20. Wrap-up What can you do to avoid falling for online scams?
  21. Wrap-up You or your family can go to www.ftc.gov/idtheft for help if identity has been stolen Forward spam emails to spam@uce.gov
  22. Extension Activity Try your luck with the Spam Scam Slam game http://www.onguardonline.gov/media/game-0012-spam-scam-slam
  23. Lesson Assessment 1. A type of crime in which your private information is stolen and used for criminal activity is called: a) Identification b) Identity theft c) Burglary
  24. Lesson Assessment 1. A type of crime in which your private information is stolen and used for criminal activity is called: a) Identification b) Identity theft c) Burglary
  25. Lesson Assessment Evan sees the following message in his inbox:
  26. Lesson Assessment Which of the following is NOT a warning sign that this message is a scam: a) The offer sounds too good to be true b) It asks Evan for his private information c) Evan is addressed as “Sir”
  27. Lesson Assessment Which of the following is NOT a warning sign that this message is a scam: a) The offer sounds too good to be true b) It asks Evan for his private information c) Evan is addressed as “Sir”
  28. Lesson Assessment 3. Sara finds a message on her phone that she thinks might be a scam. She should: a) Forward the message to her friends to see if they think it’s a scam too b) Reply and ask the sender not to send more mail c) Delete the message
  29. Lesson Assessment 3. Sara finds a message on her phone that she thinks might be a scam. She should: a) Forward the message to her friends to see if they think it’s a scam too b) Reply and ask the sender not to send more mail c) Delete the message
More Related