Скачать презентацию Identity Theft n 1 Consumer Fraud Complaint Скачать презентацию Identity Theft n 1 Consumer Fraud Complaint

dce8afb3102b1ae39a57c5574885e261.ppt

  • Количество слайдов: 24

Identity Theft n #1 Consumer Fraud Complaint – 5 th straight year! Identity Theft n #1 Consumer Fraud Complaint – 5 th straight year!

Definition n n Theft of your Identity! It occurs when someone, without your knowledge, Definition n n Theft of your Identity! It occurs when someone, without your knowledge, acquires a piece of your personal information and uses it to commit fraud.

Are You a Target? Do you: n Put outgoing mail in your mailbox? n Are You a Target? Do you: n Put outgoing mail in your mailbox? n Use a credit card in restaurants? n Use a debit card in stores? n Have mail delivered to your mailbox? n Leave your car unlocked?

Are You a Target? Do you: n n n Lock your purse or wallet Are You a Target? Do you: n n n Lock your purse or wallet in your car? Lock your laptop/pda/cell phone in car? Put out the garbage? Put out the recycle? Leave your house unlocked?

Are You a Target? Do you: n Give confidential information to phone solicitors? n Are You a Target? Do you: n Give confidential information to phone solicitors? n Answer official-looking email requests? n Answer official-looking mail requests? n Deal with companies that store your information on computer?

Which Age Group Are You In? n n Over 65 - lowest rate 35 Which Age Group Are You In? n n Over 65 - lowest rate 35 – 44 - highest $ amount 25 – 34 - highest rate Children – growing rate

Who are the Bad Guys? n n n Your Friends Your Family Your Co-Workers Who are the Bad Guys? n n n Your Friends Your Family Your Co-Workers Employees with access to your confidential information Old-Fashioned Criminals

How Do They Do It? n n Friends, family, co-workers have easy access Strangers How Do They Do It? n n Friends, family, co-workers have easy access Strangers use these techniques:

How Do They Do It? n n Steal your outgoing mail Skimming How Do They Do It? n n Steal your outgoing mail Skimming

How Do They Do It? n n Steal your card Steal incoming mail How Do They Do It? n n Steal your card Steal incoming mail

How Do They Do It? n n n n Burglarize your car Dumpster Dive How Do They Do It? n n n n Burglarize your car Dumpster Dive Burglarize your house Social Engineering – phone Email Scams Mail Scams Hacking

What They Do With Your Information n n Purchase high-ticket items Take out loans What They Do With Your Information n n Purchase high-ticket items Take out loans Assume your identity Commit other crimes

What They Do With Your Information n #1 – Use your credit card #2 What They Do With Your Information n #1 – Use your credit card #2 - Get utility and phone service #3 – Commit bank fraud

Avoid Becoming a Victim n n n Post your mail at the post office Avoid Becoming a Victim n n n Post your mail at the post office Don’t let your credit or debit card out of your sight Get a PO box or lockable mailbox Lock your car Don’t leave valuables in your car

Avoid Becoming a Victim n n n Don’t carry SSN card Don’t carry extra Avoid Becoming a Victim n n n Don’t carry SSN card Don’t carry extra credit cards Don’t carry your checkbook What is printed on your checks? Shred credit card offers

Avoid Becoming a Victim n n n Shred all documents with personal information (or Avoid Becoming a Victim n n n Shred all documents with personal information (or go to Wal Mart) Lock the doors of your house Store SSN, account information in a secure place

Avoid Becoming a Victim n n n Don’t give personal information over the phone, Avoid Becoming a Victim n n n Don’t give personal information over the phone, mail or Internet unless you initiate contact Don’t respond to email scams Don’t respond to mail scams Cancel unused accounts Get a credit report

Avoid Becoming a Victim n n n Clean out your purse, wallet, organizer Check Avoid Becoming a Victim n n n Clean out your purse, wallet, organizer Check your monthly statements Opt Out! Purchase ID Theft Insurance - OR – Stay home, lock your doors and communicate with no one!

Avoid Becoming a Victim use in Watch your wireless n airports, cyber cafes, other Avoid Becoming a Victim use in Watch your wireless n airports, cyber cafes, other public access computers

If You Become a Victim n n n Who pays? Document, Document Contact local If You Become a Victim n n n Who pays? Document, Document Contact local law enforcement Contact the FTC Contact your credit card company Contact the three credit bureaus

Trends n n Parents using children’s identity Organization misuse of customer/client/employee data Trends n n Parents using children’s identity Organization misuse of customer/client/employee data

Trends n Credit Card Duplicator Trends n Credit Card Duplicator

Identity Theft n Are You Scared? n Do You Think You Are Safe? Identity Theft n Are You Scared? n Do You Think You Are Safe?

Questions? Marsha Powell Tompkins Cortland CC Broome County Government Security Questions? Marsha Powell Tompkins Cortland CC Broome County Government Security