SlideShare a Scribd company logo
1 of 19
PRIVACY – IDENTITY
THEFT
Muhammad Amin Bandeali
CPSC- 548 – Dr. Jo
Overview
   What is Identity Theft?
   How many people become victims of ID Theft?
   Why do ID thieves do it?
   How does it affect you?
   Are you a victim of ID Theft?
   What steps can you take to avoid ID Theft? -
    by Abagnale.
   National ID Card.
   REAL ID Act.
WHAT IS IDENTITY THEFT?
   Identity theft occurs when someone uses your
    personally identifying information, like your
    name, Social Security number, or credit
    card number, without your permission, to
    commit fraud or other crimes.
HOW MANY PEOPLE BECOME
VICTIMS OF IDENTITY THEFT?
   The FTC estimates that as many as 9 million
    Americans have their identities stolen each year.
   About 37 million Americans were victims of
    identity theft between 2003 and 2007.
   The frequency of identity theft is decreasing; there
    were 10.1 million identity theft victims in 2003 and
    8.4 million victims in 2007.
   Average loss was $5,720.
   In fact, you or someone you know may have
    experienced some form of identity theft.
   Only 1 in 700 identity thieves get caught.
WHY DO IDENTITY THEIVES
DO IT?
   Identity thieves may do the following in your
    name:
     rentan apartment
     obtain a credit card

     establish a telephone account

     get medical treatment
HOW DOES IT EFFECT YOU?
   Credit card
     They    may open new credit card accounts in your
      name. When they use the cards and don't pay the
      bills, the delinquent accounts appear on your
      credit report.
     They may change the billing address on your
      credit card so that you no longer receive bills, and
      then run up charges on your account.
HOW DOES IT EFFECT YOU?
(Cont.)
   Phone or utilities
     They   may open a new phone or wireless account
      in your name, or run up charges on your existing
      account.
     They may use your name to get utility services
      like electricity, heating, or cable TV.
HOW DOES IT EFFECT YOU?
(Cont.)
   Bank/Finance
     Create counterfeit checks using your name or
      account number.
     Open a bank account in your name and write bad
      checks.
     Clone your ATM or debit card and make electronic
      withdrawals your name, draining your accounts.
     Take out a loan in your name.
HOW DOES IT EFFECT YOU?
(Cont.)
   Government
     Get  a driver's license or official ID card issued in
      your name but with their picture.
     Use your name and Social Security number to get
      government benefits.
     File a fraudulent tax return using your information.
HOW DOES IT EFFECT YOU?
(Cont.)
   Miscellaneous
     Get a job using your Social Security number.
     Rent a house or get medical services using your
      name.
     Give your personal information to police during an
      arrest. If they don't show up for their court date, a
      warrant for arrest is issued in your name.
ARE YOU A VICTIM OF AN ID
THEFT?
   If you are a victim of the ID theft, you need to
    take the following steps:
     Filea police report
     Check your credit reports

     Notifying creditors

     Disputing any unauthorized transactions

     Change all account numbers immediately
ABAGNALE – “STEALING YOUR
LIFE”
   The author of quot;Stealing Your Life,quot; Abagnale
    spent his youth stealing people's identities.
   After five years in jail, Abagnale reformed,
    eventually teaching the FBI how to catch
    white-collar criminals.
   His story was the basis for the 2002 movie
    quot;Catch Me If You Canquot; starring Leonardo
    DiCaprio.
WHAT STEPS CAN YOU TAKE TO
AVOID ID THEFT?
   According to Abagnale:
     Never    Use a Debit Card or Check to make a
      purchase
     Always make sure the online shopping store has
      it's link starting with HTTPS which stands for
      secured transport layer
     Sign up for a credit alerting system

     use a good anti-virus, phishing and firewall
      software
     Always make sure the link that you click on from
      an email is legit
NATIONAL ID CARD
NATIONAL ID CARD (Cont.)
   Events of 9-11 resurrected the debate over the National ID
    Card for Americans
   Pros:
       More reliable
       Reduce illegal immigration
       Reduce crime
   Cons:
       Does not guarantee that the identity of an individual is that
        person's actual identity
       Impossible to create a biometric based national id card that is
        100% secure
       No evidence that national id cards reduce crime
       Easier for govt. to perform data mining on its citizens
       Very hard to erase wrong information from the record
REAL ID ACT
REAL ID ACT (Cont.)
   In May 2005, President George W. Bush signed
    the REAL ID act.
   Requires every state to issue new driver licenses.
   Licenses must meet the following federal
    standards:
     full legal name
     Dob
     Gender
     license number
     digital photograph
     legal address
     signature
REAL ID ACT (Cont.)
   PROS
     Law enforcement is easier
     Criminals cannot change their identity



   CONS
     Machine-readable information is easier to steal
     Every staff of govt. agencies would have access to
      every information for every citizen
     Some say personal information floating around the
      cyberspace is insignificant compared to what would
      be available through real id act
REFERENCES
   Michael J. Quinn, “Ethics for the information age”,
    Addison Wesley, 3rd edition.
   Andrea Coombes, “Expert advice – Tech-industry
    experts tell how they avoid ID theft and other online
    threats”, Market Watch.
   Consumer’s Union, “CONSUMERS UNION URGES
    CONGRESS & STATE LEGISLATURES TO ADOPT
    IDENTITY THEFT PROTECTIONS”,
    http://www.consumersunion.org/finance/prevent_idthef
    t.htm
   Federal Trade Commission, “Fighting Back Against
    Identity Theft”,
    http://www.ftc.gov/bcp/edu/microsites/idtheft/

More Related Content

What's hot

What's hot (20)

Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
10 Credit Myth
10 Credit Myth10 Credit Myth
10 Credit Myth
 
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
 
Idt
IdtIdt
Idt
 
Writing Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft NoteWriting Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft Note
 
Id theft avoiding and detecting
Id theft avoiding and detectingId theft avoiding and detecting
Id theft avoiding and detecting
 
Identity Theft for College Students
Identity Theft for College StudentsIdentity Theft for College Students
Identity Theft for College Students
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
October2016
October2016October2016
October2016
 
InterGamingi Article
InterGamingi ArticleInterGamingi Article
InterGamingi Article
 

Similar to Protecting Your Identity from Theft

Similar to Protecting Your Identity from Theft (20)

Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft & Account Fraud
Identity Theft & Account FraudIdentity Theft & Account Fraud
Identity Theft & Account Fraud
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 

More from Amin Bandeali

SOFTWARE MEASUREMENT A PROCESS MODEL
SOFTWARE MEASUREMENT A PROCESS MODELSOFTWARE MEASUREMENT A PROCESS MODEL
SOFTWARE MEASUREMENT A PROCESS MODELAmin Bandeali
 
SOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESS
SOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESSSOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESS
SOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESSAmin Bandeali
 
SOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESS
SOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESSSOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESS
SOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESSAmin Bandeali
 
Extending Agile to Suite Big Projects
Extending Agile to Suite Big ProjectsExtending Agile to Suite Big Projects
Extending Agile to Suite Big ProjectsAmin Bandeali
 
Lead Allocation System's Attribute Driven Design (ADD)
Lead Allocation System's Attribute Driven Design (ADD)Lead Allocation System's Attribute Driven Design (ADD)
Lead Allocation System's Attribute Driven Design (ADD)Amin Bandeali
 
Lead Allocation System - Attribute Driven Design (ADD)
Lead Allocation System - Attribute Driven Design (ADD)Lead Allocation System - Attribute Driven Design (ADD)
Lead Allocation System - Attribute Driven Design (ADD)Amin Bandeali
 
Lead Allocation System
Lead Allocation SystemLead Allocation System
Lead Allocation SystemAmin Bandeali
 
Software Process Improvement – CMMI and IDEAL
Software Process Improvement – CMMI and IDEALSoftware Process Improvement – CMMI and IDEAL
Software Process Improvement – CMMI and IDEALAmin Bandeali
 
Software Process Improvement SCAMPI: Standard CMMI Appraisal Method for Proce...
Software Process Improvement SCAMPI: Standard CMMI Appraisal Method for Proce...Software Process Improvement SCAMPI: Standard CMMI Appraisal Method for Proce...
Software Process Improvement SCAMPI: Standard CMMI Appraisal Method for Proce...Amin Bandeali
 
Maintenance of Dynamically vs. Statically typed Languages
Maintenance of Dynamically vs. Statically typed LanguagesMaintenance of Dynamically vs. Statically typed Languages
Maintenance of Dynamically vs. Statically typed LanguagesAmin Bandeali
 
SOFTWARE VERIFICATION & VALIDATION
SOFTWARE VERIFICATION & VALIDATIONSOFTWARE VERIFICATION & VALIDATION
SOFTWARE VERIFICATION & VALIDATIONAmin Bandeali
 

More from Amin Bandeali (11)

SOFTWARE MEASUREMENT A PROCESS MODEL
SOFTWARE MEASUREMENT A PROCESS MODELSOFTWARE MEASUREMENT A PROCESS MODEL
SOFTWARE MEASUREMENT A PROCESS MODEL
 
SOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESS
SOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESSSOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESS
SOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESS
 
SOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESS
SOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESSSOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESS
SOFTWARE MEASUREMENT ESTABLISHING A SOFTWARE MEASUREMENT PROCESS
 
Extending Agile to Suite Big Projects
Extending Agile to Suite Big ProjectsExtending Agile to Suite Big Projects
Extending Agile to Suite Big Projects
 
Lead Allocation System's Attribute Driven Design (ADD)
Lead Allocation System's Attribute Driven Design (ADD)Lead Allocation System's Attribute Driven Design (ADD)
Lead Allocation System's Attribute Driven Design (ADD)
 
Lead Allocation System - Attribute Driven Design (ADD)
Lead Allocation System - Attribute Driven Design (ADD)Lead Allocation System - Attribute Driven Design (ADD)
Lead Allocation System - Attribute Driven Design (ADD)
 
Lead Allocation System
Lead Allocation SystemLead Allocation System
Lead Allocation System
 
Software Process Improvement – CMMI and IDEAL
Software Process Improvement – CMMI and IDEALSoftware Process Improvement – CMMI and IDEAL
Software Process Improvement – CMMI and IDEAL
 
Software Process Improvement SCAMPI: Standard CMMI Appraisal Method for Proce...
Software Process Improvement SCAMPI: Standard CMMI Appraisal Method for Proce...Software Process Improvement SCAMPI: Standard CMMI Appraisal Method for Proce...
Software Process Improvement SCAMPI: Standard CMMI Appraisal Method for Proce...
 
Maintenance of Dynamically vs. Statically typed Languages
Maintenance of Dynamically vs. Statically typed LanguagesMaintenance of Dynamically vs. Statically typed Languages
Maintenance of Dynamically vs. Statically typed Languages
 
SOFTWARE VERIFICATION & VALIDATION
SOFTWARE VERIFICATION & VALIDATIONSOFTWARE VERIFICATION & VALIDATION
SOFTWARE VERIFICATION & VALIDATION
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Protecting Your Identity from Theft

  • 1. PRIVACY – IDENTITY THEFT Muhammad Amin Bandeali CPSC- 548 – Dr. Jo
  • 2. Overview  What is Identity Theft?  How many people become victims of ID Theft?  Why do ID thieves do it?  How does it affect you?  Are you a victim of ID Theft?  What steps can you take to avoid ID Theft? - by Abagnale.  National ID Card.  REAL ID Act.
  • 3. WHAT IS IDENTITY THEFT?  Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.
  • 4. HOW MANY PEOPLE BECOME VICTIMS OF IDENTITY THEFT?  The FTC estimates that as many as 9 million Americans have their identities stolen each year.  About 37 million Americans were victims of identity theft between 2003 and 2007.  The frequency of identity theft is decreasing; there were 10.1 million identity theft victims in 2003 and 8.4 million victims in 2007.  Average loss was $5,720.  In fact, you or someone you know may have experienced some form of identity theft.  Only 1 in 700 identity thieves get caught.
  • 5. WHY DO IDENTITY THEIVES DO IT?  Identity thieves may do the following in your name:  rentan apartment  obtain a credit card  establish a telephone account  get medical treatment
  • 6. HOW DOES IT EFFECT YOU?  Credit card  They may open new credit card accounts in your name. When they use the cards and don't pay the bills, the delinquent accounts appear on your credit report.  They may change the billing address on your credit card so that you no longer receive bills, and then run up charges on your account.
  • 7. HOW DOES IT EFFECT YOU? (Cont.)  Phone or utilities  They may open a new phone or wireless account in your name, or run up charges on your existing account.  They may use your name to get utility services like electricity, heating, or cable TV.
  • 8. HOW DOES IT EFFECT YOU? (Cont.)  Bank/Finance  Create counterfeit checks using your name or account number.  Open a bank account in your name and write bad checks.  Clone your ATM or debit card and make electronic withdrawals your name, draining your accounts.  Take out a loan in your name.
  • 9. HOW DOES IT EFFECT YOU? (Cont.)  Government  Get a driver's license or official ID card issued in your name but with their picture.  Use your name and Social Security number to get government benefits.  File a fraudulent tax return using your information.
  • 10. HOW DOES IT EFFECT YOU? (Cont.)  Miscellaneous  Get a job using your Social Security number.  Rent a house or get medical services using your name.  Give your personal information to police during an arrest. If they don't show up for their court date, a warrant for arrest is issued in your name.
  • 11. ARE YOU A VICTIM OF AN ID THEFT?  If you are a victim of the ID theft, you need to take the following steps:  Filea police report  Check your credit reports  Notifying creditors  Disputing any unauthorized transactions  Change all account numbers immediately
  • 12. ABAGNALE – “STEALING YOUR LIFE”  The author of quot;Stealing Your Life,quot; Abagnale spent his youth stealing people's identities.  After five years in jail, Abagnale reformed, eventually teaching the FBI how to catch white-collar criminals.  His story was the basis for the 2002 movie quot;Catch Me If You Canquot; starring Leonardo DiCaprio.
  • 13. WHAT STEPS CAN YOU TAKE TO AVOID ID THEFT?  According to Abagnale:  Never Use a Debit Card or Check to make a purchase  Always make sure the online shopping store has it's link starting with HTTPS which stands for secured transport layer  Sign up for a credit alerting system  use a good anti-virus, phishing and firewall software  Always make sure the link that you click on from an email is legit
  • 15. NATIONAL ID CARD (Cont.)  Events of 9-11 resurrected the debate over the National ID Card for Americans  Pros:  More reliable  Reduce illegal immigration  Reduce crime  Cons:  Does not guarantee that the identity of an individual is that person's actual identity  Impossible to create a biometric based national id card that is 100% secure  No evidence that national id cards reduce crime  Easier for govt. to perform data mining on its citizens  Very hard to erase wrong information from the record
  • 17. REAL ID ACT (Cont.)  In May 2005, President George W. Bush signed the REAL ID act.  Requires every state to issue new driver licenses.  Licenses must meet the following federal standards:  full legal name  Dob  Gender  license number  digital photograph  legal address  signature
  • 18. REAL ID ACT (Cont.)  PROS  Law enforcement is easier  Criminals cannot change their identity  CONS  Machine-readable information is easier to steal  Every staff of govt. agencies would have access to every information for every citizen  Some say personal information floating around the cyberspace is insignificant compared to what would be available through real id act
  • 19. REFERENCES  Michael J. Quinn, “Ethics for the information age”, Addison Wesley, 3rd edition.  Andrea Coombes, “Expert advice – Tech-industry experts tell how they avoid ID theft and other online threats”, Market Watch.  Consumer’s Union, “CONSUMERS UNION URGES CONGRESS & STATE LEGISLATURES TO ADOPT IDENTITY THEFT PROTECTIONS”, http://www.consumersunion.org/finance/prevent_idthef t.htm  Federal Trade Commission, “Fighting Back Against Identity Theft”, http://www.ftc.gov/bcp/edu/microsites/idtheft/