SlideShare una empresa de Scribd logo
1 de 9
Image credit: http://www.heyuguys.co.uk/identity-thief-uk-trailer-poster/identity-thief-uk-quad-poster/
What is Identity Theft?
Using someone else’s personal
and/or financial information in order
to take on their identity and commit
crimes such as fraud
Identity Theft: Problem and Solutions
• Identity Theft as a Social Problem
• Magnitude
• Negative Effects
• Cause
• Solution
• Prevention
Magnitude
• Technological and non-technological
• Affects millions annually and costs
billions of dollars
• Audience survey: most of you have
suffered effects of identity theft in some
way
NEGATIVE EFFECTS
• Drained bank account
• Stolen tax refund
• Give your name during
arrest
• Get treatment using your
health insurance
Image credit: http://www.identity-theft-scout.com/identity-theft-
prevention.html
CAUSES
• Like other theft: greed
and desperation
• Data breaches
• Using unsecured wireless
networks
• Stolen wallet or laptop
• Improperly disposing of
personal/financial info
Image credit: http://www.makeuseof.com/tag/9-ways-prevent-identity-theft-online-
activities/
What’s the Solution? Prevention!
• Third parties work to prevent identity theft
• Steps that individuals can take:
• Monitor bank and credit statements
• Shred personal/financial documents
• Avoid unsecured wireless networks
• Use strong, unique passwords for each
website
• Pay attention to phishing emails/texts
• Avoid carrying important documents with you
TIPS
• Use Paypal and
1Password
• Make use of fraud
monitoring by banks
and/or credit companies
• Buy a shredder
• Continue to protect
yourself and your
information! Encourage
others to do the same.
Image credit: http://www.identitytheftpreventiontips.com/how-to-avoid-
identity-theft/
Let’s Summarize…
• Identity theft is a social problem
• Affects millions and costs billions annually
• Negative effects like drained bank account and tax
fraud
• Caused by negligence
• Prevention is the solution!
• Take steps to lock up your identity.
• Avoid the headache of dealing with the consequences
of identity theft by preventing it from happening in the
first place.
• Share tips with friends and family to stop identity
thieves.

Más contenido relacionado

Destacado

Digital Influence in a Network Economy
Digital Influence in a Network EconomyDigital Influence in a Network Economy
Digital Influence in a Network Economy
Sparxoo
 
473 2015 up political tolerance competence (1 21-15)
473 2015 up political tolerance competence (1 21-15)473 2015 up political tolerance competence (1 21-15)
473 2015 up political tolerance competence (1 21-15)
mpeffl
 
Crime In The Us
Crime In The UsCrime In The Us
Crime In The Us
tspeck7
 
Competencia cotorra de historia
Competencia cotorra de historiaCompetencia cotorra de historia
Competencia cotorra de historia
Zona Escolar 415
 
Dan Jones Presentation 21st Century Parks
Dan Jones Presentation   21st Century ParksDan Jones Presentation   21st Century Parks
Dan Jones Presentation 21st Century Parks
rendo
 

Destacado (9)

Digital Influence in a Network Economy
Digital Influence in a Network EconomyDigital Influence in a Network Economy
Digital Influence in a Network Economy
 
Sparxoo Creative Portfolio
Sparxoo Creative PortfolioSparxoo Creative Portfolio
Sparxoo Creative Portfolio
 
473 2015 up political tolerance competence (1 21-15)
473 2015 up political tolerance competence (1 21-15)473 2015 up political tolerance competence (1 21-15)
473 2015 up political tolerance competence (1 21-15)
 
Crime In The Us
Crime In The UsCrime In The Us
Crime In The Us
 
Focus on Non-fiction: "Write About It" Session C
Focus on Non-fiction: "Write About It" Session CFocus on Non-fiction: "Write About It" Session C
Focus on Non-fiction: "Write About It" Session C
 
Personal Cultural Presentation
Personal Cultural PresentationPersonal Cultural Presentation
Personal Cultural Presentation
 
Competencia cotorra de historia
Competencia cotorra de historiaCompetencia cotorra de historia
Competencia cotorra de historia
 
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
 
Dan Jones Presentation 21st Century Parks
Dan Jones Presentation   21st Century ParksDan Jones Presentation   21st Century Parks
Dan Jones Presentation 21st Century Parks
 

Similar a ID

PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
DoubleXDS
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
DoubleXDS
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
Jermaine Smith
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
mherr_riskconsult
 

Similar a ID (20)

H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy
 
Identity theft
Identity theftIdentity theft
Identity theft
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
ID Shield Services and Features
ID Shield Services and Features ID Shield Services and Features
ID Shield Services and Features
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

ID

  • 2. What is Identity Theft? Using someone else’s personal and/or financial information in order to take on their identity and commit crimes such as fraud
  • 3. Identity Theft: Problem and Solutions • Identity Theft as a Social Problem • Magnitude • Negative Effects • Cause • Solution • Prevention
  • 4. Magnitude • Technological and non-technological • Affects millions annually and costs billions of dollars • Audience survey: most of you have suffered effects of identity theft in some way
  • 5. NEGATIVE EFFECTS • Drained bank account • Stolen tax refund • Give your name during arrest • Get treatment using your health insurance Image credit: http://www.identity-theft-scout.com/identity-theft- prevention.html
  • 6. CAUSES • Like other theft: greed and desperation • Data breaches • Using unsecured wireless networks • Stolen wallet or laptop • Improperly disposing of personal/financial info Image credit: http://www.makeuseof.com/tag/9-ways-prevent-identity-theft-online- activities/
  • 7. What’s the Solution? Prevention! • Third parties work to prevent identity theft • Steps that individuals can take: • Monitor bank and credit statements • Shred personal/financial documents • Avoid unsecured wireless networks • Use strong, unique passwords for each website • Pay attention to phishing emails/texts • Avoid carrying important documents with you
  • 8. TIPS • Use Paypal and 1Password • Make use of fraud monitoring by banks and/or credit companies • Buy a shredder • Continue to protect yourself and your information! Encourage others to do the same. Image credit: http://www.identitytheftpreventiontips.com/how-to-avoid- identity-theft/
  • 9. Let’s Summarize… • Identity theft is a social problem • Affects millions and costs billions annually • Negative effects like drained bank account and tax fraud • Caused by negligence • Prevention is the solution! • Take steps to lock up your identity. • Avoid the headache of dealing with the consequences of identity theft by preventing it from happening in the first place. • Share tips with friends and family to stop identity thieves.