SlideShare una empresa de Scribd logo
1 de 10
Identity Theft: Form of stealing an
individuals identity in which someone
pretends to be someone else by assuming
that person’s identity. (Wikipedia)
TYPES OF IDENTITY THEFT
Identity Cloning and Concealment: When and identity
thief impersonates someone else in order to conceal
their own true identity.
Examples are illegal immigrants, people hiding from
creditors, or individuals wanting to become
anonymous for personal reasons.
Criminal Identity Theft: when a criminal fraudulently
identifies himself to police as another individual.
These individuals have either stolen state-issued identity
documents or have presented a fake id.
Synthetic Identity Theft: variation of identity theft in which
identities are completely or partially fabricated.
The most common technique involves combining a real social
security number and a name and birthdate other than the
ones associated with the number.
This new form of identity theft is very difficult to track
because it does not show on a persons credit report
directly, it actually may appear as an entire new file in the
credit bureau’s file system.
Medical Identity Theft: When someone seeks medical
care under the identity of another person. In addition
to financial harm the thief's medical history may be
added to the victims medical records.
Financial Identity Theft: when an individual wrongfully
obtains and uses another person’s personal data in
some way that involves fraud for economic gain.
Each year approximately 15 million Americans are
identity theft victims with financial losses averaging
3,500.
Identity theft can happen from third parties, an
example is when a data breach has occurred and the
perpetrators obtain vital information for financial
gain. (read more in this Forbes article)
HOW TO PROTECT YOURSELF
Immediate Steps:
1) Place an initial fraud alert
2) Order your credit reports
3) Create an identity theft report
1) Federal Trade Commission shows you how
CREDIT BUREAU
The three major credit bureaus are:
1) Equifax
2) Experian
3) TransUnion
Learn more at USA.gov
SOURCES
Department of Justice

Más contenido relacionado

Similar a Identity theft

Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
jwnollet
 
Creating a New Identity (How Far Can You Go)Creating a ne.docx
Creating a New Identity (How Far Can You Go)Creating a ne.docxCreating a New Identity (How Far Can You Go)Creating a ne.docx
Creating a New Identity (How Far Can You Go)Creating a ne.docx
willcoxjanay
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
danc752
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Randall Chesnutt
 

Similar a Identity theft (17)

Identity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the DifferencesIdentity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the Differences
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Creating a New Identity (How Far Can You Go)Creating a ne.docx
Creating a New Identity (How Far Can You Go)Creating a ne.docxCreating a New Identity (How Far Can You Go)Creating a ne.docx
Creating a New Identity (How Far Can You Go)Creating a ne.docx
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Theft - If you are me, then who am I
Identity Theft - If you are me, then who am IIdentity Theft - If you are me, then who am I
Identity Theft - If you are me, then who am I
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Identity theft

  • 1.
  • 2. Identity Theft: Form of stealing an individuals identity in which someone pretends to be someone else by assuming that person’s identity. (Wikipedia)
  • 3. TYPES OF IDENTITY THEFT Identity Cloning and Concealment: When and identity thief impersonates someone else in order to conceal their own true identity. Examples are illegal immigrants, people hiding from creditors, or individuals wanting to become anonymous for personal reasons.
  • 4. Criminal Identity Theft: when a criminal fraudulently identifies himself to police as another individual. These individuals have either stolen state-issued identity documents or have presented a fake id.
  • 5. Synthetic Identity Theft: variation of identity theft in which identities are completely or partially fabricated. The most common technique involves combining a real social security number and a name and birthdate other than the ones associated with the number. This new form of identity theft is very difficult to track because it does not show on a persons credit report directly, it actually may appear as an entire new file in the credit bureau’s file system.
  • 6. Medical Identity Theft: When someone seeks medical care under the identity of another person. In addition to financial harm the thief's medical history may be added to the victims medical records.
  • 7. Financial Identity Theft: when an individual wrongfully obtains and uses another person’s personal data in some way that involves fraud for economic gain. Each year approximately 15 million Americans are identity theft victims with financial losses averaging 3,500. Identity theft can happen from third parties, an example is when a data breach has occurred and the perpetrators obtain vital information for financial gain. (read more in this Forbes article)
  • 8. HOW TO PROTECT YOURSELF Immediate Steps: 1) Place an initial fraud alert 2) Order your credit reports 3) Create an identity theft report 1) Federal Trade Commission shows you how
  • 9. CREDIT BUREAU The three major credit bureaus are: 1) Equifax 2) Experian 3) TransUnion Learn more at USA.gov