36
Fraud

Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Embed Size (px)

Citation preview

Page 1: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Fraud

Page 2: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Identity Theft

• -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission.

• This can create huge problems for you…

Page 3: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Cleaning up the mess

• People whose identities have been stolen can spend…

• Months to even YEARS and can cost THOUSANDS of dollars to clean up the mess thieves leave.

Page 4: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Once your identity is stolen…

• Thieves have many options once they have your identity, INCLUDING:

• 1) Open new credit card accounts– When they don’t pay, it shows up on your credit

report• 2) Opening new checking accounts and writing

bad checks in your name• 3) Forging your signature on blank checks and

draining all the money in your account

Page 5: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Thieves may…

• 4) File for bankruptcy under your name to avoid paying debts they’ve incurred under your name to avoid eviction.

Page 6: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Thieves may…

• 5) Buy a car buy taking out a loan under your name and information

Page 7: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Thieves may…

• 6) Get a driver’s license issued in your name but have their picture.

Page 8: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Thieves may…

• 7) Give your name during an arrest. If they don’t show up for their court date, then you have a warrant out for your arrest.

Page 9: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Thieves may…

• 8) Changing the billing address on your credit card.– They may also complete a “change of address”

form at the post office– This will make all your bills go to their house which

will allow them free range of all your personal information.

Page 10: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Crafty Thieves

• “Fishing for Mail”

Page 11: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Crafty Thieves

• “Dumpster Divers”

Page 12: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Crafty Thieves

• “Skimming”• Use of electronic devices that thieves put in

ATMs and many now are inserting them into Gas Pumps.

Page 13: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Crafty Thieves

• “Pretexting”• Thieves call to tell you there’s

been a “problem” with one of your financial accounts.

• They then ask, “Please give us your address and account number to verify your identity.”

• Real companies verify your identity by asking “mother’s maiden name,” not your account #.

• Only give out personal information if you call the company.

Page 14: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Internet Thieves

• “PHISHING”• E-mail or pop-up

message that looks like a bank or other financial institution, indicating there is a problem with your account.

• Will have a link to “click” to “update” your account information.

Page 15: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

1

SCAMMED!

5-N

The news of my father death, and my uncle,s involvement in an air crash in december 2002 while on a business trip to benin republic caused my mother heartfailure and other related complications of which she later died in the hospital After we have spent a lot of money on her.

Before our mother died, she told us that our father deposited some money which he made from diamond sales and contracts at this bank here in Ivory Coast and that we should pray and find a trust worthy foreign business partner who would help us to transfer and invest this money in profitable business venture overseas.She told us to do this quickly so that we can leave Ivory Coast and, then settle down abroad. She gave us the bank document to prove the deposit and then told us that my father used my name as the next of kin and beneficiary to the money in the bank in the event of his death.

If you are willing to assist us, please let us know immediately so that you will arrange the transfer of the money to your account with the bank.

What’s Going on Here?

What’s Going on Here?

2

Page 16: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Internet Thieves• “FREEWARE or FREE

SOFTWARE”• Example: LIMEWIRE• File sharing freeware is

especially bad as it allows criminal’s free rein of your computer.

• Check the software’s sharing permissions.– If you don’t, you may not notice

that you are giving others access to your entire hard drive, including tax returns.

• Not all “freeware” is bad, but you must be careful with it.

• If you intend to use this, make sure you read the agreements to see what you’re saying “yes” to.

Page 17: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Internet Thieves

• “SPYWARE”• Bad side effect of free

downloads – even those sent to you by friends or co-workers.

• Spyware monitors or can even control your computer use.

• Spyware is used to send you pop-up ads, redirect your computer to unwanted Web sites, monitor your Internet surfing, or record your keystrokes, which could lead to identity theft.

Page 18: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Dealing With Deception

• You walk up to an ATM and a guy who appears to be waiting his turn walks up behind you. But he’s uncomfortably close—right over your shoulder—as you get ready to enter your PIN.

5-O-1

What should you do?

1 of 7

Page 19: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

• You’re at a cash register in a store and have given the clerk your credit card. She holds on to it, probably to verify your signature. But then she says she needs to grab something from the back and starts to walk away with your card in hand.

5-O-2

What should you do?

Dealing With Deception2 of 7

Page 20: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

• A caller says she’s from your credit card company and wants to offer you a higher credit limit for being such a good customer. You reply, “Great, what do I have to do?” And she tells you to give her your Social Security number for verification.

5-O-3

What should you do?

Dealing With Deception3 of 7

Page 21: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

• You’ve found a pair of shoes at a great price on a Web site you just found. You start the check-out process and notice that the padlock at the bottom of your computer screen is open and that the Web page address starts with “http” instead of “https.”

5-O-4

What should you do?

Dealing With Deception4 of 7

Page 22: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

• You get an E-mail from an online bookstore you frequently buy from. It says that the credit card on your account has expired and gives you a link to update your information.

5-O-5

What should you do?

Dealing with Deception5 of 7

Page 23: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

• Your friend sends you an E-mail about cool new software that lets you share music with others for free. He sends you the link to download the software, which is from a site you’ve never heard of.

5-O-6

What should you do?

Dealing With Deception6 of 7

Page 24: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

• You’re bummed out about losing in an online auction. But then you get an E-mail stating the winner backed out and that you can have the item if you still want it, and to just send your credit card information via E-mail.

5-O-7

What should you do?

Dealing With Deception7 of 7

Page 25: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

10 SMART STEPS to PROTECT YOUR IDENTITY

Page 26: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Step 1

• Don’t leave your wallet, credit card statements, checkbook, lying around – Even in your car. – Also, don’t carry your SS card with you.

• FTC (Federal Trade Commission) estimates that 25% of victims know the identity thief.

Page 27: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Step 2

• Sign new credit cards as soon as you receive them.

• Cut up and discard expired cards.• Tear/Shred unwanted “pre-approved” credit

card applications.

Page 28: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Step 3

• When you sign receipts, draw a line through any blank spaces above the total.

Page 29: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Step 4

• Never give your Credit card # or SSN to anyone over the phone unless you initiated the call.

• NEVER SEND THESE VIA EMAIL….EMAIL IS RARELY SECURE.

Page 30: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Step 5

• Always keep PINs for your credit/debit card completely confidential.

• DON’T WRITE THEM ON YOUR CARDS.

Page 31: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Step 6

• Review your monthly bank statements carefully to make sure you don’t have any unauthorized charges.

Page 32: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Step 7

• Shred any information that has your SSN or any account # on it that you don’t need.

• Best optimal shredder is Diamond Cut Shredder

Page 33: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Step 8

• On your computer, install and use FIREWALL, ANTI-VIRUS, and ANTI-SPYWARE software.

• Keep these up to date

Page 34: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Step 9

• Don’t fall for scams.• Legitimate businesses that call you WON’T ask

you for your account # or your SSN.

Page 35: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create

Step 10

• When you buy something on the Internet, check that the page is SECURE before entering your credit card number.

• You will see a symbol of a “padlock” or “unbroken key” in the bottom browser.

• OR, the sites address starts with “https”– NOTICE THE “s.” That stands for “secure”

Page 36: Fraud. Identity Theft -Occurs when someone uses your name, SSN, credit card number, or other personal information without your permission. This can create