16
MAHARISHI ARVIND INSTITUTE OF ENGINEERING AND TECHNOLOGY Seminar on Information Technology Acts (IDENTITY THEFT) Submitted By RAHUL SUHALKA 08EMTCS088

Id Theft Ppt

Embed Size (px)

Citation preview

Page 1: Id Theft Ppt

MAHARISHI ARVIND INSTITUTE OF ENGINEERING AND TECHNOLOGY

Seminar on Information Technology Acts

(IDENTITY THEFT)

Submitted By RAHUL SUHALKA

08EMTCS088

Page 2: Id Theft Ppt

“When Bad Things Happen To Your Good Name”

Identity Theft

Page 3: Id Theft Ppt

Identity TheftDuring the course of a busy day, you may:

Write a check Use a charge card Send out a payment in the mail Order merchandise via the phone or internet

A multitude of identity-related tasks occur every day, putting you at risk for identity theft.

Page 4: Id Theft Ppt

Identity Theft

Identity theft is a newer type of crime that emerged in the past decade. Criminals will attempt to use your personal information for unauthorized purchases. An example of this is to use your information to open a credit card account in your name without your knowledge.

Page 5: Id Theft Ppt

How Identity Theft Occurs Stolen wallets or purses containing ID and

credit cards. Stolen mail, both incoming and outgoing. This

may include bank and credit card statements, personal checks, tax information, etc.

Trash rummaged through at your home or a business you visited.

Intercepted or diverted internet activity.

Page 6: Id Theft Ppt

What They Do With Your ID

Open credit card accounts in your name using a false address.

Establish phone or wireless service in your name.

Open bank accounts and write bad checks in your name.

Take out loans in your name.

Page 7: Id Theft Ppt

7

Page 8: Id Theft Ppt

8

Page 9: Id Theft Ppt

Identity Theft Prevention

You can not completely prevent ID theft from occurring.

You can reduce the chances of it happening to you by taking precautionary steps.

If you realize your identity has been stolen, call the Cyber Cops for assistance.

Page 10: Id Theft Ppt

Minimize Your Risk When supplying information, find out how it will

be used, who gets it, and if it will be sold to others.

Pay attention to your credit card bills, watch for activity you didn’t conduct, note your billing cycles and look for the bill in the mail.

Guard your mail from theft. Put outgoing mail in the post office, not in your mailbox.

Don’t give out your personal information unless you know who you are giving it to and how it will be used.

Page 11: Id Theft Ppt

Minimize Your Risk Keep items containing personal information in

a safe place. Don’t leave personal items out in the open, even in your room or office.

Shred or tear up ALL unneeded receipts.

Order a copy of your credit report annually and review it. Make sure it is accurate.

Page 12: Id Theft Ppt

ID Theft• Prevention begins with you.

• Don’t give out your information freely.

• Keep a close eye on your credit card bills.

• Never leave your wallet or purse unattended.

• If you find that your identity has been used, report it to the local police, credit bureaus, and the creditor involved as soon as possible.

Page 13: Id Theft Ppt

When Your Identity is Stolen…

1. Contact the fraud department in each of the three credit bureaus.

2. Contact the creditors of any accounts that have been opened or tampered with.

3. File a report with the local police department or the police department where the theft took place. The TUPD will take ID theft reports and investigate the incident.

Always insist on a written police report and obtain a copy as soon as you can.

Page 14: Id Theft Ppt

What Next?

For, stolen mail contact the Indian Postal Inspector

Contact your credit card companies and verify that no unauthorized activity has occurred. Advise them to be on the lookout for new account requests.

Close any bank accounts that have been tampered with immediately. Open new accounts with new PINs. This includes savings, checking, IRAs, etc.

Page 15: Id Theft Ppt

Applicable Laws Section 419 IPC: When the fraudster by stolen identifying

information impersonates the victim to commit fraud or cheating.

Section 420 IPC: When the fraudster deceive people into disclosing valuable personal data in the nature of identifiable information which is used later to swindle money from victim account.

Section 468 IPC: When the fraudster commits forgery of website which is in the nature of electronic record to lure the victims to pass their identifiable information in order to cheat them.

Section 471 IPC: When fraudster fraudulently or dishonestly uses as genuine, the aforesaid fake website in the nature of electronic record.

Section 66 IT Act: When the fraudster by the stolen identifying information say login id & password, deletes or alter the information or data in the account of the victim in the server which is a computer resource.

Section 67 IT Act: When the fraudster uses the stolen information like profile, personal details & contact details of the victim to create & post obscene profile in the name of the victim on the social networking site.

Page 16: Id Theft Ppt