identity theft

47
Identity Theft Mystery of The Stolen Identity Take Charge of Your Finances

Upload: deacon

Post on 04-Jan-2016

28 views

Category:

Documents


0 download

DESCRIPTION

Mystery of The Stolen Identity. Take Charge of Your Finances. Identity Theft. Solve the Mystery. “ Unlucky ” Lucy is one of the many victims of identity theft. What is identity theft?. Identity Theft. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Identity Theft

Identity Theft

Mystery of The Stolen Identity

Take Charge of Your Finances

Page 2: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 2Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Solve the Mystery

“Unlucky” Lucy is one of the many victims of identity theft

What is identity theft?

Page 3: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 3Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Identity Theft

IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or

account information

The FTC is a government agency that focuses on consumer protection

Page 4: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 4Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Identity Theft Statistics

According to the Federal Trade Commission, how

many identity theft complaints were filed in

2008?

313, 982 identity theft complaints

According to the U.S. Department of Commerce,

what percentage of identity theft victims in

2008 were under the age of 20?

7% of identity theft victims were under 20 years of

age

Take a guess!

Page 5: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 5Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

• 10% of identity theft victims during 2005 reported personal expenses of more than $1200

• 11% of victims in 2005 reported that it took 3 or more months to resolve the problems associated with identity theft after they discovered that their information was being misused

Identity Theft

Victims may have to spend time and money trying to fix the

problems that are caused by thieves

Page 6: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 6Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Personal Information

Identity thieves try to obtain personal

information from victims in order to steal

their identities.

Personal Informatio

n

Page 7: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 7Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Personal Information

Search your purses, wallets, and backpacks.

What are you carrying with you right now

that reveals your personal information?Drivers License Social Security

Card Checkbook

Credit and Debit Cards

Insurance Cards

Page 8: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 8Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Personal Information

• Making purchases with a check, credit or debit card

• Applying for a credit card or loan• Online or telephone shopping• Paying bills through the mail or online• Going to the doctor

What daily activities require an individual

to share personal information?

Page 9: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 9Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Solve the Mystery

Listen carefully and take very accurate notes to help Lucy find the person who stole her

identity

Page 10: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 10Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Colonel

Mustard

Searched through

Lucy’s outgoing mail

How Do They Do It?

The inspector has identified 4 suspects in Lucy’s case.How does the inspector

believe the suspects stole Lucy’s

identity?

Professor

PlumSearched Lucy’s

online banking

website

Mrs. WhiteSearched through Lucy’s discarded mailMrs. Peacock

Guessed Lucy’s PIN number

Page 11: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 11Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

• Thieves obtain personal information through a variety of methods:– Stealing - Information is taken from a purse or wallet, personnel

records from a workplace, tax information, bank or credit card statements, or pre-approved credit card offers from the mail.

– Diverting Mail - Thieves can complete a change of address form and have the victim’s bills and statements mailed to a different location.

– “Dumpster Diving” - Personal information is discarded and thieves remove it from the trash.

– Skimming - Thieves attach a device to card processors to steal credit and debit card information

How Do They Do It?

Page 12: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 12Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

• Methods continued...– Phishing - Thieves use a form of electronic communication (usually

email) to pretend to be a company or depository institution in order to get the victim to give up their personal information.

– Pretexting - Thieves use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources. 

– Spyware - Software installed on the victim’s computer, without their knowledge or consent, that monitors internet use, sends pop up ads, re-directs the computer to other sites, and tracks key strokes.

– Hacking - Information is stolen by breaking into a computer system.

How Do They Do It?

Page 13: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 13Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

What Identity Thieves Do With Information

The thief has been using Lucy’s credit card to make

their own purchases

What has the identity thief done with

Lucy’s personal information so far?

Page 14: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 14Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

• Apply for a new driver’s license• Open new bank accounts• Apply for credit cards or store credit accounts• Obtain cash with bank cards• Get a job• Rent an apartment• Take out student loans• File for bankruptcy

What Identity Thieves Do With Information

What can identity thieves do if they obtain personal

information?

Page 15: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 15Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Many actions can be taken to help minimize the risk of identity theft

• Mail her documents from a secure post office location

• Use a PIN number that is not easy to guess• Shred documents that contain personal information• Make sure to log out of any online banking sites• Never give personal information out over the phone

or email

What could Lucy have done to help prevent her identity from being

stolen?

Page 16: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 16Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Wallets and Purses•Only carry what is necessary- do NOT carry social security cards, passports, or birth certificates

•Do not hang purses from a chair in a public place

•Use purses that close securely

Page 17: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 17Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Credit and Debit Cards•Close unwanted accounts in writing and by phone and cut up the card•Memorize the PIN number and do not use easily accessible numbers (date of birth, address, etc.)•Sign back of cards with signature &“Please see ID”•Do not give out account numbers unless making a transaction that is initiated by the consumer rather than responding to telephone or e-mail solicitations•Check statements regularly for any errors or signs of fraudulent use

Page 18: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 18Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Credit Card Offers•Shred credit card offers and applications. *a cross-cut shredder is safest because it is more difficult to reassemble

•Cut up or shred pre-approved credit card offers that are not used

•“Opt-out” of pre-screened credit offers for five years at www.optoutprescreen.com

Page 19: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 19Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Mail•Shred all credit card offers, bills, statements, and anything else that contains personal information•Deposit outgoing mail in secure post office collection boxes•Contact the post office and request a vacation hold when unable to pick up mail•Do not leave mail in an unsecured mailbox overnight or for a long period of time

Page 20: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 20Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Email•Keep your username and password protected

•Use a password that is a combination of words, numbers, and symbols and cannot be easily found (do not use names, birthdays, addresses, etc.)

•Verify the source of an email asking for personal information by calling the company to confirm the email is from them

Page 21: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 21Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Telephone•Verify the source of any phone call asking for personal information by calling the company to confirm the phone call is from them and not a potential identity thief using their name. Use the phone number listed on your account statement or in the telephone book.

Page 22: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 22Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Computer Security•Use anti-virus and anti-spyware software and update them regularly•Do not click on links found in pop-up ads•Only download software from trusted websites•Set web browser security to medium-high or high•Keep operating system and web browser software updated•Do not give out any personal information unless making a purchase•Choose security questions with answers only you would know

Page 23: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 23Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Computer Security- Continued•Watch for clues that might indicate a computer is infected with spyware. such as a stream of pop-up ads, random error messages, and sluggish performance when opening programs or saving files.•If it is suspected that a computer is infected with spyware, immediately stop shopping, banking or doing any other online activity that involves user names, passwords, or other sensitive information. Then, confirm that the security software is active and current and run it to scan the computer for viruses and spyware, deleting anything the program identifies as a problem.

Page 24: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 24Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Social Networks, Blogs, & Chat Rooms•Consider joining only sites that limit access to posts to a defined group of users. Make sure you know how the site access works before joining. Don’t join sites that allow anyone to view postings.

•Never post your full name, Social Security Number, bank or credit card information, address, or phone number.

•Avoiding posting information that could be used to indentify you offline such as school, work, or other locations where you spend time.

Page 25: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 25Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Social Networks, Blogs, & Chat Rooms- Continued

•Use privacy settings to restrict who can access personal sites

•Remember that once information is posted online, it cannot be taken back. Even if information is deleted, older versions may still exist on other people's computers and be circulated online

•Only post information that you are comfortable with anyone viewing

Page 26: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 26Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Internet Purchases•Look for “https” or a picture of a lock after the URL or in the bottom right hand corner indicating the site is secure

•Do not give any personal information on a site if it is not secure

•Enter the website address yourself rather than following a link from an email or internet advertisement

•Use a credit card instead of a debit card when making online purchases

“https” s = secure

Page 27: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 27Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Social Security Number•Memorize Social Security number•Keep Social Security card in a safe place (do not carry it in wallet)•Only give a Social Security number when absolutely necessary- ask why a Social Security number is needed and how the information will be protected•Do not print a social security number on check blanks

Page 28: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 28Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Preventing Identity Theft

Credit Reports•Check credit reports with each of the three reporting agencies at least once a year •Consumers receive one free credit report from each of the reporting agencies every year, so ordering one credit report from one agency every four months will keep consumers up to date and constantly alerted to their credit report status•Immediately dispute any wrong information

Page 29: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 29Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

3 Credit Reporting Agencies

Experian

PO Box 2104Allen, TX 75013-2104

Report Order: 1-888-397-3742

Fraud Hotline: 1-888-397-3745

www.experian.com

Trans Union

PO Box 390Springfield, PA 19064-0390

Report Order: 1-800-888-4213

Fraud Hotline: 1-800-6807289

www.tuc.com

Equifax

PO Box 105873Atlanta, GA 30348

Report Order: 1-800-685-1111

Fraud Hotline: 1-800-525-6285

www.equifax.com

To order a credit report from any of the three reporting agencies,

use the following website: www.annualcreditreport.com

Page 30: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 30Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

• Protect your Social Security number by only giving it out when absolutely necessary

• Keep usernames and passwords safe- use a combination of letters, numbers, and symbols that are not easily identified

• Select security check questions with answers only you would know

• Don't give out personal information over the phone, through the mail, or on the Internet unless you've initiated the contact and are sure you know who you're dealing with

Preventing Identity Theft

Key Guidelines

Page 31: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 31Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

• Check credit reports at least once per year• Shred all documents that contain personal

information• Be careful using the Internet. Only give out

personal information when making a purchase on a secure website

• Search your name occasionally to see if any unusual information appears

• Be observant and follow your instincts

Preventing Identity Theft

Key Guidelines

Page 32: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 32Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Recognizing Identity Theft

How did Lucy find out that heridentity had been stolen?

Could Lucy have recognized the

identity theft earlier? If so, how?

Her credit card was denied in a store

She could have checked her online banking more often and then she would have

recognized the extra charges on her credit card

Page 33: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 33Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Recognizing Identity Theft

• New accounts or charges you didn’t make

• Calls from collection agencies

• Incorrect information on your credit report

Early detection is key!

• Being denied credit when there is no reason to be

• Missing bills or mailed statements

Watch for the following signs

Page 34: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 34Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

What To Do If Identity Theft Happens

What steps did Lucy take when she discovered her identity had been stolen?

She filed a report with the local police

What should have Lucy done when she discovered the identity theft?

Page 35: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 35Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

What To Do If Identity Theft Happens

Page 36: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 36Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

What To Do If Identity Theft Happens

Page 37: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 37Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Deter, Detect, Defend-Avoid Identity theft

Hear stories from real-life identity theft victims on the FTC’s “Deter, Detect, Defend- Avoid Identity Theft” video

http://www.ftc.gov/bcp/edu/microsites/idtheft/video/avoid-identity-theft-video.html

Page 38: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 38Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Personal Liability

• Credit Cards– Truth in Lending Act limits liability for

unauthorized charges to $50.00 per card– A letter must be received by the creditor within

60 days of the first bill containing the error– The dispute must be resolved within 90 days of

the creditor receiving the letter

Since Lucy discovered the theft very quickly, she will only be liable for $50.00 in charges on her

credit card!

Page 39: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 39Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

• ATM and Debit Cards– The Electronic Funds Transfer Act provides

protection– The amount a person is liable for depends

upon how quickly the loss is reported• Within two days: maximum $50.00• Within sixty days: maximum $500.00• After sixty days a person may be liable for

everything

Personal Liability

Page 40: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 40Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

• Checks– Contact the financial institution and stop

payment– Most states hold the financial institution

responsible for losses of a forged check

Personal Liability

Page 41: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 41Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Identity Theft Protection

• Offered by banks and other companies

• Services– Closely monitor accounts and personal

information– Alert consumer when there is a change– Help resolve any problems if identity

theft does occur

Page 42: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 42Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

• Cost– $5.00 to $35.00 per month– Depends on amount of services

provided

• Can NOT eliminate identity theft but can help prevent it

Identity Theft Protection

Page 43: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 43Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Identity Theft Protection

Pros Cons

Convenient CostSaves consumer time because they don’t have to monitor their own accounts and credit reports

Most of the services offered can be completed by the consumer for no cost

What are the pros and cons

of identity theft protection?

Page 44: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 44Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Identity Theft Insurance

Page 45: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 45Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

• Directions– Divide into 4 groups– Each group will take turns verbally answering a

question about identity theft– If the question is answered correctly, the group will

receive a clue that will help reveal Lucy’s identity thief– If the question is answered incorrectly, play will move

on to the next group and the group that answered incorrectly will not receive a clue

– Play will continue until all 12 clues have been won- each group will have at least 3 chances to receive a clue

“Solve the Mystery”

Activity

Page 46: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 46Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Who is Lucy’s identity thief?

Make your guess!

Who Did It?

Colonel

Mustard

Searched Lucy’s

outgoing mail in the

conservatoryProfessor

PlumSearched Lucy’s

online banking

website in the library

Mrs. WhiteSearched Lucy’s discarded mail in the kitchen

Mrs. PeacockGuessed Lucy’s PIN number in the hall

Page 47: Identity Theft

1.3.1.G1

Identity Theft

© Family Economics & Financial Education – Revised May 2010– Consumer Protection Unit – Identity Theft – Slide 47Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America

Institute at The University of Arizona

Solve the Mystery

Find out who the true identity thief is!