what is identity theft? how does identity theft occur? how do you protect yourself? what do you do...

26
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit Counselor Identity Theft PRESENTED BY GREENPATH

Upload: brandon-baisley

Post on 15-Dec-2015

219 views

Category:

Documents


1 download

TRANSCRIPT

What is identity theft?How does identity theft occur?How do you protect yourself?What do you do if you are a victim?

Jane DoeCertified Consumer Credit Counselor

Identity TheftPRESENTED BY GREENPATH

What is identity theft?

When someone uses your personal or financial information to perform financial transactions in your name, without your knowledge.

WHAT IS IDENTITY THEFT?

Turn to page 2 in your workbook.

WHAT IS IDENTITY THEFT?

Turn to page 2 in your workbook.

WHAT IS IDENTITY THEFT?

Put the 4 Types of Identity Theft in Order from most

common to least common

1) Business Leaks2) Document Loss

3) Personal Betrayal 4) Computer Crime

How does identity theft

occur?

HOW IDENTITY THEFT OCCURS

Turn to page 3 in your workbook.

• Steal wallets, backpacks, etc.• Steal mail• “Dumpster Dive”• Steal registration and insurance card• Rob your house or business• Email scams• ATM’s• “Skimming”

HOW IDENTITY THEFT OCCURS

Turn to page 4 in your workbook.

Pharming and Phishing

HOW IDENTITY THEFT OCCURS

PHARMING: a process that steals information from unsuspecting internet users.

Pharming – What you can do:1. Delete unknown emails2. Don’t download attachments3. Don’t email personal/

financial info4. Use a secure website

HOW IDENTITY THEFT OCCURS

Turn to page 4 in your workbook.

WHICH IS SECURE?

PHISHING: a practice that online fraudsters use to “fish” for confidential passwords and financial data from the “sea” of internet users using email.

1. Be aware2. Don’t be complacent3. Security over convenience

Phishing – What you can do:

HOW IDENTITY THEFT OCCURS

Turn to page 5 in your workbook.

HOW THIEVES USE YOUR INFORMATION

• Buy merchandise• Open new accounts• Get a cell phone• Open a bank account• Take out a loan

Turn to page 6 in your workbook.

How do I protect myself?

HOW TO PROTECT YOURSELF

• Social Security Card• Passwords• Technology• At Home• Out and About• At Work

Turn to pages 6-8 in your workbook.

What if I’m a victim of

identity theft?

ARE YOU A VICTIM OF IDENTITY THEFT?

• Unexplained charges• Not receiving bills • Receiving credit cards you did not

order• Denied credit for no reason• Collection calls• Inaccuracies on credit reports

Turn to page 9 in your workbook.

TAKE ACTION

Turn to pages 10-11 in your workbook.

TAKE ACTION

• Fair and Accurate Credit Transactions

• Identity Theft and Assumption Deterrence

• Identity Theft Penalty Enhancement

• Fair Credit Billing

Turn to pages 12-13 in your workbook.

TAKE ACTION

• The Electronic Fund Transfer

• Fair Credit Reporting

MONITORING YOUR CREDIT

• Monitoring system• 3 credit reporting agencies:• Experian• TransUnion• Equifax

Turn to pages 13-14 in your workbook.

THANK YOUJane Doe

Certified Consumer Credit [email protected]