Download
slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
What is identity theft? How does identity theft occur? How do you protect yourself? PowerPoint Presentation
Download Presentation
What is identity theft? How does identity theft occur? How do you protect yourself?

What is identity theft? How does identity theft occur? How do you protect yourself?

223 Vues Download Presentation
Télécharger la présentation

What is identity theft? How does identity theft occur? How do you protect yourself?

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Identity Theft PRESENTED BY GREENPATH What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit Counselor

  2. What is identity theft?

  3. WHAT IS IDENTITY THEFT? When someone uses your personal or financial information to perform financial transactions in your name, without your knowledge.

  4. WHAT IS IDENTITY THEFT? Turn to page 2 in your workbook.

  5. WHAT IS IDENTITY THEFT? Put the 4 Types of Identity Theft in Order from most common to least common Business Leaks Document Loss Personal Betrayal Computer Crime Turn to page 2 in your workbook.

  6. How does identity theft occur?

  7. HOW IDENTITY THEFT OCCURS Turn to page 3 in your workbook.

  8. HOW IDENTITY THEFT OCCURS • Steal wallets, backpacks, etc. • Steal mail • “Dumpster Dive” • Steal registration and insurance card • Rob your house or business • Email scams • ATM’s • “Skimming” Turn to page 4 in your workbook.

  9. HOW IDENTITY THEFT OCCURS Pharming and Phishing

  10. PHARMING: a process that steals information from unsuspecting internet users.

  11. HOW IDENTITY THEFT OCCURS Pharming – What you can do: • Delete unknown emails • Don’t download attachments • Don’t email personal/financial info • Use a secure website Turn to page 4 in your workbook.

  12. WHICH IS SECURE?

  13. PHISHING: a practice that online fraudsters use to “fish” for confidential passwords and financial data from the “sea” of internet users using email.

  14. HOW IDENTITY THEFT OCCURS Phishing – What you can do: Be aware Don’t be complacent Security over convenience Turn to page 5 in your workbook.

  15. HOW THIEVES USE YOUR INFORMATION • Buy merchandise • Open new accounts • Get a cell phone • Open a bank account • Take out a loan Turn to page 6 in your workbook.

  16. How do I protect myself?

  17. HOW TO PROTECT YOURSELF • Social Security Card • Passwords • Technology • At Home • Out and About • At Work Turn to pages 6-8 in your workbook.

  18. What if I’m a victim of identity theft?

  19. ARE YOU A VICTIM OF • IDENTITY THEFT? • Unexplained charges • Not receiving bills • Receiving credit cards you did not order • Denied credit for no reason • Collection calls • Inaccuracies on credit reports Turn to page 9 in your workbook.

  20. TAKE ACTION Turn to pages 10-11 in your workbook.

  21. TAKE ACTION • Fair and Accurate Credit Transactions • Identity Theft and Assumption Deterrence • Identity Theft Penalty Enhancement • Fair Credit Billing Turn to pages 12-13 in your workbook.

  22. TAKE ACTION • The Electronic Fund Transfer • Fair Credit Reporting

  23. MONITORING YOUR CREDIT • Monitoring system • 3 credit reporting agencies: • Experian • TransUnion • Equifax Turn to pages 13-14 in your workbook.

  24. THANK YOU Jane Doe Certified Consumer Credit Counselor jdoe@greenpath.com