Cybersecurity and Personal Finance. Identity Theft by Sue Lynn Sasser

Similar documents
What to Know, What to Do Colleen Tressler FTC Division of Consumer & Business Education consumer.ftc.gov IdentityTheft.

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

Workbook 3. Borrowing Money

Personal Finance Unit 2 Chapter Glencoe/McGraw-Hill

CREDIT: HELPFUL OR HURTFUL? Ch 13 Section 1

YOU ARE NOT ALONE Hello, my name is <name> and I m <title>.

Chapter 27. Your Credit and the Law pp

for Newcomers and New Canadians Module 2 How to Build Credit In Canada Student Workbook

protecting yourself Money Management SESSION #6

ID Theft Toolkit and Affidavit

A Special Report by Laura Adams, author of Money Girl s Smart Moves to Grow Rich

Presenting the FNA A Guide to Closing for Business & Recruits

Module 7 - Credit Reporting HANDOUT 7-1

Contents. 1) Protocol for the use of ipads in school

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW

When Your Child s Identity Is Stolen

Instructions for Completing the ID Theft Affidavit

Short Selling Mini-Lesson

What is credit and why does it matter to me?

Notes. The American Center for Credit Education. Promotional Copy. CheckWise by the American Center for Credit Education

Theme 8 Review - Answer Key

Identity thieves use a variety of ways to gain access to your personal information:

ARBITRATION SUBJECT. Appeal of termination for violation of found property policy. ISSUES CHRONOLOGY SUMMARY OF FINDINGS

MEDICAL IDENTITY THEFT Presented by:

A Losing Bet: Binary Options

yourmoney a guide to managing your credit and debt Volume 6 Life After Debt

Unit 5 - Your Money: Keeping it Safe and Secure

Profiles in Credit is designed to be flexible and meet the needs of learners in different educational settings. Examples include:

Credit Matters Credit Concept Workshop Presentation Script (Part II of II)

A Losing Bet: Binary Options

ADVANTAGES OF BANKRUPTCY

The spending maze Try - Activities BBC British Council 2004

Identity Protection 101: Protect your good name from identity theft.

Cyber Incident Response When You Didn t Have a Plan

Math 8.1: Mathematical Process Standards

Just the facts about proving your identity.

Math 5.1: Mathematical process standards

Money Management Choices

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

1. Jake s credit application has been declined because of his negative credit history. Which statement is most likely to be true?

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions

Cigna Healthy Rewards Looking for more healthy choices? WE LL HELP.

Making cards work for you. A public education campaign brought to you by MasterCard

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Chapter 6 - Credit. Section 6.1

Banking Basics. Banks and Credit Unions. Warm-Up Activity. Why should you put your money in a bank?

Banks and Paychecks Role Play

Reading Essentials and Study Guide

MODULE 4 // HOW CREDITWORTHY ARE YOU? HALL OF FAME: AGES 18+

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

Instructions for completing the ID Theft Affidavit

Name Period. Finance charge Loan term Grace period Late fee Cash Advance Fee Prepayment Penalty Origination Fee Amortization Collateral Capital

Fraudulent Check, Credit Card Fraud and ID Theft Guide

FWA HSBC Financial Backpack Program

CreditReport.LifeTips.com

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Discover How To PROTECT Yourself From the IRS In Case You Get An Income Tax Notice or Audit

FINANCIAL FOUNDATIONS

Keeping Score: Why Credit Matters

Farewell Summer. & Hello Fall! Leigh & Shannon

Take Charge: Fighting Back Against Identity Theft 37

Instructions for Completing the ID Theft Affidavit

An update from Pace. What s inside this issue? Autumn 2014

TEACHER LESSON PLAN Lesson 2-4: Rights and Responsibilities OVERVIEW LEARNING OUTCOMES PREPARATION WHAT YOU WILL NEED NOTES:

GENERAL FINANCING QUESTIONS

Financial Empowerment Curriculum Moving Ahead Through Financial Management. Module One: Understanding Financial Abuse Keeping Safe and Starting Over

Your Credit Score What It Means to You as a Prospective Home Buyer

Identity Theft Victim s Packet

Now, let me turn the program over to Jacqueline Cooke, Women s Bureau Regional Administrator in Boston, to introduce our first speaker. Jackie?

DEBTS AND DISPUTES. Understanding Debt. What to do?

Announcing Dollar Bank s 2017 Tuition Scholarship Contest

Protecting Yourself from Fraud including Identity Theft Advanced Level

WHAT DOES THE INSURER HAVE TO PROVE IN A FRAUD INVESTIGATION? WHAT CAN I DO IF I AM INVESTIGATED FOR FRAUD ON AN INSURANCE CLAIM?

HIPAA Overview Health Insurance Portability and Accountability Act. Premier Senior Marketing, Inc

c» BALANCE C:» Financially Empowering You The World of Credit Reports Podcast [Music plays] Nikki:

Customer Identification Programs for Banks, Savings Associations and Credit Unions

The Provision for Credit Losses & the Allowance for Loan Losses. How Much Do You Expect to Lose?

Get MoneyWise. How To Save It And How To Spend It Wisely

NAU Police Department s Identity Theft Victim s Packet

Topic Understanding Your Consumer Rights

UNIT 3-4 Preventing Identity Theft

How to Freeze Your Credit Files

Activity: After the Bell Before the Curtain

LEARNING OUTCOMES $250 never learned how to play. KEY TERMS

Identity Theft Victim s Packet

Credit Cards. The Language of Credit. Student Loans. Installment Loans 12/14/2016

HOW TO USE CREDIT. Latino Community Credit Union & the Latino Community Development Center.

General Terms and Conditions

In This Issue. SMCU Presents Keep Your Coffee

What s New for Stage 1 in 2014

Lesson Module 1: The Fundamentals of Net Worth

Financial Literacy: Getting Organized

YOUR FINANCIAL COMPARISON REPORT

Being a Guarantor. This booklet will help you understand all that is involved in being a Guarantor.

First Time Home Buyer Guide. Are you ready to learn the steps to homeownership?

EQUIFAX AFTERMATH ONE YEAR LATER. id theftcente r.o r g

IDENTITY THEFT PROTECT YOUR MONEY

AIB Graduate Current Account Application Form

CONSUMER CREDIT STARTER GUIDE

Transcription:

Cybersecurity and Personal Finance Identity Theft by Sue Lynn Sasser

Lesson Objectives Recognize the importance of protecting yourself from identity theft. Determine the relationship between identity theft and fraud. Explain the history and the role of Social Security Numbers in identity theft. Apply the concept of identity theft to the use of credit cards and other personal information such as Social Security Numbers and passwords. Discuss how to protect yourself from identity theft. 2

Introduction Identity theft is one of the fastest growing crimes Technology provides easy access to everyone s personal information Hackers attempt to gain access to databases Government Banks and other financial institutions Other private businesses Identity theft creates problems for business, for government, and for individuals Understanding how to protect yourself from identity theft is important 3

Opening Questions What is identity theft? How can you protect yourself from becoming a victim? 4

Answers to Opening Questions What is identity theft? o The deliberate use of someone else s identity (name and personal information), usually for financial gain How can you protect yourself from becoming a victim? o Take steps to protect your personal information such as passwords and Social Security Numbers 5

Overview Anyone can become a victim Identity theft can cause multiple problems for the victim o May prevent you from getting credit cards or other loans o May prevent you from getting a school loan for your college education o May prevent you from buying a house o May prevent you from getting a job 6

Essay Scenario Fastview Middle School is preparing for its annual essay competition. Winners will be announced at a special ceremony this morning. Everyone is gathered in the auditorium and excited to hear who will win. Now, the big moment has come. Mrs. Rodriquez announces the top three essay winners and Johnny wins first place. Everyone is surprised as he slowly walks up to receive his award and a gift certificate for $100. As Johnny starts reading his essay to all of the students, Malia realizes that he is reading her essay. How could this happen? She was happy when they said she got second place, but now she s angry and confused. She wants to know how Johnny got a copy of the first one she wrote and tossed in the trash before starting over on a new paper. 7

Essay Scenario Questions What should Malia do? How can she prove it was her essay? Do things like this ever happen? 8

Essay Scenario Recap Malia is a victim of fraud o Johnny took her essay without her permission and used it for his own gain Definition of fraud o Deliberate attempt to gain from deceiving or misleading others The burden of proof is on Malia o Malia will have to show proof that Johnny stole her essay and entered it in the competition 9

Identity Theft and Fraud Identity theft and fraud are very similar o Personal information is stolen, such as Name Social Security Number Address Phone number Bank account number Credit card number Password o The stolen information is then used to buy things, leaving you to pay the bills or to prove you did not buy them 10

Identity Theft and Fraud (continued) What if Johnny stole Malia s credit card number and purchased new clothes for the awards ceremony? Malia would have to prove he did it or pay the bill. Being a victim of identity theft or fraud is much more serious than just having someone steal your essay. Identity theft can create very difficult situations for the victim to resolve. 11

Why is identity theft growing? Electronic access to databases Tossing paper with personal information into the trash Online access for individuals o Social media o Chat rooms o Emails o Online surveys o Other 12

Potential Sources of Identity Theft Posting personal information on social media Giving out personal information in a chatroom Responding to emails asking for personal information Answering online surveys that require personal information Others??? 13

Even cell phones! People store important information on cell phones and tablets If not protected, someone can easily access that information Protect cell phone and other electronic devices 14

Remember. Protecting personal information is important, even if you do not have a bank account or a credit card. Someone can still steal your identity and use it. 15

Activity #1 16

Identity Theft and Credit Have you ever loaned money to a friend who did not repay you? How did it make you feel? What if you found out that friend had borrowed from several others in class and did not repay them either? Would you want to loan this friend more money? 17

Identity Theft and Credit (continued) Failing to repay your friends gives them a bad impression of you. Companies also want to know if you repay your bills when you ask to borrow money from them. o Credit History Credit cards are an easy way to get credit. o With credit cards, you can buy today and pay for things later. What would you think if someone used your credit card to make purchases? What would you think if someone got a credit card in your name and you did not even know about it? 18

Identity Theft and Credit (continued) How would you feel if someone used your credit card to make purchases? How would you feel if someone got a credit card in your name and you did not even know about it and made purchases? Both are examples of identity theft. In both examples, you must prove it was not you who made those purchases. o If you cannot prove it, then you are responsible for paying the bills! 19

Identity Theft and Bank Account Numbers Bank Account Numbers o Issued by a bank when you open an account Checking Account Savings Account o Unique to you and to your account o Provides you and only you access to your money 20

Identity Theft and Social Security Numbers Social Security Number o Issued by the Federal Government o Basically serve as a national identification number o Unique to you o Provides you and only you access to your personal information o Used to track your credit history (your use of credit) o Other uses https://www.youtube.com/watch?v=pwjmmiwjwye 21

Review of Social Security Numbers What is a Social Security Number? How are they used? Why are they important? Why should you protect you Social Security Number from others? 22

Activity #2 http://www.netsmartz.org/netsmartzkids/passwordrap 23

Conclusion Anyone can become a victim of identity theft even you! o Even if you do not have a credit card o Even if you do not have a bank account o Even if you do not have a computer or tablet o Even if you do not have a cell phone Protecting personal information reduces the potential for becoming a victim. Talk with your parents/guardians about ways to protect your personal information and theirs. 24