identity theft

Views:
 
     
 

Presentation Description

No description available.

Comments

By: olgaafanaseva351 (88 month(s) ago)

Please,send me this presentetion

By: Manoice (121 month(s) ago)

send ur mail id if u really need it..i wud mail this presentation......

By: parashuchandra (121 month(s) ago)

what do i have to do to download it

Presentation Transcript

Slide 1: 

MANO

Sample “Phishing” Email : 

Sample “Phishing” Email

How Does Identity Theft Work? : 

How Does Identity Theft Work?

How Identity Theft Works : 

STEP 1: Getting the Identity The thief or thieves look for information in a number of ways. Discarded documents in the trash Receipts from purchases Lost or stolen wallets or purses Online “phishing” for personal data Stolen mail from mailboxes Thieves are thinking of new, inventive ways every day. How Identity Theft Works

Where and How Do They Get My Information ? : 

Telephone calls asking you to “update records” Theft of incoming bills, which show your account number Theft of outgoing mail and bill payments Where and How Do They Get My Information ?

How Identity Theft Works (continued) : 

STEP 2: Exploiting the Identity (continued) The thief may simply begin leveraging one piece of information to obtain or establish other information or assets. These may include New credit card accounts State or local licenses Accounts with utility companies, apartment leases, or even home mortgages How Identity Theft Works (continued)

How Identity Theft Works (continued) : 

STEP 3: Discovering the Theft The thief continues to build a “persona” using the victim’s name, good credit, and even good character references. The thief never pays the bills, but the victim is left with a bad name and ruined credit. Eventually, the victim tries to get a new credit account and is turned down, or gets a bill for a credit card he or she never owned, or starts getting calls from bill collectors. How Identity Theft Works (continued)

How Identity Theft Works (continued) : 

STEP 3: Discovering the Theft The thief continues to build a “persona” using the victim’s name, good credit, and even good character references. The thief never pays the bills, but the victim is left with a bad name and ruined credit. Eventually, the victim tries to get a new credit account and is turned down, or gets a bill for a credit card he or she never owned, or starts getting calls from bill collectors. How Identity Theft Works (continued)

How Identity Theft Works (continued) : 

STEP 3: Discovering the Theft (continued) The thief might abandon the victim’s identity because he or she has “spoiled” the name of the victim (e.g., with a criminal offense or bankruptcy). When the crime or ruined credit is discovered, the victim is left to clean up the mess. How Identity Theft Works (continued)

How Identity Theft Works (continued) : 

STEP 4: Reporting and Restoring The victim reports the theft to the local police and to the nation’s three major credit bureaus. The victim asks the credit bureaus to note the identity theft crime on his or her credit report. The victim may need to consult with a local victims’ assistance agency or an attorney to obtain information on the necessary, specific steps in a given state. How Identity Theft Works (continued)

Get Copies : 

If an account has been opened fraudulently in your name Get a copy of the application Get a copy of all transactions Provide copies of all information to Police Try to determine what information has been stolen Pin numbers Passwords Other personal information Sometimes victims are wrongfully accused Contact court where judgment was entered and report identity fraud Consider consulting an attorney with identity fraud experience Get Copies

Prevention Tips (continued) : 

Rip up receipts if you will not need them for warranties or returns. Shred any unwanted credit, loan, or credit card offers—or at least cut them up with scissors—before putting them in the trash. Prevention Tips (continued)

Prevention Tips (continued) : 

Do not give out your real name or other personal information in Internet chat rooms. Use a screen name. Do not authorize others to use your credit cards. They may not take the same care that you do. Deposit mail in an authorised Service mailbox. Make sure your mailbox is secure. Prevention Tips (continued)

If you remember nothing else … : 

Promptly apply system and product patches Run anti-virus software configured to update daily, use on-access/on-demand scanning, and perform a full scan at least weekly Use a firewall (either software or hardware) and configure for the most restrictive setting that still allows you to do required work Select good, strong passwords and use them everywhere Think BEFORE you click!! If you remember nothing else …

Encourage Everyone to… : 

Review their habits about handling personal information. Take prevention strategies to heart—and encourage others to do so. Speak out about the need for preventive action and laws that protect identity theft victims. Encourage Everyone to…

Questions : 

Questions

authorStream Live Help