How To Avoid The Identity Theft Predators
|
|
- Susan Price
- 8 years ago
- Views:
Transcription
1
2 Camp Watwuzithinkin
3
4 How To Avoid The Identity Theft Predators
5
6 Predator 0 An organism that lives by preying on other organisms
7 Identity Thief 0 A person who makes a living by preying on other people
8 Outsmart the ID Theft Predators 0 Understand how you are risk 0 Take simple steps to avoid ID Theft 0 Detect ID Theft early 0 Act quickly to stop predators
9 Smartphones 0 More about Smartphones later 0 Remember! If it can happen on a computer, it can happen on a Smartphone
10 Phishing 0 s, text messages or calls offering you GREAT deals 0 All you have to do is 0 Click here 0 Give us all of your personal information
11 Click Here (so I can infect your computer and steal your ID) 0 Malware 0 Spyware 0 Ransomware 0 Worms, viruses and more 0 So advanced, you may not even know it is there for a long time
12 Helping the Predators 0 Any link sent in an or text could be infected even from a trusted source 0 gets sent, intercepted by predator, malware added to link and sent on its way 0 Takes seconds
13 Prevent 0 Do not open s from people you don t know 0 Never click here 0 If it sounds too good to be true IT IS! 0 Never give out 0 Account information 0 SSN 0 Personal or Financial info
14 Malvertising
15 Ads Online 0 Click on Ad 0 Click to get Coupon 0 Hover over Ad
16 Computer Hackers
17 Protect and Prevent 0 Good Security on computers AND hand held devises 0 Use caution when using Wi-Fi in open areas 0 Strong passwords 0 2 Step Verification (2 passwords) 0 Bio-metric log on 0 Change passwords often 0 Consider a Password Keeper
18 Protect and Prevent 0 Go to Pay Pal or other sites directly not by clicking on a link in an , an ad or in a text on your hand held 0 Online shop with care 0 Use social media responsibly 0 Know where your hand held devises are at all times 0 Treat your handheld devises like computers not phones
19 Be Alert to Hackers 0 Yes, they can strike at any time 0 The Pentagon has been hacked, so you can be too!
20 Credit/Debit Card Thieves
21 Sneaky Ways to Steal Your 0 Skimmers Card 0 Fraudulent Websites 0 Server Hacking 0 Break-ins, Mail Theft or Over the Shoulder Viewing combined with a Smartphone photo
22 Can You Spot the Skimmer?
23
24
25
26 Prevent 0 Take care where and when you use your card 0 Check your accounts regularly 0 Never share your PIN 0 Whenever possible, use credit vs. debit 0 Report any problems right away
27 Jobs Online
28 No Experience Needed! 0 Mystery Shopper 0 Here s a check, cash it and use cash to wire money to employer you are checking out the Western Union folks, or the people at your bank. Don t tell anyone you are mystery shopping 0 Nanny or Personal Assistant 0 Prove you are trustworthy by cashing check and wiring funds 0 First job is to cash check and wire funds to a charity 0 Survey Taker 0 Need your name, DOB, SSN, etc. to register your profile
29 And You Can Be A Criminal Too! 0 Personal Assistant, Shipping Manager, Financial Liaison or any number of other great job titles 0 Receive cash from employer or from a customer (usually overnight mail or Fed-Ex) 0 You wire cash to a business associate or to the employer at an out of the US address 0 You keep your pay a percentage of the funds you wired 0 Congratulations! You just became a money mule for a criminal enterprise
30 Resumes Online
31 What Not to Post 0 Never include your SSN in an online resume 0 Date of Birth 0 Full Legal Name 0 If possible, set up PO Box or use address 0 Set up just for job hunting make it professional no nicknames, cute or offensive titles
32 When To Give A Potential Employer Your Personal Info 0 Your employer will need to have access to your SSN to run background checks and/or to verify that you are able to work in the US should not be needed before the 1 st interview 0 Provide SSN once being considered for position 0 Date of Birth may be needed on application to verify you are old enough to work
33 Romance Scams
34 I Love You, You re Perfect! Now, Give Me Your Money! 0 More than 25 million people seeking love online 0 Youth leaving HS and older adults make up increasingly large number of online love seekers 0 When having an Internet relationship, ANYONE could be on the other line 0 Photos, even Facebook Pages can be fraudulent
35 Pattern 0 Love at first sight 0 Quickly suggest moving off website to private communications 0 Sweet talkers 0 The need for money 0 The need for more money 0 The need for even more money
36 Love of My Life Here s my photo, my Love. I send you this so you will see that I am for real and you can see the love I have for you. When I get home, I will make you my bride
37 Predator
38 Sexting
39 What Happens on the Internet
40 Stays on the Internet
41 FOREVER
42 Stats (provided by NoBullying.com) 0 70% of teen girls say they have sexted (includes all sexually explicit messages) 0 22% of teen girls have sent nude or partially nude photos 0 18% of teen boys have sent nude or partially nude photos 0 61% of teen girls say they sexted because they were pressured, threatened or bullied into doing it 0 15% of teens have sent nude or partially nude photos to someone they have never met
43 The Dangers of Sexting 0 Sexting (sending, receiving and re-sending) is a criminal act if the object in the sexted message is under age 18, it is considered Child Pornography 0 May be charged with possessing and distributing child pornography 0 If charged, may have to register as a Sex Offender 0 If photo is sent to someone who did not ask for it, and is offended or frightened by the image, they could report sexual harassment or sexual assault
44 The Dangers of Sexting 0 Once a photo is on a Smartphone or sent via text or , it is available on the Internet 0 Revenge sharing 0 Predators are on the Internet, many of whom are pedophiles or dealers in child porn 0 Images are often re-posted on these websites, enhanced or animated
45 Smartphones
46 Smartphones 0 Computer not telephone 0 Everything that can happen on a computer can happen on a Smartphone 0 Most Smartphones are not protected by the same security systems as computers 0 Smartphones store A LOT of personal info
47 Smartphones 0 Wi-Fi or some version of the Internet is always on 0 Smartphones are often left unattended especially at school and sporting events 0 On any given day as many as 25% of teens have no idea where their Smartphone is located 0 10% of Smartphones owned by teens are lost or stolen every year
48 Smartphone Concerns 0 Apple-Pay/Google Wallet 0 Malicious Apps (once downloaded, install malware) 0 Dangerous Apps that open teens to hackers and other criminals 0 Frequent and easy use of Snap Chat, Insta-Gram, etc.
49 Apps You Should Know 0 dangerous-apps-time-hit-delete/ 0
50 APPS Tinder: Find dates and hook-ups using GPS (adults can find minors, App can be used to bully) Snapchat: Photo sharing app that claims photos will disappear after certain time (popular for sexting, photos can be saved easily and re-distributed) Blendr: Flirting app. Send a photo or video which will be rated in terms of hotness (GPS is activated, so predators can find victims, popular for sexting, rating encourages bullying) Kik Messenger: Instant messaging app that allows photos, video and GIF graphic moving images (popular for sexting, no parental controls, predators can easily use)
51 Whisper: Anonymous confessions app (since anonymous, can post confessions and photos of someone other than yourself, uses GPS so great for predators, clues predators in to potential at-risk youth and vulnerabilities) Ask.fm: Q&A social networking site for kids (anonymous and leads to relentless bullying, the UK reports 9 documented suicide cases linked to bullying on app) Yik Yak: Post 200 character Yaks that can be viewed by 500 people closest to them determined by GPS ( again, uses GPS which predators love, posts anonymously, often used to post sexually explicit content without subject knowing) Omegle: Video chat app (a favorite of predators, easy to make friends with strangers)
52 Down: Dating App connected to Facebook (classify friends as people you would be down with hooking up with creates normalcy for sexual hook-up culture) Oovoo: Video chat app allowing up to 12 people to chat at a time (not a problem IF kids use the privacy settings properly and only allow people they know to chat otherwise predators can listen in or join the chat) Meerkat & Periscope: Live streaming video app that also streams to Twitter (easy to violate app s terms of service and live stream nudity, sexually explicit content which predators love to watch, uses GPS)
53 MeetMe: App that uses GPS to meet new people living nearby ( no age verification, links to Facebook so you are easily identifiable by a predator, popularity ratings that make strangers opinions seem like a game, may be used to bully) Skout: Flirting app used to meet new people/dates (no age verification, the teen version is easy to fool by using a fake DOB, teens can go on adult version, GPS is active) ChatRoulette: Video chat site that randomly matches you with someone around the world (very popular for cyber-sex, not uncommon to be randomly matched to someone who is nude or doing something sexually explicit, person with whom you are chatting can record the chat and post anywhere)
54 Poof, Hidden Apps, Hide it Pro, App Lock: All apps designed to hide apps on your phone. While some may not be available anymore, they will still work if previously downloaded (allows your child to conceal apps from their phone screens) It is important to talk with your kids about what is on their phone and the long term problems some of these apps and experiences could create. Source of info: For Every Mom (online resource for parents) and No Bullying.com
55 Don t Be Like This Guy
56 Stay Alert and Outsmart The ID Thieves & Predators
57 Contact Hazel Heckers Colorado Bureau of Investigation Identity Theft,Fraud & Cyber Crimes Investigations Unit Hour Identity Theft & Fraud Hotline (toll free)
58 Online
59 Online Great Resource Online!
60 Call for Help 0 Hazel (Direct line) CBI Investigations Main Office Hour Identity Theft & Fraud Hotline (toll free) (available to assist you )
61
15 Dangerous Apps Every Parent Should Know About
15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges
More informationCyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationIdentity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationBE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationLiving Online: Using Technology Wisely Lesson. Guide
Living Online: Using Technology Wisely Lesson Guide Target Audience Adolescents 11-14 Time Entire program 1 hour, depending on discussion Program Objectives Ways to portray a positive image online How
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationIdentity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More information2012 NCSA / McAfee Online Safety Survey
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
More information!! What dangers do your!children!face when they go online?!! All!who!participate!in!activities!online!face!risks!when!they!use!the!
What dangers do yourchildrenface when they go online? Allwhoparticipateinactivitiesonlinefaceriskswhentheyusethe Internet,includingadults.Theworldisconstantlychangingwithnew technologyavailabledaily.itmayfeeloverwhelmingwhenwefocuson
More informationIntercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationGuideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
More information1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationCyber Safety For Parents
Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting
More informationIdentity Theft and Online Security
Identity Theft and Online Security ACI-588788 American Century Investment Services, Inc. Goals for Presentation Identity Theft - What is it and how are we at risk? Social Media - How much online security
More informationKingsley Park Primary School. 1-1 ipad Program BYOD
Kingsley Park Primary School 1-1 ipad Program BYOD 2016 Kingsley Park Primary School ipad 1-1 BYOD Program In 2015 KPPS implemented a 1-1 BYOD [bring your own device] Program for Grades 4-6. We will be
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationProtect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
More informationHOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
More informationI dentity theft occurs
1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationParents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationOnline Security Tips
Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized
More informationProtect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
More informationInformation carelessly discarded into the trash can be stolen when a thief digs through the garbage.
Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause
More informationPROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
More informationSocial Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationCyber Security. Keeping the internet safe for you and your family
Cyber Security { Keeping the internet safe for you and your family The Five Things you MUST do Learn the lay of the land Protect your identity Become a sceptic Be aware of stranger danger Be a good cyber
More informationOnline Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
More informationProtection from Fraud and Identity Theft
Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationTeen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online
Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012
More informationCyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
More informationRetail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot
More informationGuide to credit card security
Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely
More informationCyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationSafety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
More informationDIGITAL CITIZENSHIP QUIZ
1. Kelly is on Instagram and a boy she doesn t know begins to follow her and comment on her images. She should... A. Just go along with it (ignore it) B. Delete the follower C. Start a chat and get to
More informationNational Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
More informationChild Identity Theft: A Parenting Blind Spot
Child Identity Theft: A Parenting Blind Spot A study of parental awareness and response to the growing issue of child identity theft April 2013 www.csid.com TABLE OF CONTENTS Summary -------------------------------------------------------------------------------------------------------------------------------------------------------
More informationHow To Teach Kids To Be Safe Online
McAfee, an Intel company, is the world's largest dedicated security technology company. We are relentlessly focused on finding new ways to keep our customers and our communities safe, and especially our
More informationguide to staying safe online How to shop, bank, socialise and protect your identity online.
THE Mcafee guide to staying safe online How to shop, bank, socialise and protect your identity online. contents 1 Introduction 2 Today s Internet: Proceed with Caution 3 Consider the Upsides 4 Be Aware
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
More informationCommon Craigslist Scams
Common Craigslist Scams Once upon a time, everyone had to buy multiple newspapers and check endless listings of classified ads if they were looking for a job, car, home or apartment. With the advent of
More informationWISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk
WISE Online: An Internet and Mobile Phone Guide http://esafety.ngfl-cymru.org.uk File sharing and Copyright Everyone loves to file share to get music files. But here are some points to take note of: Downloading
More informationInternet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013
Internet Security Priorities Prepared for: Presented by: Benenson Strategy Group and American Viewpoint December 20, 2013 Methodology The Benenson Strategy Group and American Viewpoint conducted 1,000
More informationNational Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationSocial Media and Cyber Safety
Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant andrew@justbesafe.com Social Media and Cyber Safety Our instructor today
More informationScams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationOffice of the Privacy Commissioner of Canada. Identity Theft and You
Office of the Privacy Commissioner of Canada Identity Theft and You There have always been scammers who pose as somebody else to carry out fraudulent activities. With today s proliferation of technology,
More informationThis document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
More informationInternet Safety & Awareness. Dan Tomlinson 02/23/2013
Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer
More informationPersonal Safety Tips For Public Information Technology
IDENTITY THEFT Practical Tips to Do Your Best David L. Haase November 21, 2015 OPCUG / PATACS 1 Today s Agenda Who is This Guy? Are You a Target? I.D. Theft vs. Stalking What Do Thieves Target? Have a
More informationCyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
More informationE-MAIL & INTERNET FRAUD
FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud
More informationOffice of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices
Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000
More informationIdentity Protection Guide. The more you know, the better you can protect yourself.
Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious
More informationNower Hill High School
Nower Hill High School An introduction to E-Safety Louise Voden, Ben Ford & PC Ian Scanlon Outcomes: Highlight the potential risks young people may face online Describe the technologies and functions Outline
More informationTake our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on
Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Are you a Target? On-Line Scams Credit/Debit Card Investment Identity Theft Frauds Scams Mark the following
More informationUNSUPERVISED AND ONLINE
UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163
More informationHow To Prevent Cybercrime
2013 NORTON REPORT 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA,
More informationIDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to
IDENTITY THEFT IDENTITY theft Identity theft can happen to anyone. Previously, criminals stole your wallet for your cash. Now they want your wallet to steal your good name. Protect yourself and your identity.
More informationOutsmarting On-line Predators. Christina Kilbourne
Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationPROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
More informationDigital Safety and Privacy
Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses
More informationPARENT UNIVERSITY OFFICER JOE BOYD OFFICER RACHAEL FREEMAN
PARENT UNIVERSITY OFFICER JOE BOYD OFFICER RACHAEL FREEMAN SRO DIVISION Sgt. Eric Debus Officers Chris Cobb and Diane Patterson (CHS) Officer RJ Harr (New Tech) Officer Joe Boyd (CMSW, Pinkerton, Wilson,
More informationAccording to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection
According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government
More information2011 NCSA / McAfee Internet Home Users Survey
2011 NCSA / McAfee Internet Home Users Survey National Cyber Security Alliance McAfee Zogby International October 2011 Methodology and Sample Characteristics IBOPE Zogby International was commissioned
More informationTHINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
More informationSecurity Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
More informationCyberbullying. Welcome!
Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also
More informationFirst Steps for Victims of Identity Theft
First Steps for Victims of Identity Theft Colorado Bureau of Investigation Identity Theft/Fraud Investigation Unit Colorado Bureau of Investigation ID Theft/Fraud Unit 710 Kipling Street Suite 200 Denver
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationSTOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the
More informationHint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:
Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationIt Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit
Identity Theft: It Could Happen To You! Attorney General Tom Reilly s Guide to Protecting Yourself and Your Credit One Ashburton Place ~ Boston, MA 02108 ~ (617) 727-2200 www.ago.state.ma.us February 2005
More informationProtect Yourself From Identity Theft
Protect Yourself From Identity Theft Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social
More informationScams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
More informationDeterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.
Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints
More informationInternet Safety Guidelines
Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can
More informationIdentity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
More informationHow to Identify Phishing E-Mails
How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services (miguel@falconitservices.com) http://www.falconitservices.com
More informationWHAT YOUR TEEN IS DOING ON SOCIAL MEDIA
WHAT YOUR TEEN IS DOING ON SOCIAL MEDIA THE GUIDE 2014 EDITION It s undeniable that Social Media has changed the way teenagers experience the world. Your teens are on social media as soon as they get up,
More informationA Parents' Guide to Cybersecurity
A Parents' Guide to Cybersecurity In partnership with Top 5 Questions Parents Have About Cybersecurity 1.What are the biggest security threats to kids? Children and teens can be caught by the same kinds
More information