Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
|
|
|
- Neil Nash
- 9 years ago
- Views:
Transcription
1 Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against identity theft and scams that try to access their private information online. They learn what identity theft is, what kinds of information identity thieves want, and what can be done with that information. Students then analyze phony s and identify tricks that identity thieves use online. Finally, they create a phishing that includes the features that they have learned about, and see if classmates can identify the scams. objectives Students will: Understand what identity theft is and why it is important to guard against it Learn to recognize strategies that scam artists use to access private information Learn how to guard against phishing and identity theft Digital Ethics Focus: Self Family and Friends Community Materials and Preparation Materials Spotting Scams Student Handout Spotting Scams Student Handout Teacher Version Paper and markers or colored pencils (computers with Microsoft Office if you are using the high-tech option in Teach 3) Preparation Copy or download the Spotting Scams Student Handout, one per student Review the Spotting Scams Student Handout Teacher Version Preview the website referenced in Teach 3 (optional) Parent Resources Send parents the Security Parent Tip Sheet High School Differentiated Instruction Point out the visual elements on examples of phishing s. Show students, especially visual learners, how using elements such as logos and company fonts make the s look more authentic. Key Vocabulary Scam: An attempt to trick someone, usually with the intention of stealing money or private information Identity Theft: A type of crime in which your private information is stolen and used for criminal activity Vulnerable: In a position that makes it easier for you to be harmed or attacked Phishing: When people send you phony s, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information 1
2 Estimated time: 60 minutes teaching plans Introduce (5 minutes) ASK Do you know someone who has been scammed? What happened? (Students might tell stories of instances in which someone has been convinced to send someone else money or purchase a fake or bad product.) ASK What is the purpose of a scam? What tricks do people use to carry out a scam? (Students should understand that the ultimate purpose of a scam is to get someone to give the scammer money, or information that can help the scammer steal money, such as a credit card number, ATM code, or password. To accomplish this, scammers tell lies and often pretend to be someone they are not.) ASK Can people get scammed on the Internet? How? (Allow students to tell stories of friends or relatives who have been scammed online. Then encourage them to revisit what they know about scams, and how they might be used online.) Sample responses: Someone can be tricked into buying a bad or fake product online Someone can be lured into sharing information that a scammer can use to steal from them EXPLAIN to students that they will be learning about a variety of online scams, including which kinds of information scammers look for, and how that information can be used. They will also learn how to protect themselves against online scams. Teach 1: What Is Identity Theft? (5 minutes) POINT OUT to students that people who scam others online don t always have to get money from them directly. Instead, they use a variety of strategies to trick people into giving out private information. They then use this information to access their bank and credit card accounts or other personal accounts. They can even re-create someone s identity and produce false documents, such as Social Security cards, credit cards, or drivers licenses in someone else s name. DEFINE the Key Vocabulary term identity theft. ASK Can you guess what kinds of personal information identity thieves might look for? REVIEW the list below with students. Emphasize that identity thieves look for any information that might help them pretend to be their victims. Write the list on the board or have students take notes. Full name Date of birth and where you were born Current and previous addresses and phone numbers Driver s license or passport number Account numbers and the companies where you hold accounts (e.g., Amazon, PayPal, etc.) Passwords Social Security number DEFINE the Key Vocabulary term vulnerable. EXPLAIN that anyone is vulnerable to an online scam. Although teens might not think they re at risk, there are a few important reasons why they are vulnerable to identity theft and why it matters. Cover the following points: 2
3 Identity thieves look for clean Social Security numbers that haven t yet been used to get credit. They target teens and kids, who often have Social Security numbers that have no credit history yet. Identity thieves might sell or use these numbers, which would allow someone else to get a credit card or loan and build up debt under your name. Being a victim of identity theft can ruin your financial future and your ability to obtain loans and purchase things. For example, it could affect your ability to get a student loan for college or a loan to buy a car. In addition, if you use your parents accounts and credit cards online, or fill out forms with your parents information, you are sharing information that could potentially put your parents identities at risk. It can take months, even years, to recover your identity if it s stolen. Cleaning up such a mess takes a lot of time and energy, and it can also be expensive. Teach 2: How to Catch a Phish (15 minutes) ASK How do you think identity thieves might try to get your information? (Encourage students to share some responses, even if they have not previously encountered identity theft.) DEFINE the Key Vocabulary term phishing. EXPLAIN to students that the best way to avoid phishing scams is to be skeptical about any online request for personal information. It s also good to be skeptical of online messages or posts from friends that seem out of character for them, which is a warning sign that their accounts have been hacked. There are clues that can help students spot phishing, and they will learn some of these in the next part of the lesson by studying one type of phishing scam: a phony message. DIVIDE students into pairs. DISTRIBUTE the Spotting Scams Student Handout, one per student. READ aloud the instructions found on the Spotting Scams Student Handout Teacher Version, and share with students the extended explanation of each feature of a phishing . INSTRUCT student pairs to complete the handout together. When students are done, have two pairs get together to exchange their handouts and compare their answers. INVITE volunteers to share their answers with the class. Use the Spotting Scams Student Handout Teacher Version for guidance. REMIND students that phishing s can be very convincing, and some may not contain many of the clues they just learned about. So it s smart to distrust any that asks them to provide private information. Teach 3: Protect Yourself from Online Scams (15 minutes) TELL students that if they ever encounter something online that they believe might be a phishing scam, they should observe the following rules: Avoid opening the message or in the first place. Don t click on any links or download any attachments; they might contain viruses or spyware. Don t reply. 3
4 Mark as junk mail or spam for your provider, or report it to your social network site. If you are concerned about an account you have with a company, contact its customer service department by phone. Make sure you verify the company s contact information elsewhere online first. TELL students that they can also protect themselves from Internet scams by learning how identity thieves think. They will create a phishing , or some other form of online or mobile scam, using what they learned about phishing scams. As an optional activity, you may wish to view examples of real phishing s from Consumer Fraud Reporting before students create their own examples ( Some examples of popular scams on Facebook can be found in the online Huffington Post article, Facebook Scams You Need to Know About ( n_ html#s281483&title=fake_page_spam). INSTRUCT students to choose at least four of the eight features of a phishing listed in their Spotting Scams Student Handout. Have them create a phishing that demonstrates the four features they choose to highlight. Rather than having students create their s on paper, have them use Microsoft Word or PowerPoint. They can use the drawing tools on these programs to make a fake . INVITE students to present their examples to the class. Classmates can try to identify which features tipped them off to the fact that this is a phishing . Alternatively, students can trade examples with a partner and try to spot each other s scam. Wrap Up and Assess (5 minutes) ASSESS students understanding of the learning objectives by reviewing their responses on the Spotting Scams Student Handout. Collect the phishing s students created in Teach 3 to confirm that students are able to identify at least four features of an scam. The following questions may also help you assess student learning: What kinds of information do identity thieves look for and why? (Students should respond with examples of private information, such as full name, address, date of birth, account numbers, and passwords. Identity thieves try to use this information in order to re-create someone s identity for unlawful purposes, mainly to secure loans and buy things.) How do thieves try to get at your information? (Thieves use phishing to try to get at people s personal information. Have students discuss some of the features of phishing they learned about.) What can you do to avoid falling for online scams? (Students should remember to be suspicious of any online communication that asks for private information, or that seems out of character for a friend to have sent or posted. Students should know not to reply to such messages, not to click on any links or attachments, and to report the message as spam or junk to their provider or 4
5 social network site. If they are concerned about one of their accounts, they should call the company s customer service department using a number they found elsewhere online not within the message they received.) WRITE the following URL and address below on the board. Tell students that they can go to idtheft for help if they, or their parents, find their identities have been stolen. Students can also forward any spam s they receive to [email protected]. Extension Activity Have students visit Instruct them to click on games and play the Spam Scam Slam game. This game is a great way to extend learning about phishing schemes. Afterward, invite students to share one new thing they learned about scams. Homework Have students work with a parent or adult family member to come up with a set of security rules for their home computers and/or computers that family members use at school, work, or the library. In addition to the strategies they learned in class, students should research additional security rules at OnGuardOnline.gov ( After they have compiled their set of rules, students should take one concrete step toward improving their online security for example, changing passwords or backing up files. You may wish to have students share their rules with the class, and then invite volunteers to combine them to create an online security poster to display in the classroom. Alignment with Standards National Educational Technology Standards for Students 2007 (Source: International Society for Technology in Education, 2007) 1. Creativity and Innovation a. apply existing knowledge to generate new ideas, products, or processes b. create original works as a means of personal or group expression c. use models and simulations to explore complex systems and issues 2. Communication and Collaboration a. interact, collaborate, and publish with peers, experts, or others employing a variety of digital environments and media d. contribute to project teams to produce original works or solve problems 4. Critical Thinking, Problem Solving, and Decision Making a. identify and define authentic problems and significant questions for investigation d. use multiple processes and diverse perspectives to explore alternative solutions 5. Digital Citizenship a. advocate and practice safe, legal, and responsible use of information and technology 6. Technology Operations and Concepts a. understand and use technology systems 5
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on
Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Are you a Target? On-Line Scams Credit/Debit Card Investment Identity Theft Frauds Scams Mark the following
FTC Fact Sheet Identify Yourself
FTC Fact Sheet Identify Yourself 5 10 15 20 25 30 35 40 You might have heard about identity theft: it s what can happen when a thief gets enough of someone s information to commit fraud. Why should people
Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
Standard 9: The student will identify and explain consumer fraud and identity theft.
TEACHER GUIDE 9.1 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Consumer Fraud Priority Academic Student Skills Personal Financial
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT IT S POSSIBLE@ PROTECT YOUR IDENTITY protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IT S POSSIBLE @ What Is Identity Theft? According to the FBI, identity theft is the fastest
Information to Protect Our Customers From Identity Theft
Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns
Private and Personal Information
LESSON PLAN Private and Personal Information UNIT Essential Question How can you protect yourself from online identity theft? Lesson Overview As students visit sites that request information about their
SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
When Fraud Comes Knocking
When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
Beware! Consumer Fraud
STUDENT MODULE 9.1 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Consumer Fraud Alfredo s mom is at the door to meet him when
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Identity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY Phishing spear phishing vishing smishing debit card skimming fake check scams THE COMMON SENSE PRECAUTIONS INSIDE CAN KEEP YOU SAFE! SCHEMES SCAMS FRAUDS Criminals
Activities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
Fraud Protection module
Fraud Protection module Trainer s Introduction While the vast majority of financial transactions are legitimate and honest, the few fraudulent ones can be costly and damaging. By recognizing the warning
Standard 9: The student will identify and explain consumer fraud and identity theft.
TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
MoneySmart Rookie Community educator guide. Financial literacy for young people
MoneySmart Rookie Community educator guide Financial literacy for young people Copyright information Website: ISBN: 978 0 9805533 9 0. Creative Commons This Community educator guide is available under
E-MAIL & INTERNET FRAUD
FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud
IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09
IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do
PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
Private Today, Public Tomorrow
Estimated time: 45 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy
Protecting Yourself From Identity Theft
Protecting Yourself From Identity Theft We re hearing a lot more about identity theft these days from hackers stealing credit card numbers from big banks and retail stores to individuals opening up credit
Beware! Identity Theft
STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal
PREVENTING HIGH-TECH IDENTITY THEFT
1 PREVENTING HIGH-TECH IDENTITY THEFT Presented by The Monument Group Companies Featured speaker: David Floyd November 19, 2014 2 Introduction Preventing Identity Theft (this session) Monitoring for Theft
Online Security Tips
Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized
Helping you to protect yourself against fraud and financial crime
Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you
Recognizing Spam. IT Computer Technical Support Newsletter
IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the
Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.
Common ID Theft TACTICS. HOW DOES IT HAPPEN? Identity What should I do if I m a Protection PROTECT YOURSELF: OLD-FASHIONED STEALING: Criminals steal your wallet or purse. > Never leave your wallet or purse
How To Get A Free Credit Report From A Credit Report Website
FACTS FOR OLDER CONSUMERS National Consumer Law Center Protect Yourself From Identity Theft Identity theft is one of the fastest growing crimes in the country. It can strike anyone, but elders may be particularly
OIG Fraud Alert Phishing
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
Learning English with CBC Radio Living in Alberta. Identity Theft
Learning English with CBC Radio Living in Alberta Identity Theft by Maroro Zinyemba Project Manager: Justine Light Daylight Consulting Inc. Integration Enhancement Lesson: Identity Theft CLB Level: 6 CLB
Cyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
Digital Life 102. objectives. Essential Question: What is the place of digital media in our lives? Learning Overview and Objectives.
Estimated time: 45 minutes Essential Question: What is the place of digital media in our lives? Learning Overview and Objectives Overview: Students test their knowledge of digital media and learn some
Class 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot
Corona Police Department
By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,
DVD Companion Learning Guide
DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material
A Guide to Protecting Yourself From Identity Theft
A Guide to Protecting Yourself From Identity Theft 2010 Capital One. Capital One is a registered trademark. At Capital One, we understand that Identity Theft is a frustrating, and sometimes frightening,
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:
financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index
National Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating
suntrust.com 800.SUNTRUST
suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally
OFFICE OF KANSAS ATTORNEY GENERAL DEREK SCHMIDT
OFFICE OF KANSAS ATTORNEY GENERAL DEREK SCHMIDT Attorney General Derek Schmidt BEING A SMART CONSUMER Jackie Williams, Assistant Attorney General Consumer Protection Division Duties of the Attorney General:
Protection from Fraud and Identity Theft
Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...
Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee
Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Government Grants The government gives grants to special people like you! Stimulus money is still available through
WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 [email protected] 1.866.842.1001
WHITEPAPER Phishing Facts for Email Marketers: Understanding the phishing factor impact on your email programs. Email phishing attacks are destructive for everyone, it s not just the brands (and their
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
I know what is identity theft but how do I know if mine has been stolen?
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
Identity Theft Problem and Solutions
Identity Theft Problem and Solutions October 7, 2011 Michigan Cyber Summit 2011 Jon Miller Steiger Regional Director The views expressed are those of the speaker and not necessarily those of the FTC or
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What
How to Prevent It What to Do If You Are a Victim
How to Prevent It What to Do If You Are a Victim www.tn.gov/consumer www.tn.gov/safety Tennessee Division of Consumer Affairs Identity theft happens when someone steals your personal information and uses
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
When visiting online banking's sign-on page, your browser establishes a secure session with our server.
The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption
Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
Fraud. Your guide to protecting yourself from fraud
Fraud Your guide to protecting yourself from fraud Kent Police is committed to protecting people from career criminals and fraudsters. This booklet has been designed to give you advice on how to protect
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
What is Identity Theft?
What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.
Credit Card Fraud Training
Credit Card Fraud Training Lesson Plan A Consumer Action Publication Consumer Action created this project in partnership with Chase 2009 Consumer Action Credit Card Fraud Training Lesson Plan (For the
Private Today, Public Tomorrow
Estimated time: 40 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy
Preventing identity theft
Preventing identity theft About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence
Internet basics 2.3 Protecting your computer
Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from
Identity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
EL/Civics Lesson Plan
Program Name Staff Responsible for Lesson MVCTC EL/Civics Program Mary Ann Oatney Date(s) Used 11/2007 Civics Category Civics Objective Time Frame to Complete Lesson EFL(s) II. Civics Participation II.
How To Protect Your Information From Being Hacked By A Hacker
DOL New Hire Training: Computer Security and Privacy Table of Contents Introduction Lesson One: Computer Security Basics Lesson Two: Protecting Personally Identifiable Information (PII) Lesson Three: Appropriate
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware.
Activities for Protecting Your Identity and Computer for Elementary and Middle School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these
PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit
PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account
