IDENTITY THEFT AND PHISHING SCAMS



Similar documents
Beware! Identity Theft

Standard 9: The student will identify and explain consumer fraud and identity theft.

Identity Theft Protection

CHECKING ACCOUNTS AND ALTERNATIVE BANKING METHODS

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

EL/Civics Lesson Plan

Information to Protect Our Customers From Identity Theft

Identity Theft Prevention Presented by: Matt Malone Assero Security

What is Identity Theft?

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain.

Identity Theft: Informational Workshop

BALANCING A CHECKBOOK

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Identity Theft Protection

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

Corona Police Department

Identity Theft Problem and Solutions

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Protecting Yourself From Identity Theft And Fake Check Scams. Faculty. Question. The Law. The Law. The Law

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.

Identity Theft: Prevention & Survival

Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.

Fraud and Identity Theft. Megan Stearns, Credit Counselor

CAR INSURANCE. Risk management, insurance, comparison shopping

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

Identity Theft. Presented By: Information Technology. James Blackwood, Michael Fouts, & Tiffany Mixon

CHECKING ACCOUNTS and ATM TRANSACTIONS

Identity Theft. Prevention and Recovery Information Kit

Identity Theft is a Crime in the State of New Jersey.

Avoid completing forms in messages that ask for personal financial information.

I dentity theft occurs

When Fraud Comes Knocking

Identity Theft. Protecting Your Credit Identity G1

A Guide to Protecting Yourself From Identity Theft

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PRACTICAL MONEY GUIDES IDENTITY THEFT. How to safeguard your identity and financial information from theft

Client Education. Learn About Identity Theft

WHAT S IT ALL ABOUT?

Identity Theft Grade Level 10-12

About the Federal Reserve

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

IDENTITY THEFT: MINIMIZING YOUR RISK

What to Know, What to Do

Information copied from Federal Trade Commission Website (

Identity Theft and Fraud

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

Citi Identity Theft Solutions

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

SECURITY FREEZE INFORMATION

Personal Protection and Peace of Mind with IDProtect

Identity Protection Guide. The more you know, the better you can protect yourself.

Protecting your identity

INCOME TAXES. Government (public) spending, federal income taxes, state income taxes, marginal vs. average tax rates, tax planning

Protect Yourself From Identity Theft

Refuse to be a target of identity crime.

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Deputy Mike Butler Deputy Leslie Fox Dane County Sheriff s Office

SECURITY FREEZE INFORMATION

How To Protect Yourself From Identity Theft

THE HISTORY OF BANKING AND SAVING

Understanding our requirements and ensuring compliance

DVD Companion Learning Guide

Protecting Yourself from Identity Theft

Identity Theft Awareness: Don t Fall Victim to these Common Scams

SECURITY FREEZE INFORMATION

PREVENTING ID THEFT101

Cobblestone Capital Advisors. Identity Theft: What You Should Know

How To Get A Free Credit Report From A Credit Report Website

SECURITY FREEZE INFORMATION

INTRODUCTION HOW IDENTITY THEFT OCCURS

FTC Fact Sheet Identify Yourself

Identity Theft. Officer Rob Romey IPD Crime Prevention Officer.

Protecting Yourself From Identity Theft and Fraud. Detective Mike Kugler Bella Vista Police Department

SCAM JAM ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection

SECURITY FREEZE INFORMATION Any consumer in Wisconsin may place a security freeze on his or her credit report by requesting it in writing.

Dear Concerned Consumer,

Identity Theft. Protecting Your Credit Identity G1

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

ID THEFT: What It s All About

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft and Online Security

Identity Theft. Today s Goals. Identity Theft Statistics 03/26/2013. Joel Jacobsen Information Security Officer

Identity Theft is a serious crime!

Preventing identity theft

How To Get Help From The Police Department

Identity Theft. Medical Asst. EKG / Cardio. Fire Rescue. Paramedic. Date(s) Used April 12 and 14, 2011

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

2015 Identity Theft Guide

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Reclaiming your identity

IT S NOT JUST AN INTERNET PROBLEM

SECURITY FREEZE INFORMATION Any consumer in Illinois may place a security freeze on his or her credit report by requesting one in writing by

U.S. Postal Inspection Service. Ensuring Confidence in the U.S. Mail

PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity

Transcription:

Grades 9-12 Lesson 10 IDENTITY THEFT AND PHISHING SCAMS Key concepts: Consumer protection of financial records, protection of one s identity through paper and online Summary: This lesson introduces students to identity theft and phishing, including common methods used in the crime of identity theft. Students also learn about the consumer protection agency (the FTC) that handles this fast-growing financial crime. NJ Core Curriculum Content Standards for Personal Financial Literacy: Standard 9: 21 st Century Life and Careers Standard 9.2 Personal Financial Literacy 9.2 E. Becoming a Critical Consumer: 9.2.12.E.7, 9.2.12.E.9 National Standards in K 12 Personal Finance Education (from Jump$tart Coalition): Planning and Money Management: Standard 4: Apply consumer skills to purchase decisions. Financial Responsibility and Decision Making: Standard 1: Take responsibility for personal financial decisions. Standard 6: Control personal information. National Content Standards in Economics (from Council for Economic Education): N/A Rationale: This lesson is intended for high school students in 9 th through 12 th grades during a 40-50 minute time period. The lesson teaches students how to protect their identities while making purchases online and in everyday financial life. The activities rely on a variety of interactive and visual formats designed to be interesting and fun. Lesson Objectives: Students will be able to: List the common techniques used to steal one s identity. Become aware of electronic phishing ploys. Describe and evaluate methods to protect financial records. Explain how to take action if your identity is stolen. Explain behavior to operate more safely online and with mobile devices. Materials: TD Bank WOW!Zone 1 Grades 9-12/Lesson 10

Access to the internet in the classroom or to handouts from the Federal Trade Commission website *Materials not attached to this file may be found in a separate resource file. State the Objective: Tell the students what they will be able to do upon conclusion of the lesson. Today we are going to learn about a fast-growing financial crime: identity theft. You will be able to list the common techniques used to steal one s identity and know how to report that one s identity is stolen. You will be able to list some behaviors to protect your financial records and personal information and to operate more safely online and with mobile devices. The Lesson Procedure: If you have ever heard a parent or a relative say when they opened their credit card bill, Wow, I did not charge all of these things. I did not buy that $500 watch!, it is possible that they were a victim of identity theft. FTC surveys show that about 10 million people are victims of identity theft each year. People who are dishonest and unethical (and they are often very smart) will try to make their money by stealing yours. Identity theft is a crime. Open the lesson with a definition of new terms and phrases, asking students if they know what they are. Definitions: Identity theft is when a person acquires and then uses your name (and address, Social Security Number) in order to apply for a credit card in your name or purchase products in your name. Phishing occurs with electronic communication such as e-mail or text messaging. It is when someone pretends to be someone or something they are not to acquire your passwords, credit card or bank account information, or other personal information. FTC: The Federal Trade Commission an independent federal government agency (since 1914) whose mission is to promote consumer protection and help deter anti-competitive and unethical business practices such as deceptive advertising, phishing, and identity theft. Watch 1-2 instructional videos by the Federal Trade Commission on identity theft. TD Bank WOW!Zone 2 Grades 9-12/Lesson 10

Identity Theft (1 minute, 8 seconds) at: http://www.youtube.com/watch?v=-iebvih7bzc FTC Identity Theft.mp4 (1 minute, 53 seconds) at: http://www.youtube.com/watch?v=oopjimjp1zq Watch a video on phishing from CommonCraft.com (CommonCraft is a small company that makes videos intended for classroom use. You can join on the website, but some of their videos are free on YouTube): Phishing Scams in Plain English (3 minutes, 5 seconds) at: http://www.youtube.com/watch?v=sqrzghihgxg&feature=relmfu Review the major points of the videos. If your classroom does not have access to the internet, the major points are: The top methods for stealing a person s identity are: 1. Dumpster Diving : going through a person s or household s trash to look for credit card offers, bills, bank account numbers, pay stubs, anything with Social Security numbers, birth dates, bank or credit account number, or other personal information. 2. Skimming: stealing credit card numbers with a small hand-held unit that can store your credit card number with a quick swipe of your card. 3. Phishing: pretending to be a legitimate financial institution, government agency, or company though an e-mail, a pop-up message, a text message, etc. 4. Changing your address: Completing a change of address card at the Post Office to defer your mail to another location other than your home. Or hacking into your e-mail or online accounts to change your address or steal your personal information. 5. Stealing: stealing mail from a person s U.S. postal service mailbox, or stealing your mailed Income Tax Return; stealing wallets or purses; bribing employees who have access to employee personnel records. Ask students if they can think of other, unscrupulous methods for attempting to steal one s identity or cleverly disguise phishing. Ask them if they have ever received a spam text message (it is likely that they have). Ask students to come up with a list of the harmful things that could occur if your identity is stolen, for example: Someone could withdraw money from your bank account using a debit card or credit card in your name. Your credit score could drop if you exceed your credit limit. You have to take the time and go through the expense of cancelling accounts, getting new accounts and account numbers, etc. TD Bank WOW!Zone 3 Grades 9-12/Lesson 10

What to do if you are a victim of Identity Theft The FTC s website is a one-stop resource to both learn about identity theft and walk you through the appropriate actions if your identity is stolen: http://www.ftc.gov/bcp/edu/microsites/idtheft/ Some steps include: Report the identity theft to the 3 credit bureaus: Experian, TransUnion, and Equifax. File a police report with local law enforcement. Report the theft to the FTC online at www.ftc.gov/idtheft or by phoning 1-877-ID-THEFT (1-877-438-4338). Deterring Identity Theft: Ask students to come up with a list of behaviors to deter thieves from stealing their identity, such as: Shred financial documents that are not being kept for safeguarding. [This allows a teacher to cover the kind of information that should be held and for how long (in years). It also allows a teacher to cover what documents are best kept in a safe deposit box, a home safe, regular home files, etc.] Do not carry around your Social Security Card in your wallet. Do not give out personal information over the phone or over the internet unless you are absolutely sure who you are dealing with. Choose computer and electronic passwords with care by avoiding birth dates, your Social Security Number, your mother s last name, etc. Try not to have your postal mail pile up in your mailbox for several days; if you are going to be away for a few days, have your mail held at the post office until you return. Do not click on suspicious links in e-mail or complete forms with your account number and password. Check the web address. Be suspicious about regular bills that do not arrive on time, denials of credit for no apparent reason, calls or letters about purchases you did not make, charges on your financial statements that you do not recognize. Use a password to access your mobile devices such as your cell phone, tablet (ipad), etc., just as you would have a password to get access to your e-mail accounts. Closing the Lesson: Review with students the importance of securing their personal information and keeping an eye out for persons trying to steal information through electronic means. See the suggestions page for Ways to End and Review Lessons, for additional ideas. TD Bank WOW!Zone 4 Grades 9-12/Lesson 10

Ways to End and Review Lessons Quizbowl: Separate the students into two teams and ask questions related to the lesson, i.e. How can you better safeguard your personal information? What should you be careful to review online to avoid responding to phishing scams? Jigsaw: Jigsaw students into three groups and assign each a specific question from the lesson to answer together, with one person from each team acting as the spokesperson. Sample questions: Describe why it is important to protect one s financial documents/identity. What can you do to protect your identity from being stolen? What steps should you take if your identity is stolen? What kinds of tactics are used online with phishing scams? Peer Education through Skits, Videos: Often learning is reinforced or students learn best by teaching others. Have students write a script and act it out in class with the objective of teaching each other (their peers) about the lesson. A skit or a student-produced video could show identity theft or phishing in action and/or the proper steps for preventing it or reporting it once it occurs. Students could invent very clever scenarios that will keep them on alert in the future. These should be prepared by students and performed in another class period that follows this lesson. Misinformation: Quote information from the day s lesson purposely erroneous. Call on various students to restate the information correctly. What s left out? Supply students with statements that have some information missing. This can be done orally or it can be done on a blackboard/whiteboard. Ask students to provide the missing information. Pair and Share: Group students into pairs and ask each pair to exchange two or three new things learned during the day s lesson. Call on select pairs to share with the whole class what has been learned. TD Bank WOW!Zone 5 Grades 9-12/Lesson 10