FTC Fact Sheet Identify Yourself



Similar documents
Identity Theft Protection

When Fraud Comes Knocking

Learn to protect yourself from Identity Theft. First National Bank can help.

PREVENTING HIGH-TECH IDENTITY THEFT

Retail/Consumer Client. Internet Banking Awareness and Education Program

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Beware! Identity Theft

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Standard 9: The student will identify and explain consumer fraud and identity theft.

I dentity theft occurs

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Identity Theft Protection

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT

IDENTITY THEFT: MINIMIZING YOUR RISK

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Identity Theft and Strategies for Crime Prevention

Protecting Yourself from Identity Theft

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

7 PRACTICES FOR SAFER COMPUTING

STOP THINK CLICK Seven Practices for Safer Computing

What to Know, What to Do

Information to Protect Our Customers From Identity Theft

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain.

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

How To Protect Yourself From Identity Theft

NORWALK STATION Civic Center Dr. Norwalk, CA Phone: (562) News Release

Identity Theft Prevention Presented by: Matt Malone Assero Security

Saheel KHOYRATTY. Partner Technology Advisor

When life happens... Protect Against Identity Theft. Keeping personal information safe & what to do if it happens to you

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

Do s & Don ts Reference website.

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Corona Police Department

Fraud Prevention Tips

The Canadian Resource Centre for Victims of Crime Centre canadien de ressources pour les victimes de crimes. Identity Theft and Phishing

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

Protect Yourself From Identity Theft

How to protect your identity. Identity fraud explained

Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.

Preventing identity theft

A Guide to Protecting Yourself From Identity Theft

Protecting Yourself from Identity Theft

BE SAFE ONLINE: Lesson Plan

Identity Theft Problem and Solutions

Cobblestone Capital Advisors. Identity Theft: What You Should Know

Activities for Protecting Your Identity and Computer for Middle and High School Students

Online Security Tips

Fraud Prevention Guide

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.

Learning English with CBC Radio Living in Alberta. Identity Theft

Introduction to Computer Security

DVD Companion Learning Guide

National Cyber Security Month 2015: Daily Security Awareness Tips

How To Get Help From The Police Department

How To Get A Free Credit Report From A Credit Report Website

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Identity fraud explained. How to protect your identity

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Identity Theft Simple ways to keep your sensitive information safe.

Identity Theft. Presented By: Information Technology. James Blackwood, Michael Fouts, & Tiffany Mixon

Avoid completing forms in messages that ask for personal financial information.

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you

Reduce your Risk of Credit Card & Identity Fraud

suntrust.com 800.SUNTRUST

EL/Civics Lesson Plan

& INTERNET FRAUD

Coping with Identity Theft

Transcription:

FTC Fact Sheet Identify Yourself 5 10 15 20 25 30 35 40 You might have heard about identity theft: it s what can happen when a thief gets enough of someone s information to commit fraud. Why should people care about it? Because recovering a stolen identity can be a time-consuming and expensive process. Imagine that someone pretends to be you: they use your name; they even convince businesses that they re you and they open a credit card in your name, get a cell phone in your name, or buy things using checks or a credit card that have your name on them. ID thieves can be creative about getting your information. There are some low-tech ways they get it: sometimes they steal garbage, going through it to find personal information, or they steal mail. Of course, it s illegal to steal mail and to steal your identity. There are high-tech ways, too: ID thieves might put software onto your computer without you knowing it it can happen when you open an email attachment, click on a pop-up ad, or download some music files, for example. The software, called spyware or badware, lets a thief see everything on your computer, track where you go, and record everything you type on your computer. Unfortunately, even if you re really careful with your personal information, thieves can still get people s personal information. Sometimes, they hack into computer systems at stores or schools, hospitals or businesses. They look for personal information to use or sell to other thieves. It s pretty easy for you and your family to make it harder for a thief to steal your identity. You can start with the low-tech defenses: being careful with your mail and garbage. If your family doesn t have a shredder, you might want to get one. Tell your parents to shred anything that has personal information on it before they throw it away. And be sure to take care with your purse, your wallet, or your backpack. It s especially important not to carry your Social Security card with you. Keep it in a safe, locked place at home. Practice some routine higher-tech defensive plays, too: protect your computer by installing and turning on an up-to-date firewall along with antispyware and anti-virus software. Once you re online, be careful with your personal information. Some sites might ask for a credit card number maybe for something you re buying, maybe as proof of age. Ask yourself if they really need that number. If your answer is yes, stop and check. Before you type in your number, look for the closed lock icon in the lower right-hand corner of the screen, and look for the URL that starts with https://. These are two ways to tell if a site is secure. When you get email or pop-ups on your computer, don t respond automatically. Emails that ask you to reply or click a link to update your account or avoid cancellation could be thieves trying to trick you into giving them your personal information. It s a technique called phishing, because the thieves are fishing for your information. Pop-ups for free downloads or screensavers could be Grade 7 ELA 9 Common Core Sample Questions

45 spyware in disguise; clicking them could let someone see what you do and where you go online. Stop and think before you click it could help keep your information private, and keep spyware off your computer. www.ftc.gov Words that could be defined for students are in bold. Grade 7 ELA 10 Common Core Sample Questions

6 How does the information in lines 9 17 help to develop the article? A It tells why people should care about identity theft. B It describes how thieves obtain information for identity theft. C It explains ways people can protect themselves from identity theft. D It emphasizes the importance of avoiding identity theft. Key: B Aligned to CCLS: RI.7.5 Commentary: This item aligns to RI.7.5 because it asks students to analyze how a section of text (lines 9 17) contributes to the development of the entire passage as a whole. Rationale: Option B is correct. Lines 9 17 explain how thieves obtain information for identity theft. The rest of the passage describes why people should care about identity theft and how to avoid it. Grade 7 ELA 11 Common Core Sample Questions

7 Which statement is not supported by the information in the article? A Schools can be targets of identity thieves. B Music downloads can often expose you to spyware. C Secure websites can protect your information. D Identity thieves can only target people on the internet. Key: D Aligned CCSLS: RI.7.1; additional standards may be added after further development. Commentary: This item aligns to RI.7.1 because it asks students to find the textual evidence that supports the statements and determine which statement is not supported by the text. Rationale: Option D is correct. The author explains that identity thieves take information from schools, businesses, mail, etc. not just from information people share online. The ideas behind options A, B, and C are explicitly stated in the text. Grade 7 ELA 12 Common Core Sample Questions

8 Which statement best expresses the author s view of identity theft? A Identity theft will eventually be stopped as computer software becomes more sophisticated. B Identity theft is a serious threat that can generally be prevented with a few simple habits. C Identity theft happens more commonly to adults because they are typically less familiar with computers. D Identity theft is an uncontrollable consequence of the amount of personal information that is shared through computers in today s world. Key: B Aligned CCLS: RI.7.2 Commentary: This item aligns to RI.7.2 because it asks students to summarize the general idea of the text. Rationale: Option B is correct. The author views identity theft as a real threat to most people, but one that can be generally prevented with low- and high-tech strategies. Grade 7 ELA 13 Common Core Sample Questions

9 Read this sentence from the article: Practice some routine higher-tech defensive plays, too: protect your computer by installing and turning on an up-to-date firewall along with anti-spyware and anti-virus software. The word plays in this sentence most closely means A games B scripts C techniques D attacks Key: C Aligned CCLS: RI.7.4 Commentary: This item aligns to CCLS RI.7.4 because it asks students to determine the specific connotation of a word as it is used in a text. Rationale: Option C is correct. In this context, plays means techniques for defending against identity theft. Grade 7 ELA 14 Common Core Sample Questions

10 The article suggests all of the following strategies for preventing identity theft EXCEPT A don t put personal information in the trash B don t take your Social Security card out of the house C don t enter your credit card on shared public computers D don t download free software without considering if it s necessary Key: C Aligned CCLS: RI.7.1; additional standards may be added after further development. Commentary: This item aligns to CCLS RI.7.1 because it asks students to find textual evidence that supports the statements and determine which statement is not supported by the text. Rationale: Option C is correct. The article does not discuss the use of shared public computers. All of the other strategies are presented. Grade 7 ELA 15 Common Core Sample Questions