SlideShare a Scribd company logo
1 of 9
Tiina Antikainen 1103920
Definition
• Identity theft is a form of stealing someone's
  identity in which someone pretends to be
  someone else by assuming that person's identity.
• Typically in order to access resources or obtain
  credit and other benefits in that person's name.
What identity thefts are looking for?
• Full name
• Date of birth
• Social Insurance Numbers
• Full address
• Mother’s maiden name
• Username and password for online services
• Driver's license number
• Personal identification numbers (PIN)
• Credit card information (numbers, expiry dates and the last
  three digits printed on the signature panel)
• Bank account numbers
• Signature
• Passport number
What they do with the information?
•   Access your bank accounts
•   Open new bank accounts
•   Transfer bank balances
•   Apply for loans, credit cards and other goods and services
•   Make purchases
•   Hide their criminal activities
•   Obtain passports or receive government benefits
How to know if your identity was
stolen?
• Frequently monitor your: Hard copy, on-line financial accounts
  and your credit card reports for any unusual activities
• Investigate further if you find out there is unfamiliar accounts
  in your name
• You have applied for credit and are unexpectedly turned down
What to do if identity is stolen?
• Report it to the police
• Inform your bank and credit card companies
• Place a fraud alert on your credit reports, and review your
  credit reports
• Close the accounts that you know, or believe, have been
  tampered with or opened fraudulently
• It is important to do all these steps as soon as you find out
  your identity is stolen
How to prevent my identity to be
stolen?
• Always keep your personal data private
  • Keep your data secure with passwords or in a locked storage
    device
  • Never pay your bills on a public Wi-Fi hotspot
• Keep key personal information on social networking sites
  private
• Be sure of the applications you download
• Watch where you leave your phone (Do not let anyone use
  your phone without your supervising)
• Make sure you report identity thief as quickly as possible (The
  sooner you act, the less you will lose and the more likely law
  enforcement can catch the fraudsters)
Identity thefts increasing
• It is important to be aware of the problem
• Compared to 2010, in year 2011 identity theft incidents
  increased 13 present
• Reason?
  • The use of smartphones and social media has been increasing->
    more opportunities for the thefts

                                              2011 statistics
                                              of identity
                                              crimes
Bibliography
• http://en.wikipedia.org/wiki/Identity_theft
• http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/ab
  out-identity-theft.html
• http://www.rcmp-grc.gc.ca/scams-fraudes/id-theft-vol-
  eng.htm
• http://www.digitaltrends.com/mobile/why-id-theft-increased-
  in-2011-and-how-you-can-protect-yourself/
• http://drjonpbloch.blogspot.fi/2012/02/identity-theft-fastest-
  growing-crime-in.html

More Related Content

What's hot

How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraudHenley Walls
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor AuthenticationNikhil Shaw
 
Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)ajmal anbu
 
Onfido: Data-Driven Product Management at Scale
Onfido: Data-Driven Product Management at ScaleOnfido: Data-Driven Product Management at Scale
Onfido: Data-Driven Product Management at ScaleAmazon Web Services
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and SolutionsClarice_Wilson
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Floreslorrflores
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Tracxn Research: Payments Landscape, October 2016
Tracxn Research: Payments Landscape, October 2016Tracxn Research: Payments Landscape, October 2016
Tracxn Research: Payments Landscape, October 2016Tracxn
 

What's hot (20)

Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
 
How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraud
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Merchant Presentation
Merchant PresentationMerchant Presentation
Merchant Presentation
 
itsme Digital ID turns 3
itsme Digital ID turns 3itsme Digital ID turns 3
itsme Digital ID turns 3
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
 
Mobile Wallet Features
Mobile Wallet FeaturesMobile Wallet Features
Mobile Wallet Features
 
Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Onfido: Data-Driven Product Management at Scale
Onfido: Data-Driven Product Management at ScaleOnfido: Data-Driven Product Management at Scale
Onfido: Data-Driven Product Management at Scale
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Tracxn Research: Payments Landscape, October 2016
Tracxn Research: Payments Landscape, October 2016Tracxn Research: Payments Landscape, October 2016
Tracxn Research: Payments Landscape, October 2016
 

Viewers also liked

Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringaFausto Dutan
 
output meetup #7 人とのつながりを創るために大切にしていること
output meetup #7 人とのつながりを創るために大切にしていることoutput meetup #7 人とのつながりを創るために大切にしていること
output meetup #7 人とのつながりを創るために大切にしていることR Iwa
 
Malware
MalwareMalware
MalwareHHSome
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yrjdrinks
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonHHSome
 
Classification of tv advertizing
Classification of tv advertizingClassification of tv advertizing
Classification of tv advertizingEhnan Jelh Lamita
 
Ntl overview presentation
Ntl overview presentationNtl overview presentation
Ntl overview presentationRosalyn Alleman
 
Fmcsa presentation12 13-11
Fmcsa presentation12 13-11Fmcsa presentation12 13-11
Fmcsa presentation12 13-11Rosalyn Alleman
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yrjdrinks
 
ลัทธิสังคมนิยม
ลัทธิสังคมนิยมลัทธิสังคมนิยม
ลัทธิสังคมนิยมMarissa Meester
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yrjdrinks
 
Introduction to plants
Introduction to plantsIntroduction to plants
Introduction to plantsjdrinks
 
Angaran rumah tangga (autosaved)
Angaran rumah tangga (autosaved)Angaran rumah tangga (autosaved)
Angaran rumah tangga (autosaved)Strobillus Found
 
Ntl overview presentation_long
Ntl overview presentation_longNtl overview presentation_long
Ntl overview presentation_longRosalyn Alleman
 
Impact of the great war
Impact of the great warImpact of the great war
Impact of the great warally_bally_bee
 
Ntl sources slides 2011 gpo
Ntl sources slides 2011 gpoNtl sources slides 2011 gpo
Ntl sources slides 2011 gpoRosalyn Alleman
 

Viewers also liked (20)

Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringa
 
output meetup #7 人とのつながりを創るために大切にしていること
output meetup #7 人とのつながりを創るために大切にしていることoutput meetup #7 人とのつながりを創るために大切にしていること
output meetup #7 人とのつながりを創るために大切にしていること
 
Malware
MalwareMalware
Malware
 
Budget 2013
Budget 2013Budget 2013
Budget 2013
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
 
Classification of tv advertizing
Classification of tv advertizingClassification of tv advertizing
Classification of tv advertizing
 
State of Rural Minnesota 2013-preview
State of Rural Minnesota 2013-previewState of Rural Minnesota 2013-preview
State of Rural Minnesota 2013-preview
 
Ntl overview presentation
Ntl overview presentationNtl overview presentation
Ntl overview presentation
 
Imc presentation
Imc presentationImc presentation
Imc presentation
 
Fmcsa presentation12 13-11
Fmcsa presentation12 13-11Fmcsa presentation12 13-11
Fmcsa presentation12 13-11
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
Imc presentation
Imc presentationImc presentation
Imc presentation
 
ลัทธิสังคมนิยม
ลัทธิสังคมนิยมลัทธิสังคมนิยม
ลัทธิสังคมนิยม
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
Introduction to plants
Introduction to plantsIntroduction to plants
Introduction to plants
 
Angaran rumah tangga (autosaved)
Angaran rumah tangga (autosaved)Angaran rumah tangga (autosaved)
Angaran rumah tangga (autosaved)
 
Ntl overview presentation_long
Ntl overview presentation_longNtl overview presentation_long
Ntl overview presentation_long
 
Impact of the great war
Impact of the great warImpact of the great war
Impact of the great war
 
Ntl sources slides 2011 gpo
Ntl sources slides 2011 gpoNtl sources slides 2011 gpo
Ntl sources slides 2011 gpo
 

Similar to Identity thefts

Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Mark Kotzin
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 

Similar to Identity thefts (20)

Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Staying Secure Electronically
Staying Secure ElectronicallyStaying Secure Electronically
Staying Secure Electronically
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 

More from HHSome

Assignment4
Assignment4Assignment4
Assignment4HHSome
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social mediaHHSome
 
Spy Programs
Spy ProgramsSpy Programs
Spy ProgramsHHSome
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionageHHSome
 
Social engineering
Social engineeringSocial engineering
Social engineeringHHSome
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessHHSome
 
Over posting
Over postingOver posting
Over postingHHSome
 
Censorship
CensorshipCensorship
CensorshipHHSome
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to preziHHSome
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingHHSome
 
Phishing
PhishingPhishing
PhishingHHSome
 
Personal information
Personal informationPersonal information
Personal informationHHSome
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsHHSome
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick krammHHSome
 

More from HHSome (17)

Assignment4
Assignment4Assignment4
Assignment4
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 Facelessness
 
Over posting
Over postingOver posting
Over posting
 
Censorship
CensorshipCensorship
Censorship
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
 
Phishing
PhishingPhishing
Phishing
 
Personal information
Personal informationPersonal information
Personal information
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
 

Identity thefts

  • 2. Definition • Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity. • Typically in order to access resources or obtain credit and other benefits in that person's name.
  • 3. What identity thefts are looking for? • Full name • Date of birth • Social Insurance Numbers • Full address • Mother’s maiden name • Username and password for online services • Driver's license number • Personal identification numbers (PIN) • Credit card information (numbers, expiry dates and the last three digits printed on the signature panel) • Bank account numbers • Signature • Passport number
  • 4. What they do with the information? • Access your bank accounts • Open new bank accounts • Transfer bank balances • Apply for loans, credit cards and other goods and services • Make purchases • Hide their criminal activities • Obtain passports or receive government benefits
  • 5. How to know if your identity was stolen? • Frequently monitor your: Hard copy, on-line financial accounts and your credit card reports for any unusual activities • Investigate further if you find out there is unfamiliar accounts in your name • You have applied for credit and are unexpectedly turned down
  • 6. What to do if identity is stolen? • Report it to the police • Inform your bank and credit card companies • Place a fraud alert on your credit reports, and review your credit reports • Close the accounts that you know, or believe, have been tampered with or opened fraudulently • It is important to do all these steps as soon as you find out your identity is stolen
  • 7. How to prevent my identity to be stolen? • Always keep your personal data private • Keep your data secure with passwords or in a locked storage device • Never pay your bills on a public Wi-Fi hotspot • Keep key personal information on social networking sites private • Be sure of the applications you download • Watch where you leave your phone (Do not let anyone use your phone without your supervising) • Make sure you report identity thief as quickly as possible (The sooner you act, the less you will lose and the more likely law enforcement can catch the fraudsters)
  • 8. Identity thefts increasing • It is important to be aware of the problem • Compared to 2010, in year 2011 identity theft incidents increased 13 present • Reason? • The use of smartphones and social media has been increasing-> more opportunities for the thefts 2011 statistics of identity crimes
  • 9. Bibliography • http://en.wikipedia.org/wiki/Identity_theft • http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/ab out-identity-theft.html • http://www.rcmp-grc.gc.ca/scams-fraudes/id-theft-vol- eng.htm • http://www.digitaltrends.com/mobile/why-id-theft-increased- in-2011-and-how-you-can-protect-yourself/ • http://drjonpbloch.blogspot.fi/2012/02/identity-theft-fastest- growing-crime-in.html