SlideShare uma empresa Scribd logo
1 de 20
Types of Identity Theft
Pooja Kalra
SRIMCA 2013
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Financial ID Theft
• Financial ID theft include bank fraud ,credit card fraud .
• Financial ID occur when a fraudster makes a use of someone else's
identifying details ,such as name SSN and bank account.
• Fraudster can open a new credit card account in the victim’s name
and card charges up, payment is ignored, leaving the victim with bad
credit history.
• Sometime fraudster completely takeover the victim ‘s identity, which
enables the fraudster to easily open bank accounts, multiple credit
cards,purchase a vehicle ,receive a home loan or even find
employment in victim’s name.
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Criminal ID Theft
• A specific type of ID theft that occurs when a criminal gives another
person’s name or personal identification to a law enforcement.
• Criminal identity theft occurs when someone arrested for a crime uses
another person's name and identifying information, resulting in a criminal
record being created in that person's name.
• When that happens, the victim of criminal identity theft can have
problems with law enforcement or be unable to gain employment. It is a
serious, but rare, problem.
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Identity Cloning
• When a fraudster lives as the victim, getting married, working, paying
taxes and possibly committing crimes.
• Identity cloning is the act of a fraudster living a natural and usual life
similar to a victim’s life, may be at different location.
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Business ID Theft
• When most people think of identity theft, they imagine an individual
victim’s Social Security or credit card number being stolen.
• However, identity theft does not just affect individuals. Business
identity theft occurs when a business’s identity is used to transact
business and establish lines of credit with banks and/or vendors.
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Medical ID Theft
• Medical identity theft happens when someone steals your personal
information and uses it to commit health care fraud. Medical ID thieves may
use your identity to get treatment — even surgery — or to cheat insurers by
making fake claims.
• Repairing damage to your good name and credit record can be difficult
enough, but medical ID theft can have other serious consequences.
• If a scammer gets treatment in your name, that person’s health problems
could become a part of your medical record.
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Synthetic ID Theft
• This is the “latest thing” in the ID theft world.
• The thief will take parts of information from many victims and
combine it.
• The new identity isn’t any specific person, but all the victims can be
affected when it’s used. It will show up in the areas above, so look to
those sections for additional information.
Types of Identity Theft
• Financial ID Theft
• Criminal ID Theft
• Identity Cloning
• Business ID Theft
• Medical ID Theft
• Synthetic ID Theft
• Child ID Theft
Child ID Theft
• Child identity theft occurs when a child’s Social Security number is
used by another person for the fraud’s personal gain. The fraud can
be a family member, a friend, or even a stranger who targets
children.
• A child's Social Security number can be used by identity thieves to
apply for government benefits, open bank and credit card accounts,
apply for a loan or utility service, or rent a place to live. Check for a
credit report to see if your child’s information is being misused. Take
immediate action if it is.
Case Studies
Case study 1
CHRIS FROM ARIZONA :•AllClear ID discovered that a 17-year-old girl has over $725,000 in
debt. Chris’s daughter’s Social Security number was linked to eight
different suspects living in border states. The suspects opened 42 open
accounts including auto loans, credit cards, and bills in collections
including medical, credit cards, and utilities.
•STATUS: The case is in progress.
Case study 2
STEPHANIE FROM IDAHO :•AllClear ID discovered that Stephanie, a minor, had a credit file with
unpaid debt. The suspect used Stephanie’s Social Security number to
open two different accounts with mobile phone companies, leaving
over $1,000 in unpaid bills. The unpaid bills had moved into collections
and were reported– establishing a history of bad credit for Stephanie.
•RESOLUTION: AllClear ID worked with Stephanie’s parents to file police
reports and restore her credit file and identity.
Thank You

Mais conteúdo relacionado

Mais procurados

Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 

Mais procurados (20)

Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
IDShield
IDShieldIDShield
IDShield
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
online shopping
online shoppingonline shopping
online shopping
 

Destaque (6)

Language and identity[1]
Language and identity[1]Language and identity[1]
Language and identity[1]
 
Language and Cultural Identity
Language and Cultural IdentityLanguage and Cultural Identity
Language and Cultural Identity
 
Language, culture, and identity
Language, culture, and identityLanguage, culture, and identity
Language, culture, and identity
 
Culture and Identity
Culture and IdentityCulture and Identity
Culture and Identity
 
Definition and types of research
Definition and types of researchDefinition and types of research
Definition and types of research
 
Types of Research
Types of ResearchTypes of Research
Types of Research
 

Semelhante a Identity theft and there types by pooja kalra

Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pntjessmc1
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the DifferencesIdentity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the DifferencesFTx Identity
 
Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftThe Identity Advocate
 

Semelhante a Identity theft and there types by pooja kalra (20)

Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the DifferencesIdentity Theft vs Identity Fraud: Understanding the Differences
Identity Theft vs Identity Fraud: Understanding the Differences
 
Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity Theft
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Identity theft and there types by pooja kalra

  • 1. Types of Identity Theft Pooja Kalra SRIMCA 2013
  • 2. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 3. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 4. Financial ID Theft • Financial ID theft include bank fraud ,credit card fraud . • Financial ID occur when a fraudster makes a use of someone else's identifying details ,such as name SSN and bank account. • Fraudster can open a new credit card account in the victim’s name and card charges up, payment is ignored, leaving the victim with bad credit history. • Sometime fraudster completely takeover the victim ‘s identity, which enables the fraudster to easily open bank accounts, multiple credit cards,purchase a vehicle ,receive a home loan or even find employment in victim’s name.
  • 5. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 6. Criminal ID Theft • A specific type of ID theft that occurs when a criminal gives another person’s name or personal identification to a law enforcement. • Criminal identity theft occurs when someone arrested for a crime uses another person's name and identifying information, resulting in a criminal record being created in that person's name. • When that happens, the victim of criminal identity theft can have problems with law enforcement or be unable to gain employment. It is a serious, but rare, problem.
  • 7. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 8. Identity Cloning • When a fraudster lives as the victim, getting married, working, paying taxes and possibly committing crimes. • Identity cloning is the act of a fraudster living a natural and usual life similar to a victim’s life, may be at different location.
  • 9. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 10. Business ID Theft • When most people think of identity theft, they imagine an individual victim’s Social Security or credit card number being stolen. • However, identity theft does not just affect individuals. Business identity theft occurs when a business’s identity is used to transact business and establish lines of credit with banks and/or vendors.
  • 11. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 12. Medical ID Theft • Medical identity theft happens when someone steals your personal information and uses it to commit health care fraud. Medical ID thieves may use your identity to get treatment — even surgery — or to cheat insurers by making fake claims. • Repairing damage to your good name and credit record can be difficult enough, but medical ID theft can have other serious consequences. • If a scammer gets treatment in your name, that person’s health problems could become a part of your medical record.
  • 13. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 14. Synthetic ID Theft • This is the “latest thing” in the ID theft world. • The thief will take parts of information from many victims and combine it. • The new identity isn’t any specific person, but all the victims can be affected when it’s used. It will show up in the areas above, so look to those sections for additional information.
  • 15. Types of Identity Theft • Financial ID Theft • Criminal ID Theft • Identity Cloning • Business ID Theft • Medical ID Theft • Synthetic ID Theft • Child ID Theft
  • 16. Child ID Theft • Child identity theft occurs when a child’s Social Security number is used by another person for the fraud’s personal gain. The fraud can be a family member, a friend, or even a stranger who targets children. • A child's Social Security number can be used by identity thieves to apply for government benefits, open bank and credit card accounts, apply for a loan or utility service, or rent a place to live. Check for a credit report to see if your child’s information is being misused. Take immediate action if it is.
  • 18. Case study 1 CHRIS FROM ARIZONA :•AllClear ID discovered that a 17-year-old girl has over $725,000 in debt. Chris’s daughter’s Social Security number was linked to eight different suspects living in border states. The suspects opened 42 open accounts including auto loans, credit cards, and bills in collections including medical, credit cards, and utilities. •STATUS: The case is in progress.
  • 19. Case study 2 STEPHANIE FROM IDAHO :•AllClear ID discovered that Stephanie, a minor, had a credit file with unpaid debt. The suspect used Stephanie’s Social Security number to open two different accounts with mobile phone companies, leaving over $1,000 in unpaid bills. The unpaid bills had moved into collections and were reported– establishing a history of bad credit for Stephanie. •RESOLUTION: AllClear ID worked with Stephanie’s parents to file police reports and restore her credit file and identity.

Notas do Editor

  1. An identity cloning will be obtain as much information about the victim as possible they will look to find out what city and state the victim was born in,where attending school and what relationship he/she may have been involved in.