| A | B |
| Stealing | Information is taken from a purse or wallet, personnel records from a workplace, tax information, bank or credit card statements, or pre-approved credit card offers from the mail. |
| Diverting Mail | Thieves can complete a change of address form and have the victim’s bills and statements mailed to a different location. |
| “Dumpster Diving” | Personal information is discarded and thieves remove it from the trash. |
| Skimming | Thieves attach a device to card processors to steal credit and debit card information |
| Phishing | Thieves use a form of electronic communication (usually email) to pretend to be a company or depository institution in order to get the victim to give up their personal information. |
| Pretexting | Thieves use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources. |
| Spyware | Software installed on the victim’s computer, without their knowledge or consent, that monitors internet use, sends pop up ads, re-directs the computer to other sites, and tracks key strokes. |
| Hacking | Information is stolen by breaking into a computer system. |