| A | B |
| stealing | thieves access personal information by stealing a purse/wallet, personal records from workplace, tax information, bank or credit card statements, pre-approved credit card offers |
| diverting mail | thieves complete change of address form and have victim's bills and statements mailed to different location |
| dumpster diving | thieves dig through garbage to steal information carelessly discarded |
| skimming | thieves may steal debit or credit card informatin by attaching a device to card processors |
| phishing | thieves use form of electronic communication to pretend to be company or financial institution to obtain personal information |
| pretexting | thieves use false pretenses to obtain your personal information from financial institutions, telephone companies and others |
| spyware | software may be installed on victim's computer without their knowledge that monitors internet use, sends pop-up ads, tracks key strokes, etc. |
| hacking | thieves may break into computer system and steal information |
| personal information | bank account numbers, credit card numbers, social security number, driver's license number, telephone number |
| Federal Trade Commission | agency of the US government that primarily focuses on consumer protection |
| identity theft protection | service offered by banks for a fee, where they monitor credit reports, scores & personal information on internet & alert consumer whenever change occurs |
| identity theft insurance | limits the liability to consumer if they are victims of identity theft by reimbursing them for all or some of identity theft expenses |