Java Games: Flashcards, matching, concentration, and word search.

Identity Theft: How Do They Do It 7.03

NC Personal Finance Objective 7.03

AB
stealingthieves access personal information by stealing a purse/wallet, personal records from workplace, tax information, bank or credit card statements, pre-approved credit card offers
diverting mailthieves complete change of address form and have victim's bills and statements mailed to different location
dumpster divingthieves dig through garbage to steal information carelessly discarded
skimmingthieves may steal debit or credit card informatin by attaching a device to card processors
phishingthieves use form of electronic communication to pretend to be company or financial institution to obtain personal information
pretextingthieves use false pretenses to obtain your personal information from financial institutions, telephone companies and others
spywaresoftware may be installed on victim's computer without their knowledge that monitors internet use, sends pop-up ads, tracks key strokes, etc.
hackingthieves may break into computer system and steal information
personal informationbank account numbers, credit card numbers, social security number, driver's license number, telephone number
Federal Trade Commissionagency of the US government that primarily focuses on consumer protection
identity theft protectionservice offered by banks for a fee, where they monitor credit reports, scores & personal information on internet & alert consumer whenever change occurs
identity theft insurancelimits the liability to consumer if they are victims of identity theft by reimbursing them for all or some of identity theft expenses


E. E. Smith Senior High School

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities