SlideShare a Scribd company logo
CLB 3-4 Drop-in Workshop:
How to Prevent Identity Theft and
Fraud
Agenda
•Objectives
•Introductions
•What is identity theft
•How does identity theft happen
•What information is most commonly
stolen
•How our stolen information is used
•What can we do to prevent identity
theft?
• Five case studies
Objectives
By the end of this workshop you should
know:
• What financial information should be
protected
• How to protect yourself from identity
theft and fraud
• What to do if you are a victim of
identity theft or fraud
Introductions
• What is your name?
• What is your country of Origin?
Reflection
• What is identity theft?
• Have you ever been a victim of
identity fraud?
• What happened?
• What did you learn?
What is identity theft?
• This is when somebody steals another
person’s personal information for the
purpose of engaging in criminal
activities.
What is identity fraud?
• This is when your personal
information is actually used by the
person who stole it.
Identity Theft
How can it happen?
How it can happen
1. Dumpster Diving
How it can happen
2. Our own carelessness
How it can happen
3. Car break-in
Photo by V31S70 http://bit.ly/1mhaR6e shared under CC BY 2.0
How it can happen
4. Mail theft
How it can happen
5. Financial institution fraud
Listen:
• What mistake did
Iliana make?
• What could she do
differently next time?
Iliana’s Financial Lesson
Fernando Oh, hi Iliana ... How are you today?
Iliana I ‘m ok I suppose. I’m just a little stressed out!
Fernando Why what’s wrong?
Iliana Well, I got a call from the credit card company because my credit card is
maxed out!
Fernando Oh that’s too bad. It’s not like you to overspend.
Iliana That’s the problem. It’s a brand new card. I never even had a chance to
use it!
Fernando Well then how did it get maxed out?
Iliana This is why I am stressed out. I went to go and check my wallet and it’s
gone! I think it was stolen!
Iliana’s Financial Lesson
Fernando That is a problem! Where did you leave it?
Iliana By accident I left it on the front seat of my car yesterday afternoon. I was in a
hurry. I was going to go back to my car because I planned to go to the store for
milk, but then I changed my mind. I completely forgot I left it on the front seat.
Oh, and one more thing....
Fernando What’s that?
Iliana I didn’t lock the car door!
Fernando What are you doing about this mess?
Iliana I don’t know can be done! I’m just waiting for the credit card company to call me
back.
Fernando What a hard lesson this is!
Iliana You can say that again!
What kind of information is
commonly stolen?
Your full name
Your date of birth
Your social insurance number
Your full address
Your mother’s maiden name
User names and passwords
Driver’s license number
Credit card information
Bank account information
Signature
One more thing!
How is stolen information used?
Access your bank accounts
Open new bank accounts
Transfer account balances
Apply for loans
Make purchases
Hide criminal activity
Open new passports
What can we do to
help ensure our
personal information
is not stolen?
1. Monitor our records
2. Check our credit report for
unusual activity
Photo by TrinityCreditServices http://bit.ly/1HmcUgG shared under CC BY 2.0
3. We should Investigate further
if ...
1. we receive
phone calls from a
collection agency
about unfamiliar
accounts
2. We
unexpectedly get
turned down for
credit
How can we
prevent Identity
theft?
1. Shred all personal documents
2. Monitor financial records
3. Do not give personal
information over the phone
Photo by Kylesteed http://bit.ly/1KZtiEs shared under CC BY 2.0
4. Don’t be careless with your
personal information
4. Don’t carry too much
personal information with you
5. Keep all personal information
numbers in a safe place
Never write them on
the cards!
6. When you change your
address be sure to notify all your
financial institutions
Photo by mbtrama http://bit.ly/1HbzGp8 shared under CC BY 2.0
7. Shield the ATM and swipe
your own card!
7. Know when your credit
card payments are due
Photo by frankieleon http://bit.ly/1e9RJFe shared under CC BY 2.0
Case Studies
• Read each study and discuss
a. what mistake was made (if any)?
b. What can be done now to fix the
problem?
c. What can be done to prevent identity
theft?
Case Study One:
Miguel and his family are moving to a
new house. They have many personal
financial documents which they feel
they no longer need. Miguel’s wife asks
what they should do with the
documents. Miguel suggests tearing
them up and throwing them into the
garbage.
Case Study Two:
Samantha keeps all her pin numbers in
her wallet. She has so many credit
cards she cannot remember all the
numbers.
Case Study Three:
Su Jie’s “bank” called to confirm her
address and bank account numbers.
Su Jie felt comfortable giving her
account number over the phone
because the caller seemed to already
know a lot about her. She assumed it
really was a lady from the bank.
Case Study Four:
Bob and Diane always had a good
credit rating. One day they decided to
apply for a small loan for a car. They
were surprised when they got a call
from the bank informing them that
their application was declined.
Case Study Five:
Kamaljit and Vera are very good friends.
Vera has no money with her to buy
medicine for her child. Vera asks
Kamaljit if she could borrow her Debit
card to buy the medicine. Kamaljit
lends Vera her bank card and her pin
number
Discussion
What are some things
we can do once we
know our personal
information has been
stolen?
What did you learn?
What is identity fraud and theft
What kind of information is most
commonly stolen
How to know if your personal
information may have been stolen
Ways to prevent identity theft
Thanks for Attending!
See you next time!

More Related Content

PPT
Indentify Theft Slide Show
PPTX
Identity theft ppt
PPT
Cyber Forensic - Policing the Digital Domain
PPT
Cyber forensics
PPT
ATM Frauds and Solutions
PDF
Artificial intelligence in financial sector
PDF
Crypto Wallet Types Explained
Indentify Theft Slide Show
Identity theft ppt
Cyber Forensic - Policing the Digital Domain
Cyber forensics
ATM Frauds and Solutions
Artificial intelligence in financial sector
Crypto Wallet Types Explained

What's hot (20)

PDF
National Cyber Security Policy 2013 (NCSP)
PPTX
Credit Card Fraud PPT - Reena Prajapati.pptx
PPTX
Presentation on security feature of atm (2)
DOC
An atm with an eye
PPTX
Cybercrime And Cyber forensics
PPT
Moneypad
PPTX
Biometric technology
PPTX
Digital Forensics
PDF
Security Automation and Machine Learning
PDF
Identity Theft ppt
PPT
Computer Misuse Act
PPTX
Credit card fraud detection methods using Data-mining.pptx (2)
PPTX
Data theft
PPT
Digital Forensic
PPT
Identity Theft: How to Avoid It
PPTX
Cybercrime investigation
PPTX
Analysis of digital evidence
PPT
50409621003 fingerprint recognition system-ppt
PDF
Secure Coding for Java
PPTX
Improving Password Based Security
National Cyber Security Policy 2013 (NCSP)
Credit Card Fraud PPT - Reena Prajapati.pptx
Presentation on security feature of atm (2)
An atm with an eye
Cybercrime And Cyber forensics
Moneypad
Biometric technology
Digital Forensics
Security Automation and Machine Learning
Identity Theft ppt
Computer Misuse Act
Credit card fraud detection methods using Data-mining.pptx (2)
Data theft
Digital Forensic
Identity Theft: How to Avoid It
Cybercrime investigation
Analysis of digital evidence
50409621003 fingerprint recognition system-ppt
Secure Coding for Java
Improving Password Based Security
Ad

Similar to How to Prevent Identity Theft and Fraud (20)

PPTX
Identity Theft Overview
PDF
Youth Protection Guide - Canada
PDF
Identity Theft-How to Reduce Your Risk-03-16
PPT
Identity Theft Overview Webinar
PPTX
Identity Theft
PPT
Identity Theft: How to Reduce Your Risk
PDF
Identity Theft: The Other You
PPT
How to Minimize the Damage of Identity Theft
PDF
IdentIty Theft - ConsumerCents
PDF
Identity Theft 101
PPT
Identity Fraud and How to Protect Yourself
PDF
Senior Protection Guide - Canada
PDF
All about identity theft
PDF
All about identity_theft
PPTX
Credit Card Fraud
PPTX
Identity thefts
PPT
Identity Theft It's Devasting Impact
PPT
Identity Theft
PPT
Identity Theft It's Devasting Impact
PDF
Identity Theft Awareness 101 - Basics
Identity Theft Overview
Youth Protection Guide - Canada
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft Overview Webinar
Identity Theft
Identity Theft: How to Reduce Your Risk
Identity Theft: The Other You
How to Minimize the Damage of Identity Theft
IdentIty Theft - ConsumerCents
Identity Theft 101
Identity Fraud and How to Protect Yourself
Senior Protection Guide - Canada
All about identity theft
All about identity_theft
Credit Card Fraud
Identity thefts
Identity Theft It's Devasting Impact
Identity Theft
Identity Theft It's Devasting Impact
Identity Theft Awareness 101 - Basics
Ad

More from English Online Inc. (20)

PPTX
AllAboutArticlesRevised07/24EnglishOnline.pptx
PPTX
Stranger Danger - Based on Fear and Anxiety Idioms.pptx
PPTX
From Coast to Coast to Coast - Based of Canadianisms (CLB 3-4).pptx
PPTX
Canadianisms (Canadian Terms) - Canadian Idioms
PPTX
PrepositionsofPlaceCLB3-4EnglishOnline.pptx
PPTX
PrepositionsofTimeEnglishOnlineCLB3-4.pptx
PPTX
LookSeeWatchEnglishOnlineLunch&Learn.pptx
PPTX
ModalsofAdviceRevision2EnglishOnline.pptx
PPTX
DemonstrativePronounsCLB3-4EnglishOnline
PPTX
Rent or own - Based on Family Idioms.pptx
PPTX
IrregularVerbs2.0CLB3-4EnglishOnline.pptx
PPTX
AdverbsofFrequencyLunch&LearnEnglishOnline.pptx
PPTX
BBQ - Based on Meat Idioms.pptx - A language Circle Lesson
PPTX
IndefinitePronounsEnglishOnlineINC3-4.pptx
PPTX
RegularVerbsEnglishOnlineCLB3-4L/Learn.pptx
PPTX
ModalsNecessityObligationEnglishOnline.pptx
PPTX
Grandparents - Based on Relationship Idioms.pptx
PPTX
SimplePresentPresentProgressive(CLB3-4)EO.pptx
PPTX
Sleep and Health - Based on Health and Fitness Idioms Set 2.pptx
PPTX
PronouncingChShSoundsEnglishOnlineInc.pptx
AllAboutArticlesRevised07/24EnglishOnline.pptx
Stranger Danger - Based on Fear and Anxiety Idioms.pptx
From Coast to Coast to Coast - Based of Canadianisms (CLB 3-4).pptx
Canadianisms (Canadian Terms) - Canadian Idioms
PrepositionsofPlaceCLB3-4EnglishOnline.pptx
PrepositionsofTimeEnglishOnlineCLB3-4.pptx
LookSeeWatchEnglishOnlineLunch&Learn.pptx
ModalsofAdviceRevision2EnglishOnline.pptx
DemonstrativePronounsCLB3-4EnglishOnline
Rent or own - Based on Family Idioms.pptx
IrregularVerbs2.0CLB3-4EnglishOnline.pptx
AdverbsofFrequencyLunch&LearnEnglishOnline.pptx
BBQ - Based on Meat Idioms.pptx - A language Circle Lesson
IndefinitePronounsEnglishOnlineINC3-4.pptx
RegularVerbsEnglishOnlineCLB3-4L/Learn.pptx
ModalsNecessityObligationEnglishOnline.pptx
Grandparents - Based on Relationship Idioms.pptx
SimplePresentPresentProgressive(CLB3-4)EO.pptx
Sleep and Health - Based on Health and Fitness Idioms Set 2.pptx
PronouncingChShSoundsEnglishOnlineInc.pptx

Recently uploaded (20)

PDF
Chapter 9 IFRS Ed-Ed4_2020 Intermediate Accounting
PDF
Mathematical Economics 23lec03slides.pdf
PPTX
Session 11-13. Working Capital Management and Cash Budget.pptx
PPTX
Globalization-of-Religion. Contemporary World
PDF
ABriefOverviewComparisonUCP600_ISP8_URDG_758.pdf
PDF
Dialnet-DynamicHedgingOfPricesOfNaturalGasInMexico-8788871.pdf
PDF
Bladex Earnings Call Presentation 2Q2025
PDF
how_to_earn_50k_monthly_investment_guide.pdf
PPTX
Session 3. Time Value of Money.pptx_finance
PDF
Spending, Allocation Choices, and Aging THROUGH Retirement. Are all of these ...
PPTX
EABDM Slides for Indifference curve.pptx
PDF
ssrn-3708.kefbkjbeakjfiuheioufh ioehoih134.pdf
PPTX
Basic Concepts of Economics.pvhjkl;vbjkl;ptx
PDF
Q2 2025 :Lundin Gold Conference Call Presentation_Final.pdf
PDF
Lecture1.pdf buss1040 uses economics introduction
PPTX
Introduction to Customs (June 2025) v1.pptx
PPTX
FL INTRODUCTION TO AGRIBUSINESS CHAPTER 1
PDF
Predicting Customer Bankruptcy Using Machine Learning Algorithm research pape...
PDF
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
PDF
caregiving tools.pdf...........................
Chapter 9 IFRS Ed-Ed4_2020 Intermediate Accounting
Mathematical Economics 23lec03slides.pdf
Session 11-13. Working Capital Management and Cash Budget.pptx
Globalization-of-Religion. Contemporary World
ABriefOverviewComparisonUCP600_ISP8_URDG_758.pdf
Dialnet-DynamicHedgingOfPricesOfNaturalGasInMexico-8788871.pdf
Bladex Earnings Call Presentation 2Q2025
how_to_earn_50k_monthly_investment_guide.pdf
Session 3. Time Value of Money.pptx_finance
Spending, Allocation Choices, and Aging THROUGH Retirement. Are all of these ...
EABDM Slides for Indifference curve.pptx
ssrn-3708.kefbkjbeakjfiuheioufh ioehoih134.pdf
Basic Concepts of Economics.pvhjkl;vbjkl;ptx
Q2 2025 :Lundin Gold Conference Call Presentation_Final.pdf
Lecture1.pdf buss1040 uses economics introduction
Introduction to Customs (June 2025) v1.pptx
FL INTRODUCTION TO AGRIBUSINESS CHAPTER 1
Predicting Customer Bankruptcy Using Machine Learning Algorithm research pape...
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
caregiving tools.pdf...........................

How to Prevent Identity Theft and Fraud

  • 1. CLB 3-4 Drop-in Workshop: How to Prevent Identity Theft and Fraud
  • 2. Agenda •Objectives •Introductions •What is identity theft •How does identity theft happen •What information is most commonly stolen •How our stolen information is used •What can we do to prevent identity theft? • Five case studies
  • 3. Objectives By the end of this workshop you should know: • What financial information should be protected • How to protect yourself from identity theft and fraud • What to do if you are a victim of identity theft or fraud
  • 4. Introductions • What is your name? • What is your country of Origin?
  • 5. Reflection • What is identity theft? • Have you ever been a victim of identity fraud? • What happened? • What did you learn?
  • 6. What is identity theft? • This is when somebody steals another person’s personal information for the purpose of engaging in criminal activities.
  • 7. What is identity fraud? • This is when your personal information is actually used by the person who stole it.
  • 9. How it can happen 1. Dumpster Diving
  • 10. How it can happen 2. Our own carelessness
  • 11. How it can happen 3. Car break-in Photo by V31S70 http://bit.ly/1mhaR6e shared under CC BY 2.0
  • 12. How it can happen 4. Mail theft
  • 13. How it can happen 5. Financial institution fraud
  • 14. Listen: • What mistake did Iliana make? • What could she do differently next time?
  • 15. Iliana’s Financial Lesson Fernando Oh, hi Iliana ... How are you today? Iliana I ‘m ok I suppose. I’m just a little stressed out! Fernando Why what’s wrong? Iliana Well, I got a call from the credit card company because my credit card is maxed out! Fernando Oh that’s too bad. It’s not like you to overspend. Iliana That’s the problem. It’s a brand new card. I never even had a chance to use it! Fernando Well then how did it get maxed out? Iliana This is why I am stressed out. I went to go and check my wallet and it’s gone! I think it was stolen!
  • 16. Iliana’s Financial Lesson Fernando That is a problem! Where did you leave it? Iliana By accident I left it on the front seat of my car yesterday afternoon. I was in a hurry. I was going to go back to my car because I planned to go to the store for milk, but then I changed my mind. I completely forgot I left it on the front seat. Oh, and one more thing.... Fernando What’s that? Iliana I didn’t lock the car door! Fernando What are you doing about this mess? Iliana I don’t know can be done! I’m just waiting for the credit card company to call me back. Fernando What a hard lesson this is! Iliana You can say that again!
  • 17. What kind of information is commonly stolen? Your full name Your date of birth Your social insurance number Your full address Your mother’s maiden name User names and passwords Driver’s license number Credit card information Bank account information Signature
  • 19. How is stolen information used? Access your bank accounts Open new bank accounts Transfer account balances Apply for loans Make purchases Hide criminal activity Open new passports
  • 20. What can we do to help ensure our personal information is not stolen?
  • 21. 1. Monitor our records
  • 22. 2. Check our credit report for unusual activity Photo by TrinityCreditServices http://bit.ly/1HmcUgG shared under CC BY 2.0
  • 23. 3. We should Investigate further if ... 1. we receive phone calls from a collection agency about unfamiliar accounts 2. We unexpectedly get turned down for credit
  • 24. How can we prevent Identity theft?
  • 25. 1. Shred all personal documents
  • 27. 3. Do not give personal information over the phone Photo by Kylesteed http://bit.ly/1KZtiEs shared under CC BY 2.0
  • 28. 4. Don’t be careless with your personal information
  • 29. 4. Don’t carry too much personal information with you
  • 30. 5. Keep all personal information numbers in a safe place Never write them on the cards!
  • 31. 6. When you change your address be sure to notify all your financial institutions Photo by mbtrama http://bit.ly/1HbzGp8 shared under CC BY 2.0
  • 32. 7. Shield the ATM and swipe your own card!
  • 33. 7. Know when your credit card payments are due Photo by frankieleon http://bit.ly/1e9RJFe shared under CC BY 2.0
  • 34. Case Studies • Read each study and discuss a. what mistake was made (if any)? b. What can be done now to fix the problem? c. What can be done to prevent identity theft?
  • 35. Case Study One: Miguel and his family are moving to a new house. They have many personal financial documents which they feel they no longer need. Miguel’s wife asks what they should do with the documents. Miguel suggests tearing them up and throwing them into the garbage.
  • 36. Case Study Two: Samantha keeps all her pin numbers in her wallet. She has so many credit cards she cannot remember all the numbers.
  • 37. Case Study Three: Su Jie’s “bank” called to confirm her address and bank account numbers. Su Jie felt comfortable giving her account number over the phone because the caller seemed to already know a lot about her. She assumed it really was a lady from the bank.
  • 38. Case Study Four: Bob and Diane always had a good credit rating. One day they decided to apply for a small loan for a car. They were surprised when they got a call from the bank informing them that their application was declined.
  • 39. Case Study Five: Kamaljit and Vera are very good friends. Vera has no money with her to buy medicine for her child. Vera asks Kamaljit if she could borrow her Debit card to buy the medicine. Kamaljit lends Vera her bank card and her pin number
  • 40. Discussion What are some things we can do once we know our personal information has been stolen?
  • 41. What did you learn? What is identity fraud and theft What kind of information is most commonly stolen How to know if your personal information may have been stolen Ways to prevent identity theft
  • 42. Thanks for Attending! See you next time!