SlideShare a Scribd company logo
Who is that? Is his identity safe?
Identity Fraud ! Yes, it could happen to you. P R E S E N T E D B Y M A R I E S S A & R O C H E L L E
What is  Identity fraud ?  It is the use of a  stolen identity  in criminal activity, to obtain goods or services by deception. In the blink of an eye, Identity Fraud causes a great loss to the victim, but a great benefit to the thief. Without having committed any crime, the  victim  of  identity fraud  is charged. Identity fraud is one of the fastest growing crimes in Australia and costs the Australian community billions of dollars every year.
How are databases involved in  Identity Fraud ? Most companies store information about their clients in databases for easy retrieval. If a thief can access that database, the clients are at risk of identity fraud. You don’t have to think hard about where YOUR personal data is stored: Student information on the school database. Family members’ records in an employer or landlord database. Banks, utility companies, hospitals and tax offices store people’s information in databases. The question is- Is your personal information secure?
The internet has made it easier for  anyone  to obtain personal and financial data and trade the information.  Want to know where and how your name could be found?  Let’s try: A search engine;  any social network site you have joined automatically adds your name to the online database. Identity Fraud is a  common fear individuals don’t anticipate.  This is why Mr. Lennon ensures we do not add any personal  information when working online on  Blogger. Other ways of gaining our personal information include: Dumpsters & trashcans (Disposed mail can be  searched ) Spam programs (False promise computer advertisements) Purchasing from online or offline databases Bribery in companies Hacking Eavesdropping Stealing wallets or important documents
What type of data may be stored about individuals? Unlike your fingerprints, which are unique to you and cannot be  given  to someone else for their use, your personal data can be exploited. This includes: Full name & Date of Birth Address Contact details (Telephone/mobile no., e-mail) Bank account details Credit Card number Past records Photo ID
Accessing bank account information allows the thief to: gain  credit cards, loans, state benefits  or simply  take over  the existing account.  make  purchases  in the victim’s name. file for  bankruptcy , cleaning the bank account of cash. obtain   genuine official documents  like passports and driving licenses. Some of the ways in which this data can be misused
Ethical Responsibilities  of those maintaining the database These are concerned by the employees who keep the records in databases. The developer of the database should take action in imposing firm security rules. Developers have a strict responsibility to ensure the security of the systems they develop where security is a requirement. Ethical responsibility requires one to think twice before giving in to the Identity thief, and breaking the customer’s trust.
Legal Responsibilities  of those maintaining the database On the Commonwealth level ,  a person  is guilty of an offence if the person does anything with the intention of dishonestly  causing a loss to another person The person shouldn’t give access to anyone to the database without having seen genuine proof of identity They must maintain a backup and recovery of all records Must co-ordinate and complete regular database upgrades that will ensure reliability and security Responsibility to provide final approval for those wishing to retrieve records off the database, provided it is for official reasons
Thanks for viewing our presentation! Case closed! =)
What can you do to prevent  Identity Theft ?
Presentation prepared by: Mariessa Lai & Rochelle De Silva 10IST.1

More Related Content

PPTX
Identity theft ppt
PPTX
Identity theft
PPT
Identity Theft: How to Avoid It
PDF
Identity Theft ppt
PPT
Identity theft power_point
PPTX
Data theft
PPTX
Identity Theft Prevention
PPTX
Identity Theft
Identity theft ppt
Identity theft
Identity Theft: How to Avoid It
Identity Theft ppt
Identity theft power_point
Data theft
Identity Theft Prevention
Identity Theft

What's hot (20)

PPT
Cyber Crime Identity Theft
PPTX
RSA Conference 2016 Review
PDF
How to Protect Yourself From Identity Theft
PDF
Identity theft 10 mar15
PPTX
CSMFO 2012 Data Privacy in Local Government
PDF
Corporate role in protecting consumers from the risk of identity theft
PDF
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
PDF
Identity theft
PPTX
Data breach
PPTX
Tech Week Chicago 2012: Law & Social Data
PDF
Identity Theft: Evolving with Technology
PDF
Identity Theft Consumer Seminar
PDF
The Right and Wrong Ways to Prevent Identity Theft
PPSX
IDENTIFYING CYBER THREATS NEAR YOU
PPT
Identity Theft
PDF
Identity theft fraud laws how the legal system can protect you
PPTX
2014: The Year of the Data Breach
PPT
Identity Theft nigerian fraud cross border fraud
PPTX
Id Theft & Phishing2
PPTX
Id Theft & Phishing2
Cyber Crime Identity Theft
RSA Conference 2016 Review
How to Protect Yourself From Identity Theft
Identity theft 10 mar15
CSMFO 2012 Data Privacy in Local Government
Corporate role in protecting consumers from the risk of identity theft
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Identity theft
Data breach
Tech Week Chicago 2012: Law & Social Data
Identity Theft: Evolving with Technology
Identity Theft Consumer Seminar
The Right and Wrong Ways to Prevent Identity Theft
IDENTIFYING CYBER THREATS NEAR YOU
Identity Theft
Identity theft fraud laws how the legal system can protect you
2014: The Year of the Data Breach
Identity Theft nigerian fraud cross border fraud
Id Theft & Phishing2
Id Theft & Phishing2
Ad

Similar to IST Presentation (20)

PPT
Powerpoint Mini Project.Pdf
PPTX
Protecting Personal Privacy
PPTX
PROTECTION PERSONAL PRIVACY
PDF
The Identity Theft Checklist – Guidance for the general public.nz
PDF
Misuse of personal information
PPTX
Identity Theft and How to Prevent Them in the Digital Age
PPTX
Protect against id fraud workshop 2 of 2
PPT
Identity theft
PDF
Youth Protection Guide - Canada
PPT
Identity Theft Information for Businesses
PDF
Identity Theft Awareness 101 - Basics
PDF
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
PPT
Tech Topic Privacy
PPTX
Identity Theft.pptx
PDF
Senior Protection Guide - Canada
PPTX
Wk4 project
PPTX
Identity theft
PDF
IDT Red Flags White Paper By Wrf
PPT
W A2 Group P P
PDF
SHRM: Employers Face Liability for Identity Theft
Powerpoint Mini Project.Pdf
Protecting Personal Privacy
PROTECTION PERSONAL PRIVACY
The Identity Theft Checklist – Guidance for the general public.nz
Misuse of personal information
Identity Theft and How to Prevent Them in the Digital Age
Protect against id fraud workshop 2 of 2
Identity theft
Youth Protection Guide - Canada
Identity Theft Information for Businesses
Identity Theft Awareness 101 - Basics
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Tech Topic Privacy
Identity Theft.pptx
Senior Protection Guide - Canada
Wk4 project
Identity theft
IDT Red Flags White Paper By Wrf
W A2 Group P P
SHRM: Employers Face Liability for Identity Theft
Ad

Recently uploaded (20)

PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
master seminar digital applications in india
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Institutional Correction lecture only . . .
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Classroom Observation Tools for Teachers
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Complications of Minimal Access Surgery at WLH
Module 4: Burden of Disease Tutorial Slides S2 2025
master seminar digital applications in india
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Institutional Correction lecture only . . .
O7-L3 Supply Chain Operations - ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Classroom Observation Tools for Teachers
Final Presentation General Medicine 03-08-2024.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Computing-Curriculum for Schools in Ghana
Microbial disease of the cardiovascular and lymphatic systems
102 student loan defaulters named and shamed – Is someone you know on the list?
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
GDM (1) (1).pptx small presentation for students
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
VCE English Exam - Section C Student Revision Booklet
Complications of Minimal Access Surgery at WLH

IST Presentation

  • 1. Who is that? Is his identity safe?
  • 2. Identity Fraud ! Yes, it could happen to you. P R E S E N T E D B Y M A R I E S S A & R O C H E L L E
  • 3. What is Identity fraud ? It is the use of a stolen identity in criminal activity, to obtain goods or services by deception. In the blink of an eye, Identity Fraud causes a great loss to the victim, but a great benefit to the thief. Without having committed any crime, the victim of identity fraud is charged. Identity fraud is one of the fastest growing crimes in Australia and costs the Australian community billions of dollars every year.
  • 4. How are databases involved in Identity Fraud ? Most companies store information about their clients in databases for easy retrieval. If a thief can access that database, the clients are at risk of identity fraud. You don’t have to think hard about where YOUR personal data is stored: Student information on the school database. Family members’ records in an employer or landlord database. Banks, utility companies, hospitals and tax offices store people’s information in databases. The question is- Is your personal information secure?
  • 5. The internet has made it easier for anyone to obtain personal and financial data and trade the information. Want to know where and how your name could be found? Let’s try: A search engine; any social network site you have joined automatically adds your name to the online database. Identity Fraud is a common fear individuals don’t anticipate. This is why Mr. Lennon ensures we do not add any personal information when working online on Blogger. Other ways of gaining our personal information include: Dumpsters & trashcans (Disposed mail can be searched ) Spam programs (False promise computer advertisements) Purchasing from online or offline databases Bribery in companies Hacking Eavesdropping Stealing wallets or important documents
  • 6. What type of data may be stored about individuals? Unlike your fingerprints, which are unique to you and cannot be given to someone else for their use, your personal data can be exploited. This includes: Full name & Date of Birth Address Contact details (Telephone/mobile no., e-mail) Bank account details Credit Card number Past records Photo ID
  • 7. Accessing bank account information allows the thief to: gain credit cards, loans, state benefits or simply take over the existing account. make purchases in the victim’s name. file for bankruptcy , cleaning the bank account of cash. obtain genuine official documents like passports and driving licenses. Some of the ways in which this data can be misused
  • 8. Ethical Responsibilities of those maintaining the database These are concerned by the employees who keep the records in databases. The developer of the database should take action in imposing firm security rules. Developers have a strict responsibility to ensure the security of the systems they develop where security is a requirement. Ethical responsibility requires one to think twice before giving in to the Identity thief, and breaking the customer’s trust.
  • 9. Legal Responsibilities of those maintaining the database On the Commonwealth level , a person is guilty of an offence if the person does anything with the intention of dishonestly causing a loss to another person The person shouldn’t give access to anyone to the database without having seen genuine proof of identity They must maintain a backup and recovery of all records Must co-ordinate and complete regular database upgrades that will ensure reliability and security Responsibility to provide final approval for those wishing to retrieve records off the database, provided it is for official reasons
  • 10. Thanks for viewing our presentation! Case closed! =)
  • 11. What can you do to prevent Identity Theft ?
  • 12. Presentation prepared by: Mariessa Lai & Rochelle De Silva 10IST.1