chap2_mc1_identity

Technology In Action, Complete Version (7th Edition)

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Identity Theft
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units Register a Fraud Alert/Victim Impact statement Ask crediter for contact before opening new account Call Federal Trade Commission
Background image of page 2
What Is Identity Theft?
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Open credit cards Make purchases illegally Apply for loans Gain unauthorized acess to locations Take over financial accounts Establish services with phone or utility companies
Background image of page 4
Why Steal an Identity?
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How Is Identity Theft Accomplished?
Background image of page 6
How Can Identity Be Protected?
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 8
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 10
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 12
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: What Steps Should Victims Follow? Remove mail promptly, take out-going mail to post office Do not give personal information over phone Shred: credit card applications receipts bills financial documents Acquiring someones identifying information and impersonating them for gain Name Social Security Number Credit Card Account Numbers Mothers Maiden Name Date of Birth Check washing Dumpster diving Male theft Check creation software Online information theft...
View Full Document

This document was uploaded on 03/15/2012.

Page1 / 12

chap2_mc1_identity - What Steps Should Victims Follow?...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online