SlideShare une entreprise Scribd logo
1  sur  14
IDENTITY THEFT
What is Identity Theft
• Identity theft occurs when someone steals key pieces of
personal information to impersonate
• a person. This information may include such data as
name, address, date of birth, Social
• Security number, passport number, driver’s license
number, and mother’s maiden name.
• Using this information, an identity thief may apply for
new credit or financial accounts, rent
• an apartment, set up utility or phone service, and register
for college courses—all in someone
• else’s name.
Impact Of Identity Theft
• Damaged Credit: Thieves run up bills or open new accounts in your
name. When they don’t pay your credit rating plummets while your
interest rates skyrocket. When you apply for a loan or new credit
card, you are turned down.
• Lost Medical Benefits: When someone seeks medical treatment with
your health insurance benefit, the implications go beyond financial.
You could end up with a medical history that isn’t entirely yours,
resulting in potentially incorrect diagnosis and treatment when you
do need help.
• Financial Loss: With bank account numbers and basic personal
information, identity thieves can drain your bank accounts.
• Repair Time: The average identity theft victim spends more than 500
hours and more than $3,000 to restore his or her credit and good
name. That time lost from work, from family, from life.
TYPES OF ID THEFT
• Criminal identity theft (posing as another person when
apprehended for a crime)
• Financial identity theft (using another's identity to obtain
credit, goods and services)
• Identity cloning (using another's information to assume
his or her identity in daily life)
• Medical identity theft (using another's identity to obtain
medical care or drugs)
• Child identity theft
HOW IT IS CARRIED OUT
Identity thieves have a variety of ways to steal your information—both
high and low tech. With the constant evolution of technology, there is a
constant evolution of ways identity thieves can steal data. These are
the most common:
• Dumpster diving
It’s exactly as it sounds. Thieves will go through your trash looking for
bills, receipts and other documents containing your personal
information.
• Phishing, Vishing & Smishing
Identity thieves will email (phishing), call (vishing) or text (smishing) you
pretending to be someone else—likely a bank or other institution your
trust— and request that you provide more information. They’ve even
been known to replicate a popular website hoping to trick you into filling
out an online form.
• Hacking
Your computer, smartphone and mobile devices could all be at
risk. Hackers can install malware, keystroke-logging software
and other malicious technology that grabs your information
without you ever noticing.
• Data breach
When an organization like a bank, retailer or doctor’s office gets
hacked, the damage is often widespread impacting hundreds or
thousands of customers. Hackers may use stolen information for
identity fraud, or they may simply sell it on black market websites
for other criminals to purchase and use. Many people affected by
data breaches don’t even know they’re victims until several
years after the event occurred.
How to protect yourself from identity
theft
• Shred
Buy a cross-cut shredder and make sure you shred any documents
containing personal information before you toss them in the dumpster.
• Lock
Be sure to password protect all of your devices, and use unique,
complicated passwords for your online accounts.
• Secure
Never log in to financial accounts or shop online while using public Wi-
Fi, and make sure to encrypt and password protect your Wi-Fi at home.
• Monitor
Review your credit reports and bank accounts periodically looking for
suspicious activity and errors that could signify identity theft
• Detect
Consider purchasing an identity theft detection product that
includes identity theft restoration. If you do become a victim of
identity theft, you’ll be notified quickly and be able to lean on
certified specialists to help restore your identity.
• Educate
People must be educated as to the value of information.They
must be trained to protect information (even if the information
they have access to appears to be of relatively low value).
People must be made aware of what social engineering is and
how social engineers operate.
5 Steps to Take Immediately If You’ve Been a
Victim of Identity Theft
1. Contact Any Institution Directly Affected
2. Put a Fraud Alert on Your Credit Reports
3. Contact the Federal Trade Commission (FTC)
4. File a Police Report
5. Protect Your Social Security Number
IT Acts to prevent identity
theft:
Identity Theft and Assumption Deterrence Act, 1998
United States of America has enacted Identity Theft and
Assumption Deterrence Act of 1998 in order to make
identity theft a crime.
This act makes identity theft a Federal crime with penalties
up to 15 years imprisonment and a maximum fine of
$250,000.
2. ITA,2000
• The Information Technology Act 2000 (also known as ITA-
2000, or the IT Act) is an Act of the Indian Parliament notified
on October 17, 2000.
• It extends to whole of India and also applies to any offence
committed outside India by any person .
• Punishment for identity theft according to section 66c of ITA-
“ Whoever, fraudulently or dishonestly make use of the
electronic signature, password or any other unique identification
feature of any other person, shall be punished with imprisonment
of either description for a term which may extend to three years
and shall also be liable to fine which may extend to rupees one
lakh.”
To counter identity theft and fraud in India, the
government must focus on three areas:—
• Legislating specific provisions to counter identity theft.
• Enabling flow of information from credit bureaus to
consumers.
• Implementing an identity fraud alert registry.
•
Thank you
Group no.4
A001 JASON AMANNA
A012 UMANG GUPTA
A045 VARNIKA TALWAR
A058 HARSH GUPTA

Contenu connexe

Similaire à Identity Theft.pptx

Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.PdfSanea
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 

Similaire à Identity Theft.pptx (20)

Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 

Dernier

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Dernier (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Identity Theft.pptx

  • 2. What is Identity Theft • Identity theft occurs when someone steals key pieces of personal information to impersonate • a person. This information may include such data as name, address, date of birth, Social • Security number, passport number, driver’s license number, and mother’s maiden name. • Using this information, an identity thief may apply for new credit or financial accounts, rent • an apartment, set up utility or phone service, and register for college courses—all in someone • else’s name.
  • 3. Impact Of Identity Theft • Damaged Credit: Thieves run up bills or open new accounts in your name. When they don’t pay your credit rating plummets while your interest rates skyrocket. When you apply for a loan or new credit card, you are turned down. • Lost Medical Benefits: When someone seeks medical treatment with your health insurance benefit, the implications go beyond financial. You could end up with a medical history that isn’t entirely yours, resulting in potentially incorrect diagnosis and treatment when you do need help. • Financial Loss: With bank account numbers and basic personal information, identity thieves can drain your bank accounts. • Repair Time: The average identity theft victim spends more than 500 hours and more than $3,000 to restore his or her credit and good name. That time lost from work, from family, from life.
  • 4.
  • 5. TYPES OF ID THEFT • Criminal identity theft (posing as another person when apprehended for a crime) • Financial identity theft (using another's identity to obtain credit, goods and services) • Identity cloning (using another's information to assume his or her identity in daily life) • Medical identity theft (using another's identity to obtain medical care or drugs) • Child identity theft
  • 6. HOW IT IS CARRIED OUT Identity thieves have a variety of ways to steal your information—both high and low tech. With the constant evolution of technology, there is a constant evolution of ways identity thieves can steal data. These are the most common: • Dumpster diving It’s exactly as it sounds. Thieves will go through your trash looking for bills, receipts and other documents containing your personal information. • Phishing, Vishing & Smishing Identity thieves will email (phishing), call (vishing) or text (smishing) you pretending to be someone else—likely a bank or other institution your trust— and request that you provide more information. They’ve even been known to replicate a popular website hoping to trick you into filling out an online form.
  • 7. • Hacking Your computer, smartphone and mobile devices could all be at risk. Hackers can install malware, keystroke-logging software and other malicious technology that grabs your information without you ever noticing. • Data breach When an organization like a bank, retailer or doctor’s office gets hacked, the damage is often widespread impacting hundreds or thousands of customers. Hackers may use stolen information for identity fraud, or they may simply sell it on black market websites for other criminals to purchase and use. Many people affected by data breaches don’t even know they’re victims until several years after the event occurred.
  • 8. How to protect yourself from identity theft • Shred Buy a cross-cut shredder and make sure you shred any documents containing personal information before you toss them in the dumpster. • Lock Be sure to password protect all of your devices, and use unique, complicated passwords for your online accounts. • Secure Never log in to financial accounts or shop online while using public Wi- Fi, and make sure to encrypt and password protect your Wi-Fi at home. • Monitor Review your credit reports and bank accounts periodically looking for suspicious activity and errors that could signify identity theft
  • 9. • Detect Consider purchasing an identity theft detection product that includes identity theft restoration. If you do become a victim of identity theft, you’ll be notified quickly and be able to lean on certified specialists to help restore your identity. • Educate People must be educated as to the value of information.They must be trained to protect information (even if the information they have access to appears to be of relatively low value). People must be made aware of what social engineering is and how social engineers operate.
  • 10. 5 Steps to Take Immediately If You’ve Been a Victim of Identity Theft 1. Contact Any Institution Directly Affected 2. Put a Fraud Alert on Your Credit Reports 3. Contact the Federal Trade Commission (FTC) 4. File a Police Report 5. Protect Your Social Security Number
  • 11. IT Acts to prevent identity theft: Identity Theft and Assumption Deterrence Act, 1998 United States of America has enacted Identity Theft and Assumption Deterrence Act of 1998 in order to make identity theft a crime. This act makes identity theft a Federal crime with penalties up to 15 years imprisonment and a maximum fine of $250,000.
  • 12. 2. ITA,2000 • The Information Technology Act 2000 (also known as ITA- 2000, or the IT Act) is an Act of the Indian Parliament notified on October 17, 2000. • It extends to whole of India and also applies to any offence committed outside India by any person . • Punishment for identity theft according to section 66c of ITA- “ Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.”
  • 13. To counter identity theft and fraud in India, the government must focus on three areas:— • Legislating specific provisions to counter identity theft. • Enabling flow of information from credit bureaus to consumers. • Implementing an identity fraud alert registry. •
  • 14. Thank you Group no.4 A001 JASON AMANNA A012 UMANG GUPTA A045 VARNIKA TALWAR A058 HARSH GUPTA