Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching ""identity theft"" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Anne Bubnic

Identity Theft and Children - 0 views

  • Financial identity theft: This most commonly occurs when the Social Security Number (SSN) and name is used to establish new lines of credit.
  • Criminal identity theft: This typically occurs when a person “borrows” the information of the minor to get a driver’s license or uses the child’s identity when caught in a criminal act. This person may be an illegal immigrant who bought the information or a relative who has had a license suspended or revoked.
  • Identity Cloning: Cloning is when a identity thief uses an identity for financial, criminal, and governmental purposes. Most frequently, profilers have people in positions where they are able to collect information about minors and then sell it on the black market. The most frequent purchasers of this information, in our experience, are illegal immigrants or people who are trying to “restart” their lives and avoid arrest
  •  
    A fact sheet from the Identity Theft Resource Center identifying three kinds of identity theft: financial identity theft, criminal Identity Theft and identity cloning.
Anne Bubnic

Deter. Detect. Defend. Avoid ID Theft - 0 views

  • This website is a one-stop national resource to learn about the crime of identity theft. It provides detailed information to help you deter, detect, and defend against identity theft.  
  •  
    On the Federal Trade Commission (FTC) website consumers can learn how to avoid identity theft - and learn what to do if their identity is stolen and offers materials to use in your community.
  •  
    This site (from the federal trade commission) is a one-stop national resource to learn about the crime of identity theft. It provides detailed information to help you deter, detect, and defend against identity theft.
Anne Bubnic

Deter - Detect - Defend Against Identity Theft [Video] - 0 views

  •  
    9-minute video that would be good to show in a digital citizenship class. Identity theft is a serious crime. People whose identities have been stolen can spend months or years and thousands of dollars cleaning up the mess the thieves have made of a good name and credit record. In the meantime, victims of Identity theft may lose job opportunities, be refused loans for education, housing, or cars, and even get arrested for crimes they didn't commit. Humiliation, anger, and frustration are among the feelings victims experience as they navigate the process of rescuing their identity.
Anne Bubnic

Top 5 Ways Teens Are Compromising Their Identities Online [Video] - 0 views

  •  
    From Qwest Communications. Identity theft is the fastest growing crime in America with 18-29 year olds being the largest group of victims. Educating 13-18 year olds about how and why they are being targeted is critical in preventing new victims. Clean credit and a low level of Identity theft awareness are two top reasons teens are targeted. A new survey from Qwest Communications Teen Council Program shows that an alarming number of teens are making it easier for thieves to steal their identity. With answers from more than 1,600 students about their online habits, the report identified the top 5 ways teens are compromising their identities.\n
Anne Bubnic

Identity Theft: Stolen Futures [Video] - 1 views

  •  
    Types of Identity Theft and tips to help protect against identity theft.
Anne Bubnic

Identity Theft Portal - 0 views

  •  
    Learn everything you need to know about identity theft, credit card theft and fraud alerts and how to protect yourself. The portal provides both generic and state-by-state information. This resource would be good for a digital citizenship class and includes information on protecting both children and adults.
Anne Bubnic

What you should know about phishing identity-theft scams [Video] - 0 views

  •  
    Watch this excellent video from Microsoft to find out more about phishing e-mail scams and how they are used for identity theft. The video will show you how fraudulent e-mail messages and spoofed Web sites-two common forms of phishing-can trick you into s
Anne Bubnic

Child Identity Theft [Video] - 1 views

  •  
    ID theft has become the crime this generation will deal with most of their lives.Kids just never think about Identity Theft. Most parents are not even aware that kids have identities to be stolen. A 2-minute, eye-opening news video.
Anne Bubnic

Identity Theft: Stolen Futures [Video] - 0 views

  •  
    This brief 11 minute video is a good introduction to protecting oneself against identity theft, but is especially applicable to raising the awareness of young people, many of whom are completely unaware of the dangers of exposing personal identifying information freely.
Anne Bubnic

Identity Theft/Privacy Lesson Plans from Cybersmart - 1 views

  •  
    Non-sequential standards-based lesson plans and student activity sheets related to teaching students about privacy and identity theft.
Anne Bubnic

Protect Yourself From Identity Theft [Lesson Plan] - 0 views

  •  
    Lesson Plan from University of Tennessee Dept of Family Economics. Participants learn how to protect themselves from identity theft and fraud.
Anne Bubnic

Identity Theft Resource Center | Teen Space - 1 views

  •  
    Identity theft can affect everyone, including teenagers. It is important for you to know what information is needed to steal your identity and the best ways of protecting your information. Your information, in the wrong hands, can 'jack your life!' The site includes lesson plans, games and a video.
Judy Echeandia

Help for Victims of Identity Theft - 0 views

  •  
    The Office for Victims of Crime (OVC) website offers identity theft and identity fraud information, services, and recovery aids, and includes links to Government Resources, National Organizations and Credit-Monitoring Organizations.
Anne Bubnic

Phishing Tales - Lesson Plan - 0 views

  •  
    In this lesson, students research different types of identity-theft fraud and ways to avoid falling victim to various scams. They then create focused public service announcements in different media, targeted to individuals most susceptible to consumer fraud.
Anne Bubnic

10 Ways to Protect Your Kids Against Identity Theft - 0 views

  •  
    Great tips from Vanessa Van Patten on guarding your kids against identity theft.
Anne Bubnic

Students plagued by Internet fraud - 4 views

  •  
    October is National Cyber Security Awareness Month, and the National Cyber Security Alliance is looking to raise awareness among college students to help them stay safe and secure online. According to the 2010 Identity Fraud Survey Report, college students lost five times more money than any other age group as a result of identity fraud or other online fraud situations.
Judy Echeandia

Warning: Identity Thieves Target Young People, Too - 1 views

  •  
    The Federal Deposit Insurance Corporation (FDIC) website is not only designed to provide useful resources about money management for teens, but it also provides information about identity theft and phishing scams.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Preventing Identity Theft [Video] - 0 views

  •  
    Presentation for 2006's FBLA National Leadership Conference in Nashville, TN. Placed THIRD in the nation with student-made video.\n
Anne Bubnic

FL Virtual School Student Orientation: Internet Safety - 0 views

  •  
    Florida Virtual School includes a learning module on Internet Safety in their student orientation materials. Through colorful flash-based adventures, students solve four Internet Security mysteries and learn about cyberstalking, identity theft, cyberbullying and email scams, then create their own Internet pledges based on NetSmartz materials. ISafe materials on cyberbullying and copyright are also included as downloads in the resource section.
1 - 20 of 61 Next › Last »
Showing 20 items per page