You are on page 1of 4

Page|12

2.6.4.L1

TakeChargeTodayJanuary2014ProtectingYourselfFromFraud
FundedbyagrantfromTakeChargeAmerica,Inc.totheNortonSchoolofFamilyandConsumerSciencesTakeChargeAmericaInstituteatTheUniversityofArizona
ProtectingYourselffromFraudNoteTakingGuide

TotalPointsEarned
Name

TotalPointsPossible
Date

Percentage
Class

Describethecommontypesoffraud:

Howdoesfraudnegativelyimpactan

Whatisfraud?

Identity
Theft
Communications
Credit
Investment
Tax
Howdoesfraudnegativelyimpact
anindividualswellbeing?

Fourtypesofpersonal
informationare...
Haley Scogland
11-1-14
2
an intentional effort to deceive another individual for personal gain
When another's personal information is used without their permission
occurs via mass marketing, mail,wire, telephone,Internet, etc. to deceitfully get
money from people
applying for and modifying crdit (most common involves mortgages)
Investors are deceived by individuals claiming to be financial advisors or have an investment guaranteed to
make money
Scammers making claims that a person may be exempt from paying taxes
Drivers license debit and credit cards
Stress, time, costs money,
and anxiety
electronic devices
identification cards
Page|13
2.6.4.L1

TakeChargeTodayJanuary2014ProtectingYourselfFromFraud
FundedbyagrantfromTakeChargeAmerica,Inc.totheNortonSchoolofFamilyandConsumerSciencesTakeChargeAmericaInstituteatTheUniversityofArizona


TheFraudMysteryNotes
HowdidthescammeraccessLucys
information?

WhatcouldLucyhavedonetominimizeherrisk
offraud?

Whatevidencehastheinspectorgatheredforandagainst
eachsuspect?
Suspect#1:ColonelMustard

Suspect#2:Mrs.Peacock

Suspect#3:Mrs.White

Suspect#4:ProfessorPlum

E
v
i
d
e
n
c
e
:

E
v
i
d
e
n
c
e
:

E
v
i
d
e
n
c
e
:

E
v
i
d
e
n
c
e
:

Page|14
2.6.4.L1

TakeChargeTodayJanuary2014ProtectingYourselfFromFraud
FundedbyagrantfromTakeChargeAmerica,Inc.totheNortonSchoolofFamilyandConsumerSciencesTakeChargeAmericaInstituteatTheUniversityofArizona

Threewaysthievesaccesspersonal
informationare...
Whatarefourwaystobecarefulonline?
Fourwaystoprotectyourpersonalinformationinclude:
Whyshouldapersonmonitortheircreditreportsandfinancialinformation?

Diverting mail
Stealing a purse, wallet,
financial records, mail, etc.
skimming credit and debit
card information
don't carry you Social security card
memorize and use difficult pin number
keep personal records in a secure location
sign credit and debt cards with signature and "please see ID"
consistently monitor information such as credit statements, depositary institution
statements, etc
keep usernames
and passwords
safe
use a credit card
when making
online purchases
search for your
name
Use privacy
settings on social
networking sites
Page|15
2.6.4.L1

TakeChargeTodayJanuary2014ProtectingYourselfFromFraud
FundedbyagrantfromTakeChargeAmerica,Inc.totheNortonSchoolofFamilyandConsumerSciencesTakeChargeAmericaInstituteatTheUniversityofArizona

Ifyouareavictimoffraud,whatstepsshouldyoutake?

Whataresignsoffraud?
Describefourgovernmentagenciesand
whatfraud(s)theyprotectagainst
Whyisitrecommendedtouseacreditcardinsteadofadebitcardwhenmakingonlinepurchases?

Credit card signature is harder to copy, debit card have a pin that is easy to copy and
infrared scope. You can put see ID on the back of a credit card to make sure the cashier
verifies who you are.
A business that has taken your money
won't return your calls
unfamiliar or unrecognizable charges
you are denied credit
mail is missing
act immediately
keep detailed
records
file a report with
your local law
enforcement
report to the
appropriate
federal agency
Prevent business
practices that are
anticompetitive,
deceptive or unfair
consumers
makes markets for
consumer financial
products and
services work for
americans
protects the public
health
regulates
interstate and
international
communication
federal trade
commission
consumer financial
protection bureau
federal drug
admisistration
federal
communications
commission

You might also like