Topic: IDENTITY THEFT IDENTITY THEFT WHAT IS IDENTITY THEFT? Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. Identity theft is the deliberate use of another person's identity to gain financial advantages, secure credit, or obtain other benefits, and maybe to cause other people's problems or loss. The identifiable information generally includes : ● person's name ● date of birth ● social security number ● driver's license number ● bank account or credit card numbers ● PINs ● electronic signatures ● fingerprints ● Passwords ● or any other information that can be used to access a person's financial resources. THERE ARE 5 TYPES OF IDENTITY THEFT ● Criminal identity theft ● Financial identity theft ● Identity cloning ● Medical identity theft ● Child identity theft CRIMINAL IDENTITY THEFT ● When a criminal fraudulently identifies themselves to police as another individual at the point of arrest, it is sometimes referred to as "Criminal Identity Theft." In some cases, criminals have previously obtained state-issued identity documents using credentials stolen from others, or have simply presented a fake ID. Provided the subterfuge works, charges may be placed under the victim's name, letting the criminal off the hook. FINANCIAL IDENTITY THEFT ● The most common type of identity theft is related to finance. Financial identity theft includes obtaining credit, loans, goods, and services while claiming to be someone else IDENTITY CLONING ● the identity thief impersonates someone else to conceal their own true identity. Examples are illegal immigrants hiding their illegal status, people hiding from creditors or other individuals and those who simply want to become "anonymous" for personal reasons. Another example is posers, a label given to people who use someone else's photos and information on social networking sites. MEDICAL IDENTITY CLONING ● According to a researcher Pam Dixon, the founder of the World Privacy Forum, coined the term medical identity theft and released the first major report about this issue in 2006. In the report, she defined the crime for the first time and made the plight of victims public. The report's definition of the crime is that medical identity theft occurs when someone seeks medical care under the identity of another person. Insurance theft is also very common, if a thief has your insurance information and or your insurance card, they can seek medical attention posing as yourself. CHILD IDENTITY CLONING ● Child identity theft occurs when a minor's identity is used by another person for the impostor's personal gain. The impostor can be a family member, a friend, or even a stranger who targets children. The Social Security numbers of children are valued because they do not have any information associated with them. Thieves can establish lines of credit, obtain driver's licenses, or even buy a house using a child's identity. How can we found out If someone is using your identity? ● Credit or debit card charges for goods or services you are not aware of including unauthorized withdrawals from your account ● Receiving calls from credit or debit card fraud control department warning of possible suspicious activity on your credit card account ● Receiving credit cards that you did not apply for ● Receiving information that a credit scoring investigation was done. They are often done when a loan or phone subscription was applied for. ● Checks bouncing for lack of enough money in your account to cover the amount. This might be as a result of unauthorized withdrawals from your account. What is the punishment for Identity theft in the Philippines? ● The Philippines, which is ranks eighth in terms of Facebook and other social networking sites like Twitter, Multiply, and Tumblr users, has a history of being a source of identity theft. By just searching, the identities of those who carelessly put personal information on their profiles can be easily stolen. Some people communicate online, get to know each other through Facebook chat, and then exchange private personal data messages. ● the 2012 Cybercrime Prevention Act (Republic Act No. 10175). Section 2 of the act states that it recognizes the importance of communication and multimedia in the development, exploitation, and distribution of information, and therefore violators will be punished by the law of imprisonment or a penalty of up to ₱200,000, but not more than ₱1,000,000, or both, depending on the amount of damage caused. WAYS TO PREVENT IDENTITY THEFT ● Safeguard your Social Security number Your Social Security number is the master key to your personal data. Guard it as best you can. When you are asked for your number, ask why it is needed and how it will be protected. Don’t carry your card with you. Securely store or shred paperwork containing your Social Security number. ● Use strong passwords and add an authentication step To create strong, unique passwords for your accounts, use a password manager. Passwords should not be reused. You can lessen your risk by using an authenticator app. Don't trust on security questions to protect your accounts; your mother's maiden name and the name of your pet are both easy to find. Consider what you post on social media to ensure you don't reveal sensitive information or signals about how you respond to security questions. WAYS TO PREVENT IDENTITY THEFT ● Freeze your credit freeze your credit and unfreeze when you want to open an account, and it provides the best protection against an identity thief using your data to open a new account. ● Check your credit reports regularly Check to be sure that any accounts in forbearance or deferment are being reported properly, and to watch for signs of fraud. You can also sign up for a free credit report and score from NerdWallet to receive alerts when there are changes. WAYS TO PREVENT IDENTITY THEFT ● Be alert to phishing and spoofing Scammers can make phone calls appear to come from government entities or businesses, and emails that appear to be legitimate may be attempts to steal your information. Initiate a callback or return email yourself, working from a known entity such as the official website, rather than responding to a call or email. ● Use a digital wallet If you’re paying online or in a store, use a digital wallet, an app containing secure, digital versions of credit and debit cards. You can use it to shop online or at a compatible checkout terminal. Transactions are tokenized and encrypted, which makes them safer. In addition, contactless transactions have fewer health risks. THANK YOU! REPORT BY : Liezel Aranda Jastin S. Beliran Junrey Teves Codina