Uploaded by jbbeliran23

Identity Theft: Types, Prevention & Legal Consequences

Topic:
IDENTITY THEFT
IDENTITY THEFT
WHAT IS IDENTITY THEFT?
Identity theft occurs when someone uses another person's personal
identifying information, like their name, identifying number, or credit card
number, without their permission, to commit fraud or other crimes. Identity
theft is the deliberate use of another person's identity to gain financial
advantages, secure credit, or obtain other benefits, and maybe to cause
other people's problems or loss.
The identifiable information generally includes :
● person's name
● date of birth
● social security number
● driver's license number
● bank account or credit card numbers
● PINs
● electronic signatures
● fingerprints
● Passwords
● or any other information that can be used to
access a person's financial resources.
THERE ARE 5 TYPES OF IDENTITY
THEFT
● Criminal identity theft
● Financial identity theft
● Identity cloning
● Medical identity theft
● Child identity theft
CRIMINAL IDENTITY THEFT
●
When a criminal fraudulently identifies themselves to police
as another individual at the point of arrest, it is sometimes
referred to as "Criminal Identity Theft." In some cases,
criminals have previously obtained state-issued identity
documents using credentials stolen from others, or have
simply presented a fake ID. Provided the subterfuge works,
charges may be placed under the victim's name, letting the
criminal off the hook.
FINANCIAL IDENTITY THEFT
●
The most common type of identity theft is related to finance.
Financial identity theft includes obtaining credit, loans,
goods, and services while claiming to be someone else
IDENTITY CLONING
●
the identity thief impersonates someone else to conceal
their own true identity. Examples are illegal immigrants
hiding their illegal status, people hiding from creditors or
other individuals and those who simply want to become
"anonymous" for personal reasons. Another example is
posers, a label given to people who use someone else's
photos and information on social networking sites.
MEDICAL IDENTITY CLONING
●
According to a researcher Pam Dixon, the founder of the World
Privacy Forum, coined the term medical identity theft and
released the first major report about this issue in 2006. In the
report, she defined the crime for the first time and made the
plight of victims public. The report's definition of the crime is that
medical identity theft occurs when someone seeks medical care
under the identity of another person. Insurance theft is also very
common, if a thief has your insurance information and or your
insurance card, they can seek medical attention posing as
yourself.
CHILD IDENTITY CLONING
●
Child identity theft occurs when a minor's identity is used by
another person for the impostor's personal gain. The impostor
can be a family member, a friend, or even a stranger who
targets children. The Social Security numbers of children are
valued because they do not have any information associated
with them. Thieves can establish lines of credit, obtain driver's
licenses, or even buy a house using a child's identity.
How can we found out If someone is using your identity?
●
Credit or debit card charges for goods or services you are not aware of
including unauthorized withdrawals from your account
●
Receiving calls from credit or debit card fraud control department warning of
possible suspicious activity on your credit card account
●
Receiving credit cards that you did not apply for
●
Receiving information that a credit scoring investigation was done. They are
often done when a loan or phone subscription was applied for.
●
Checks bouncing for lack of enough money in your account to cover the
amount. This might be as a result of unauthorized withdrawals from your
account.
What is the punishment for Identity theft in the
Philippines?
●
The Philippines, which is ranks eighth in terms of Facebook and other social
networking sites like Twitter, Multiply, and Tumblr users, has a history of being a
source of identity theft. By just searching, the identities of those who carelessly
put personal information on their profiles can be easily stolen. Some people
communicate online, get to know each other through Facebook chat, and then
exchange private personal data messages.
●
the 2012 Cybercrime Prevention Act (Republic Act No. 10175). Section 2 of the
act states that it recognizes the importance of communication and multimedia in
the development, exploitation, and distribution of information, and therefore
violators will be punished by the law of imprisonment or a penalty of up to
₱200,000, but not more than ₱1,000,000, or both, depending on the amount of
damage caused.
WAYS TO PREVENT IDENTITY THEFT
●
Safeguard your Social Security number
Your Social Security number is the master key to your personal data. Guard it as best you
can. When you are asked for your number, ask why it is needed and how it will be protected.
Don’t carry your card with you. Securely store or shred paperwork containing your Social
Security number.
●
Use strong passwords and add an authentication step
To create strong, unique passwords for your accounts, use a password manager.
Passwords should not be reused. You can lessen your risk by using an authenticator app.
Don't trust on security questions to protect your accounts; your mother's maiden name and
the name of your pet are both easy to find. Consider what you post on social media to
ensure you don't reveal sensitive information or signals about how you respond to security
questions.
WAYS TO PREVENT IDENTITY THEFT
● Freeze your credit
freeze your credit and unfreeze when you want to open an account, and it provides the best
protection against an identity thief using your data to open a new account.
● Check your credit reports regularly
Check to be sure that any accounts in forbearance or deferment are being reported
properly, and to watch for signs of fraud. You can also sign up for a free credit report and
score from NerdWallet to receive alerts when there are changes.
WAYS TO PREVENT IDENTITY THEFT
● Be alert to phishing and spoofing
Scammers can make phone calls appear to come from government entities or businesses,
and emails that appear to be legitimate may be attempts to steal your information. Initiate a
callback or return email yourself, working from a known entity such as the official website,
rather than responding to a call or email.
● Use a digital wallet
If you’re paying online or in a store, use a digital wallet, an app containing secure, digital
versions of credit and debit cards. You can use it to shop online or at a compatible
checkout terminal. Transactions are tokenized and encrypted, which makes them safer. In
addition, contactless transactions have fewer health risks.
THANK YOU!
REPORT BY :
Liezel Aranda
Jastin S. Beliran
Junrey Teves Codina