You are on page 1of 4

Page|12

2.6.4.L1

TakeChargeTodayJanuary2014ProtectingYourselfFromFraud
FundedbyagrantfromTakeChargeAmerica,Inc.totheNortonSchoolofFamilyandConsumerSciencesTakeChargeAmericaInstituteatTheUniversityofArizona
ProtectingYourselffromFraudNoteTakingGuide

TotalPointsEarned
Name

TotalPointsPossible
Date

Percentage
Class

Describethecommontypesoffraud:

Howdoesfraudnegativelyimpactan

Whatisfraud?

Identity
Theft
Communications
Credit
Investment
Tax
Howdoesfraudnegativelyimpact
anindividualswellbeing?

Fourtypesofpersonal
informationare...
Mackenzie Slade
10/3/14
B2
an intentional effort to deceive another individual for personal gain
When anothers personal information is used without their permission
Occurs via mass marketing, mail, wire, telephone, Internet, etc. to deceitfully get
money from people
Applying for and modifying credit (most common involves mortgages)
Investors are deceived by individuals claiming to be financial advisors or have an
investment guaranteed to make money
Scammers making claims that a person may be exempt from paying taxes
drivers license debit & credit card
stress
costs money
anxiety
time
electronic devices
indentification
Page|13
2.6.4.L1

TakeChargeTodayJanuary2014ProtectingYourselfFromFraud
FundedbyagrantfromTakeChargeAmerica,Inc.totheNortonSchoolofFamilyandConsumerSciencesTakeChargeAmericaInstituteatTheUniversityofArizona


TheFraudMysteryNotes
HowdidthescammeraccessLucys
information?

WhatcouldLucyhavedonetominimizeherrisk
offraud?

Whatevidencehastheinspectorgatheredforandagainst
eachsuspect?
Suspect#1:ColonelMustard

Suspect#2:Mrs.Peacock

Suspect#3:Mrs.White

Suspect#4:ProfessorPlum

E
v
i
d
e
n
c
e
:

E
v
i
d
e
n
c
e
:

E
v
i
d
e
n
c
e
:

E
v
i
d
e
n
c
e
:

Page|14
2.6.4.L1

TakeChargeTodayJanuary2014ProtectingYourselfFromFraud
FundedbyagrantfromTakeChargeAmerica,Inc.totheNortonSchoolofFamilyandConsumerSciencesTakeChargeAmericaInstituteatTheUniversityofArizona

Threewaysthievesaccesspersonal
informationare...
Whatarefourwaystobecarefulonline?
Fourwaystoprotectyourpersonalinformationinclude:
Whyshouldapersonmonitortheircreditreportsandfinancialinformation?

stealing a purse, wallet,


financial records, mail,
etc.
diverting mail
skimming credit and debit
card info
Don't carry your social security card
Memorize and use difficult PIN numbers
Keep personal records secure
Shred personal docs
So there is no fraud
Keep user
names and
passwords safe
Search for your
name
Look for "https"
or a picture of a
lock
Use a credit card
when making
online purchases
Page|15
2.6.4.L1

TakeChargeTodayJanuary2014ProtectingYourselfFromFraud
FundedbyagrantfromTakeChargeAmerica,Inc.totheNortonSchoolofFamilyandConsumerSciencesTakeChargeAmericaInstituteatTheUniversityofArizona

Ifyouareavictimoffraud,whatstepsshouldyoutake?

Whataresignsoffraud?
Describefourgovernmentagenciesand
whatfraud(s)theyprotectagainst
Whyisitrecommendedtouseacreditcardinsteadofadebitcardwhenmakingonlinepurchases?

You don't have to use a PIN


A business that has taken your money
wont return your calls
Unfamiliar or unrecognizable charges
You are denied credit
Mail is missing
Act Immediately
Keep detailed
records
File a report with
your local law
enforcement
Report to the
appropriate
federal agency
Federal Trade
Commission
Consumer
Financial
Protection Bureau
Federal Drug
Administration
Federal
Communications
Commission
Prevent business practices that
are anticompetitive, deceptive
or unfair to consumers
Makes markets for consumer
financial products and
services work for Americans
Protects the
public health
Regulates interstate
and international
communication

You might also like