scams and schemes

29
Scams and Schemes VICTORIA ISD COMMON SENSE MEDIA GRADE 6: SCAMS AND SCHEMES

Upload: solada

Post on 26-Feb-2016

45 views

Category:

Documents


0 download

DESCRIPTION

Scams and Schemes. Victoria ISD Common Sense Media Grade 6: Scams and schemes. Essential Question. What is identity theft, and how can you protect yourself from it?. Objectives. The students will be able to… Understand what identity theft is and why it is important to guard against it. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Scams and Schemes

Scams and Schemes

VICTORIA ISDCOMMON SENSE MEDIA

GRADE 6 : SCAMS AND SCHEMES

Page 2: Scams and Schemes

Essential Question

What is identity theft, and how can you protect

yourself from it?

Page 3: Scams and Schemes

Objectives

The students will be able to…Understand what identity theft is and why it

is important to guard against it.Learn to recognize strategies that scam

artists use to access private information.Learn how to guard against phishing and

identity theft.

Page 4: Scams and Schemes

Vocabulary

Scam: an attempt to trick someone, usually with the intention of stealing money or private informationIdentity theft: a type of crime in which your privateinformation is stolen and used for criminal activity

Page 5: Scams and Schemes

Vocabulary, cont.

Vulnerable: in a position that makes it easier for you to be harmed or attacked

Phishing: when people send you phony emails,pop-up messages, social media messages, texts, calls,or links to fake websites in order to hook you intogiving out your personal and financial information

Page 6: Scams and Schemes

Introduction: Warm-up

Do you know someone who has been scammed?

What happened?

Page 7: Scams and Schemes

Introduction: Warm-up

What is the purpose of a scam? What tricks

do people use to carry out a scam?

Page 8: Scams and Schemes

Introduction: Warm-up

Can people get scammed on the Internet?

How?

Page 9: Scams and Schemes

What Is Identity Theft?

People who scam don’t always get money from them directly

Use variety of strategies to trick people into giving out private information

Use information to access bank and credit card accounts

Even recreate someone’s identify Produce false documents (social security cards,

drivers’ licenses, etc.)

Page 10: Scams and Schemes

What Is Identity Theft?

Can you guess what kinds of personal information identity

thieves might look for?

Page 11: Scams and Schemes

What Is Identity Theft? Personal Information

Full nameDate of and place of birthCurrent/previous addresses/phone numbersDriver’s license or passport numbersAccount numbers, companies’ names (ex:

Amazon, iTunes, PayPal, Dillard’s)PasswordsSocial Security Number

Page 12: Scams and Schemes

Vulnerable

…Vulnerable: in a position that makes it easier for you to be harmed or attacked

Anyone on line is vulnerable!

Page 13: Scams and Schemes

How to Catch a Phish

How do you think identity thieves might try to get your information?

(Phishing: when people send you phony emails,pop-up messages, social media messages, texts,

calls,or links to fake websites in order to hook you into

giving out your personal and financial information)

Page 14: Scams and Schemes

How to Catch a Phish

How good are you a spotting potential scams?

Page 15: Scams and Schemes

Phishing Examples

Consumer Fraud Reporting Example 1

Page 17: Scams and Schemes

Protect Yourself from Online Scams

Protect yourself…follow the rules Avoid opening the message or email in the first place Don’t click on any links or download and attachments.

They might contain viruses or spyware. Don’t reply Mark as “junk mail” or “spam” for your email

provider, or report it to your social network site. If you are concerned about an account you have with a

company, contact its customer service by phone. Make sure you verify the company’s contact

information elsewhere online first.

Page 18: Scams and Schemes

Wrap-up

What kinds of information do identity thieves look for and

why?

Page 19: Scams and Schemes

Wrap-up

How do thieves try to get at your information?

Page 20: Scams and Schemes

Wrap-up

What can you do to avoid falling for online scams?

Page 21: Scams and Schemes

Wrap-up

You or your family can go to www.ftc.gov/idtheft for help if identity has been stolen

Forward spam emails to [email protected]

Page 22: Scams and Schemes

Extension Activity

Try your luck with the Spam Scam Slam game

http://www.onguardonline.gov/media/game-0012-spam-scam-slam

Page 23: Scams and Schemes

Lesson Assessment

1. A type of crime in which your private information is stolen and used for criminalactivity is called:a) Identificationb) Identity theftc) Burglary

Page 24: Scams and Schemes

Lesson Assessment

1. A type of crime in which your private information is stolen and used for criminalactivity is called:a) Identificationb) Identity theftc) Burglary

Page 25: Scams and Schemes

Lesson Assessment

Evan sees the following message in his inbox:

Page 26: Scams and Schemes

Lesson Assessment

Which of the following is NOT a warning sign that this message is a scam:

a) The offer sounds too good to be trueb) It asks Evan for his private informationc) Evan is addressed as “Sir”

Page 27: Scams and Schemes

Lesson Assessment

Which of the following is NOT a warning sign that this message is a scam:

a) The offer sounds too good to be trueb) It asks Evan for his private informationc) Evan is addressed as “Sir”

Page 28: Scams and Schemes

Lesson Assessment

3. Sara finds a message on her phone that she thinks might be a scam. She should:a) Forward the message to her friends to see if they think it’s a scam toob) Reply and ask the sender not to send more mailc) Delete the message

Page 29: Scams and Schemes

Lesson Assessment

3. Sara finds a message on her phone that she thinks might be a scam. She should:a) Forward the message to her friends to see if they think it’s a scam toob) Reply and ask the sender not to send more mailc) Delete the message