*check your _________ accounts regularly.
bank and credit card
*say YES! To automated notifications (texts/ emails) for use of
bank accounts/credit cards
AVOID USING CHECKS! They have your ___________ numbers on them.
routing and account
claiming another person’s material as your own.
plagiarism
bits of data stored on your computer that record information about the websites you have visited. Cookies may also contain personal information you have entered on a website.
Cookies
• Make certain you get your card back after you make a purchase. A good way to do this is to leave your wallet open in your hand until you
put the card in it
• Always keep a list of your credit cards, credit card numbers, and credit card company numbers in case your card is
lost or stolen.
How do you protect your computer from identity theft?
•Install a firewall and buy virus-protection software. If you dispose of a computer, remove data with a disk wipe utility program.
the unethical and illegal copying or downloading of software, files, and other protected material.
Piracy
How can you deal with fake profiles?
block/ report to site admin
-take screenshots for evidence
• Be aware if someone is looking over your shoulder when you are using an ATM or making store purchases so they can't steal your _____.
credit card number/pin
• Never give your credit card number over the
phone
• Don’t use the same ___________ for all your accounts. Avoid using easily identifiable words or numbers
password
protects taglines, slogans, names, symbols, and any unique method to identify a product or company.
trademark
How can you deal with Dissing on social media?
ignore/block/report/update privacy settings
• Shred _________________ before throwing them away.
bank and credit statements and credit card offers
• Obtain your credit Make sure you recognize all the account information listed.
reports and scores.
a data record of all of someone’s online activities.
digital footprint
a set of rules that explains what is and is not acceptable use of computer equipment and networks. (usually no commercial use)
acceptable use policy
How can you avoid/respond to Trickery/trolling?
avoid giving personal information
-dont friend people who you dont know
• Close out unused Cutting them up is not enough.
credit cards.
• Avoid giving out your Your SSN is the prime target of identity thieves. Never put your Social Security number on your checks or your credit receipts.
Social Security number/birth date/phone number/account numbers.
something that comes from a person’s mind, such as an idea.
Intellectual property
a number used to identify a device connected to the Internet.
The Internet protocol (IP) address
Catfishing-
verify(?how) video/audio; multiple pics; google them,
Meet in public/safe places(even safe exchange/police station)
Meet in public/safe places(even safe exchange/police station) block/report to site admin