ID PROTECTION
ID PROTECTION
ID/ DC
DC
DC
100

*check your _________ accounts regularly.

bank and credit card

100

*say YES! To automated notifications (texts/ emails) for use of

bank accounts/credit cards

100

AVOID USING CHECKS! They have your  ___________ numbers on them.

routing and account

100

 claiming another person’s material as your own.

plagiarism

100

 bits of data stored on your computer that record information about the websites you have visited. Cookies may also contain personal information you have entered on a website.

Cookies

200

• Make certain you get your card back after you make a purchase. A good way to do this is to leave your wallet open in your hand until you

put the card in it

200

• Always keep a list of your credit cards, credit card numbers, and credit card company numbers in case your card is

lost or stolen.

200

How do you protect your computer from identity theft?

•Install a firewall and buy virus-protection software. If you dispose of a computer, remove data with a disk wipe utility program.

200

 the unethical and illegal copying or downloading of software, files, and other protected material.

Piracy

200

How can you deal with fake profiles?

 block/ report to site admin

-take screenshots for evidence



300

• Be aware if someone is looking over your shoulder when you are using an ATM or making store purchases so they can't steal your _____.

credit card number/pin

300

• Never give your credit card number over the

phone

300

• Don’t use the same ___________  for all your accounts. Avoid using easily identifiable words or numbers

password

300

 protects taglines, slogans, names, symbols, and any unique method to identify a product or company.

trademark

300

How can you deal with Dissing on social media?

ignore/block/report/update privacy settings

400

• Shred _________________ before throwing them away.

bank and credit statements and credit card offers

400

• Obtain your credit  Make sure you recognize all the account information listed.

reports and scores.

400

a data record of all of someone’s online activities.

digital footprint

400

 a set of rules that explains what is and is not acceptable use of computer equipment and networks. (usually no commercial use)

 acceptable use policy

400

How can you avoid/respond to Trickery/trolling?

avoid giving personal information

-dont friend people who you dont know

500

 • Close out unused  Cutting them up is not enough.

credit cards.

500

• Avoid giving out your  Your SSN is the prime target of identity thieves. Never put your Social Security number on your checks or your credit receipts.

Social Security number/birth date/phone number/account numbers.

500

 something that comes from a person’s mind, such as an idea.

Intellectual property

500

 a number used to identify a device connected to the Internet.

The Internet protocol (IP) address

500

Catfishing-  

verify(?how) video/audio; multiple pics; google them, 

Meet in public/safe places(even safe exchange/police station)


  • Meet in public/safe places(even safe exchange/police station) block/report to site admin