Cybersecurity and Personal Finance: Identity Theft
Standards
Anyone can become a victim of identity theft. Protecting one’s identity can help reduce the potential of becoming a victim of fraud or other illegal activities that can create future problems. Such problems may prevent an individual from getting a credit card, a school loan, or even a job. Learning how to protect personal information, such as Social Security Numbers and passwords, is a critical step in protecting one’s identity in an online environment.
Introduction
ESSENTIAL QUESTION: What is identity theft and how can you protect yourself from becoming a victim?
TIME REQUIRED: 1.5 to 2 class periods
Identity theft is one of the fastest growing crimes in the world today. Through technology, everyone now has easy access to personal information for people of all ages and all socioeconomic backgrounds. It is becoming more common to hear about state, local, and federal government databases being “hacked” as well as databases of private businesses and financial institutions. Understanding identity theft and how it relates to everyday life are important factors when considering ways to protect oneself from this problem.
ADDITIONAL CYBERSECURITY CONCEPTS: Identity Theft, Social Security Numbers, Passwords
Learning Objectives
- Recognize the importance of protecting themselves from identity theft.
- Determine how identity theft relates to fraud.
- Explain the history and role of Social Security Numbers in identity theft.
- Apply the concept of identity theft to the use of credit cards and other personal information such as Social Security Numbers and passwords.
- Discuss how to protect themselves from identity theft.
Resource List
- Activity #1: Tips for Preventing Identity Theft
- Activity #1 (Key)
- Activity #2: Protecting Your Personal Information
- Activity #2 (Key)
- PowerPoint Slides (PPT or PDF)
- Assessment
- Parent letter
- FTC Video: Why Care About Identity Theft?
- Video: Your Social Security Number
- Video: Social Security Cards
- UYN: The Password Rap
Process
We suggest that you send out the Parent Letter before teaching the lesson.
1. Read the following scenario to students and ask how they would feel if this happened to them. (Present Slide 7 while you read and Slide 8 while you ask the questions).
Fastview Middle School is preparing for its annual essay competition. Winners will be announced at a special ceremony this morning. Everyone is gathered in the auditorium and excited to hear who will win. Now, the big moment has come. Mrs. Rodriguez announces the top three essay winners and Johnny is in first place. Everyone is surprised as he slowly walks up to receive his award and a gift certificate for $100. As he starts reading his essay to all of the students, Malia realizes that he is reading her essay. How could this happen? She was happy when they announced she had won second place, but now she’s angry and confused. She wants to know how Johnny got a copy of the first essay she wrote and tossed in the trash before starting over on a new paper.
- What should she do? [Talk to her teacher, tell her parents so they can contact the principal or the teacher]
- How can she prove it was her essay and not Johnny’s? [Maybe she made a copy of the essay before handing it in or it is still stored on a computer at home or at school. She can also provide another writing sample that shows how similar his essay is to her style of writing.]
- Do things like this ever happen? [Unfortunately, things like this do happen because people are not always honest and trustworthy. Ask the students to provide other examples that they have heard, read, or seen.]
2. Present Slide 9. Tell students that Malia is the victim of fraud. Johnny stole her first essay from the trash can, retyped it, and turned in it to the competition as though it were his own paper. In legal terms, fraud is the deliberate attempt to gain from deceiving or misleading others. Stealing someone’s paper and winning an essay contest is wrong, and Johnny should be held responsible for his actions – but Malia will have to prove it was really her paper that he used because, unfortunately, the burden of proof is on the victim.
3. Present Slide 10 and tell students what happened here is very similar to what happens in cases of identity theft. Identity theft is fraud too. It means someone steals your personal information such as:
- Your name
- Your Social Security Number
- Your address, your phone number
- Your bank account number
- Your credit card number
- Your password, or
- Anything else that is unique to you
– and then uses it to buy things or take out a loan for themselves in your name.
4. Present Slide 11. Explain how having someone steal your identity is even more serious than stealing an essay because someone can start making purchases in your name, leaving you to pay the bills.
- For example, what if Johnny took Malia’s credit card number and purchased new clothes for the awards ceremony instead of just taking her paper? Malia would have to prove she did not buy the clothes.
Tell students that victims of identity theft can be left with thousands of dollars in charges that are not their own, which can create a very difficult situation to resolve.
5. Present Slide 12. Explain that identity theft is a growing problem because of electronic access to information, but also because we throw a lot of personal information in the trash, just like Malia threw her essay in the school trashcan. Remind students that protecting personal information is important, regardless of what form it is in.
6. Present Slide 13. Discuss the following list of potential sources of identity theft online and ask students if they can add to the list:
- Posting personal information about yourself on social media
- Giving out personal information in a chat room
- Responding to emails from people you do not know and including personal information
- Answering any online surveys or questions that require personal information
7. Present Slide 13. Tell students that their cell phones and tablets can also be a source of identity theft because we often put a lot of personal information on them. It is important to protect your cell phones, tablets and their passwords, just like you would protect your purse or your billfold. (Note: An article with ten tips for preventing identity theft via cell phones is included in the Extension section of this lesson.)
8. Present Slide 15. Remind students that it is important to protect their personal information to keep from becoming a victim, even though they may not have credit cards or bank accounts.
9. Review the first five tips in Activity #1, then put students into small groups, asking them to add more tips to the list.
10. Present Slide 17. Ask students the following questions:
- Have you ever loaned money to a friend who did not repay it?
- How did it make you feel?
- What if you found out that friend had borrowed from several others in class and did not repay them either?
- Would you want to loan them more money?
Present Slide 18. Explain that failing to repay friends gives everyone a bad impression of that person. In a small way, that is similar to a credit history. (Note: Explain that credit histories are a record of a person’s use of credit. Optional lessons on credit reports and credit histories are included in the Extension activity.)
11. Ask students what they know about credit or credit cards. Most will probably have some experience with their parents or other family members using credit cards.
Tell students that credit cards allow people to borrow money so they can make purchases today. With a credit card, people buy now and pay later.
12. Present Slide 19. Ask students what they think would happen if someone else used their identification to get a credit card or make purchases?
- For example, if someone has committed identity theft and is using your personal information to get a loan, you are required to prove it was not your loan or you will be expected to make the payments. In addition, you may not be able to get additional credit for future purchases such as a car, a house, or even a loan for your college education.
13. Also, explain that it is much harder to correct a bad or false credit history than it is to prove someone stole your paper. Remind students that people who steal their identity may make many purchases before they even realize what has happened.
14. Tell students that credit histories and transactions are tracked by a person’s Social Security Number. Ask students if they have heard about Social Security Numbers, bank account numbers, or passwords. (Note: While most students will be familiar with passwords, they probably are less likely to understand Social Security or bank account numbers.). Present Slide 20.
- Social Security Numbers are issued by the federal government and serve as something like a national identification number because they are usually required before getting a job or a loan.
- Bank account numbers are issued by banks when a person opens an account.
- These numbers are unique to the person—no one else has your Social Security Number or that bank account number in that bank.
- Both numbers are used to ensure the right people have access to the information or the money associated with those accounts.
15. Have students watch the this video explaining Social Security Numbers.
16. Present Slides 21 and 22. Review video on Social Security Numbers with the following questions:
- What is a Social Security Number? [A number issued by the federal government.]
- How are they used? [Like a national ID number.]
- Why are they important? [They are unique to each person and used to confirm a person’s identity.]
- Why should you protect your Social Security Number from other people? [To keep them from using your identity.]
17. Hand out Activity #2. Remind students that protecting their passwords is one of the most important ways they can protect their personal information.
- Review the instructions for the activity and show the https://www.youtube.com/watch?v=DE5xKaf4E9E.
- Put students in four groups and assign the topics, giving them sufficient time to write and rehearse their raps.
- Have each group perform their raps or other presentation in class.
- Debrief the activity by asking students what they have learned from this activity.
Conclusion
Present Slide 24. Remind students that even though they may not have a credit card or a checking account now, they are potential victims of identity theft. Taking steps to protect their personal information such as passwords, Social Security Number, and other important data is a good way to reduce the potential of becoming a victim of identity theft. Encourage them to talk with their parents about ways to secure their personal information and reduce their potential for identity theft, fraud, and other similar problems.
Extension Activity
- Have students keep a log for the next week listing the times they encounter situations where they could become a victim of identity theft or fraud. Some of these might include playing an online game that requires a password, participating in a chat room, posting information on a social media site, or creating a new password for their email account.
- Use the following lesson to help students understand how to build a credit history: https://econedlink.org/resources/establishing-credit/
- For a more advanced discussion of credit history, use the following lesson to explain the importance of credit reports and credit scores:
- https://econedlink.org/resources/credit-reports-and-credit-scores/
- Use the following video to discuss Internet safety for kids, including information on passwords and online chatting: https://www.youtube.com/watch?v=bLO3lqYW9vE·
- Use the following video to discuss steps for creating stronger passwords: https://www.youtube.com/watch?v=aEmF3Iylvr4
- Use the following blog article to discuss potential sources of identity theft: https://www.experian.com/blogs/ask-experian/survey-findings-are-consumers-making-it-easier-for-identity-thieves/ (Note: The data in this blog is a summary of a survey conducted by Consumerinfo.com, a subsidiary of Experian.)
- Use the ten tips in the following article to generate class discussion about cell phone identity theft: https://what-is-privacy.com/2012/07/how-to-avoid-cell-phone-identity-theft/
Assessment
Refer to Assessment Activity.