Anonymous

Difference between revisions of "Identity Theft"

From Clicklaw Wikibooks
No change in size ,  14:35, 19 April 2013
Line 16: Line 16:
==How do they get the information?==  
==How do they get the information?==  


[[File:IdentityTheftAnimation.png|link=http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28|right|thumb|350px|[http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28 What is Identify Theft?] An animation from People's Law School that discusses identity theft and steps you can take to address the problem.]]
[[File:IdentityTheftAnimation.png|link=http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28|right|thumb|350px|[http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28 What is Identity Theft?] An animation from People's Law School that discusses identity theft and steps you can take to address the problem.]]
Identity thieves can obtain your personal and financial information in a range of ways. For example, they may:
Identity thieves can obtain your personal and financial information in a range of ways. For example, they may:
* Steal the information from your computer, smartphone, wallet or purse, home, or vehicle.
* Steal the information from your computer, smartphone, wallet or purse, home, or vehicle.
9,075

edits