Identity Theft: Difference between revisions
From Clicklaw Wikibooks
→How do they get the information?
Drew Jackson (talk | contribs) No edit summary |
Nate Russell (talk | contribs) |
||
Line 16: | Line 16: | ||
==How do they get the information?== | ==How do they get the information?== | ||
{{Video | |||
|video = {{#ev:youtube|mvbxcgKRL5Q|350|right}} | |||
}} | |||
Identity thieves can obtain your personal and financial information in a range of ways. For example, they may: | Identity thieves can obtain your personal and financial information in a range of ways. For example, they may: | ||
* Steal the information from your computer, smartphone, wallet or purse, home, or vehicle. | * Steal the information from your computer, smartphone, wallet or purse, home, or vehicle. | ||
Line 28: | Line 30: | ||
* Place bogus advertisements for employment in <span class="noglossary">order</span> to obtain your information. | * Place bogus advertisements for employment in <span class="noglossary">order</span> to obtain your information. | ||
* Pretend they need your personal details to send you "winnings." | * Pretend they need your personal details to send you "winnings." | ||
{{Video | |||
|video = | |||
{{#ev:youtube|K9hvYMQA_HM|350|right}} | {{#ev:youtube|K9hvYMQA_HM|350|right}} | ||
}} | |||
==Warning signs== | ==Warning signs== |