Anonymous

Identity Theft: Difference between revisions

From Clicklaw Wikibooks
no edit summary
No edit summary
No edit summary
Line 16: Line 16:
==How do they get the information?==  
==How do they get the information?==  


[[File:IdentityTheftAnimation.png|link=http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28|right|thumb|300px|[http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28 What is Identify Theft?] An animation from People's Law School that discusses identity theft and steps you can take to address the problem.]]
[[File:IdentityTheftAnimation.png|link=http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28|right|thumb|350px|[http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28 What is Identify Theft?] An animation from People's Law School that discusses identity theft and steps you can take to address the problem.]]
Identity thieves can obtain your personal and financial information in a range of ways. For example, they may:
Identity thieves can obtain your personal and financial information in a range of ways. For example, they may:
* Steal the information from your computer, smartphone, wallet or purse, home, or vehicle.
* Steal the information from your computer, smartphone, wallet or purse, home, or vehicle.
9,075

edits