Identity Theft: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
Line 17: Line 17:


[[File:IdentityTheftAnimation.png|link=http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28|right|thumb|350px|[http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28 What is Identity Theft?] An animation from People's Law School that discusses identity theft and steps you can take to address the problem.]]
[[File:IdentityTheftAnimation.png|link=http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28|right|thumb|350px|[http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28 What is Identity Theft?] An animation from People's Law School that discusses identity theft and steps you can take to address the problem.]]
Identity thieves can obtain your personal and financial information in a range of ways. For example, they may:
Identity thieves can obtain your personal and financial information in a range of ways. For example, they may:
* Steal the information from your computer, smartphone, wallet or purse, home, or vehicle.
* Steal the information from your computer, smartphone, wallet or purse, home, or vehicle.

Navigation menu