Difference between revisions of "Identity Theft"

Jump to navigation Jump to search
58 bytes added ,  02:26, 24 April 2017
no edit summary
Line 23: Line 23:
==How do they get the information?==
==How do they get the information?==
{{PLSStorybox
{{PLSStorybox
| image =  
| image = [[File:Headshot_-_Scams_to_Avoid_-_Hazel_-_2017.jpg|link=]]
| text      = “I got a call from my credit card company asking if I had just bought something in New York. I’ve never been to New York. It turns out someone had been using my credit card for weeks, and run up $10,000 in charges. The police think she got my credit card information by pulling an old bill out of my garbage, and then she contacted the credit card company to change my address. I had wondered why I hadn’t received a bill for almost two months.”<br>- Hazel, Williams Lake
| text      = “I got a call from my credit card company asking if I had just bought something in New York. I’ve never been to New York. It turns out someone had been using my credit card for weeks, and run up $10,000 in charges. The police think she got my credit card information by pulling an old bill out of my garbage, and then she contacted the credit card company to change my address. I had wondered why I hadn’t received a bill for almost two months.”<br>- Hazel, Williams Lake
}}
}}
Line 31: Line 31:
Some go through garbage or recycling bins for discarded bills or other mail with personal information on it.  
Some go through garbage or recycling bins for discarded bills or other mail with personal information on it.  


Some use technology to steal your information. For example, they pretend to be a reputable company and send fake emails or texts to trick you into providing personal and financial information.  
Some use technology to steal your information. For example, they pretend to be a reputable company and send fake emails or texts to trick you into providing personal and financial information.


==Warning signs==
==Warning signs==
2,553

edits

Navigation menu