Identity Theft: Difference between revisions
Jump to navigation
Jump to search
→How do they get the information?
Drew Jackson (talk | contribs) |
Drew Jackson (talk | contribs) |
||
Line 16: | Line 16: | ||
==How do they get the information?== | ==How do they get the information?== | ||
[[File:IdentityTheftAnimation.png|link=http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28|right|thumb|350px|[http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28 What is | [[File:IdentityTheftAnimation.png|link=http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28|right|thumb|350px|[http://www.youtube.com/watch?v=mvbxcgKRL5Q&list=UUSstQuUfC1NQphZOL_onOuw&index=28 What is Identity Theft?] An animation from People's Law School that discusses identity theft and steps you can take to address the problem.]] | ||
Identity thieves can obtain your personal and financial information in a range of ways. For example, they may: | Identity thieves can obtain your personal and financial information in a range of ways. For example, they may: | ||
* Steal the information from your computer, smartphone, wallet or purse, home, or vehicle. | * Steal the information from your computer, smartphone, wallet or purse, home, or vehicle. |