Standards and Purpose

Welcome:
My name is Jess Malinky. I'm currently a 10th grade Social Studies teacher at Brooke High School in Wellsburg, WV.



Goals:
The goals of this blog are to educate students, parents, and the community about the various threats lurking in the online world; how to protect themselves from these threats; and where to report misuse of the internet.



WV Content Standards:

21.0.9-12.3.TT.4

Student adheres to acceptable use policy and displays ethical behaviors related to acceptable use of information and communication technology (e.g. privary, security, copyright, file-sharing, plagiarism); student predicts the possible cost and effects of unethical use of technology (e.g. consumer fraud, intrusion, spamming, virus setting, hacking) on culture and society; students identify the methodologies that individuals and business can employ protect the integrity of technology systems.





21C.0.3-4.3TT.4

Student complies with county acceptable use policy. Student identifies the need for acceptable use policies (AUP), discusses the basic issues related to resposible use of technology and information, describes personal consequences of inappropriate use and begins to cite sources for information found through electronic searches.



21C.0.5-0.3TT.4

Student complies with county acceptable use policy. Students discuss legal and ethical behaviors related to the acceptable use of information and communications technology (e.g. privacy, security, copyright, file-sharing, plagiarism) and predicts the possible effects of unethical use of technology (e.g. consumer fraud, intrusion, spamming, virus setting, hacking) on the individual and society, as well as identify methods for addressing these risks.



Purpose:

This blog is intended to provide information about safe use of the internet. It is designed to educate students, parents, and members of the community of the risks posed in the cyber world as well as provide them with strategies to reduce their risks online.







Identity Theft

HOW LONG WOULD IT TAKE YOU TO KNOW YOUR IDENTITY WAS STOLEN?

                                      Graph Source: Javelin Strategy & Research     CreditCards.com

What is identity theft?
Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.

What do thieves use your identity for?
The crime takes many forms. Identity thieves may rent an apartment, obtain a credit card, or establish a telephone account in your name.

¨      They may open new credit card accounts in your name.  When they use the cards and don’t pay the bills, the delinquent accounts appear on your credit report.
¨      They may open a new phone or wireless account in your name, or run up charges on your existing account.
¨      They may create counterfeit checks using your name or account number.
¨      They may open a bank account in your name and write bad checks.
¨      They may clone your ATM or debit card and make electronic withdrawals in your name, draining the accounts.
¨      They may get a driver’s license or official ID card issued in your name, but with their picture.
¨      They may give your personal information to police during an arrest.  If they don’t show up for their court date, a warrant for arrest is issued in your name.



What to do if you are a victim of identity theft?
Filing a police report, checking your credit reports, notifying creditors, and disputing any unauthorized transactions are some of the steps you must take immediately to restore your good name.

What can you do to prevent identity theft?
Awareness is an effective weapon against many forms identity theft. Be aware of how information is stolen and what you can do to protect yours, monitor your personal information to uncover any problems quickly, and know what to do when you suspect your identity has been stolen.

Stories of Real Identity Theft Victims
10 Unbelievable Yet True Identity Theft Stories:
Read ten true stories of victims of identity theft.  Including the story of a 9 year-old boy whose identity was stolen by thieves who racked up more than $18,000 of credit card debt; a single mom whose bank account of nearly $38,000 was emptied by thieves; and a cancer patient who received phone calls from creditors demanding payment for charges he didn’t make.

Identity Theft Nightmare- 5 Real Stories:
Read five stories of identity theft. Including the story of a woman whose sister stole her identity while living out a life of crime and a man who spent over three years trying to correct his credit history after his identity was stolen.

Stopping ID Theft- Real Identity Theft Stories
Here are several stories concerning identity theft including that of a man who applied for a loan only to find that his identity was stolen, and he now owed over $23,000 in back child support… even though he didn’t have any children!

For additional information visit:
http://www.ftc.gov/
http://www.idtheftcenter.org/
www.epic.org/privacy/idtheft

Citation for information on this page:  http://www.ftc.gov/