Lesson Guide sc-6

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Semester Course

6.5 Identity Theft


Lesson Guide
UNIT: MANAGING CREDIT

Learning Objectives Jump$tart Standards


Financial Decision Making
Students will be able to ● 7a: Outline steps to resolve identity theft problems as
● Understand different types of identity theft and how recommended by the Federal Trade Commission and
they might occur relevant financial institutions
● Take steps to identify and prevent personal identity ● 7c: Investigate consumer safeguards for mobile and
theft online banking
● Explain actions to take if they become a victim of
identity theft

Approximate Time
● Lesson length: 45 mins

Distribute to Students Plan Your Unit


● Student Activity Packet SC-6.5 ● Semester Course Managing Credit Unit Plan
● Customizable Parent Newsletter: Managing Credit

LESSON PLAN

Resources Questions Est. Time

DISCUSSION PROMPTS Discussion Prompts 5 mins


1 Discuss this question with your classmates or with a partner.

In 2015, 13.1 million Americans were the victims of identity theft. As


a result, identity thieves were able to steal almost $15 billion that
year.
1. Why do you think identity theft is so common and so
profitable for thieves?

INFOGRAPHIC 2018 Unisys Security Index 3 mins


2 ● 2018 Unisys Security Review this infographic about American security concerns, and then
Index answer:
● Publisher: Unisys
1. According to this resource, 61% of US consumers are
concerned about becoming victims of ID theft. Why do you
think this is such a prevalent concern?
2. The FINANCIAL section in the resource states that more than
half of Americans are “more willing to trust facial
recognition technology to identify them...during financial
transactions.” Would you be comfortable with this? Why or
why not?

ACTIVITY COMPARE: Types of Identity Theft 12 mins*


3 ● COMPARE: Types of Given that identity theft is so common, it’s important to understand
Identity Theft the types of ID theft to watch out for and how the theft typically
● Publisher: NGPF occurs, so that you can be vigilant. Follow the directions on this
worksheet to complete the activity.

www.ngpf.org Last updated: 8/1/19


1
VIDEO (3:32) Protecting Yourself from Identity Theft 5 mins
4 ● Protecting Yourself from There are many proactive steps you can take to minimize the risk of
Identity Theft your personal information being stolen. Watch this video and then
● Publisher: SchoolsFirst answer:
FCU 1. Think about how you currently use your smartphone and
social media. What actions can you take to protect your
information more securely?
2. Most of the steps recommended in the video are fairly easy
to do. Why, then, do you think a lot of people fail to do
them?
3. Based on this video, what other steps do you need to take to
protect yourself from identity theft?

VIDEO (2:02) Multiple Videos 10 mins


5 ● 5 Ways to Avoid Credit These four videos provide additional ways to prevent identity theft.
Card Fraud Record the main idea of each video in the chart provided. Be
● Publisher: ESET prepared to share your answers with the class.
VIDEO (1:59)
● What is Two Factor
Credit Card Fraud:
Authentication?
● Publisher: Duo Security
VIDEO (1:00)
Two-Factor Authentication:
● How to Know if an Email
is Real
● Publisher: Google Emails:
VIDEO (3:30)
● How to Create a Strong
Password Strong Passwords:
● Publisher: Safety in
Canada

❖ Teacher Tip: We
recommend you split
students into 4 groups,
allow 3 minutes for them
to review their resource
and record the main idea.
Then, allow 7 minutes for
share out, as the rest of
the class takes notes on
what they hear.

ARTICLE 10 Steps to Recover if Your Identity is Stolen 5 mins


6 ● 10 Steps to Recover if Review this list of steps you can follow if you become a victim of
Your Identity is Stolen identity theft or fraud. Use it to answer:
● Publisher: Bankrate 1. As you’ve seen throughout this lesson, ID theft is quite
common. If it happens to so many Americans, why do you
think cleaning up the effects is so time-consuming and
difficult?
2. Pay close attention to item #3 on the list, which says you will
automatically have access to each credit bureau’s credit
report after you report the ID theft. What would you
recommend as appropriate follow-up in the months and
years afterwards?

EXIT TICKET Exit Ticket 5 mins


7 1. Name two common forms of identity theft.
❖ Teacher Tip: To 2. What are three ways to protect yourself from identity theft
administer this Exit Ticket when using your smartphone or computer?

www.ngpf.org Last updated: 8/1/19


2
using Google Forms, 3. Jason is a high school student, and here are the passwords
make your own copy he’s considering using for his online bank account. Which of
here. these is probably the most secure option he could choose?
a. Jason2001
b. Abc123
c. 27Snail&_112
d. USBankPW

*Teacher Tip: Completing all of this activity will likely take longer than the designated time. You may want to break your students into
groups or assign the remainder for homework.

EXTEND THE LEARNING

DO MORE... LEARN MORE...


INTERACTIVE ARTICLES
● Quizlet Cashcabulary | Managing Credit ●
● Publisher: NGPF
QUESTION OF THE DAY
ACTIVITY ●

VIDEO

FAST FACTS...
● In 2017, there were 16.7 million victims of identity fraud, a record high that followed a previous record the
year before (Javelin Strategy & Research, 2018).
● In 2017, credit card fraud was the most common form of identity theft (133,015 reports), followed by
employment or tax-related fraud (82,051 reports), phone or utilities fraud (55,045 reports), and bank fraud
(50,517 reports) (FTC, 2018).

www.ngpf.org Last updated: 8/1/19


3

You might also like