Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 29

Ethical Issue in

Information Technology
our
office

1.4 million

2
1.4 million
Reported Case of Identity Theft in the World
(Reported by the Federal Trade Commission in 2020)

3
YOU SAW IT RIGHT!!
This insane number was fueled by the high rate of
unemployment identity theft during the pandemic, as
increased and extended unemployment benefits made the
sector an attractive target for fraudsters.

4
But the QUESTION is???

What is Identify Theft and


Privacy Infiltration ?

5
LET’S DIG DEEPER!

6
Introduction

As the modernization emerges, the world


continuously paving its way to continuous shift to
digital world— where informations are accessible
through internet access.

7
Introduction

We are currently living in the so-called information


age which can be described as an era where economic
activities are mainly information based. This is due to
the development and use of technology.

8
Introduction

But with the highly dependence on digital functions, this


paradigm shift brings new ethical and juridical problems
which are mainly related to issues such as the right of access
to information, the right of privacy which is threatened by the
emphasis on the free flow of information, and the protection of
the economic interest of the owners of intellectual property.

9
Undeniably, technological advances became handful to
different people around the world.

Able to
More
connect to
flexible Convenient
different
business banking
people
digital transaction
around the
transaction
globe

10
Introduction

However, on the flip side of the coin, although


technology has a major impact on the gathering,
storage, retrieval and dissemination of information its
main ethical impact relates to
accessibility/inaccessibility and the manipulation of
information.

11
Introduction

In a simply put, it becomes easier to access a person’s


private information by more people.

12
For which

The
Identity Theft and Invasion in Privacy
has brought into existence.

13
Identity Theft and
Privacy Infiltration

14
Identity Theft

Identity theft occurs when someone uses your


personal identifying information and pretends to be
you in order to commit fraud or to gain other
financial benefits.

15
Identity Theft
Your Personal identifying information includes:
◉ Name
◉ Home Address
◉ Logins and Passwords
◉ Bank number
◉ Social Security number
◉ Driver’s License number and many others.
16
You may be asking, in what
ways do identity thieves
usually reap the benefits of
stealing other’s identity?

17
Identity Theft

To be specific, the following are the examples of what


identity thieves might do with your sensitive personal
information.
◉ Make unauthorized purchases using your existing credit
and debit cards.
◉ Use your health insurance to get medical care.

18
To unravel how these lawless
thieves steal information,
take a look at their different
ways.

19
Phishing Mail Theft

WiFi
Hacking Skimming
Different
methods in Phone
Malware
Stealing Scams
Information

20
Top Five Types of Identity Theft

Percent of the Total Top


Type of Identity Theft Number of Reports
Five

Government benefits applied for 394,324 32.0%

Credit Card Fraud 365,597 29.7

Miscellaneous Identity Theft 281,434 22.9

Business/ Personal Loan 99,667 8.1

Tax Fraud 89,391 7.3

Total, top Five 1,230,413 100.0%

Source: Federal Trade Commission, Consumer Sentinel Network. 21


The table you’ve seen are the alarming
most reported identity-related crimes.

!!!

22
Engaging ourselves to the digital
world also means facing the risks of
cybercrimes, but that does not mean
we can’t protect ourselves from it.

23
Ways to Protect Yourself against
Identity Theft

◉ Create unique, complex passwords, for each account


and device. A strong password includes a dozen letters,
numbers, and symbols. Or you can create a long
passphrase, which would be hard for a criminal to
guess, but easier for you to remember.

24
Ways to Protect Yourself against
Identity Theft

◉ Enable two-factor authentication on all accounts that


offer it.
◉ Never give out your personal information — especially
on phone calls you didn’t initiate.
◉ Don’t click links, open attachments, or respond to
emails from unfamiliar or untrusted sources. These may
contain malware.
25
Reference

The presentation used ideas and information from the sources


online and accessible through the following websites.

https://us.norton.com/internetsecurity-id-theft-what-is-identity-theft.html
https://www.iii.org/fact-statistic/facts-statistics-identity-theft-and-cybercrime

26
A Note to Remember:
As you wander around digital world, always
be mindful.

27
Presented by:

ALJON PATRICK A. MEDINA


BSBA FMIIB
Living in the IT Era

28
Thanks!

29

You might also like