1 of 15

Middle School Course

7.2 Identity Theft

APPROXIMATE TIME: 60 MINUTES

2 of 15

TEACHER FACING SLIDES

3 of 15

ASSESSMENTS & GRADING

Please do NOT include any NGPF assessments or answer keys in your Nearpod lessons.

Each NGPF lesson ends with an Exit Ticket which NGPF recommends for grading.

IMPORTANT

GRADING TIP

4 of 15

CUSTOMIZE IT!

Please review the Nearpod slides and customize the content and activities based on your teaching environment using Google Slides and/or Nearpod.

Delete teacher facing slides before facilitating lesson to your students!

5 of 15

FACILITATION

Make sure you have the lesson guide available when you are facilitating (for time management, organization of lesson) and the answer key available when you are grading.

If a resource or activity in a lesson was not transferable to Nearpod there will be a teacher facing slide making you aware.

6 of 15

Identity Theft

7 of 15

JUMP$TART STANDARDS

Managing Risk

  • 7a: Explain methods used by identity thieves to obtain personal information to commit a crime
  • 7b: List actions that an individual can take to protect personal identification information

8 of 15

LESSON SKILLS

ELA SKILLS

  • Understand and summarize key topics from a text or visual

9 of 15

INTRO

10 of 15

LEARN IT

11 of 15

ARTICLE: Avoiding Identity Theft

Identity theft can happen to anyone so it is important you understand how to identify it and how you can prevent it from happening. Read the article to learn more about the common ways identity theft can occur. Then, answer the questions.

12 of 15

EDPUZZLE: Protecting Yourself from Identity Theft

It is important to know how to protect yourself from falling victim to identity theft. Once your identity is stolen it can be difficult to fix the damage that is done, so preventing it from happening in the first place is key! Watch the video and answer the questions as they appear.

13 of 15

DO IT

14 of 15

CREATE: Strong Passwords

Creating a strong password protects you from getting your identity stolen. Did you know cybercriminals can buy your passwords off the dark web? In order to buy your password it needs to be cracked first, so the first step in preventing this from happening is creating a strong one! Practice creating strong passwords using three different strategies by following the directions!

15 of 15

EXIT TICKET