Home Blog Featured Article | A Pothole in Your Pathway: Pieces of Information

Featured Article | A Pothole in Your Pathway: Pieces of Information

Published on October 26, 2017 by in Blog, Newsletter

Featured Article | A Pothole in Your Pathway: Pieces of Information

Think About It: What types of personal information do you share in your social media profile and posts? Have you ever shared your phone number?

Consider the type of information that is stored inside of your account: your name, your date of birth and your e-mail address. If your account’s security is breached, the hacker can gain access to this information.

Tip: Consider using a nickname and making your birthday private.

Research has shown that teens are more comfortable with sharing their personal information on social media than ever before (Pew, 2013). But did you know that sharing information about yourself on your favorite social networks can also lead to identity theft? Social networks are global platforms, and pieces of personal information on your Instagram, Facebook, and other accounts that can make you an easy target; information such as your full name, birthday, and hometown (Lewis, nd). Did you know that three pieces of personal information are sufficient to commit identity theft? Depending on the uniqueness of your name, many people might have the same first and last name as you, yet by combining other identifiers, a criminal can narrow the search for your ID. In this case, an identity thief can pair your name up with your birthday; one day out of 365 ¼ days in the year. Additional pieces of information such as e-mail address, hometown, phone number serve to isolate your ID when linked together. Some social media users share this information on their public profile while others only share these types of identifying information with the social media service when creating their accounts. Consider how much information you share on your social media profile and in your posts. Are you aiding in your own identity theft by giving away pieces of your information?

Think that identity theft is just for “old folk?” Think again. Discover why teens are prime targets for this online crime.
Go to Article → Featured Article | A Pothole in Your Pathway: Teen Identity Theft

Find out how your online actions can allow a devious individual to access your account as easily as saying “Open Sesame.”
Go to Article → Featured Article | A Pothole in Your Pathway: Open Sesame

Whether you are shopping online or interacting with friends on social networks, you hold the key to protecting your identity. Take note of these Social Media Privacy Pointers.
Go to Article → Featured Article | A Pothole in Your Pathway: Social Media Privacy Pointers

Follow these 8 tips to prevent identity theft, and then share them on social media!
Go to Article → iDrive Agent: 8 Tips to Prevent Identity Theft on Social Media

iDrive wants to hear from you!

Want to start your own iDrive campaign or have a topic that you want iDrive to address? Send us a direct message on social media or send an e-mail at advisoryboard@isafe.org

Want to contribute social media content to future iDrive campaigns? Submit your application to join the iDrive Student Advisory Board here

Are you reading this article, but you’re not yet an iDrive Agent? Sign up here

Follow iDrive on Facebook, Twitter and Instagram.

  • facebook
  • Twitter
  • Instagram

Related Stories:


Brenner, Joanna. “73% of Teens Have Access to a Smartphone; 15% Have Only a Basic Phone.” Pew Research Center: Internet, Science & Tech. 08 Apr. 2015. Web. www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/pi_2015-04-09_teensandtech_06/

Carrns, Ann. “Why, and When, Your Child Should Have a Debit Card.” The New York Times. The New York Times, 14 Oct. 2016. Web. www.nytimes.com/2016/10/15/your-money/why-and-when-your-child-should-have-a-debit-card.html

Grant, Kelli B. “Identity Theft, Fraud Cost Consumers More than $16 Billion.” CNBC. CNBC, 01 Feb. 2017. Web. www.cnbc.com/2017/02/01/consumers-lost-more-than-16b-to-fraud-and-identity-theft-last-year.html

Identity Theft Resource Center. “Teen Space FAQs.” ID Theft Center. Web. http://www.idtheftcenter.org/Protect-yourself/teen-faq.html

Lathrop, Steve. Democrat-Herald, Albany. “Albany Teen Victim of ID Theft.” Albany Democrat Herald.19 Dec. 2011. Web. www.democratherald.com/news/local/albany-teen-victim-of-id-theft/article_c42188cc-2828-11e1-ae48-0019bb2963f4.htm

Lewis, Kent. How Social Media Networks Facilitate Identity Theft and Fraud. “Octane Magazine: Special Features.” Entrepreneurs’ Organization. Nd. Web. https://www.eonetwork.org/octane-magazine/special-features/social-media-networks-facilitate-identity-theft-fraud

Moyer, Phillip. “Rip-Off Alert: Social Media Habits Make Teens Easy ID Theft Targets.” KSNV. Web. http://news3lv.com/archive/rip-off-alert-social-media-habits-make-teens-easy-id-theft-targets

“News Room – ID Analytics.” ID Analytics. Web. news3lv.com/archive/rip-off-alert-social-media-habits-make-teens-easy-id-theft-targets

Pascual, Al, Marchini, K., Miller, S. “2017 Identity Fraud: Securing the Connected Life.” Javelin. N.p., 01 Feb. 2017. Web. www.javelinstrategy.com/coverage-area/2017-identity-fraud

Pipl.com.Web. www.pipl.com

“Teens, Social Media, and Privacy.” Pew Research Center: Internet, Science & Tech. 21 May 2013. Web. www.pewinternet.org/2013/05/21/teens-social-media-and-privacy-3/

 Share on Facebook Share on Twitter Share on Reddit Share on LinkedIn
No Comments  comments 

Leave a Reply