Protection Against Identity Theft

In: Computers and Technology

Submitted By jriddle11
Words 1008
Pages 5
Protection Against Identity Theft

Identity theft is a crime that can easily ruin one’s life and cause extreme suffering and loss. Criminals have been using other people’s identity since the beginning of time to commit crimes, achieve financial gain, and for many other illegal purposes. Since the rise in the popularity of the Internet, identity theft has also been on the rise. “Approximately 15 million United States residents have their identities used fraudulently each year with financial losses totaling upwards of $50 billion.” (Douglas, 2012) By securing someone else’s personally identifiable information (PII), a criminal with enough knowledge about the Internet could illegally gain access to medical records, bank accounts, and many other aspects of the unknowing victim’s life. This is why protecting one’s personally identifiable information is paramount in avoiding identity theft. There are many methods criminals can use to acquire PII but there are many ways one can protect their information as well. It is easier to protect PII by practicing several simple habits rather than forfeiting time, effort, and potentially large sums of money after one’s identity has been compromised. The United States Department of Justice suggests several easy tips to help avoid becoming a victim of identity theft. Individuals should be stingy about releasing their PII to anyone they do not know or trust. (Identity Theft And Identity Fraud, 2014) It is common to receive phone calls or emails that are offering the sale of a product, donations, or credit card offers. Many of these calls or emails are legitimate and there is no danger involved, but it is important to remain vigilant when placed in these situations. Criminals who are phishing will often use techniques to secure an individual’s PII while posing as a legitimate organization. Many times the victims in these…...

Similar Documents

Identity Theft

...Dangers of Identity Theft Sharae Ernst IFSM 201 – Summer 2012 8/3/2012 “Identity theft occurs when someone uses your personally identifying information (PII), like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.” (Fighting Back Against Identity Theft: Federal Trade Commission). According to the Federal Trade Commission, identity theft complaints have decreased since year 2008 (314,521 to 250,854). It is estimated by the FTC that as many as 9 million Americans have their identities stolen each year. As information technology progresses along with society, there is always an increased risk of having one’s identity stolen. “Identity theft was the number one complaint category in the CSN for calendar year 2010 with 19% of the overall complaints, followed by Debt Collection (11%); Internet Services (5%); Prizes, Sweepstakes and Lotteries (5%); Shop-at-Home and Catalog Sales (4%); Imposter Scams (4%); Internet Auction (4%); Foreign Money Offers and Counterfeit Check Scams (3%); Telephone and Mobile Services (3%); and Credit Cards (2%).” (Consumer Sentinel Network Data Book: For January - December 2010, 2011). Although the numbers have slightly decreased, overall, identity theft is on the rise. “According to a February 2012 Javelin Study, identity theft rose 13% from 2010 to 2011.  More than 11.6 million adults became a victim of identity theft in the United States during 2011.” (Coping with Identity......

Words: 1352 - Pages: 6

Identity Theft

...Rasmussen College | Identity Theft | The long term issue | | Caden Ross | 2/17/2013 | Author's Note: This research is for Professor Rob Paixao B234/BUL2241 Section 01 Business Law Course written by Caden Ross on 02/17/2013. | Jeffrey Gerald Jackson, otherwise known as Troy Lee Evans, was arrested on September 4,2012 for identity theft. Mr. Jackson used the identity of Troy Lee Evans to gain employment at Credit Concepts Inc. Mr. Jackson had worked at Credit Concepts Inc. under this false ID for six years. Through his job there he had access to important personal information that allowed him to obtain several loans using other people's identities. Police uncovered at least six separate incidents in which Mr. Jackson used other peoples information to obtain loans for himself. His bail was set at $45,000.00 and police are asking for anyone to come forward with any additional information about other crimes he may have committed. [ (Bella, 2012) ] Identity Theft is a heinous crime with long term repercussions for it victims. Mr. Jackson's case shows how much a person can do with identity theft. He not only used other people's information to obtain loans but he lived as someone else for six years and worked as this person. This means that for six years income was reported to the IRS and Social Security as Mr. Evans when it was not his income. Any bills that Mr. Jackson has taken out in Mr. Evans name like utilities or rent can show up on Mr. Evans credit if......

Words: 976 - Pages: 4

Identity Theft

...Abstract Culprits of identity theft are the modern day con artists that are able to convince and persuade people out of their money by promising their victims a portion of wealth which will never come to be. This paper will describe what is classified as identity theft, how people become victims of this crime and how people can avoid being becoming a victim to this popular means of deception in the electronic world. On the average one hundred thousand people are affected by identity theft in the United States per year and over two billion dollars in revenue is stolen as shown in the surveys that were conducted in 2003 -2006 (Anderson, Durbin & Salinger). Because of this threat the consumer becomes skeptical of online transactions which cause loss of business to many retailers as they are based solely on internet sales. For the retailer to make sure that the consumer is protected from fraudulent transactions and the possibility of their personal information to be at risk of being intercepted by others, the retailers need to incorporate special systems onto their site and have special programs that could make the purchasing of items from their business complicated for the consumer and will also raise the price of the goods to offset their loss on the security measures. The way people are committing the crimes of identity theft are only limited by the imagination of the person that commits these types of crimes. The source can be from......

Words: 1459 - Pages: 6

Identity Theft

...Identity Theft Identity theft is one of the fastest growing crimes in the United States. Every minute about nine people have their identity stolen. (Identity Theft and Identity Fraud, 2013). Identity theft can happen to anyone at any time. A consumer can protect themselves without having to purchase a protection program. Protection programs are available to help consumers protect their identity. An identity theft program isn’t the best protection against identity theft. There are a number of protection plan companies a consumer can choose from. Each company has their own plans to choose from and each have different rates. A consumer can review the ratings of each company also. When a consumer has a protection program there are some advantages. These programs review the client’s credit reports with credit monitoring. When a consumer purchases a protection program, fraud insurance is granted to the consumer. This insurance covers a few areas. The insurance will cover all legal services endured by the consumer, it covers all out-of-pocket services that the consumer pays out, and some of the companies offer a private investigator and assigns them to help with the claim. There are a number of disadvantages to having a protection program. These programs will not prevent identity theft. In order for a consumer to get a protection plan, they must pay a monthly/yearly fee for the program. If a consumer’s identity is stolen, the consumer will not be reimbursed for any money that......

Words: 545 - Pages: 3

Identity Theft

...Technology help Criminals Commit Identity Theft? Identity theft is becoming one of the fastest growing criminal offenses in the United States. Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name (Kiesbye). It is important for one to know that identity theft is not just a financial crime. It is a serious crime that can cause havoc on finances, credit history, and reputation. Identity theft can go unnoticed and can take time, money, and patience to resolve. Technology is constantly evolving making identity theft an easier crime to commit (Kiesbye). There are several ways in which technology plays a major role in assisting criminals commit identity theft (Knight Ridder/Tribune Business News). Some ways include computer hacking, telephone bugging, and old-fashioned stealing. Identity theft has become a very serious business for criminals (Knight Ridder/Tribune Business News). . Identity theft has been around for a number of years. The term identity theft was coined in 1964 however it does not mean to steal an identity but rather to impersonate another individual to commit fraud or deception (Vacca). Identity theft is not easily detectable by the individuals. Someone can steal or misappropriate personal information without the individual knowing then commit identity theft using the stolen......

Words: 1341 - Pages: 6

Identity Theft

...Identity is yours and only yours “But he that filches from me my good name/Robs me of what not enriches him and makes me poor indeed” --- Shakespeare Crimes are not always on the rise; with tough and stringent laws and hard work of excellent law enforcement agencies the rate of crime can always be controlled. For example the crime rate in the New York City went down considerably in the beginning of this decade, with the introduction of new policies by the new government. There is one type of crime, which has consistently grown every year in the last decade, and also has been the fastest growing crime. It is a neither gun crimes nor the use and abuse of certain drug; it is identity theft. When searched for fastest growing crime on google.com the unanimous answer turned out to be identity theft. This crime basically proves that there is no doubt in the fact that there is something going wrong when dealing with identity theft. It seems like there is a piece of the puzzle which is missing. The main focus of this paper is to put some light on the issues concerning with identity theft, how it takes place in various manners and what are the current laws in place to act against identity theft. The role of credit card companies to deal with identity theft is also mentioned. Identity theft and identity fraud are words used to refer to all degrees of crime in which someone wrong fully acquires and exploit individual private information in numerous ways that engage scam or......

Words: 1086 - Pages: 5

Identity Theft and Protection of Ppi

...Identity theft is one of the fastest growing crimes in the United States. From empty bank accounts to ruined credit reports, there are numerous ways that an identity thief could hurt you. While identity theft is not new, the advent of the internet has given thieves new ways of using your personal data as their own for their benefit. According to Javelin Strategy and Research (2014), in 2013, over l3 million people were victims of some type of identity fraud. This showed an increase of more than half of a million people becoming victims. Considering the fact that more and more of our lives involve the internet through social media, online banking, and online shopping, it is up to us to protect ourselves while using online resources so that our information stays safe. Identity theft occurs when thieves use a victim’s personal or financial information to obtain money from the victim. This can happen in multiple ways. One of the more common ways criminals can steal your identity is by sending phishing emails. These emails pose as a retailer or bank and ask you for personal information such as your username and password or credit card information. Some emails provide a link that redirects the user to a fake login page. When the victim enters their information, it is captured and used to take over the victim’s online banking page or Amazon account. To prevent this, it is important for people to recognize the stop signs of a fraudulent email. Firstly, be wary of any email that......

Words: 1277 - Pages: 6

Credit Protection and Identity Theft

...University of Phoenix Material Credit Protection and Identity Theft Directions Refer to: • Free Credit Report on the Federal Trade Commission’s site. • Identity Theft resource center on the Federal Trade Commission’s site. Provide answers to three of the following questions based on your readings and your personal experiences. Answers should be 100-to 150-words each. 1. If you find errors on your credit report, what steps would you take to correct them? If someone was to find errors on their credit report there are a few steps they can take to correct them. One step is contact the credit reporting company in writing, and let them know what you feel is inaccurate on your credit report. Another is you can contact the creditor that gave the credit reporting company that information in writing so they can fix it. Writing these companies will take about 30 days max for them to fix it, unless they feel it is urgent. You can also ask them to contact anyone who has viewed your credit report in the past and fix the error on their end, but that will cost you a fee. Another way is to contact them by phone, or you are able to go on the credit reporting website and dispute it there as well. 2. There are many organizations that claim they will repair your credit for a fee. From your readings, should someone use a credit repair service? Why or why not? What are some actions these organizations can take that should be a red flag? I do not think people......

Words: 690 - Pages: 3

Identity Theft

...Aug 26, 2013 Research Paper: Identity Theft Identity theft, also known as ID theft is a crime in which a criminal obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to pretend to be someone else. The information can be used to obtain credit, merchandise, and services using the victims’ name. Identity theft can also provide a thief with false credentials for immigration or other applications. One of the biggest problems with identity theft is that very often the crimes committed by the identity theft expert are often credited to the victim. A thief could take out a mortgage in your name or commit a crime and pretend to be you when caught. Thieves can even use your personal information to apply for a job or use your medical insurance. Identity theft has become one of the world’s leading crimes in the world. Identity theft drastically increased in the year 2000 by nearly 52%, occurring every half second all across the world. There are two primary types of identity theft: ~Account takeover ~True name theft Account takeover identity theft refers to the type of situation where an imposter uses the stolen personal information to gain access to the person’s existing accounts. Often the identity thief will use the stolen identity to run up current credit lines, by changing your address so that you never see the credit card bills that the thief constantly runs up. True name identity theft means that the thief uses......

Words: 485 - Pages: 2

Identity Theft

...Identity Theft I know three people who have been affected by identity theft in the past. They were forced to deal with the hassle of clearing and repairing their good names and financial reputations. According to my research, there was a new victim of identity theft in the U.S. every two seconds within the last year and over 9 million Americans reported that their identity had been stolen (Rogers, 2014). The primary complaint on the Federal Trade Commission’s list of top consumer complaints is identity theft (Trowbridge, 2014). This crime has gone from actions like rooting through a person’s trash and stealing their mail to confidence scams to gain access to personal information. With the possibilities that are provided by the internet criminals are capable of gaining access to and stealing personal information from a larger pool of prospective victims from all across the world. What is Identity Theft? According to Merriam-Webster, identity theft is “the illegal use of someone else's personal information (as a Social Security number) especially in order to obtain money or credit” (Merriam-Webster, 2014). Some of the items that a person would utilize to steal another person’s identity are Social Security Numbers, driver's license numbers or their date of birth just to name a few of the pieces of information. The thief can take this information and use it to obtain things such as credit cards, bank accounts, auto loans, and home mortgages in the victim’s name. ......

Words: 1134 - Pages: 5

Identity Theft

...Identity Theft James Middleton AIU Online   Abstract In this paper we will discuss identity theft. What is identity theft, what are some of the more common ways that people have become victims to identity theft? We will discuss how the law has changed and what the law has accomplished. Also how the law now protects the victim.   Identity Theft What is identity theft; which is often referred to as identity fraud, which refers to all types id crime involving someone wrongfully obtain and uses another person’s personal data in some way that involves deception (findlaw.com, n.d.). By definition of the Identity Theft & Assumption Deterrence Act (ITAD) of 1998, specified that it is a federal crime to knowing transfer or use without lawful authority, a means of identification of another person with the intent to commit, or to aid or abed any unlawful activity that constitutes a violation of Federal law, or constitutes a felony under any applicable state or local law (OVC, 2010). If a person steals another person’s identity but does not cause any monetary damage has a crime been committed? I would have to say yes, based on the definition of the ITAD Act. You transfer or use another person’s identity with the intent to commit a crime and you are caught; yes it is a crime. The most common ways to commit identity theft, is either to listen to someone’s conversation while they are giving out a credit card number over the phone, by “dumpster diving” when they can......

Words: 825 - Pages: 4

Identity Theft

... The Two Mrs. Jane Does Diana Sours DeVry University The Two Mrs. Jane Does Identity theft, it can and will catch you off guard if you are not careful with your information, and it can have a devastating effect. “Another pre-screened credit offer?” thought Mrs. Jane Doe, as she walked back up to her house from checking her mail. She quickly realized that was not the case at all, as she opened the “offer” from Visa. Instead, what she was staring at was a bill addressed to her, that she had no recollection of making. She was now faced with the probability of being a victim of identity theft. Identity theft, in short, is using someone else’s personal information for one’s own financial gain. Identity theft laws need to be improved because this crime costs businesses money, costs credit card companies money, and financially hurts ordinary consumers. In 2006, “U.S. companies average identity theft-related costs of $182 per compromised record. While that figure averaged $660,000 per company in notification expenses and indirect costs, the total estimate, including lost business, tops $2.5 million. This staggering amount also includes costs and fees associated with legal expenses, fines, investigation, auditing, class action litigation, public relations damage control, and setting up monitoring, remediation practices, and a dedicated customer support phone number.” (Identitytheft.lifetips.com, 2014) Some of this cost is passed along to the credit card companies in the form of......

Words: 855 - Pages: 4

Identity Theft

...Identity Theft: Fastest Growing Crime Tracy A. Baggett DeVry University Keller Graduate School of Management Identity Theft; Fastest Growing Crime Imagine waking up to news that you had accumulated hundreds of thousands in debt after someone used your identity for unauthorized purchases. This is exactly what happened to John Harrison, a Connecticut salesman. Jerry Phillips, the twenty year old who stole John Harrison’s identity went on a shopping spree that included purchases to Home Depot, JC Penny, Sears, Lowes and even bought two cars from Ford, a Kawasaki and a Harley. In just four months Jerry Phillips was able to accumulate $ 265,000 in purchases. Jerry Phillips was later arrested and imprisoned for three years. He even went as far as to apologize to John Harrison saying, “Sorry. You know, I wish I could make it up to you.” John Harrison felt that the nightmare was over with the criminal behind bars and even verbally acknowledging his regret over the crime. But despite all of this and a letter from the Justice Department confirming that John Harrison was a victim, he still found himself owing $140,000 to different creditors. How about waking up in the middle of the night realizing that federal agents just entered your home with guns pointed certainly qualifies as one of the most horrifying ordeals in anyone’s life. This is exactly what happened to Carlos Gomez, a UPS driver accused of being involved in a million dollar money laundering operation headed by a......

Words: 3754 - Pages: 16

Identity Theft

...Abstract The Federal Trade Commission considers identity theft to be the fastest growing crime in the country. The Internet has become a hot zone for attracting identity theft thieves to steal personal information. Identity theft is divided into four basic areas – financial identity theft, criminal identity theft, identity cloning and business and commercial identity theft. Criminals obtain our personal information through methods such as using an insider, dumpster diving, computer hacking, war driving, phishing and pre-texting. The Department of Justice prosecutes identity theft under federal statutes. Congress passed the Identity Theft and Assumption Deterrence Act, Title 18 United States Code 1028 in 1998. One of the most noted identity theft cases was USA v. Cummings. The largest hacking and identity theft case ever prosecuted by the Department of Justice involved eleven people who stole more than forty million credit and debit card numbers. To severely curtail on identity theft, President Bush mandated Executive Order 13402 called the Identity Theft Task Force. Identity theft causes immeasurable damage to peoples’ names and reputations. Greater awareness and education will help us to combat identity theft. Identity Theft It’s a nightmare that can leave an unsuspecting person feeling violated and vulnerable. It doesn’t care who you are or where you live. Gender, race and age are totally irrelevant. In this modern technological age, it is a crime that can......

Words: 2466 - Pages: 10

Identity Theft

...Identity Theft + Fraud= Identity Crime 20 December 2007 There is a thief that lurks around us everyday; this thief can attack in brad day light or in the darkest hour, and just about anywhere you may find yourself. This thief has the power to act in your name, make unlimited purchases, open up credit accounts and ruin your good name and credit all in the matter of seconds; if you are vulnerable enough, you might become his next victim. In many cases all he needs is your name and a social security number, and he has enough information to make you his next victim; if you don’t believe me then ask the millions of Americans that became victim’s, or just ask me. The thief that I am talking about is identity theft. Identity theft is a crime that is affecting many Americans, the costs are well in the millions every year, but with a little bit of knowledge and adaptive common practices, you can help fight back and minimize your chances of becoming the next victim of Identity theft. Identity theft is as predictable as a giant storm; you really don’t know what the damage will be until it passes and many victims don’t even see it coming until its already too late. So what is identity theft? According to the webpage article “about identity theft,” the Federal Trade Commission (FTC) (2007) writes that “identity theft occurs when someone uses your personal identifying information, like your name, SSN… without your permission to commit fraud or other crimes.” (para 1) All it takes...

Words: 3405 - Pages: 14