Identity theft is a term used to describe all types of crimes where one wrongfully obtains and uses the personal data of another person for fraudulent purposes. This is done mainly for economic gain. According to The Federal Trade Commission (FTC) identity theft is "when someone…
Personal data like Social security number, credit card number, bank account, etc. are not unique like for instance fingerprints and can be misused when they fall into the wrong hands. In the United States many people have suffered huge losses on account of unauthorized persons withdrawing funds from their bank or financial accounts and very often these persons who have stolen the identity have committed crimes and run huge debts using the victim’s identity. In short a criminal can use an individual’s identity to commit a wide range of crimes such as fraudulent withdrawal of money from banks, apply for credit cards and loans, fraudulent use of telephone calling cards, or buy goods or services which might not have been possible if the criminal had used his name
hurry respond to "spam" or unsolicited email that request identifying data in the pretext of offering some benefits. Here people do not realize that in many of such cases the person who has requested for personal information has no intention of passing on any benefit to them. However Internet is not the only source. Misplaced or stolen wallets containing credit cards or other personal information, stolen laptops again containing personal data can prove easy targets for identity thefts. To prevent any kind of fraudulent use of one’s identity one must have a security policy and certain guidelines in place about what personal information should not be given to third parties especially through electronic means like the email. The guidelines to be followed are: 1) There should be no personal or financial details in any of the emails sent. 2) Open only those mails that have come from known persons or trusted parties. 3) All suspicious mails should be reported to the concerned authorities. 4) Online passwords must be changed frequently and passwords that can be easily be hacked, such as those related to birthdays and ...
Cite this document
(“Identity theft Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Retrieved from https://studentshare.net/miscellaneous/385047-identity-theft
(Identity Theft Essay Example | Topics and Well Written Essays - 2500 Words)
“Identity Theft Essay Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.net/miscellaneous/385047-identity-theft.
The ITRC portal defines identity theft broadly as follows:-“It is a crime in which an impostor obtains key pieces of personal identifying information such as social security numbers and bank account information and uses them for their own personal gain.
It has become pertinent for people and organizations to display their identity information in a more sensible and restricted manner so as to avoid an unwanted situation in which someone else wrongly benefits from their identity information. As the online social media has expanded, likewise, the identity theft crimes have increased manifold.
One of these innovative ideas that has become quite popular in recent years involves the stealing of another person’s identity. Identity theft involves the use of another individual’s personal information to gain access to financial and other information that would benefit the criminal.
Identity theft can be broadly categorized as Financial Fraud and Criminal Activities. The most common forms of identity theft for Financial Fraud occur when someone obtains another person's social security number, driver's license number, date of birth, and the like and uses it to open a fraudulent bank, credit card, cellular telephone, or other account, or to obtain false loans.
The key words: identity theft, victimization, response.
Identity theft has been a problem for years, and has become one of the fastest growing crimes in the nation. Identity theft is when someone uses your name, social
The more efficiently and expediently computers and the Internet that connects them process and exchange information for the benefit of the consumer and the corporation, the more ways there are to illegally obtain that information and use it for various nefarious ends.