Free Essay

Protection Against Identity Theft

In:

Submitted By jriddle11
Words 1008
Pages 5
Protection Against Identity Theft

Identity theft is a crime that can easily ruin one’s life and cause extreme suffering and loss. Criminals have been using other people’s identity since the beginning of time to commit crimes, achieve financial gain, and for many other illegal purposes. Since the rise in the popularity of the Internet, identity theft has also been on the rise. “Approximately 15 million United States residents have their identities used fraudulently each year with financial losses totaling upwards of $50 billion.” (Douglas, 2012) By securing someone else’s personally identifiable information (PII), a criminal with enough knowledge about the Internet could illegally gain access to medical records, bank accounts, and many other aspects of the unknowing victim’s life. This is why protecting one’s personally identifiable information is paramount in avoiding identity theft. There are many methods criminals can use to acquire PII but there are many ways one can protect their information as well. It is easier to protect PII by practicing several simple habits rather than forfeiting time, effort, and potentially large sums of money after one’s identity has been compromised. The United States Department of Justice suggests several easy tips to help avoid becoming a victim of identity theft. Individuals should be stingy about releasing their PII to anyone they do not know or trust. (Identity Theft And Identity Fraud, 2014) It is common to receive phone calls or emails that are offering the sale of a product, donations, or credit card offers. Many of these calls or emails are legitimate and there is no danger involved, but it is important to remain vigilant when placed in these situations. Criminals who are phishing will often use techniques to secure an individual’s PII while posing as a legitimate organization. Many times the victims in these situations are completely unaware their information has been compromised until it is too late. Maintaining awareness of financial information on a regular basis is another easy way to protect against identity theft. (Identity Theft And Identity Fraud, 2014) By staying on top of all transactions, investments, and all financial activity, an individual will be aware if something out of the ordinary is happening. Reviewing bank account and credit card statements is one of the simplest and quickest way to identify if something is not right. There are many times these statements are thrown out after only a quick glance which could have potentially saved that individual from being a victim of identity theft. If a criminal has obtained an individual’s bank account information and is only taking out very small amounts over a long period of time it will be extremely difficult to catch this action if the statements are not reviewed regularly. If erroneous activity is recognized soon enough it will be easier for financial institutions to rectify and will be less impactful on the victim. Individuals should also review their credit report on a regular basis. There is a possibility that a criminal who has accessed an individual’s PII has opened numerous accounts using that victim’s information. Reviewing a credit report very well might be the only way to discover these criminal actions. Often times in these situations individuals are unaware of numerous accounts being opened in their name and by the time they find out the damage far exceeds what it would have been with a little diligence on their part. With so many individuals and businesses being vulnerable to attacks from identity thieves there has been a massive increase in the products and services offered by identity protection companies. Companies such as LifeLock offer services to safeguard your information, finances, credit, and other valuable information from criminals seeking to commit identity theft. (Protecting Your Identity, 2014) These services provide individuals with identity protection but most of all with a peace of mind their information is protected. Even with all the advances in technology and awareness of the need to protect one’s identity, the criminals committing these offenses have many techniques and schemes to acquire information. Criminals use phishing, spoofing, pharming, and many other advanced techniques to gain access to unassuming, innocent victim’s information. It is important to use multiple resources that are available in protecting one’s identity. Although an individual might be using the products and services of a company such as LifeLock, they should remain vigilant and continue to use good habits as well. In conclusion, identity theft is a very disruptive and potentially dangerous crime that is committed against many people each and every day. The tricks and techniques used by these criminals are sometimes intricately planned and carried out. Once an individual’s personally identifiable information falls into the wrong hands it can spell great disaster if not recognized and rectified promptly. Numerous accounts could be opened using the stolen information to include credit card accounts, checking and savings accounts, real estate purchases, and home mortgages just to name a few. This could very easily ruin a victim’s life and require them to spend their time, effort, and potentially a large amount of money to regain their credit standing and good name. (Douglas, 2012) There are several simple habits one can use to protect themselves as well as the products and services of companies such as LifeLock. Most importantly, it is every individual’s responsibility to maintain a vigilant stance when it comes to deterring identity thieves and protecting their own information.
References

Douglas, R. (2012). Identity Theft Victim Statistics. Retrieved from www.identitytheft.info.
Identity Theft And Identity Fraud. (2014). Retrieved from www.justice.gov.
Protecting Your Identity. (2014). Retrieved from www.lifelock.com.

--------------------------------------------
[ 1 ]. Personally Identifiable Information (PII) – information that can be used on its own or with other information to identify, contact, or locate a single person. Example: Social Security Number, Date of Birth, and Name.
[ 2 ]. Phishing – Using trusted institutional names to elicit PII
[ 3 ]. Spoofing – Forgery of an email sender’s name that leads you to believe it is from a trusted source
[ 4 ]. Pharming – The act of placing malicious software on a victim’s computer that redirects them to a phony website

Similar Documents

Free Essay

Identity Theft

...Identity Theft Identity theft is one of the fastest growing crimes in the United States. Every minute about nine people have their identity stolen. (Identity Theft and Identity Fraud, 2013). Identity theft can happen to anyone at any time. A consumer can protect themselves without having to purchase a protection program. Protection programs are available to help consumers protect their identity. An identity theft program isn’t the best protection against identity theft. There are a number of protection plan companies a consumer can choose from. Each company has their own plans to choose from and each have different rates. A consumer can review the ratings of each company also. When a consumer has a protection program there are some advantages. These programs review the client’s credit reports with credit monitoring. When a consumer purchases a protection program, fraud insurance is granted to the consumer. This insurance covers a few areas. The insurance will cover all legal services endured by the consumer, it covers all out-of-pocket services that the consumer pays out, and some of the companies offer a private investigator and assigns them to help with the claim. There are a number of disadvantages to having a protection program. These programs will not prevent identity theft. In order for a consumer to get a protection plan, they must pay a monthly/yearly fee for the program. If a consumer’s identity is stolen, the consumer will not be reimbursed for any money that has...

Words: 545 - Pages: 3

Free Essay

The Threat of Fraud

...The Threat of Fraud Tracey Brewer American InterContinental University Security and Loss Prevention CRJS270-1301B-01 Jade Pumphrey March 28, 2013 Abstract Identity theft, whether on a personal or business level is a criminal act. So, for many years individuals have plotted and schemed to come up with scams to obtain personal information from other individuals or organization to either sabotage one’s reputation or obtain financial gain. Either way, this wave of criminal activity is wreaking havoc to innocent people and successful organizations everywhere. The Threat of Fraud Introduction Corporate fraud and executive identity theft are crimes that are on the rise. I don’t think corporations understand the impact this crime can have on their business. It only takes a few measures to ensure that the company is protecting against someone being able to access information that could bring the entire corporation to the ground. It can takes years to establish credit, build clientele and provide a service to the country or a community, however, it can only take the click of a mouse, that one email attachment or that one dishonest employee and your entire businesses financial data has been obtained, used or sold for the sole purpose of financial gain. Therefore, to protection your organization’s personal information. Well, it’s time to get the facts, take the necessary precautions, and start the process for what could be the first steps in protecting your organization...

Words: 1599 - Pages: 7

Free Essay

Protective Identity Theft Measures

...Easy Measures for Increasing Identity Theft Protection Introduction Imagine getting ready to purchase a home. Your family has outgrown the house you are currently living in, and a bigger home would be a perfect fit for your family. Since you have owned your home for many years and made your payments on time (along with your other bills), you feel applying for a home loan will be easy. With banks offering lower interest rates and trying to obtain business from customers, now is the time (you feel) to apply for a home loan. You walk into the bank and meet with the local loan officer. After explaining your financial and work situation, the loan officer provides an interest rate and term on a home loan. You find the home loan favorable and wish to proceed with the home loan. The loan officer is happy to proceed and explains that a credit report will need to be pulled. You agree to have your credit report pulled, as you feel your credit score is in good shape. The loan officer pulls your credit report and you see a look of concern come across his face. The loan officer prints your credit report and proceeds to tell you that due to your high debt, failure to make payments, and low credit score; the bank cannot offer you a loan. You now have this look of horror on your face as you do not know how you have late payments, your debt is high, and your credit score is low. You ask to see your credit report. When you review the credit report, you realize these unpaid, high-balance...

Words: 3176 - Pages: 13

Premium Essay

Identity Theft and Fraud

...Ricardo Hernandez SS3150 ITT Holly Hale-Hang, MAEd March 5, 2014 One person should also carry a current amount of credit card in there wallet, everything else should put inside a safe. Always monitor the bank statement and etc. Checking the mail for missing account statements is another way to protect from identity theft and fraud. If someone going on vacation that person should ask the post office to hold all their mail until that person came back, to prevent identity theft and frauds. People should invest in a shredder to shred unwanted information. Use a secure website to access information, never enclose personal information by the phone. Check bank statement and credit card statement very careful each month to see any unwanted purchase. If that person sees any unwanted purchase notices their credit card immediately. Thesis: One day you receive a call from your bank, stating you had just made a purchase for a random estimate of 5,000 dollars. But you did not go on a shopping spree. Your identity just has stolen. How secure is your identity? Do you ever wonder about your identity? Ways to prevent/protect yourself from identity theft and frauds. I. One thing you should be aware about is your bank account. A. Once your ATM has been compromises change your pin right away. B. Get new ATM cards if it has been compromised. C. Contact the bank if you see any suspense in your bank account. I. Another way is keeping your social security secure in a...

Words: 2515 - Pages: 11

Premium Essay

Internet Fraud: an Overview of Classifications, Government Actions, and Consumer Protection

...Consumer Protection December 14, 2006 Internet Fraud: An Overview of Classifications, Governmental Actions, and Consumer Protection Internet fraud is an increasing threat to our technological society, which thrives on the advances and benefits of the Internet and e-commerce. With the increased growth and dependence of the Internet, creative individuals have found ways of conveying fraudulent schemes as legitimate goods and services. Not only does Internet fraud cause harm to individuals and institutions, but it also damages the consumer confidence of valid Internet businesses and e-commerce. There are many forms of Internet fraud which Internet patrons need to be aware of and cognizant of. This paper will explore major classifications of Internet fraud, provide information on how to deal with Internet fraud, relay actions taken by the government to thwart Internet fraud and prosecution thereof, and also take a detailed look into one type of Internet fraud especially, identity theft. According to the Department of Justice (http://www.usdoj.gov/criminal/fraud/text/Internet.htm), Internet fraud is any type of criminal scheme that uses one or more components of the Internet to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions or to transmit the proceeds of fraud to financial institutions. Major types include; online action and retail scams, business opportunities or work-at-home scams, investment schemes, phishing, and identity theft...

Words: 3658 - Pages: 15

Premium Essay

Identity Theft

...Aug 26, 2013 Research Paper: Identity Theft Identity theft, also known as ID theft is a crime in which a criminal obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to pretend to be someone else. The information can be used to obtain credit, merchandise, and services using the victims’ name. Identity theft can also provide a thief with false credentials for immigration or other applications. One of the biggest problems with identity theft is that very often the crimes committed by the identity theft expert are often credited to the victim. A thief could take out a mortgage in your name or commit a crime and pretend to be you when caught. Thieves can even use your personal information to apply for a job or use your medical insurance. Identity theft has become one of the world’s leading crimes in the world. Identity theft drastically increased in the year 2000 by nearly 52%, occurring every half second all across the world. There are two primary types of identity theft: ~Account takeover ~True name theft Account takeover identity theft refers to the type of situation where an imposter uses the stolen personal information to gain access to the person’s existing accounts. Often the identity thief will use the stolen identity to run up current credit lines, by changing your address so that you never see the credit card bills that the thief constantly runs up. True name identity theft means that the thief uses personal...

Words: 485 - Pages: 2

Premium Essay

How Identity Theft Affect the Culture of Our Society

...How Identity Theft Affect the Culture of our Society Sections I, II, III and IV Rodrekus Baskin DeVry University How Identity Fraud and Theft Impact the Culture of Our Society Section I Identity theft affects millions of Americans every day. Scam artists and hackers lay in wait for an unsuspecting person to get caught up their scheme through ignorance or naivety so they can take full advantage of their personal information to do as they desire with it. Problem is, it infiltrates and depreciates the integral infrastructure of our society which creates a cultural lapse through the declination of economic and cultural growth and double jeopardizes an already unstable system to the brink of its destruction. To understand how identity theft works or happens, one need to know and understand what identity theft is, the different forms of identity theft, cyber security and the impact on its victims, the methods used by identity thieves to obtain identifying information about their victims, and preventive solutions. How Identity Theft Affect the Culture of Our Society A single mother looking forward to advancing her financial situation comes across what appears to be the opportunity she has been waiting for. A real estate agent has provided her with the fortune of owning her own home and without skepticism of any impending dangers or foul play, even though he displayed what appeared to be proper credentials, she relinquished all of her personal data...

Words: 5785 - Pages: 24

Free Essay

Idenitty Theft

...been a victim of identity theft. What is identity theft you ask? It is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. According to the national association of the attorneys general, “Identity theft is one of the fastest growing crimes in the nation with an estimated 700,000 victims each year and after the victim discovers their theft, they spend an average of 808 dollars to clear up the discrepancies along with 175 hours approx. Restoring their reputation by means of notifying the credit bureaus, cancelling cards, and negotiating with creditors (2006.) Currently those numbers are now even higher at 1,495 dollars in expenses and 609 hours to clean up credit”. Identity theft happens all the time. This is partly caused because of who you trust and what you put on the internet. In the paragraphs to come we will get into the types and stages of identity theft, who it affects and how you can protect yourself. According to the NIJ (National Institute of Justice), there are seven broad types of identity theft and three stages. The Seven stages are exploiting weakness in specific technologies and information system, financial scams, a motive for other crimes, facilitating other crimes, avoiding arrest, repeat victimization (“classic” identity theft), and organized identity theft. The three stages...

Words: 1118 - Pages: 5

Premium Essay

Information Privacy

...protect the personal data, information privacy can be applied in various ways like encrypting the data, data masking and authentication by which only the people who are legitimate users can have access to the private data of the organization with authorized access. Using these measures, the personal information can be protected from illegal and unauthorized access and also prevent data mining (Bergstein, Brian , 2004; Swartz, Nikki, 2006) which otherwise is illegal in many parts of the world. As we know that in today’s world, the information technology sector is changing very rapidly, where location tracking is becoming a norm and smart phones that are becoming even smarter. Thus an attempt is being made by the officials to make sure that protection of private data and its privacy is not forgotten and also the attempts are capable to cope up with the new advances in technology. The main issue is that any rule that has been implemented to safeguard the data now can become outdated quickly due to change in technology. The analysis trend and information technology’s impact including issues related to security of...

Words: 1338 - Pages: 6

Premium Essay

Identity Theft Research Paper

...The Inside Key Of Identity theft And What You Must Do To Secure Yourself Identity theft is the use of other's details or identity without authorization. Under the Fair Credit Confirming Act, identity theft is determined as "the use or tried use of an account or determining details without the owner's authorization." The 1998 identity theft and Supposition Prohibition Act also explains "identity theft" as "knowingly exchanges or uses, without legal power, a indicates of identity of another person with the purpose to commit, or to aid or abet, any illegal activity that is really a breach of Federal law, or that is really a criminal activity under any proper Condition or local law. Information Convenience & Protection Actual physical identity...

Words: 1226 - Pages: 5

Free Essay

Identity Theft

...Identity Theft: Fastest Growing Crime Tracy A. Baggett DeVry University Keller Graduate School of Management Identity Theft; Fastest Growing Crime Imagine waking up to news that you had accumulated hundreds of thousands in debt after someone used your identity for unauthorized purchases. This is exactly what happened to John Harrison, a Connecticut salesman. Jerry Phillips, the twenty year old who stole John Harrison’s identity went on a shopping spree that included purchases to Home Depot, JC Penny, Sears, Lowes and even bought two cars from Ford, a Kawasaki and a Harley. In just four months Jerry Phillips was able to accumulate $ 265,000 in purchases. Jerry Phillips was later arrested and imprisoned for three years. He even went as far as to apologize to John Harrison saying, “Sorry. You know, I wish I could make it up to you.” John Harrison felt that the nightmare was over with the criminal behind bars and even verbally acknowledging his regret over the crime. But despite all of this and a letter from the Justice Department confirming that John Harrison was a victim, he still found himself owing $140,000 to different creditors. How about waking up in the middle of the night realizing that federal agents just entered your home with guns pointed certainly qualifies as one of the most horrifying ordeals in anyone’s life. This is exactly what happened to Carlos Gomez, a UPS driver accused of being involved in a million dollar money laundering operation headed by a Wachovia...

Words: 3754 - Pages: 16

Free Essay

Avoiding Identity Theft

...Avoiding Identity Theft Gary Lee Kaplan University CM 220 Kelley Gordon Avoiding Identity Theft Ben Franklin once said “An ounce of prevention is worth a pound of cure” Well this has never been truer than in today’s hi-tech society where our personal information flows freely over the internet. Identity theft has become a wide-spread crime committed by thieves who use stolen personal information to commit various types of fraud. Simply put, identity theft is a crime that takes your personal information and uses it to open unauthorized accounts, make purchases and acquire loans without the victim’s knowledge. So in order to protect against identity theft citizens should understand how identity thieves work, guard their personal information, and learn what measures to take if this does happen to them. No one is safe from identity theft but the elderly are especially vulnerable. Americans over the age of 60 are the fastest growing segment of computer and Internet users today. And according to the FBI, they are also the targets of identity theft more often than anyone else (FBI, 2011). Identity thieves target senior citizens because they don't regularly check credit-card statements, review credit reports or monitor their bank statements. Identity theft can be broken down into two separate categories (Identity Theft & Identity Fraud) since it is actually a two part crime. Identity theft is the actual act of obtaining personal information...

Words: 1963 - Pages: 8

Free Essay

Identity Theft: Perspectives on How to Mitigate the Damage

...Identity Theft: Perspectives on How to Mitigate the Damage Introduction Identity theft is defined as an incident where someone “knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, or in connection with, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law. “Identity theft is the most rapidly rising type of fraud in the United States” (Finklea, 2009). One may have their identity stolen from them without even knowing so. This is because it is not necessary to make physical contact, or even make an acquaintance with a victim before assuming their identity. The crime of identity theft may be committed in a number of different ways, most commonly by obtaining personal information from non-secure websites. These actions will not only cause hardship for the victim, who will more than likely have money stolen from them; but it will also have an effect on an entire nation’s economy. “In 2004 one in every twenty-three adult Americans were victims of identity theft, resulting in costs of over $50 billion.” (Hazelah, Ismail, & Hashim, 2011). There are ways to fight identity theft and different nations take different approaches in order to defend against this offense. American Perspective In the United States, insurance companies such as American International Group have established policies to cover...

Words: 972 - Pages: 4

Premium Essay

Comm/156 Research Essay

...For 22 years, John Doe assumed the identity of a man whose wallet was stolen from his car in 1989. This form of identity theft will change over time to evolve to possibly affect any one who accesses the World Wide Web. Even though crime exists in the real world equally as it is online, The Internet is solely responsible for most of the Identity theft crimes. Crime exists in the real world equally as it is online. As much as we hate crime it is something that we have to live with. It is a constant battle that we must fight against all types of different criminal threats. Now with technology advancing so rapidly, crime has found a new home. This new home is the Internet, criminals now target individuals online in ways that is harming our society even more. The most popular committed crime in the United States would be violent crimes, rather murder, rape, assault are rated as the highest committed. The FBI states that total number of crimes reported— 10,329,135 (1,246,248 violent crimes and 9,082,887 property crimes). Most of the real horrible crimes do happen in real life but over time online has just as many threats. Online crime is tricky criminals can invade your home, your business, your office, without breaking any door or windows. They can have instant access to your social security number that they can sell on the black market. They can have access to your personal information, banking information, and...

Words: 823 - Pages: 4

Premium Essay

Identity Theft in Online Business

....1 2. Theory and Concept……………………………………………………….…. .3 3. Key Findings……………………………………………………………………..4 3.1 Issues of Online Identity Theft …………………………………………...4 3.2 Trends of Online Identity Theft……………………………………………5 4. Case Study………………………………………………………………………..7 4.1 Background…………………………………………………………………..8 4.2 Analysis……………………………………………………………………….8 5. Recommendations and Conclusions……………………………………..…9 Executive Summary Identity theft make a lot of customers and organisations suffer serious loss both financially and emotionally. It is necessary to build acknowledge of identity theft to protect the interest of customers and organisations. This report finds the different methods and trends of identity theft and gives some advices for protection. A case study of TJX breach case shows the harm of identity theft in an organisation. 1. Introduction The internet technology has greatly changed the world in which human live since 1990s. Nowadays, internet has gone deep into people’s daily life and its high productivity, efficiency and convince make people deeply rely on it. Online business and social network have become the most important contributions of internet. As the growth of e-commerce and number of users of social networking websites, the target of identity theft has broadened. In e-commerce, identity theft threats not only the customers’ information and property safety but also the interest of corporate. On the social networking...

Words: 2731 - Pages: 11