Identity thieves often use simple techniques to acquire personal information, such as Dumpster diving, plundering trash bags, and stealing mail from mailboxes to obtain paper records with identifying …show more content…
Some Internet users recklessly reply to unsolicited email that promises money or prizes, but requires the individual to provide identifying data, such as name and address and checking account or credit card numbers with the expiration date and security code, which can allow full-blown identity theft.
Identity theft, on a much larger scale, is committed through the use of high technology. This identity theft depends on legal and economic identity in contemporary society that is largely “virtual.” This theft depends on access to consumer data through the Internet, such as files that are the property of a credit card payment processing company.
Identity theft is a pervasive crime that requires cooperation among law enforcement agencies, the federal and state government, and citizens to develop a comprehensive and effective response. To reduce the impact of identity theft, an effective national strategy would …show more content…
Individuals must be diligent to protect all personal information and quickly report identity theft to involved businesses and law enforcement authorities. Individuals frequently should check bank accounts and credit card accounts and statements, and promptly report to the bank or credit card companies any unauthorized transactions. Call the credit reporting agencies to place a fraud alert on your credit report if you suspect an illegal use of your personal