Identity Theft Speech

Improved Essays
Today is my 16th birthday. I have saved every last penny for several months for the brand new IPad my parents refused to purchase for me. I go into Apple, pick out the rose gold 64GB IPad and prepare to purchase my hard earned gift. I start daydreaming about all the new apps and music I can now download, finally something that is mine. Until…a team member comes in and says the one word I was not expecting, DENIED. How could it be denied? I know I have enough for this item I’ve been tracking my pay cheque for months. After some time-consuming effort, I realised the only explanation for the insufficient funds is that I have been a victim of identity theft.

Identity theft and fraud both interchangeable terms refer to the crime in which someone
…show more content…
Yet the thieves know absolutely everything about them. Franklin a victim of identity theft described it as “This nauseous feeling of, what if I was going to be held responsible for these charges?” These thoughts are travelling through the mind of victims when faced with mysterious charges for items they did not purchase.

Imagine learning that you own a home somewhere across the country or that you owe thousands of dollars in income taxes for a job you’ve never held. If those scenarios seem unfathomable, they’re all too real for families whose children are victims of identity theft. In the unfortunate circumstance that any one of your identities is stolen it may go undetected for many years until a bank account is opened or you apply for a credit card. The damage from child identity theft can make it difficult in the future to obtain credit cards, car loans, or student loans.

Online fraudsters and thieves are out there and will continue to target, vilify and harass those who are naïve and unprotected. In order to minimise your risk of falling prone to Identity theft there are ways to protect and be more cautious to your surroundings, some include:
- Disregarding suspicious

Related Documents

  • Improved Essays

    In most cases victims are unaware that they are even victims until it is too late to do anything about the theft and there is already a multitude of debt built up in our name. There are so many different ways that identity theft is done these days that the best line of defense is to stay visitant and keep a journal of all expenditures, and check your credit reports regularly. In this chapter we learn that Staying alert to our credit monitoring is like setting a home alarm system (Kapoor, Dlabay, L, & Hughes, 2014). If when checking through financial records and credit reports if there is anything that seems peculiar or out of place immediately dispute and investigate to make sure if it is as simple as a billing error or in fact your identity has been compromised. If you do find that your identity has been stolen immediately report to the appropriate agencies (Kapoor, Dlabay, L, & Hughes, 2014).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Repercussions Of Crimes

    • 1460 Words
    • 6 Pages

    This week’s readings introduced many aspects of crime that touch closer to home. Many students may be reading this same textbook, though I expect that we relate to these topics differently, some grasp our attention more and others, standing to be more significant to our lives and fears. This week we were introduced to the economic repercussions of crimes along with the fear of knowing that some serial murders are so cunning that they simply seem to disappear. The reason many types of physical crimes are more feared for some individuals is the simple fact that it takes work to earn the things they chose to purchase.…

    • 1460 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Emr System Pros And Cons

    • 437 Words
    • 2 Pages

    Identity theft can occur when unauthorized people gain access to confidential and sensitive records. Data loss is a major…

    • 437 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Dr. Wallace introduces the speaker, the director of the core text reader, states that it is used to enhance what were learning in class. Dr. Brad Busbee starts off by saying that we can learn a lot from a pre-modern case of identity theft. The big questions we wrestle with is “who are we” and “how do we know who we are”. People today know know who they are and what they look like because we have mirrors and pictures.…

    • 376 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    After they’ve itemized every bill and have made payments to all they owe, they toss their bills and do not want to see them anymore. Bills may contain critical personal information such as their name, address, credit card and bank account numbers. After those bills are tossed, the information can get into the hands of dumpster diving perpetrators. Dumpster diving is exactly what is sounds like. “Dumpster diving occurs when someone goes through someone else’s garbage to obtain personal identifiable information off items found in the trash, such as credit card bills, utility bills, medical insurance, and bank statements” (Most Common Schemes, 2009).…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Identity Theft Case

    • 663 Words
    • 3 Pages

    INTRODUCTION: This case involves the suspects accessing the victim’s bank account, by unknown means and stealing US currency in violation of PC 530.5(a)-Identity Theft. LOCATION DESCRIPTION: This incident occurred at the Bank of America, located at 880 E. Colorado Boulevard. LOSS:…

    • 663 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    How SuccessfulIs Your Identity theft Protection? What is the ultimate effect of identity theft? If you become a sufferer of this white receiver criminal activity, your financial predicament are completely broken. It takes a lengthy time to recover from identity theft, especially if it took years before you learned about your regrettable situation. You should acquire the best id protection from theft because every responsible credit score holder should know how to avoid identity theft.…

    • 694 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Many people believe that they will never be a victim of identity fraud but everyone is vulnerable to it. Identity fraud is America’s fastest growing white collar crime. Identity fraud is a term used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. The most common forms of identity theft occur when someone obtains another person's social security number, driver's license number, date of birth, and the like and uses it to open a fraudulent bank, credit card, cellular telephone, or other account, or to obtain false loans. Identity theft started to become a very popular crime in the late 1990s because of the increase of computer use.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    You are buying milk from the grocery store. As you swipe your credit card, an ear-piercing beep sounds. You try again, but the same thing happens. The total was only $4.16, so you decide to just pay with cash but are still confused. A week later, you are at the airport getting ready to go to Paris.…

    • 474 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Persuasive Speech When you hear the term “Organized Crime”, what is some of the first thoughts that pop into your head? According to Calderón, “Organized crime” is briefly described as an illegal act committed in exchange for some kind of profit (Calderón, 2015, p. 52-53). Since organized crime affects citizens directly and indirectly, normally a topic that is skipped over when brought up in the news or discussion. By presenting information about the history, the wealth, the government’s view, and real life examples of organized crime, it will show the reader how big of an impact organized crime actually makes in society and everyone’s daily lives.…

    • 619 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Conformity Bias

    • 1015 Words
    • 5 Pages

    How times have changed as technologies, have evolved, so too have the tools that cyber attackers use to hack into businesses to access personal information. Fraud has always existed and has hardly changed, only the disguises it uses. In today’s world people, have been taught to push and strive for more and to continue to push for more. This new way of thinking has quickly developed into something uncontrollable. It has caused a new stream of fraud to emerge for it has created higher levels of greed, new methods to detection, as well as new ways to prevention.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Identity theft has been a growing situation. It is something that continues to grow and having many people being affected by having their identity stolen. Technology makes it easier for individuals to steal someone's identity and use it to their own advantage. It is important for people to take the right precautions and keep information secure to prevent any identity theft from occurring. Keeping Information Private…

    • 481 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    What is Kid ID Theft? Apparently, identity criminals grab a kid's Public Protection Variety and use this particular information in committing fraud against the kid's account. Lots of problems about identity robbery have been filed at the Federal Trade Commission every season and these problems were from consumers below 18 years old. Obviously, even children can suffer from bad record of credit score before he's old enough to apply for his own credit Protect Your…

    • 515 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Causes Of Robbery Essay

    • 832 Words
    • 4 Pages

    Many robbery crimes must be solved, but some crimes cannot identify if it is a robbery…

    • 832 Words
    • 4 Pages
    Improved Essays