Preventing Identity Theft Crimes

Improved Essays
Identity theft crimes are becoming more prevalent in today's society. More and more people are becoming victims, discovering that their personal and financial information is being used by someone else. Here are some simple steps on how you can prevent identity theft.

Tip #1: Keep your private information private.

Try to avoid giving out any of your personal/financial information as much as possible. Never reveal your social security number to anyone unless it's an absolute emergency or is truly required to carry out some function. Instead, only be willing to use the last four digits of your social security number as means of verifying who you are. Note that there are many companies who are already employing this method as means for identity
…show more content…
Moreover, make sure your bills actually arrive since many identity theft thieves are known to steal your mail in order to gain access to your personal information. It is also recommended to routinely order your credit reports. Note that the Federal Trade Commission launched a website (http://www.annualcreditreport.com) where all consumers can get a free copy of their credit reports. If you find any discrepancy on your credit report, inform the respective credit bureau immediately.

Tip#5: Make copies of your important personal and financial documents.

If your purse or wallet gets stolen, it's helpful to have copies of everything in it so you can quickly recall all the items that need to be cancelled. It's better though to not carry your social security card in your purse, and have your social security number memorized.

Tip#6: Be informed and updated on identity theft scams.

Being informed and updated on identity theft scams can help you avoid becoming a victim. Note that the internet is not the only place where thieves can steal your personal information. Thieves even install equipment in ATM machines that can steal ATM cards and pin numbers. It's better then to trust your instincts, check the card reader or just use ATM machines located in banks.

Article Source:

Related Documents

  • Improved Essays

    In most cases victims are unaware that they are even victims until it is too late to do anything about the theft and there is already a multitude of debt built up in our name. There are so many different ways that identity theft is done these days that the best line of defense is to stay visitant and keep a journal of all expenditures, and check your credit reports regularly. In this chapter we learn that Staying alert to our credit monitoring is like setting a home alarm system (Kapoor, Dlabay, L, & Hughes, 2014). If when checking through financial records and credit reports if there is anything that seems peculiar or out of place immediately dispute and investigate to make sure if it is as simple as a billing error or in fact your identity has been compromised. If you do find that your identity has been stolen immediately report to the appropriate agencies (Kapoor, Dlabay, L, & Hughes, 2014).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    Strengthen your passwords. Use random combinations of letters, numbers and special characters. Create different passwords for each account and change them frequently. 3. Check your credit reports.…

    • 264 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Against Wacky Waffles

    • 188 Words
    • 1 Pages

    I wanted to take the time to extend a thank you to all of Wacky Waffles' customers. Your loyalty has been much appreciated. Our customers have always been Wacky Waffle's first priority. For that reason we wanted to immediately let you know of a recent breach in security our company has experienced. Wacky Waffles' customer's credit card information along with transactions were stolen on Tuesday, October 13 at our Austin, Texas location.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Emr System Pros And Cons

    • 437 Words
    • 2 Pages

    Identity theft can occur when unauthorized people gain access to confidential and sensitive records. Data loss is a major…

    • 437 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Macy's Research Paper

    • 141 Words
    • 1 Pages

    Macy’s was a victim of hacking and sensitive information such as credit card numbers and personal information that belonged to customers has been compromised. This incident has been identified and actions were already taken in respect to this issue. At Macy’s there…

    • 141 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    The Michigan Incident Crime Reporting (MICR) Section has listed that Michigan’s auto thefts have risen 28% from 2015 to 2016. Reasons for current theft increases may include the following: 1. Anti-theft technologies have driven thieves to become more proficient in falsified paper crimes such as identity theft or false titles and documents used in the fraudulent purchases of an automobile. False identification is used in car rental companies where the thief acquires a vehicle and fails to return it. 2.…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Cyrusone: A Case Study

    • 812 Words
    • 4 Pages

    In a corporate environment, it is of utmost importance that unauthorized individuals are not allowed to access secure systems and networks. Passwords, fobs and PIN numbers can be shared to not only coworkers but people outside of the company that causes a huge security…

    • 812 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Identity Theft Schemes and Methods There are many different types of schemes and methods that identity…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Macbeth Security Analysis

    • 1281 Words
    • 6 Pages

    My individual sense of security had gone back up, but there was still a worry. The emails on her computer would come up to show her my charge to the card. Much like Macbeth, I found myself in situations where my security was going up and down, I had to keep making moves that could end up making the end result even worse. Macbeth and I end up in the same place, except i'm not dead. My mom found out about the purchase and I was set to make the payment back to her.…

    • 1281 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    What Has Technology Done to America Technology is improving every day. Making it easy to access different things on the Internet. Technology contains many private data bases that can be obtained through anybody. It also gives people access to do things, that shouldn’t be done. Technology has changed America in an unsatisfactory way.…

    • 687 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The nature of the inaccuracy is credit card fraud from multiple people. The person’s identity had been stolen, which caused this misuse of information. They became aware of the situation when the person received several phone calls from credit card companies threating her to pay her dues. She went to a lawyer to explain her situation and help her resolved her issue. An identity theft claim was established to correct the misinformation and to cancel any usage or approval of future credit cards.…

    • 278 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Target Fraud Case Study

    • 801 Words
    • 4 Pages

    Our visitors are dependably the main need. For additional confirmation, we will offer free credit checking administrations for everybody affected. We'll be in contact with you soon on how and where to get to the administration” (Steinhafel, 2013, para.…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “This automatically makes me feel more susceptible to being victimized again.” However, there are responsibilities for individuals as well. “Monitor your information, just because it looks like a purchase you would make, verify that you actually did make that purchase,” Haas said. “And you can also get a credit freeze.”…

    • 808 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Take a look in your wallet or purse .What items there could be the source of identity theft? How do you protect yourself…

    • 224 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Personal Identity Theft

    • 306 Words
    • 2 Pages

    Criminals are waiting to seize the opportunity to steal your personal information. As a victim, your life is turned upside down, leaving you with many questions and a dire need to find the answers. To begin with, you want to know who did this to you? How did the criminal obtain your information? What steps needs to be taken to take to repair…

    • 306 Words
    • 2 Pages
    Decent Essays