Preventing Identity Theft

Improved Essays
Introduction Having your identity stolen is a very difficult thing to have to deal with. It could prevent you from paying bills and obtaining credit, and the only way to prevent your identity from being stolen is by protecting it. Identity theft is one of the fastest growing crimes in the United States and is a serious problem that affects millions of innocent people (Identity Theft Victim Statistics), and the government need to implement better regulations to help put a stop to this crime. Identity theft is described as a crime where a thief steals your full name or social security number and uses it in a fraudulently manner to apply for credit cards, file taxes, or even get medical services (Identity Theft). As a victim your credit is ruined and it will cost you time and money to get it all straightened out. There are several different types of identity theft that can affect you such as, child ID theft, tax ID theft, medical ID theft, senior ID theft, and social media ID theft (Identity Theft).
Children’s identity is vulnerable because the theft can go undetected for many years and by the time they are adults the damage has already been done
…show more content…
The thief will still one person’s social security number and combine it with another person’s name, and the use someone else’s address to create a brand new identity and then turn around and uses the fraudulent identity to apply for credit, rent an apartment, or make major purchases (Identity Theft). Synthetic ID Theft is difficult to detect because the fraud is not directly tied to just one person which want allow fraud alerts and monitoring services to stop or prevent these scams (Identity Theft). Although you cannot prevent synthetic ID theft, you should still get copies of your credit report to check for accounts that you did not open (Identity

Related Documents

  • Improved Essays

    Identity Theft. CPA Journal, 87(1), 66-68.). Once you begin to receive bills for credit cards, cellphones, medical, and even car loans most will be able to tell that these types of debts are not theirs and that their identity has in fact been compromised (Kapoor, Dlabay, L, & Hughes, 2014). However, often in these cases it is to the…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    The first year to have statistical data on identity theft was 2005 which showed that 6.4 million residents were victims of identity theft to some extent (Bureau of Justice Statistics (BJS) Data Collection,…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Repercussions Of Crimes

    • 1460 Words
    • 6 Pages

    It can hinder them from purchasing, a home, a car and even something as simple as receiving their tax refund. Individuals work very hard to build up their names so that they can be seen a responsible adults when they need wish to speak to lenders and for someone to completely hijack their life is the most outrageous form of no physical violence I can think of, because I wish to own a home, get a nicer vehicle and so…

    • 1460 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    The Michigan Incident Crime Reporting (MICR) Section has listed that Michigan’s auto thefts have risen 28% from 2015 to 2016. Reasons for current theft increases may include the following: 1. Anti-theft technologies have driven thieves to become more proficient in falsified paper crimes such as identity theft or false titles and documents used in the fraudulent purchases of an automobile. False identification is used in car rental companies where the thief acquires a vehicle and fails to return it. 2.…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    With massive data breaches populating the headlines in recent years such as the recent breaches at Target and Home Depot, healthcare institutions are actively strengthening their arsenal against threats to patient history information (PHI). According to the Identity Theft Resource Center (ITRC, 2015), data breaches in healthcare accounted for 44 percent of all breaches in 2013, and that is expected to only inflate each year. A data breach is an incident when confidential data has been stolen or viewed by unauthorized individuals (Anandarajan, D'Ovidio, &Jenkins). In healthcare PHI is a high-value target due to the breaches that includes stolen prescriptions, fraud, and identity theft.…

    • 478 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    After they’ve itemized every bill and have made payments to all they owe, they toss their bills and do not want to see them anymore. Bills may contain critical personal information such as their name, address, credit card and bank account numbers. After those bills are tossed, the information can get into the hands of dumpster diving perpetrators. Dumpster diving is exactly what is sounds like. “Dumpster diving occurs when someone goes through someone else’s garbage to obtain personal identifiable information off items found in the trash, such as credit card bills, utility bills, medical insurance, and bank statements” (Most Common Schemes, 2009).…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Identity Theft Case

    • 663 Words
    • 3 Pages

    INTRODUCTION: This case involves the suspects accessing the victim’s bank account, by unknown means and stealing US currency in violation of PC 530.5(a)-Identity Theft. LOCATION DESCRIPTION: This incident occurred at the Bank of America, located at 880 E. Colorado Boulevard. LOSS:…

    • 663 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Imposter Scams In Canada

    • 390 Words
    • 2 Pages

    Increased personal security measures and regulation can also protect individuals from scams. Other similar imposter scams include IRS and government imposter scams. IRS imposter scams pose as the IRS calling to say you owe them money and if not paid you will be charged and arrested [3]. They request either a money transfer or a prepaid debit card to be sent to them immediately [3]. IRS imposter scams can be identified because the IRS would notify owed money through mail, not by phone; also, they would not require a specific method of payment [3].…

    • 390 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Many reasons why identity theft is rampant is because credit bureaus, credit reporting agencies, and credit lenders do not hold themselves accountable for the theft. It has been estimated that millions of dollars are spent a year on identity theft victims. Businesses and companies offset the price of goods and services by making consumers pay higher prices (O’Neill & Xiao, 2005, p.33). Credit bureaus and lenders do not lose money on identity theft if anything it is a money making a scheme. Credit bureaus have suggested that money generated from credit reports and services are in the millions (Sovern, 2004, p.237).…

    • 122 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    The Real ID Act, which was sponsored by Representative Jerry Lewis and signed into law by the President on May 11, 2005, has set federal standards for the issuance of driver’s licenses and requires aliens to prove their "legal presence" in the United States (Thomas, HR 1268.) Its basic purpose is to ensure that state-issued licenses and IDs meet certain standards and requirements that the federal government sets before they will be considered valid. This piece of legislation has caused quite a bit of debate since its origination and passage into law. Some throughout the United States support this piece of legislation because they believe it will protect our country, as well as keep us out of harms way with regard to terrorism.…

    • 1677 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    Yes, many victims of identity theft crimes are not even aware that the crime has occurred until sometime well after the theft has been completed. As technology has advanced so have the methods an identity thief uses to commit their crimes. The days of a thief going through garbage to find the necessary information they need have been replaced by such things as RF card scanners where the perpetrator just passes by the victim and the scanner steals the information directly from the victims card without any awareness of what is happening. The best defense against identity thefts is for every person to be vigilant in how they handle their personal information. Everyone needs to utilize RF blocking wallets, along with shredding all records instead…

    • 160 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Identity theft is any unauthorized use of someone else’s personal identity to fraudulently obtain money, goods, or services; to prevent the payment of debt; or to avoid criminal prosecution. In 1998, under the authority of the Identity Theft and Assumption Deterrence Act, identity theft became a federal crime with prescribed prison sentences for using identity theft to commit crimes. In addition, increased penalties apply for those who exceed, misuse, or abuse privileged access to personal identification records because of a position of authority. Identity thieves often use simple techniques to acquire personal information, such as Dumpster diving, plundering trash bags, and stealing mail from mailboxes to obtain paper records with identifying…

    • 467 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    tremendously serious ways, they may lose the ability to access their financial identity, the ability to cask checks, obtain credit or buy a home, or they may even be arrested for a crime committed by identity thieves (Swecker2). In 2003 survey has shown that 4.6 percent of the United States population ages eighteen and older were victims of identity theft, 9.91 million of people lost over 52.6 billion dollar from only new account frauds (Swecker2). In another case “survey by the Bureau of Justice Statistic, victims reported losing over 24.7 billion dollar in direct and indirect costs because of identity theft in 2012” (Morton2). According to Swecker, identity theft has emerged as one of the most dominant white collar crime problem in the…

    • 348 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Thieves may steal not only your property, but also your identity, that is, they illegitimately obtain personal information that you may have disclosed on a job application,…

    • 244 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Identity theft is when a criminal obtains the personal information that belongs to someone else in order for personal of financial gain. The criminal can steal a Social Security number or a driver’s license number to pose as the person that the information was stolen from. For example, the information can be used to help the criminal get credit cards, material things, and sometimes false credentials for immigrants. In order to obtain personal information, identity thieves can hack into computer systems. They can obtain what they need from trash cans.…

    • 783 Words
    • 4 Pages
    Improved Essays