The Importance Of Identit Identity Theft

Improved Essays
According to the Federal Trade Commission, identity theft occurs when “someone uses your Social Security number or other personal information to open new accounts, make purchases, or get a tax refund” (“Identity Theft,” 2015). Identity theft does not only occur with opening new accounts, but can also encompass gaining access to existing accounts opened by the real individual. This crime is very prevalent and it seems that there is not a downward trend of those affected by it. This is a topic that I encounter every day in my current professional field as a Transaction Monitoring Associate for a bank and it interests me because it is something that everyone should be aware of in order to prevent it from happening to them as much as possible. …show more content…
Some of the most popular ways that a person’s identity is stolen is from the criminal going through the victim’s trash, stealing mail, phishing, or skimming. The first two ways are obvious, but the other two terms may not be familiar to everyone. Phishing is when the criminal poses as someone else, from an individual that works at a bank to law enforcement, in order to gain information from the victim through phone calls or e-mail. Skimming occurs when the criminal places a device in ATMs that gathers account information on the individuals that use it. The device is not noticeable and often would not look any different than an ATM without the device on it (Papadimitriou, 2015). These are only a few of the ways that criminals gain personal information and I can only imagine that new schemes will be created in the

Related Documents

  • Improved Essays

    In most cases victims are unaware that they are even victims until it is too late to do anything about the theft and there is already a multitude of debt built up in our name. There are so many different ways that identity theft is done these days that the best line of defense is to stay visitant and keep a journal of all expenditures, and check your credit reports regularly. In this chapter we learn that Staying alert to our credit monitoring is like setting a home alarm system (Kapoor, Dlabay, L, & Hughes, 2014). If when checking through financial records and credit reports if there is anything that seems peculiar or out of place immediately dispute and investigate to make sure if it is as simple as a billing error or in fact your identity has been compromised. If you do find that your identity has been stolen immediately report to the appropriate agencies (Kapoor, Dlabay, L, & Hughes, 2014).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    The first year to have statistical data on identity theft was 2005 which showed that 6.4 million residents were victims of identity theft to some extent (Bureau of Justice Statistics (BJS) Data Collection,…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Emr System Pros And Cons

    • 437 Words
    • 2 Pages

    Identity theft can occur when unauthorized people gain access to confidential and sensitive records. Data loss is a major…

    • 437 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    With massive data breaches populating the headlines in recent years such as the recent breaches at Target and Home Depot, healthcare institutions are actively strengthening their arsenal against threats to patient history information (PHI). According to the Identity Theft Resource Center (ITRC, 2015), data breaches in healthcare accounted for 44 percent of all breaches in 2013, and that is expected to only inflate each year. A data breach is an incident when confidential data has been stolen or viewed by unauthorized individuals (Anandarajan, D'Ovidio, &Jenkins). In healthcare PHI is a high-value target due to the breaches that includes stolen prescriptions, fraud, and identity theft.…

    • 478 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    “A recent Government Accountability Office (GAO) report found the number of information-security incidents in which personal information was involved has more than doubled over the last few years, exceeding 25,000 in fiscal 2013” (“Privacy”). That means that every day there are approximately 68.5 incidents where personal information is stolen from major holders of sensitive data, such as credit card information, social security numbers, and usernames and passwords. So through the use of a virus, bug (a flaw in the software being used), and malware, thieves are able to gain access to…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Dr. Wallace introduces the speaker, the director of the core text reader, states that it is used to enhance what were learning in class. Dr. Brad Busbee starts off by saying that we can learn a lot from a pre-modern case of identity theft. The big questions we wrestle with is “who are we” and “how do we know who we are”. People today know know who they are and what they look like because we have mirrors and pictures.…

    • 376 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Identity Theft Schemes and Methods There are many different types of schemes and methods that identity…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Amy is an active blog writer who is attached to discussing interesting finance related articles to persuade folks to manage and protected their financial predicament. Follow her and know more on what an improved id protection from theft should have and the importance of identity theft insurance policy to lower the destruction of identity theft if your identity gets…

    • 694 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    This book could be informative in my own research, providing an in-depth examination on how and why the crimes are performed, however, the source doesn’t provide information about cases which could be a limitation. Brody, R., Mulig, E. and Kimball, V. (2007). Phishing, Pharming and Identity Theft. Academy of Accounting and Financial Studies Journal, 11(3).…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Critical Review #2: Identity crime and misuse in Australia: Results of the 2013 online survey Behind the article: Koubaridis (2014, n.p.), a crime news reporter for News Limited, states that ‘1 in 5 Australians have been victims of identity crime [due to] computer hacking, [and] online banking and shopping [are] to blame’. Koubaridis (2014) based the article’s research on a study conducted by the Australian Institute of Criminology. Russell G. Smith and Alice Hutchings from the Australian Institute of Criminology conducted this study in September 2013 (Smith and Hutchings 2014). Research data embedded within the article: Within the media article, there were five components that directly related back to the published research.…

    • 1370 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Typically, this involves providing personal information online. The Federal Trade Commission reports that of all the complaints they receive, nearly 20 percent are from one demographic on one subject: senior citizens over 60 years of age complaining about identity theft. Good…

    • 373 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Identity Theft Affidavit

    • 235 Words
    • 1 Pages

    1 complaint category again.” (pg. 42). In summary, it seems that identity theft fraudsters’ main target are tax payers, tax professionals and small business. It is my understanding that thieves commit identity theft for their personal and/or financial gain and their main victims are mostly individuals and/or small businesses. Therefore, consumers should always take preventive measures as well as clients who are business owners because identity thieves will always find new ways to accomplished their…

    • 235 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    In this article there is a statistic that is truly terrifying. “A recent study based on identity scans of over 40,000 children in the U.S. conducted by Richard Power, Distinguished Fellow at Carnegie Melon CyLab, found 10.2 percent of the children in the report had someone else using their Social Security number. That figure is 51 times higher than the 0.2 percentrate for adults in the same population. Prior to the Internet age, child identity theft occurred most often at the hands of a relative who was using the minor’s Social Security number to circumvent bad credit.” (Elizabeth Alterman) Thieves are no longer just looking to circumvent bad credit, they are now looking to follow these children on social media sites to create a cyber identity that mimics the victims so that they can steal from them when the grow up.…

    • 1904 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Detecting Identity Theft

    • 542 Words
    • 3 Pages

    This is because identity theft is a very easy thing to commit due to it being able to be done on the computer and the chance of getting caught is very small. When a person is able to take another person’s identity then it is likely they will be able to take another one with just as much ease so when one identity is used up then they move on to the next person’s…

    • 542 Words
    • 3 Pages
    Improved Essays