Why Is Identity Theft Rampant

Decent Essays
Many reasons why identity theft is rampant is because credit bureaus, credit reporting agencies, and credit lenders do not hold themselves accountable for the theft. It has been estimated that millions of dollars are spent a year on identity theft victims. Businesses and companies offset the price of goods and services by making consumers pay higher prices (O’Neill & Xiao, 2005, p.33). Credit bureaus and lenders do not lose money on identity theft if anything it is a money making a scheme. Credit bureaus have suggested that money generated from credit reports and services are in the millions (Sovern, 2004, p.237). Identity theft will continue to escalate until agencies, lenders, and bureaus take a stand against identity theft and protect their

Related Documents

  • Improved Essays

    In most cases victims are unaware that they are even victims until it is too late to do anything about the theft and there is already a multitude of debt built up in our name. There are so many different ways that identity theft is done these days that the best line of defense is to stay visitant and keep a journal of all expenditures, and check your credit reports regularly. In this chapter we learn that Staying alert to our credit monitoring is like setting a home alarm system (Kapoor, Dlabay, L, & Hughes, 2014). If when checking through financial records and credit reports if there is anything that seems peculiar or out of place immediately dispute and investigate to make sure if it is as simple as a billing error or in fact your identity has been compromised. If you do find that your identity has been stolen immediately report to the appropriate agencies (Kapoor, Dlabay, L, & Hughes, 2014).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    What is Identity robbery? Fraud is a type of taking somebody's character in which somebody puts on a show to be you with a specific end goal to have entry to assets, for example, getting your bank data, Visa numbers, and passwords to get to your own data. 9. How is fraud done? Fraud is finished by utilizing a PC, experiencing somebody's waste, skimming gadgets, spyware and programmers utilize a savvy project to have admittance to your money related data.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Emr System Pros And Cons

    • 437 Words
    • 2 Pages

    Identity theft can occur when unauthorized people gain access to confidential and sensitive records. Data loss is a major…

    • 437 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Dr. Wallace introduces the speaker, the director of the core text reader, states that it is used to enhance what were learning in class. Dr. Brad Busbee starts off by saying that we can learn a lot from a pre-modern case of identity theft. The big questions we wrestle with is “who are we” and “how do we know who we are”. People today know know who they are and what they look like because we have mirrors and pictures.…

    • 376 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    “In 2004, the government passed the Identity Theft Penalty Enhancement Act, which increased the severity of the punishment for identity theft crimes” (Crimes, 2006-2014). It brings a sense of relief to know that the criminals get what they truly deserve. Identity Theft is truly a selfish crime and the perpetrators should be penalized accordingly. According to the Identity Theft Penalty Enhancement Act, “The prison sentence for identity theft starts at up to five years, plus two more years for using the stolen identity in another crime. The prison sentence grows from there, depending on how many related crimes were committed” (Crimes, 2006-2014).…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    How SuccessfulIs Your Identity theft Protection? What is the ultimate effect of identity theft? If you become a sufferer of this white receiver criminal activity, your financial predicament are completely broken. It takes a lengthy time to recover from identity theft, especially if it took years before you learned about your regrettable situation. You should acquire the best id protection from theft because every responsible credit score holder should know how to avoid identity theft.…

    • 694 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Critical Review #2: Identity crime and misuse in Australia: Results of the 2013 online survey Behind the article: Koubaridis (2014, n.p.), a crime news reporter for News Limited, states that ‘1 in 5 Australians have been victims of identity crime [due to] computer hacking, [and] online banking and shopping [are] to blame’. Koubaridis (2014) based the article’s research on a study conducted by the Australian Institute of Criminology. Russell G. Smith and Alice Hutchings from the Australian Institute of Criminology conducted this study in September 2013 (Smith and Hutchings 2014). Research data embedded within the article: Within the media article, there were five components that directly related back to the published research.…

    • 1370 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    In this article there is a statistic that is truly terrifying. “A recent study based on identity scans of over 40,000 children in the U.S. conducted by Richard Power, Distinguished Fellow at Carnegie Melon CyLab, found 10.2 percent of the children in the report had someone else using their Social Security number. That figure is 51 times higher than the 0.2 percentrate for adults in the same population. Prior to the Internet age, child identity theft occurred most often at the hands of a relative who was using the minor’s Social Security number to circumvent bad credit.” (Elizabeth Alterman) Thieves are no longer just looking to circumvent bad credit, they are now looking to follow these children on social media sites to create a cyber identity that mimics the victims so that they can steal from them when the grow up.…

    • 1904 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    I think people who steal other people's identities online should go to jail. Most people today have some kind of info online. 70% of people today have their credit card info stolen and money is spent. That should be classified as theft and the people should be found and arrested. In the next two paragraphs, I argue that people should go to jail if they steal identities.…

    • 255 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Identity theft has been a growing situation. It is something that continues to grow and having many people being affected by having their identity stolen. Technology makes it easier for individuals to steal someone's identity and use it to their own advantage. It is important for people to take the right precautions and keep information secure to prevent any identity theft from occurring. Keeping Information Private…

    • 481 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Identity theft is a growing problem in the USA and the world. Identity theft is most common from ages 18-49. In 2006 there were 5,503 reported incidents of identity theft, in 2014 there was a whopping 67,168 reported incidents of identity theft. “We’ve been dealing with criminals faking IDs for decades, from check forgers to fugitives on the run. But the threat is more pervasive and the scams more sophisticated than ever, including new online elements”, (https://www.fbi.gov/about-us/investigate/cyber/identity_theft, n.d.)…

    • 356 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Detecting Identity Theft

    • 542 Words
    • 3 Pages

    This is because identity theft is a very easy thing to commit due to it being able to be done on the computer and the chance of getting caught is very small. When a person is able to take another person’s identity then it is likely they will be able to take another one with just as much ease so when one identity is used up then they move on to the next person’s…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    According to the authors, the main argument to protect a person from identity theft is to do annual credit reports and to never carry a Social Security card. The main point of this article is to provide the reader with ways to protect the individual from identity theft. I know that there are currently so many ways for an individual to have their identity stolen through various means, like phishing, harmful viruses that attach to a computer device, and skimmers. In this article, the authors provide a survey. On the survey, it is stated that many people do not take advantage of free credit reports and many people carry personal information that could bring harm on themselves if ever stolen and used for identity theft.…

    • 286 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Identity Theft Protection

    • 1090 Words
    • 5 Pages

    Identity theft has been for many years the number one growing crime across America. According to the Bureau of Justice and Statistics (BJS) 16.6 million people were victims of Identity theft in 2012, with financial loses totaling somewhere in the neighborhood of $24.7 billion (McCarthy, 2013). The BJS defines identity theft as”the attempted or successful misuse of an existing account, such as a debit or credit card account, the misuse of personal information…

    • 1090 Words
    • 5 Pages
    Superior Essays