Preventing Identity Theft And Social Security

Improved Essays
Identity theft is a crime that involves a person/imposter taking control of yours or another

person’s personal information for the purpose of impersonation. The information obtained by the

other can be Social Security number or Driver’s license number which is used to use your identity as their

own, also known as identity fraud. The fraud committed can involve making purchases using the victim’s

credit card details, opening bank accounts using the victim’s name, conducting illegal businesses or take

loans (USA.gov, 2015). Identity theft can be prevented by securing your Social Security Number,

making sure you’re on top of your billing cycles, and use different and complicated passwords for

everything. People should secure their social security number by not giving out the number when not

needed. You shouldn’t keep your Social
…show more content…
If financial statements or bills are late, the

senders should be contacted. Bank account statements should be examined on a monthly basis to ensure

that there are no unauthorized charges and if in any case there are unauthorized charges, the bank should

be contacted immediately (Cantor, 2013). If you have a credit card that is not in use should also be

cancelled to reduce the risk of identity theft by not having as many accounts to look at.

Any sensitive personal information should be protected by a complex password that cannot be guessed

easily by identity thieves (Cantor, 2013). While typing your password you should look out for people

looking over your shoulders because they might steal your password therefore you should cover your

keyboard while typing your password. In case there is any identity fraud done the person in which their

identity was stolen they’re responsible for the crimes committed by the thief while using their personal

information. Some of the problems that might be faced by someone who had their identity stolen

Related Documents

  • Decent Essays

    RELATED CASES: None SUPPORT DOCUMENTS: Eight Pages Bank Of America Fraud Affidavit/Transaction History. On 12/09/2015, Sandra Agrait contacted the Pasco Sheriff`s Office by telephone to report fraudulent use of her Bank Of America ATM/Debit Card ending in 5457. Ms. Agrait advised she reviewed her bank account transaction history and observed two unauthorized cash withdrawals that she did not make. She said her houseguest, Timothy Midkiss took her debit card out of her wallet, used it to make the cash withdrawals and returned it to her walle without her knowledge or permission.…

    • 206 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Strengthen your passwords. Use random combinations of letters, numbers and special characters. Create different passwords for each account and change them frequently. 3. Check your credit reports.…

    • 264 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Repercussions Of Crimes

    • 1460 Words
    • 6 Pages

    I online shop out of preference, I can not afford to not use Wi-Fi when possible, and I often use public computers and networks on campus. As a university student I apply for jobs a lot, and supply my social security number regularly, I also make many credit card purchases and carry no cash. I may not a favored target but it would still be a possibility. Identity theft is a completely terrifying, even more so now after reading that “8.6 million households " have experienced identity theft. Identify theft goes beyond the simple definition of “illegally obtaining another information for economic gain, it is the complete theft of an individual 's life that can forever alter their choices.…

    • 1460 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Foyle Legal Case Study

    • 509 Words
    • 3 Pages

    Last updated 23 Dec 2016 Foyle Legal is committed to protecting your privacy with your rights and needs in mind. This privacy statement is aimed to provide an outline on how we handle your personal and sensitive information. Your Consent You have no obligation to disclose personal or sensitive information when you visit the Foyle Legal website.…

    • 509 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Emr System Pros And Cons

    • 437 Words
    • 2 Pages

    Identity theft can occur when unauthorized people gain access to confidential and sensitive records. Data loss is a major…

    • 437 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The most interesting part of Cooper-White’s book has to be the ‘Introduction to the Second Edition”. In it she outlines an interesting theory of identity as it relates to victimhood. Cooper-White refers to identity thusly, “I have increasingly come to the conviction that our subjectivity – our selfhood, or sense of self – is not unitary or monolithic, but multiple, fluid and contingent upon our relationships with family and friends, circles of community, and wider culture.” (Cooper-White 18) I also believe that selfhood is not archetypical, we don’t even exist on a spectrum. We exist on an array – we are the sum of disparate parts.…

    • 792 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The Michigan Incident Crime Reporting (MICR) Section has listed that Michigan’s auto thefts have risen 28% from 2015 to 2016. Reasons for current theft increases may include the following: 1. Anti-theft technologies have driven thieves to become more proficient in falsified paper crimes such as identity theft or false titles and documents used in the fraudulent purchases of an automobile. False identification is used in car rental companies where the thief acquires a vehicle and fails to return it. 2.…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    “In 2004, the government passed the Identity Theft Penalty Enhancement Act, which increased the severity of the punishment for identity theft crimes” (Crimes, 2006-2014). It brings a sense of relief to know that the criminals get what they truly deserve. Identity Theft is truly a selfish crime and the perpetrators should be penalized accordingly. According to the Identity Theft Penalty Enhancement Act, “The prison sentence for identity theft starts at up to five years, plus two more years for using the stolen identity in another crime. The prison sentence grows from there, depending on how many related crimes were committed” (Crimes, 2006-2014).…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Identity Theft Case

    • 663 Words
    • 3 Pages

    INTRODUCTION: This case involves the suspects accessing the victim’s bank account, by unknown means and stealing US currency in violation of PC 530.5(a)-Identity Theft. LOCATION DESCRIPTION: This incident occurred at the Bank of America, located at 880 E. Colorado Boulevard. LOSS:…

    • 663 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Amy is an active blog writer who is attached to discussing interesting finance related articles to persuade folks to manage and protected their financial predicament. Follow her and know more on what an improved id protection from theft should have and the importance of identity theft insurance policy to lower the destruction of identity theft if your identity gets…

    • 694 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It is said that an identity is stolen online every three seconds. A persons identity can be stolen false applications for loans and credit cards, fraudulent withdrawals from bank accounts, fraudulent use of telephone calling cards, or obtaining other goods or privileges…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Identity Theft

    • 241 Words
    • 1 Pages

    Discussion Question 1: Discuss how identity theft meets the elements of theft. How has the internet changed criminalizing theft? Identity theft is “theft by using someone else’s Social Security number or driver’s license to obtain goods” (Chamelin, 2012, p. 162). Although a person’s identity is not a tangible object, it fits the definition of theft.…

    • 241 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The names, social security numbers and credit card information are examples of what could be stolen with the intent of this information to be misused by the recipients of this information. This information could be sold and would give individuals the necessary information needed to help steal someone’s identity. This could consist of applying for credit or mortgages, working under that person’s identity or committing fraud using the stolen individuals’…

    • 683 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Every year identity theft has risen and the impact is causing the consumers millions of dollars. These crimes have been ranked by the Federal Trade Commission as the number one complained over the last fifteen years. According to Federal Trade Commission (2015), thirteen percent of the complaints by consumers are regarding identify theft. The identity theft assumption and deterrence act of 1998 required that the FTC to log and acknowledge complaints of victims and provide them with relevant information, and refer their complaints to the appropriate channels. Identity fraud has impacted over 13 million Americans and the act of collecting credit information from unsuspecting consumers involves a variety tactics; these tactics includes, mail theft,…

    • 140 Words
    • 1 Pages
    Decent Essays