Sunday, July 28, 2019

Analysis of Identity Theft Essay Example | Topics and Well Written Essays - 750 words

Analysis of Identity Theft - Essay Example You can even find that while you have your information secure, another honest person who you send it to in good faith is vulnerable to ID hijackers. i1The criminal, a convicted felon, not only incurred more than $100,000 of credit card debt, obtained a federal home loan, and bought homes, motorcycles, and handguns in the victims name, but called his victim to taunt him -- saying that he could continue to pose as the victim for as long as he wanted because identity theft was not a federal crime at that time -- before filing for bankruptcy, also in the victims name. Though involving elements of embezzlement, blackmail, deception, and intimidation the ii Congress used the events as a basis for establishing ‘Identity Theft’ as a felony in its own right in 1989. ID Theft has a language of its own. iii‘Dumpster Diving’ - ransacking litter bins and landfill sites to secure discarded sensitive documentation. shoulder Surfing’ – Watching people (sometimes through binoculars) as they use phone cards or pin number machines. Combating ID fraud is a growth industry. Financial institutions use advisory bodies to warn people how to protect themselves, and what to do if they have become victims. websites offer practical advice. Many homes now have shredders to enable ID bearing literature to be destroyed so that Dumpster Divers cannot intercept it. Many people only learn that they are victims when they receive bills indicating large debts, which they have not personally authorized. When they query this with any credit agencies involved, they may find that they are personally expected to settle the debts run up in their name. As ScamBusters.Org observe: vii companies who made the loans often assume that you are the one who actually incurred the debt, and is trying to beat them out of their money. They can be very aggressive in their collection tactics.  Ã‚  

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.