Identity Theft Essay

3357 Words14 Pages
Information Technology (Online) Identity Theft Research Paper Module Name: Information Technology (Online) Module Code: INT1001 Date of Submission: March 18, 2013. Question “Businesses and governments ask us to reveal personal data more frequently than ever before. These institutions store this sensitive information in numerous, increasingly larger databases. This data is, of course, very valuable, but not only to those who should have it. Criminals also try to get their hands on this information, so that they can use it for malicious purposes or sell it to commit fraud. This is identity theft.” Source: Paget, F. Identity Theft. Retrieved January 25, 2013 from http://www.pubblicaamministrazione.net/file/whitepaper/000042.pdf Contents Definition of Identity Theft 4 Types of Identity Theft 6 Measures provided to combat Identity Theft by Organizations 8 Issues of Identity Theft in Jamaica or another Caribbean Country 10 Whose Responsibility is it? 13 Conclusion 15 Bibliography 16 Definition of Identity Theft Identity theft is sometimes referred to as “hijacking” (Rouse, 2009). It is a common crime where an impersonator obtains key pieces of personal information, such as social security or driver's license numbers, in order to defraud people. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials. In addition, an imposter might provide false identification to police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen. There are two categories of identity theft; account takeover and true name. Account takeover identity theft is when the imposter uses personal information to gain access to the person's existing accounts. Usually, the thief changes the mailing address on an account and run up a

More about Identity Theft Essay

Open Document