2. Content
What is identity theft?
How Identity Theft Occurs
Types of Identity Theft
How to Protect Yourself from Identity Theft
How to Prevent Identity Theft
Fighting Identity Theft
Conclusion
References
3. What is identity theft?
The definition of identity theft is the unauthorized use of
someone’s personal data or documents (usually social
security card or credit cards) to obtain merchandise,
services or credit.
Identity theft has increasingly become an online
problem.
The Identity Theft Resource Center (ITRC), which began
collecting data in 2005, lists the primary sources of
online breaches into five major categories.
4. How Identity Theft Occurs
Stealing — Beware of leaving your wallet or unopened mail around the house or
in your car. Grab-and-go can happen in a heartbeat.
Dumpster Diving — Some thieves go through garbage cans to find information,
such as unopened pre-approved credit cards.
Change Of Address — Thieves can fill out change-of-address request forms.
Once your mail is sent to them, they can access your personal information.
Cloning Credit Card Information — An employee of, say, a restaurant, gas station
or retail store, can swipe your credit card through a device that copies the
magnetic strip information. It can be transferred to a counterfeit credit card, which
can make purchases.
5. Types of Identity Theft
Social ID Theft
Criminal Identity Theft
Financial Identity Theft
Medical ID Theft
Child ID Theft
Employment Identity Theft
6. Financial Identity Theft
In financial identity theft, someone uses another
person's identity or information to obtain credit,
goods, services, or benefits. This is the most
common form of identity theft.
What you can do : Check your bills, accounts
and statements regularly. Some criminals may
start by making small credit or debit charges in
hopes you don't notice them, so review the
statements carefully. If you see a charge you
don’t recognize, contact your bank or credit
card company.
7.
8. Criminal Identity Theft
In criminal identity theft: a criminal poses as another
person during an arrest to try to avoid a summons,
prevent the discovery of a warrant issued in their real
name, or avoid an arrest or conviction record.
What you can do : Consider limiting the amount of
personal information you share on social media, as you
never know who might access it. If you are a victim of
criminal identity theft, contact law enforcement
immediately. The Identity Theft Resource Center has
some other information about criminal identity theft.
9. Child ID Theft
In child identity theft, someone uses a child's identity for various
forms of personal gain. This is common, as children typically do not
have information associated with them that could pose obstacles for
the perpetrator.
The fraudster may use the child's name and Social Security number
to obtain a residence, find employment, obtain loans, or avoid arrest
on outstanding warrants. Often, the victim is a family member, the
child of a friend, or someone else close to the perpetrator. Some
people even steal the personal information of deceased loves ones.
10. How to Protect Yourself from Identity
Theft
Check Your Credit Report
Update Virus Software
Shred
Old Technology Disposal
Unsolicited Requests
11. How to Prevent Identity Theft
Education
Coalition on Online Identity Theft
Padlock your credit file
Check your credit report annually
Share personal information only with people and companies you trust
Make online purchases only with companies having secure connections
Never give out your personal information over the phone unless you initiated the
call.
Never have your Social Security number printed on your checks
12. Fighting Identity Theft
According to the Indian Law, identity theft is considered to be punishable under
two legislations, namely, the Indian Penal Code (IPC), 1860. and Information
Technology Act (IT Act), 2000. As an offense, identity theft was recognized after
the amendment of the Indian Penal Code by the Information Technology Act,
2000.
Federal Trade Commission
Internet Fraud Complaint Center
U.S. Department of Justice
Identity Theft Resource Center (ITRC)
Operation E-con
13. Conclusion
In understanding the scope of the identity theft crisis facing society today,
we understand that it arises out of our need to be connected to the Internet.
Side by side, trends in Internet popularity match trends in rising numbers of
identity theft instances. This is due to the huge availability of consumer
information stored in online databases and the relatively easy access others
have to that information.