SlideShare a Scribd company logo
The crime of falsely assuming the identity of another
to gain a benefit or avoid an expense.
False Personation

 Prior to 1998, crimes that would now be considered
identity theft were charged under "false personation"
statutes, which go back to the late 19th century.
False Personation

 The crime of falsely assuming the identity of another
person in order to gain a benefit or cause harm to the
other person can be referred to as false personation or
false impersonation. False personation laws have been
enacted at both the state and federal levels to protect
the dignity, reputation, and economic well-being of the
individual being impersonated. Further, these statutes
deter criminals by discouraging the impersonator's
pursuit of benefits.
False Personation

 A false impersonator need not alter her or his voice,
wear a disguise, or otherwise change her or his
characteristics or appearance in order to be found guilty.
False personation simply involves passing oneself off as
another person. For example, an individual who
misrepresents herself to be someone else in order to
wrongfully cash that person's paycheck commits false
personation.
False Personation

 The person impersonated must be real, not fictitious. If
a police officer pulls a driver over for speeding, and the
driver pretends to be his brother, the driver is guilty of
false personation. His brother is an actual person, and
the crime of false personation is designed to take
advantage of his brother's reputation and driving record.
Federal Identity Theft Laws
Identity Theft and Assumption
Deterrence Act of 1998

 It wasn’t until Congress passed the Identity Theft and
Assumption Deterrence Act of 1998 that identity theft
was officially listed as a federal crime. The act
strengthened the criminal laws governing identity theft.
Identity Theft and Assumption
Deterrence Act of 1998 accomplished
four things

 1st) It made identity theft a separate crime against the individual
whose identity was stolen and credit destroyed. Previously,
victims had been defined solely by financial loss and often the
emphasis was on banks and other financial institutions, rather
than on individuals.
Identity Theft and Assumption
Deterrence Act of 1998

 2nd) It established the Federal Trade Commission (FTC)
as the Federal Government’s one central point of contact
for reporting instances of identity theft by creating the
Identity Theft Data Clearinghouse.
Identity Theft and Assumption
Deterrence Act of 1998

 3rd) It increased criminal penalties for identity theft and
fraud. Specifically, the crime now carries a maximum
penalty of 15 years imprisonment and substantial fines.
Identity Theft and Assumption
Deterrence Act of 1998

 4th) It closed legal loopholes, which previously had made
it a crime to produce or possess false identity
documents, but not to steal another personal’s personal
identifying information.
Fair Debt Collection Practices Act
(FDCPA)

 Prohibits debt collectors from using unfair or deceptive practices
to collect overdue bills that a creditor has forwarded for collection.
Fair Credit Reporting Act (FCRA)
and the Fair and Accurate Credit
Transactions Act (FACTA) of 2003
 FCRA is the law governing the accuracy and privacy of credit
reports. FACTA amended the Fair Credit Reporting Act in 2003 to
strengthen and add to the protections for victims of identity theft.
These laws require consumer reporting agencies (CRAs) and
creditors to help victims recover from identity theft, and allow
consumers to place alerts on their credit files if they are or believe
they may become victims of identity theft.

 Consumers have the right to dispute inaccurate information, and
CRAs and creditors must investigate the claim and correct
information if it is inaccurate. The laws also entitle consumers to a
free credit report once per year from each of the three credit
reporting agencies.
 As part of the responsibilities under FACTA, the Federal Trade
Commission and the federal financial agencies established "Red
Flag Rules" requiring creditors and financial institutions to
establish programs designed to address identity theft.
Identity Theft Penalty Enhancement
Act of 2004

 This act establishes penalties for "aggravated" identity
theft, which is using the identity of another person to commit
felony crimes, including immigration violations, theft of another’s
Social Security benefits, and acts of domestic terrorism.
Identity Theft Enforcement and
Restitution Act of 2008

 This act to make it clear that restitution orders for identity theft
cases may include an amount equal to the value of the victim’s
time spent remediating the actual or intended harm of the identity
theft or aggravated identity theft.
 The new law also allows federal courts to prosecute when the
criminal and the victim live in the same state. Under previous law,
federal courts only had jurisdiction if the thief uses interstate
communication to access the victim’s PII.
Compiled and designed by Mark Fullbright , Certified
Identity Theft Risk Management Specialist™ (CITRMS) as
a free service for consumers to protect themselves from
identity theft
Stay Safe, Stay Secure

Office for Victims of Crime
810 Seventh Street NW., Eighth Floor, Washington, DC 20531
The Office for Victims of Crime is a component of the Office of
Justice Programs, U.S. Department of Justice.

More Related Content

What's hot

Ethics at Sunrise program - Missouri Bar CLE 5-2017
Ethics at Sunrise program - Missouri Bar CLE  5-2017Ethics at Sunrise program - Missouri Bar CLE  5-2017
Ethics at Sunrise program - Missouri Bar CLE 5-2017
Downey Law Group LLC
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
forms, extent & cause of poloice deviance
forms, extent & cause of poloice devianceforms, extent & cause of poloice deviance
forms, extent & cause of poloice deviance
Chaitanya Limbachiya
 
Fraud and Money Laundering Acts in India
Fraud and Money Laundering Acts in IndiaFraud and Money Laundering Acts in India
Fraud and Money Laundering Acts in India
Vivek Shrivastava (9873246043)
 
White collar crime by waseem i. khan
White collar crime by waseem i. khanWhite collar crime by waseem i. khan
White collar crime by waseem i. khan
waseemkhanpbn
 
Plunder law ra_7080
Plunder law ra_7080Plunder law ra_7080
Plunder law ra_7080
JerwelVillaflores
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pntjessmc1
 
white collar crime definition extent forms in india
white collar crime definition extent forms in indiawhite collar crime definition extent forms in india
white collar crime definition extent forms in india
Chaitanya Limbachiya
 
Uk Anti Bribery Act Slideshow 0211 Final
Uk Anti Bribery Act Slideshow 0211 FinalUk Anti Bribery Act Slideshow 0211 Final
Uk Anti Bribery Act Slideshow 0211 FinalMayer Brown LLP
 
Forgery A Cause Foor Alarm (2)
Forgery A Cause Foor Alarm (2)Forgery A Cause Foor Alarm (2)
Forgery A Cause Foor Alarm (2)
Socially Savvy
 
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Brady Allen
 

What's hot (16)

Ethics at Sunrise program - Missouri Bar CLE 5-2017
Ethics at Sunrise program - Missouri Bar CLE  5-2017Ethics at Sunrise program - Missouri Bar CLE  5-2017
Ethics at Sunrise program - Missouri Bar CLE 5-2017
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
1
11
1
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
forms, extent & cause of poloice deviance
forms, extent & cause of poloice devianceforms, extent & cause of poloice deviance
forms, extent & cause of poloice deviance
 
Fraud and Money Laundering Acts in India
Fraud and Money Laundering Acts in IndiaFraud and Money Laundering Acts in India
Fraud and Money Laundering Acts in India
 
White collar crime by waseem i. khan
White collar crime by waseem i. khanWhite collar crime by waseem i. khan
White collar crime by waseem i. khan
 
2
22
2
 
Plunder law ra_7080
Plunder law ra_7080Plunder law ra_7080
Plunder law ra_7080
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
SS 18 Yung kay Timothy...
SS 18 Yung kay Timothy...SS 18 Yung kay Timothy...
SS 18 Yung kay Timothy...
 
white collar crime definition extent forms in india
white collar crime definition extent forms in indiawhite collar crime definition extent forms in india
white collar crime definition extent forms in india
 
Uk Anti Bribery Act Slideshow 0211 Final
Uk Anti Bribery Act Slideshow 0211 FinalUk Anti Bribery Act Slideshow 0211 Final
Uk Anti Bribery Act Slideshow 0211 Final
 
Forgery A Cause Foor Alarm (2)
Forgery A Cause Foor Alarm (2)Forgery A Cause Foor Alarm (2)
Forgery A Cause Foor Alarm (2)
 
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
 
ANTI-CORRUPTION TEAM INDIA
ANTI-CORRUPTION TEAM INDIAANTI-CORRUPTION TEAM INDIA
ANTI-CORRUPTION TEAM INDIA
 

Similar to False Personation aka Identity Theft

Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crimerharrisonaz
 
Human Trafficking Resource List
Human Trafficking Resource ListHuman Trafficking Resource List
Human Trafficking Resource List
Friends for Youth, Inc.
 
Understand The Types Of Fraud To Help Protect Your Business 12.pdf
Understand The Types Of Fraud To Help Protect Your Business 12.pdfUnderstand The Types Of Fraud To Help Protect Your Business 12.pdf
Understand The Types Of Fraud To Help Protect Your Business 12.pdf
PROF. PAUL ALLIEU KAMARA
 
Understand The Types Of Fraud To Help Protect Your Business.pdf
Understand The Types Of Fraud To Help Protect Your Business.pdfUnderstand The Types Of Fraud To Help Protect Your Business.pdf
Understand The Types Of Fraud To Help Protect Your Business.pdf
PROF. PAUL ALLIEU KAMARA
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
ouldparis
 
Anti bribery law for bangladesh
Anti bribery law for bangladeshAnti bribery law for bangladesh
Anti bribery law for bangladesh
M S Siddiqui
 
Frequent White Collar Crimes And Their Causes.pdf
Frequent White Collar Crimes And Their Causes.pdfFrequent White Collar Crimes And Their Causes.pdf
Frequent White Collar Crimes And Their Causes.pdf
Free Law - by De Jure
 
Writing Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft NoteWriting Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft Note
Chris Sleeper
 
APA Medicare Fraud Regulations_Structures_Details
APA Medicare Fraud Regulations_Structures_DetailsAPA Medicare Fraud Regulations_Structures_Details
APA Medicare Fraud Regulations_Structures_DetailsLori Ranzino-Renda, CIS
 
Identity Theft * Canada
Identity Theft * CanadaIdentity Theft * Canada
Identity Theft * Canada
- Mark - Fullbright
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
robinlgray
 
Quickdinero Compliance Training Module 4
Quickdinero Compliance Training Module 4Quickdinero Compliance Training Module 4
Quickdinero Compliance Training Module 4Quickdinero_Inc
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
Identity Theft Protection
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protection
Bayo Cary
 
1 The FCPA and why it Matters October 04, 2010 .docx
1  The FCPA and why it Matters October 04, 2010 .docx1  The FCPA and why it Matters October 04, 2010 .docx
1 The FCPA and why it Matters October 04, 2010 .docx
honey725342
 
Law final report Michelangelo Matteoda
Law final report  Michelangelo MatteodaLaw final report  Michelangelo Matteoda
Law final report Michelangelo Matteoda
Weorizon
 
Civil RICO - Racketeer Influenced and Corruption Organizations Act
Civil RICO - Racketeer Influenced and Corruption Organizations ActCivil RICO - Racketeer Influenced and Corruption Organizations Act
Civil RICO - Racketeer Influenced and Corruption Organizations Act
Ethan Burger
 
Chapter 1 presents a list of the top ten Foreign.docx
Chapter 1 presents a list of the top ten Foreign.docxChapter 1 presents a list of the top ten Foreign.docx
Chapter 1 presents a list of the top ten Foreign.docx
write31
 

Similar to False Personation aka Identity Theft (18)

Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crime
 
Human Trafficking Resource List
Human Trafficking Resource ListHuman Trafficking Resource List
Human Trafficking Resource List
 
Understand The Types Of Fraud To Help Protect Your Business 12.pdf
Understand The Types Of Fraud To Help Protect Your Business 12.pdfUnderstand The Types Of Fraud To Help Protect Your Business 12.pdf
Understand The Types Of Fraud To Help Protect Your Business 12.pdf
 
Understand The Types Of Fraud To Help Protect Your Business.pdf
Understand The Types Of Fraud To Help Protect Your Business.pdfUnderstand The Types Of Fraud To Help Protect Your Business.pdf
Understand The Types Of Fraud To Help Protect Your Business.pdf
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
 
Anti bribery law for bangladesh
Anti bribery law for bangladeshAnti bribery law for bangladesh
Anti bribery law for bangladesh
 
Frequent White Collar Crimes And Their Causes.pdf
Frequent White Collar Crimes And Their Causes.pdfFrequent White Collar Crimes And Their Causes.pdf
Frequent White Collar Crimes And Their Causes.pdf
 
Writing Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft NoteWriting Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft Note
 
APA Medicare Fraud Regulations_Structures_Details
APA Medicare Fraud Regulations_Structures_DetailsAPA Medicare Fraud Regulations_Structures_Details
APA Medicare Fraud Regulations_Structures_Details
 
Identity Theft * Canada
Identity Theft * CanadaIdentity Theft * Canada
Identity Theft * Canada
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Quickdinero Compliance Training Module 4
Quickdinero Compliance Training Module 4Quickdinero Compliance Training Module 4
Quickdinero Compliance Training Module 4
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protection
 
1 The FCPA and why it Matters October 04, 2010 .docx
1  The FCPA and why it Matters October 04, 2010 .docx1  The FCPA and why it Matters October 04, 2010 .docx
1 The FCPA and why it Matters October 04, 2010 .docx
 
Law final report Michelangelo Matteoda
Law final report  Michelangelo MatteodaLaw final report  Michelangelo Matteoda
Law final report Michelangelo Matteoda
 
Civil RICO - Racketeer Influenced and Corruption Organizations Act
Civil RICO - Racketeer Influenced and Corruption Organizations ActCivil RICO - Racketeer Influenced and Corruption Organizations Act
Civil RICO - Racketeer Influenced and Corruption Organizations Act
 
Chapter 1 presents a list of the top ten Foreign.docx
Chapter 1 presents a list of the top ten Foreign.docxChapter 1 presents a list of the top ten Foreign.docx
Chapter 1 presents a list of the top ten Foreign.docx
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
- Mark - Fullbright
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
- Mark - Fullbright
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
- Mark - Fullbright
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
- Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

False Personation aka Identity Theft

  • 1. The crime of falsely assuming the identity of another to gain a benefit or avoid an expense.
  • 2. False Personation  Prior to 1998, crimes that would now be considered identity theft were charged under "false personation" statutes, which go back to the late 19th century.
  • 3. False Personation  The crime of falsely assuming the identity of another person in order to gain a benefit or cause harm to the other person can be referred to as false personation or false impersonation. False personation laws have been enacted at both the state and federal levels to protect the dignity, reputation, and economic well-being of the individual being impersonated. Further, these statutes deter criminals by discouraging the impersonator's pursuit of benefits.
  • 4. False Personation  A false impersonator need not alter her or his voice, wear a disguise, or otherwise change her or his characteristics or appearance in order to be found guilty. False personation simply involves passing oneself off as another person. For example, an individual who misrepresents herself to be someone else in order to wrongfully cash that person's paycheck commits false personation.
  • 5. False Personation  The person impersonated must be real, not fictitious. If a police officer pulls a driver over for speeding, and the driver pretends to be his brother, the driver is guilty of false personation. His brother is an actual person, and the crime of false personation is designed to take advantage of his brother's reputation and driving record.
  • 7. Identity Theft and Assumption Deterrence Act of 1998  It wasn’t until Congress passed the Identity Theft and Assumption Deterrence Act of 1998 that identity theft was officially listed as a federal crime. The act strengthened the criminal laws governing identity theft.
  • 8. Identity Theft and Assumption Deterrence Act of 1998 accomplished four things  1st) It made identity theft a separate crime against the individual whose identity was stolen and credit destroyed. Previously, victims had been defined solely by financial loss and often the emphasis was on banks and other financial institutions, rather than on individuals.
  • 9. Identity Theft and Assumption Deterrence Act of 1998  2nd) It established the Federal Trade Commission (FTC) as the Federal Government’s one central point of contact for reporting instances of identity theft by creating the Identity Theft Data Clearinghouse.
  • 10. Identity Theft and Assumption Deterrence Act of 1998  3rd) It increased criminal penalties for identity theft and fraud. Specifically, the crime now carries a maximum penalty of 15 years imprisonment and substantial fines.
  • 11. Identity Theft and Assumption Deterrence Act of 1998  4th) It closed legal loopholes, which previously had made it a crime to produce or possess false identity documents, but not to steal another personal’s personal identifying information.
  • 12. Fair Debt Collection Practices Act (FDCPA)  Prohibits debt collectors from using unfair or deceptive practices to collect overdue bills that a creditor has forwarded for collection.
  • 13. Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transactions Act (FACTA) of 2003  FCRA is the law governing the accuracy and privacy of credit reports. FACTA amended the Fair Credit Reporting Act in 2003 to strengthen and add to the protections for victims of identity theft. These laws require consumer reporting agencies (CRAs) and creditors to help victims recover from identity theft, and allow consumers to place alerts on their credit files if they are or believe they may become victims of identity theft.  Consumers have the right to dispute inaccurate information, and CRAs and creditors must investigate the claim and correct information if it is inaccurate. The laws also entitle consumers to a free credit report once per year from each of the three credit reporting agencies.  As part of the responsibilities under FACTA, the Federal Trade Commission and the federal financial agencies established "Red Flag Rules" requiring creditors and financial institutions to establish programs designed to address identity theft.
  • 14. Identity Theft Penalty Enhancement Act of 2004  This act establishes penalties for "aggravated" identity theft, which is using the identity of another person to commit felony crimes, including immigration violations, theft of another’s Social Security benefits, and acts of domestic terrorism.
  • 15. Identity Theft Enforcement and Restitution Act of 2008  This act to make it clear that restitution orders for identity theft cases may include an amount equal to the value of the victim’s time spent remediating the actual or intended harm of the identity theft or aggravated identity theft.  The new law also allows federal courts to prosecute when the criminal and the victim live in the same state. Under previous law, federal courts only had jurisdiction if the thief uses interstate communication to access the victim’s PII.
  • 16. Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free service for consumers to protect themselves from identity theft Stay Safe, Stay Secure Office for Victims of Crime 810 Seventh Street NW., Eighth Floor, Washington, DC 20531 The Office for Victims of Crime is a component of the Office of Justice Programs, U.S. Department of Justice.