SlideShare a Scribd company logo
IDENTITY THEFT, ITS
PSYCHOSOCIAL EFFECT
AND VICTIM SUPPORT.
Waridah Makena, Researcher.
Identity theft, its psychosocial
effect and victim support.
Context
1. INTRODUCTION
2. BACKGROUND
3. FINDINGS
IDENTITY
THEFT
1. THE CRIME
2. THE PLAYERS
3. LAW IN THEORY VS, LAW IN
PRACTISE
CONCLUSION
1. RECOMMENDATIONS
INTRODUCTION
◦ Although there are laws seeking to regulate Anti-money laundering, victims of identity theft are often
denied justice and with it the assistance they need during the judicial process or after the commission of
the crime against them; this is due to the discrepancy between the law in theory and in practise, poor
victim support systems and mode of crime.
◦ This research maps out the gaps that will enable countries, policymakers, judiciary and citizens to create
effective victim support systems in the area of Identity theft.
BACKGROUND
◦ Identity theft poses a challenge in the anonymity provided in the cyberspace causing multiple
challenges in seeking justice when the crime is committed, bringing the criminals to justice, understanding
the motivations behind the crime to better regulate it and designing effective victim support systems.
◦ The current discussions and policy-making strategies rely on the economic effects of the identity theft,
discounting the psychological and social effects to the victims, the emotional stability of a society and
importance of psycho-social health of individuals in sustaining the human race.
FINDINGS
◦ The research methodology adopted for this research is the doctrinal methodology of research. This
methodology involves the comparative study of information and analysis of existing legal material
consisting of books, journals, the internet, articles and statutes with the Constitution in this particular
case playing a major role
◦ Empirical research that involves the use of materials that are not regarded as legal may be used for the
purposes of comparative studies and analysis such as case studies and content analysis.
◦ The research carried out is in line with ethics from research to the analysis and recommendations
provided.
THE CRIME
◦ Identity theft may happen on an individual level or corporate level both as victims, or ways to obtain data
needed to commit identity theft. On the perpetrators’ side, they may steal a person’s identity or corporate
identity or get information from the victim, steal data from the corporations’ databases to simply asking the
victim on data they want.
◦ Increasingly, technology is being used to commit identity theft from stolen devices, searching hard drives
of discarded laptops, hacking into devices, accessing computer-based public records, using information
gathering malware to infect computers, browsing social media networks or using emails or text messages.
LAW IN THEORY (1/2)
◦ In South Korea, the regulation provided is under fraud by use of computer under their cybercrime laws.
Korea is home to one of the world's fastest internet connections and enjoys very high online activity with a
consequence of increase in threat of cybercrime, particularly identity theft, online scams, phone scams and
voice-phishing.
◦ In South Korea, just pretending to be another person is not a punishable offence, but there are acts
commonly involved in identity theft such as opening mobile phone accounts, obtaining credit cards or
withdrawing money from bank accounts.
◦ On the other hand, individuals may falsify social media identities, for this case the Personal Information
Protection Act prohibits the use of personal information without consent, but it applies only to those who
use personal information for official or business purposes.
LAW IN THEORY (1/2)
- In Kenya, Under Section 29, identity theft or impersonation is an offence and, upon conviction, results in
a fine of KES 200,000, two years' imprisonment, or both
a. ‘Hacking, constituting unauthorised access under section 14 of the Computer Misuse and Cybercrimes
Act, 2018. The penalty for unauthorised access upon conviction is a fine not exceeding KES 5 million,
imprisonment for a term not exceeding three years or both while intent to commit or facilitate
commission of crime of such an offence is a fine not exceeding KES 10 million, imprisonment for a
term not exceeding 10 years or both.
b. Phishing is another offence under section 30 of the computer misuse and cyber crimes act and
conviction results a penalty of KES 300 000 in fines imprisonments for a maximum term of three years
or both.
LAW IN PRACTISE (1/2)
◦ South Korea:
◦ In 2014, the government planned to issue new ID numbers to every citizen over 17 at a possible cost of
billions of dollars due to the high number of data breaches including the president’s credit card
information. The increase in such cases were partly due to the rapid advancement of technology with
about 85 percent of South Korea’s people being online and the country having 40 million smartphones
versus security measures whose creation and implementation was slower. In the identification case, the
password systems were weak, the identifications numbers were poorly structured in that from looking at
the number one can tell the gender, year of birth and more information on their victims if they came
across an identification number.
LAW IN PRACTISE (2/2)
◦ For victims the case is different as seen in the case of Central Depository And Settlement Corporation
Ltd v Hilary G. Erculiani [2016] eKLR in regards to the defendant opening a bank account falsely and
transferring the applicant’s stocks accounts to their own account where the applicant was awarded:
a. injunction be issued to restrain the Defendant, his agents, servants or employees from transferring any
monies in the account
b. Defendant be ordered to show cause why he should not furnish security in the sum of
Kshs.2,200,000/- within seven days being the amount claimed by the Plaintiff
c. an order of attachment before judgment be issued attaching all the monies in the account of the
defendant
FINDINGS (1/3)
◦ The crime is motivated by the likely financial reward or corruption done on accessed data.
◦ Lack of legislation touching on cyber-attacks.
◦ Poor detection techniques. Mechanisms of tracking the culprit are much behind.
◦ Lack of capacity to respond to the crime. This exposes vulnerability of systems (in Kenya).
◦ Attackers are also capitalizing on the naivety of some of the Internet system users
FINDINGS (1/3)
◦ Several factors affect potential victims’
vulnerability, including:
• Online activities
• Personal traits
• Individual behavior
• Attitudes about technology
- Victims of identity theft will feel:
◦ by the psychological pain of loss,
◦ helplessness, anger, isolation, betrayal, rage, and even
embarrassment.
- This crime triggers deep fears regarding financial security,
◦ the safety of family members, and
◦ the ability to trust again.
FINDINGS
◦ During the trial, they are examined, re-examined, and cross-examined by prosecutors, the accused and lawyers representing
them and judges and magistrates.
◦ In Kenya, this has manifested through Article 50 (9) of the Constitution which integrates the rights and welfare of victims as a
process and the enactment of the Victims Protection Act (VPA) of 2014 which protects the interests of victims of crime and
them with better information and support services.
◦ Victims and their advocates can no longer be considered as passive observers in criminal proceedings.
◦ victims have the right to participate in the criminal trial process either in person or through a representative or lawyer. They
evidence the prosecution or defence will be relying on and they may give their views at every stage of the proceedings,
before the sentencing of the offender via a Victim Impact Assessment statement.
◦ The Act provides for the right to privacy from intrusion by the media, health professionals, and any other person. The right
also includes confidentiality of communication between a victim and support services providers.
◦ Victims of crime will now be able to get redress in instances of intimidation, harassment, bribery, or any form of abuse within
the legal system. The right is extended to the victims’ property
CONCLUSION
◦ - MULTI-STAKEHOLDER COOPERATION
◦ VICTIM RE-EDUCATION
◦ IDENTITY THEFT AWARENESS
THANK YOU!
Waridahmakena.wordpress.com

More Related Content

Similar to Identity theft, its psychosocial effect and victim support.pptx

Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Chris Hails
 
TAIEX workshop Cairo.pdf
TAIEX workshop Cairo.pdfTAIEX workshop Cairo.pdf
TAIEX workshop Cairo.pdf
midorasho
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South Africa
Tracy Morgan
 
CASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxCASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptx
AryamanSinghvi
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
Emily Smith
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
Yash Jain
 
White collar crime by waseem i. khan
White collar crime by waseem i. khanWhite collar crime by waseem i. khan
White collar crime by waseem i. khan
waseemkhanpbn
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
amani kadope
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
Dr. Arun Verma
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
Jason Nathu
 
White collar crime
White collar crimeWhite collar crime
White collar crime
Asian Paint Bangladesh Ltd
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
Dr.Keshav Sathaye
 
Cyber law
Cyber law Cyber law
Cyber law
Arshad_A
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
Rakshith Shetty
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
ouldparis
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
linda gichohi
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
IJCI JOURNAL
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
CollinsKimathi
 

Similar to Identity theft, its psychosocial effect and victim support.pptx (20)

Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
TAIEX workshop Cairo.pdf
TAIEX workshop Cairo.pdfTAIEX workshop Cairo.pdf
TAIEX workshop Cairo.pdf
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South Africa
 
CASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxCASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptx
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
White collar crime by waseem i. khan
White collar crime by waseem i. khanWhite collar crime by waseem i. khan
White collar crime by waseem i. khan
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
White collar crime
White collar crimeWhite collar crime
White collar crime
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 

Recently uploaded

原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 

Recently uploaded (20)

原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 

Identity theft, its psychosocial effect and victim support.pptx

  • 1. IDENTITY THEFT, ITS PSYCHOSOCIAL EFFECT AND VICTIM SUPPORT. Waridah Makena, Researcher.
  • 2. Identity theft, its psychosocial effect and victim support. Context 1. INTRODUCTION 2. BACKGROUND 3. FINDINGS IDENTITY THEFT 1. THE CRIME 2. THE PLAYERS 3. LAW IN THEORY VS, LAW IN PRACTISE CONCLUSION 1. RECOMMENDATIONS
  • 3. INTRODUCTION ◦ Although there are laws seeking to regulate Anti-money laundering, victims of identity theft are often denied justice and with it the assistance they need during the judicial process or after the commission of the crime against them; this is due to the discrepancy between the law in theory and in practise, poor victim support systems and mode of crime. ◦ This research maps out the gaps that will enable countries, policymakers, judiciary and citizens to create effective victim support systems in the area of Identity theft.
  • 4. BACKGROUND ◦ Identity theft poses a challenge in the anonymity provided in the cyberspace causing multiple challenges in seeking justice when the crime is committed, bringing the criminals to justice, understanding the motivations behind the crime to better regulate it and designing effective victim support systems. ◦ The current discussions and policy-making strategies rely on the economic effects of the identity theft, discounting the psychological and social effects to the victims, the emotional stability of a society and importance of psycho-social health of individuals in sustaining the human race.
  • 5. FINDINGS ◦ The research methodology adopted for this research is the doctrinal methodology of research. This methodology involves the comparative study of information and analysis of existing legal material consisting of books, journals, the internet, articles and statutes with the Constitution in this particular case playing a major role ◦ Empirical research that involves the use of materials that are not regarded as legal may be used for the purposes of comparative studies and analysis such as case studies and content analysis. ◦ The research carried out is in line with ethics from research to the analysis and recommendations provided.
  • 6. THE CRIME ◦ Identity theft may happen on an individual level or corporate level both as victims, or ways to obtain data needed to commit identity theft. On the perpetrators’ side, they may steal a person’s identity or corporate identity or get information from the victim, steal data from the corporations’ databases to simply asking the victim on data they want. ◦ Increasingly, technology is being used to commit identity theft from stolen devices, searching hard drives of discarded laptops, hacking into devices, accessing computer-based public records, using information gathering malware to infect computers, browsing social media networks or using emails or text messages.
  • 7. LAW IN THEORY (1/2) ◦ In South Korea, the regulation provided is under fraud by use of computer under their cybercrime laws. Korea is home to one of the world's fastest internet connections and enjoys very high online activity with a consequence of increase in threat of cybercrime, particularly identity theft, online scams, phone scams and voice-phishing. ◦ In South Korea, just pretending to be another person is not a punishable offence, but there are acts commonly involved in identity theft such as opening mobile phone accounts, obtaining credit cards or withdrawing money from bank accounts. ◦ On the other hand, individuals may falsify social media identities, for this case the Personal Information Protection Act prohibits the use of personal information without consent, but it applies only to those who use personal information for official or business purposes.
  • 8. LAW IN THEORY (1/2) - In Kenya, Under Section 29, identity theft or impersonation is an offence and, upon conviction, results in a fine of KES 200,000, two years' imprisonment, or both a. ‘Hacking, constituting unauthorised access under section 14 of the Computer Misuse and Cybercrimes Act, 2018. The penalty for unauthorised access upon conviction is a fine not exceeding KES 5 million, imprisonment for a term not exceeding three years or both while intent to commit or facilitate commission of crime of such an offence is a fine not exceeding KES 10 million, imprisonment for a term not exceeding 10 years or both. b. Phishing is another offence under section 30 of the computer misuse and cyber crimes act and conviction results a penalty of KES 300 000 in fines imprisonments for a maximum term of three years or both.
  • 9. LAW IN PRACTISE (1/2) ◦ South Korea: ◦ In 2014, the government planned to issue new ID numbers to every citizen over 17 at a possible cost of billions of dollars due to the high number of data breaches including the president’s credit card information. The increase in such cases were partly due to the rapid advancement of technology with about 85 percent of South Korea’s people being online and the country having 40 million smartphones versus security measures whose creation and implementation was slower. In the identification case, the password systems were weak, the identifications numbers were poorly structured in that from looking at the number one can tell the gender, year of birth and more information on their victims if they came across an identification number.
  • 10. LAW IN PRACTISE (2/2) ◦ For victims the case is different as seen in the case of Central Depository And Settlement Corporation Ltd v Hilary G. Erculiani [2016] eKLR in regards to the defendant opening a bank account falsely and transferring the applicant’s stocks accounts to their own account where the applicant was awarded: a. injunction be issued to restrain the Defendant, his agents, servants or employees from transferring any monies in the account b. Defendant be ordered to show cause why he should not furnish security in the sum of Kshs.2,200,000/- within seven days being the amount claimed by the Plaintiff c. an order of attachment before judgment be issued attaching all the monies in the account of the defendant
  • 11. FINDINGS (1/3) ◦ The crime is motivated by the likely financial reward or corruption done on accessed data. ◦ Lack of legislation touching on cyber-attacks. ◦ Poor detection techniques. Mechanisms of tracking the culprit are much behind. ◦ Lack of capacity to respond to the crime. This exposes vulnerability of systems (in Kenya). ◦ Attackers are also capitalizing on the naivety of some of the Internet system users
  • 12. FINDINGS (1/3) ◦ Several factors affect potential victims’ vulnerability, including: • Online activities • Personal traits • Individual behavior • Attitudes about technology - Victims of identity theft will feel: ◦ by the psychological pain of loss, ◦ helplessness, anger, isolation, betrayal, rage, and even embarrassment. - This crime triggers deep fears regarding financial security, ◦ the safety of family members, and ◦ the ability to trust again.
  • 13. FINDINGS ◦ During the trial, they are examined, re-examined, and cross-examined by prosecutors, the accused and lawyers representing them and judges and magistrates. ◦ In Kenya, this has manifested through Article 50 (9) of the Constitution which integrates the rights and welfare of victims as a process and the enactment of the Victims Protection Act (VPA) of 2014 which protects the interests of victims of crime and them with better information and support services. ◦ Victims and their advocates can no longer be considered as passive observers in criminal proceedings. ◦ victims have the right to participate in the criminal trial process either in person or through a representative or lawyer. They evidence the prosecution or defence will be relying on and they may give their views at every stage of the proceedings, before the sentencing of the offender via a Victim Impact Assessment statement. ◦ The Act provides for the right to privacy from intrusion by the media, health professionals, and any other person. The right also includes confidentiality of communication between a victim and support services providers. ◦ Victims of crime will now be able to get redress in instances of intimidation, harassment, bribery, or any form of abuse within the legal system. The right is extended to the victims’ property
  • 14. CONCLUSION ◦ - MULTI-STAKEHOLDER COOPERATION ◦ VICTIM RE-EDUCATION ◦ IDENTITY THEFT AWARENESS

Editor's Notes

  1. Our current environment is growing and encouraging the reliance on technology to tackle our day-to-day operations whether it is banking, shopping, healthcare, transport, eating, or connecting with others; the internet has it. Within the cyberspace, there are different players, with different motivations for participating in the cyber space. One of the ways, the cyberspace is used is through identity theft. Identity theft is the act of obtaining personal or financial information of another person to commit fraud such as money laundering, making unauthorised transactions or purchases etc.
  2. Identity theft may happen on an individual level or corporate level both as victims, or ways to obtain data needed to commit identity theft. On the perpetrators’ side, they may steal a person’s identity or corporate identity or get information from the victim, steal data from the corporations’ databases to simply asking the victim on data they want. Increasingly, technology is being used to commit identity theft from stolen devices, searching hard drives of discarded laptops, hacking into devices, accessing computer-based public records, using information gathering malware to infect computers, browsing social media networks or using emails or text messages. In these cases, the offender needs to provide the resident registration number or resident registration card of another person, and must submit documents containing the other person's personal information to relevant organizations such as banks, mobile phone companies, etc. The regulation in place is under the Resident Registration Act which provides that making a document by assuming the capacity of another person and submitting it to related organizations can fall under the Criminal Act against counterfeiting personal documents and using of falsified private document. ‘
  3. Identity theft may happen on an individual level or corporate level both as victims, or ways to obtain data needed to commit identity theft. On the perpetrators’ side, they may steal a person’s identity or corporate identity or get information from the victim, steal data from the corporations’ databases to simply asking the victim on data they want. Increasingly, technology is being used to commit identity theft from stolen devices, searching hard drives of discarded laptops, hacking into devices, accessing computer-based public records, using information gathering malware to infect computers, browsing social media networks or using emails or text messages. In these cases, the offender needs to provide the resident registration number or resident registration card of another person, and must submit documents containing the other person's personal information to relevant organizations such as banks, mobile phone companies, etc. The regulation in place is under the Resident Registration Act which provides that making a document by assuming the capacity of another person and submitting it to related organizations can fall under the Criminal Act against counterfeiting personal documents and using of falsified private document. ‘
  4. General law on cybercrime and cybersecurity is the Computer Misuse and Cybercrimes act. Additionally, the data protection act is also in effect which covers aspects of cybersecurity. There are no specific obligations to monitor, detect, mitigate or prevent identity theft cases. There are offices created like the National Computer and Cybercrimes Co-ordination Committee has the mandate in Kenya to build infrastructure, recommend methods of securing systems including the monitoring, detection, prevention and mitigation and incidents. Additionally in the Data protection act, data processors and controllers are required to put in place technical and organisational measures for data security. The telecommunications sector, licensed entities are required as part of their licensing requirements under the Kenya Information and Communications Act to ensure technical and organisational security of their systems and operations