Words of Wisdom:

"I distrust those people who know so well what God wants them to do because I notice it always coincides with their own desires."- Susan B. Anthony" - Dwayne

Identity Teft

  • Date Submitted: 01/11/2014 11:33 AM
  • Flesch-Kincaid Score: 50.5 
  • Words: 1080
  • Essay Grade: no grades
  • Report this Essay
Identity Theft

According to the Federal Trade Commission, The 1990's spawned a new variety of crooks called identity thieves. Your everyday transactions, which usually reveal every bit of your personal information: your bank and credit card account numbers; your income; your social security number (SSN); or your name, address, and phone numbers. An identity thief obtains some piece of your sensitive information and uses it without your knowledge to commit fraud or theft. (http://www.ftc.gov/). In this paper, I will argue as to how identity theft takes place and how we can deter it.  
Victims of identity theft usually do not even know that they have been targeted until it is too late. Identity theft can take years and a lot of money to clear up. As with other crimes we cannot completely control if we are victims, but we can be aware of how criminals obtain our private information, how can we minimize the risk of being a victim and some helpful information on what to do after the crime is committed.
How Does Our Private Information Fall into the Wrong Hands
Thieves get personal information in different ways. (http://www.ftc.gov/). The FTC (Oct., 2003) stated: "Thieves use a variety of methods to gain access to your personal information such as:
·Stealing records from their employer,
·Bribing an employee who has access to these records, or hacking into the organization's computers.
·Rummage through your trash
·Obtain credit reports by abusing their employer's authorized access to credit reports or by posing as a landlord, employer, or someone else who may have legal right to the information.
·Steal credit and debit card numbers as your card is processed, using a special device known as skimming
·Stealing wallets and purses
·Steal mail like pre-approved credit offers, new checks, tax information, and bank statements
·They can complete a change of address form to divert your mail to another location
·They can steal personal information from your home...

Comments

Express your owns thoughts and ideas on this essay by writing a grade and/or critique.

  1. No comments