Identity Theft_ How to Protect Your Personal Information Essay

Identity theft began to emerge as a serious problem in the mid-1990s. It has been coined by many leading experts in the criminal justice arena as the “crime of the new millennium”. Identity theft without a doubt is the fastest growing crime in our society. Between 2010 and 2011 it is estimated that 10 million Americans were victimized by this crime with a combined individual and loss to business estimated at nearly 50 billion dollars. When identity theft occurs it claims two victims: first the persons whose identity was stolen and second the businesses that suffered losses owing to the criminal use of the stolen identity. For a victim of identity theft it can take years to repair your credit report and your reputation. Swanson, Chamelin, Territo and Taylor (2009) suggest that the cost to individual victims to clear their names vary, but sources maintain that it requires as much as 600 hours of effort and up to $1,500 worth of lost earnings to correct credit and other related problems.

So what is identity theft, how does it happen, and what can Americans do to protect themselves for becoming victim to this crime? Using cash to pay for goods or services is somewhat a thing of the past. In today’s society we use our debit and credit cards to perform daily activities that include purchasing merchandise online, paying for groceries, dinning out at restaurants, and a wide variety of other transactions that involve money. What we may not be aware of is that in performing such tasks we are sharing personal information via the internet which can be stored, collected, and processed which are all opportunities for identity theft. Identity thieves use a wide variety of tactics to obtain a person’s identity. Statistically the most widely used method used by identity thieves is stealing wallets and purses which contain such items as identification, bank, credit, membership, and other types of cards.

Another method is stealing mail which provides the thieves bank statements, preapproved credit offers, and other personal data. Some identity thieves have gone to such lengths as completing a change of address at the post office to divert mail to another location so the victim will be unaware of any wrongdoings for months. Would-be thieves have also been known to do a little dumpster diving in order to obtain personal data used to commit identity theft. As technology advances, so does the ways in which perpetrators go about retrieving personal data from their victims. Some perpetrators fraudulently obtain their victims credit report by acting as a landlord or potential employer. Phishing is the most commonly used method to gain personal information via the internet. Using this method, identity thieves send emails claiming to be a legitimate source, such as Bank of America, eBay, Facebook, or a credit card company asking you to update their account information data.

Another form of phishing involves sending an email to notify the victim that they have won a prize such as the lottery, but in order to receive payment they must pay a processing fee in order to receive it, thus tricking the victim into giving up personal information. There are infinite ways in which perpetrators can obtain personal information used to commit identity theft, but what preventative measures can we take to prevent from becoming a victim. No matter what precautions you take or how careful you are with safeguarding your personal information there is no 100% way of preventing identity theft. The Federal Trade Commission, the U.S Department of Justice, and the U.S Attorney General’s Office have all stated that there is no full proof method to avoid this crime (Rocha 2010). However, by making yourself aware of the threat and becoming aware of the signs of being victimized you can minimize the risk of becoming a target.

Read also  Proposal for Multimedia Project

Experts in identity theft have published five steps to avoid becoming a victim. First, pay close attention to your credit report. Look for anything that is out of the ordinary such as newly opened credit cards or delinquent transactions that you did not authorize. By law, the federal Fair Credit Reporting Act requires that you are provided with a free credit report annually. Second, never give out personal information over the phone or via the internet until you are certain of whom you are dealing with. As stated before, identity thieves will pretend to be reputable companies such as banks and credit card companies in an attempt to steal your personal information. Third, be over protective of your mail. All mail, to include junk mail, contains some type of data that identity thieves can use to steal your personal information. Identity thieves have been known to take victims pre-approved credit card statements out of mailboxes and then open the account using a different address so the victim is unaware the transactions are even occurring for months. Fourth, don’t carry any unneeded social security cards, credit/debit cards, or passports unless you intend to use them that day. Experts say if you must carry these items on you keep them in a secure location at all times.

Finally, when you do have to disclose personal information at your place of business, doctor’s office, school, or anything that has your name on it ask if your information will be shared with any outside organization. As a United States citizen you have the right to ask that your information be kept confidential. An estimated 221.3 million people in the United States access the Internet. They do so for a variety of reasons: to exchange e-mail, obtain news, entertain themselves, and manage their finances (Pratt, Holtfreter, & Reisig 2010). Of the 221.3 million internet users, one in nine report being victimized in the past year. That roughly translates into nearly 25 million fraud victims which is 18 time the number of armed robberies, rapes, and aggravated assault victims combined. As stated earlier, although there is no fool proof way of preventing yourself from becoming a victim, there are several ways you can educate yourself from being a target for identity thieves.

References

Pratt, T.C., Holtfreter, K., & Reisig M.D. (2010). Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory, 6(1) 277-290. Doi: 10.1177/0022427810365903 Rocha, J. (2010). Proven Steps To Prevent Identity Theft – What Steps Can You Take To Prevent Identity Theft? Retrieved from http://ezinearticles.com/?Proven-Steps-To-Prevent-Identity-Theft—What-Steps-Can-You-Take-To-Prevent-Identity-Theft?&id=6486241 Swanson, C. R., Chamelin, N. C., Territo, L., & Taylor, R. W. (2009). Criminal Investigation (10th ed.). New York, NY: McGraw-Hill Companies, Inc.

Read also  Debit Card Vs Credit Card Which Is Better

More Essays

  • American Cities in the Late 19th and Early 20th Century

    In the late 19th and early 20th century, American cities faced challenges which arose from the effects of industrialization and urbanization. During this time, three groups were active to do what they thought was best for themselves and society. These groups were immigrants, political machines, and...

  • Gattaca Film Study

    Gattaca is often portrayed as a quest film. A quest film is defined as "a character that is on a journey or adventure with an ultimate goal in mind of completing a task or to obtain an object of significance." (Merriam-Webster, 2012) The quest often involves overcoming challenges and to do this the...

  • Analysis of Macromolecules in Tissue

    The homogenates provided were made by homogenizing tissues in a sucrose phosphate buffer in a 1:20 ratio. The protein concentration in bovine cells was measured by diluting the homogenate with a 1:5 ratio; 50 microliters of homogenate and 200 microliters of water. Then 5 known protein concentration samples...

  • The Analysis of Aspirin

    ANALYSIS OF ASPIRIN TABLETS The aim of this investigation is to determine the percentage by mass of aspirin aspirin present in different commercial preparations and to find out, which the best value is, using a neutralization reaction followed by a direct titration with NaOH. Chemicals Used: 100 ml of...

  • Plagiarism Summary

    This article discusses the issues surrounding plagiarism and providing detail into what plagiarism is and identifying how it can be regulated in an attempt to address this growing educational concern.  The article describes plagiarism as an act "when a writer deliberately uses someone else's language,...

  • An Environmental Analysis

    An environmental analysis of the constraints in both the host and home countries is of primary significance in determining the conditions of the host market, thus giving the home country the option to adjust according to the conditions in the host country. There are several important factors that should be...

  • Summarise Common Core Skills and Knowledge

    The Common Core Skills and Knowledge for the children's workforce provides a set of basic skills and knowledge that we must be aware of and practice when we are working with children and young people on a regular basis on a part-time, full-time or on a voluntary capacity. There are six areas of skills and...

  • Obama Immigration Reform

    Currently, 11 million illegal immigrants inhabit the United States. This number will continue to augment without proper regulation of these aliens. Ever since his first inauguration, it has been President Barack Obama's mission to improve America's mediocre immigration system. Since Obama's reelection for...

  • Legal Rights Afforded to the Accused Kristian Addison

    Despite the United States best efforts in preventing illegal immigration, there are those who manage to cross the border without any legal status, including a green card. Those who do manage to sneak into the United States unlawfully do not have many rights in comparison to actual US citizens. However, when...

  • Plagiarism – Impact of Internet

    The advent of technology and internet in the last decade has opened up several avenues for unlimited information access. This along with the increasing academic pressures has led students to resort to plagiarism at an alarming rate (Elliot, 2004). The problem of plagiarism in the academic context can no...