Identity Theft When it Comes Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

Criminals don't always need to have shotguns and masks to threat and rob money; it only takes a social security number, or a pre-approved credit card application from trash to make things according to their wicked way (ID Theft, 2004).

Some consumers have had credit card numbers and Social Security numbers stolen and used fraudulently or identity theft. By taking reasonable steps to protect your personal information, this can mitigate the chance that it may be stolen (What you should know about internet banking, 2007) by identity thieves.

Identity theft is a term used for serious crimes associated with someone uses your name, address, Social Security number, bank or credit card account number or other identifying information without your knowledge to commit fraud. This fraud may only take setting up accounts in your name and make online transactions without you knowing (Get the Upper Hand on Credit Crime, 2004).

Identity theft is one of the fastest growing crimes in America. This makes it very alarming since these thieves can use or get personal information about you. Most of the time identity thieves use your number and your good credit to apply for more credit in your name. Followed by using the credit cards and do not pay the bills. Yet you don't have any idea that someone is using your number until you are turned down for credit, or you begin to get calls from unknown creditors demanding payment for items you never bought (Identity Theft and your Social Security Number, 2006).

Credit card numbers, driver's license numbers, social security numbers, date of birth, and other personal identification can net criminals thousands of dollars in a very short period of time. Most often, identity thieves will obtain your personal identification numbers and obtain credit in your name by having credit cards, goods or services delivered to their address or mail drop. Since the bills for charges incurred are sent to the thief's address, not yours, you will be unaware that debt is mounting up in your name until the collections department tracks you down. By then your credit report will already be riddled with late payment histories and show many accounts in collections. As you can imagine the credit reporting bureaus will be reluctant to change negative credit without proof that you didn't create the bad credit. With this, it may take a lot of time and effort to clear your name and bring back your credits (McGoey, 2007).

Identity theft and credit card fraud is not uncommon; such is the nature of an online world (Credit Cards and Identity Theft - Online Fraud, 2007).

Credit Card Companies is encouraging consumers to take some simple, commonsense steps to avoid falling victim to online credit fraud or identity theft (Get the Upper Hand on Credit Crime, 2004):

When communicating with credit card issuers electronically, consumers should always use their issuer's secure online Web site (Get the Upper Hand on Credit Crime, 2004).

Be sure to have the latest anti-virus, spy ware and security updates as a safety measure (Get the Upper Hand on Credit Crime, 2004).

Create passwords that are easy to remember, but difficult for "outsiders" to guess. Mix letters and numbers, avoid using birthdays and Social Security numbers making it hard to predict or guess (Get the Upper Hand on Credit Crime, 2004). Use a different password for financial- services Websites and transactions than for other accounts. Change passwords regularly. Just as with any information used to access any other financial account, you should keep these codes secret. Your bank will tell you what to look for such as an icon of a locked padlock to ensure you're accessing your account over a secure line (What is Online Banking, 2003).

Deal only with companies that post their privacy policies on their Web site. Reputable companies should prominently display their policies before asking for credit card or other personal information (Get the Upper Hand on Credit Crime, 2004).

In addition, be sure to beware of a scam called phishing where crooks send out e-mails that might look exactly like e-mails from your bank (What is Online Banking, 2003). Phishing is a strategy used to fool people into revealing passwords and other sensitive information by posing as a legitimate source. A common example is email sent by a party claiming to be a bank stating that the addressee must take action immediately to prevent problems with their account. The email usually has a link an online form that is branded to like the organization web site. The form will usually ask for sensitive details such as passwords, tax numbers etc. (Credit Cards and Identity Theft - Online Fraud, 2007).

Phishing" is a growing Internet scam in which criminals use fraudulent e-mails and websites to retrieve personal financial information such as account numbers, passwords, or social security numbers. This confidential information is then used to steal money from your account or to run up charges on your credit cards (Einhorn, 2005).

E-mail is usually not secure. it's not a good idea to send personal information such as your Social Security number, personal identification number (PIN) or account numbers via e-mail, unless you know it is encrypted (What you should know about internet banking, 2007). Thus, it is important to be vigilant with these identity thieves to prevent these unlawful actions to take place.

Credit cards are one of those things that could make your life easier, or could make your life disastrous. The positive and negative effects or the advantages and disadvantages of having a credit card help understand various features and factors involved in credit cards. When all is said and done, choose wisely, and realize the credit cards are weapons that can be used for a bountiful existence or a tragic fate. It all depends on how you wield the same fruit and make it better (the Pros and Cons of Using a Credit Card, 2006).

Make sure your computer's security system is safe and sound to establish privacy while using online transactions. Some people may miss the face-to-face contact of their local branch, and most will choose a combination of online banking. As online banking becomes more established, its likely most of us will end up conducting at least a proportion of our transactions online (Kenny, 2007). Thus, the use of credit card online makes things easier for all of us. As long as we remain vigilant it would mitigate chances of fraud and identity thieves. It is important that credit card holder to have precautionary measures when using credit card online or making online transactions to make things favorable and eliminate identity thieves.

Online banking isn't out to change habits of handling money. It simply uses today's technology to give you the option of circumventing the time-consuming, paper-based aspects of traditional banking in order to manage finances more quickly and efficiently (What is Online Banking, 2003).


Convenience Factors. (2002). Retrieved March 14, 2007.

Bank Information - Internet and Online Banking. (2005). Retrieved March 14, 2007.

Einhorn, Monique F. (2005). Coping with identity theft: imagine discovering that someone has opened credit card accounts or secured a home equity or car loan under an assumed name: yours. Consider receiving an IRS W-2 form reporting wages earned by someone else who has used your name and Social Security number (Cover Story). Partners in Community and Economic Development. Retrieved March 14, 2007.

Get the Upper Hand on Credit Crime - Protect Your Identity With a Few Simple Tips; Your Credit Card Companies Alerts Consumers About Ways to Fight Back Against Identity Theft Scams. (2004). Retrieved March 14, 2007.

ID Theft. (2004). Retrieved March 14, 2007. Retrieved March 14, 2007.

Identity Theft and your Social Security Number. (2006).

Internet Banking Comptroller's Handbook. (1999). Retrieved March 14, 2007.

Kenny, J. (2007). Internet Banking - the Pros and Cons. Ezine Articles. Retrieved March 14, 2007.

Kron, D. (1996). The ABCs of banking online: how to use your computer to manage your finance: with a personal computer and a modem, you can turn your home into a bank branch. Black Enterprise. Retrieved March 14, 2007.

McGoey, C. (2007).Identity Thefts Facts: Fastest Growing Crime World. Retrieved March 14, 2007.

Online Credit Card Account Access. (2005). Retrieved March 14, 2007.

Pros and Cons of Online Banking. (2007). Retrieved March 14, 2007.,15356,89417,00.html

Shop Safely on the Web. (2006). Retrieved March 14, 2007.

Singh, Kalpana (2006). Online Banking. Retrieved March 14, 2007.

The Pros and the Cons. (2004). Money Observer. Retrieved March 14, 2007.

The Pros and Cons of Using a Credit Card. (2006). Ezilon infobase. Retrieved March 14, 2007.

What is Online Banking. (2003). Retrieved March 14, 2007.

What you should know about internet banking. (2007). Retrieved March 14, 2007.[continue]

Cite This Term Paper:

"Identity Theft When It Comes" (2007, March 15) Retrieved October 24, 2016, from

"Identity Theft When It Comes" 15 March 2007. Web.24 October. 2016. <>

"Identity Theft When It Comes", 15 March 2007, Accessed.24 October. 2016,

Other Documents Pertaining To This Topic

  • Identity Theft in America and

    Pharmers now not only small local servers operated by Internet service providers (ISP) but they also target the 13 servers on which all other DNS servers depend. Implications Businesses & Large Organizations: Among large scale businesses that get affected includes the financial sector other than individuals. Electronic banking services have been greatly affected by these criminals who are euphemistically called hackers or crackers who conduct phishing or pharming. They not only

  • Identity Theft Prevention Detection and

    When a Social Security number is stolen, contacting the Social Security Administration can help to place a watch on its use as well (SSA 2009). This particular problem can lead to many complications, as obtaining a new Social Security Number can create many difficulties for the victim while keeping the old number might allow the thief to continue using the victim's identity (SSA 2009). Generally, though, a new number

  • Identity Theft

    Identity Theft: Managing the Risk Management What's New for the Future of Identity Theft Prevention In this paper I examine the basics of identity theft in today's age of widespread and accessible information. The fundamental problem is that while information technologies continue to make aspects of our lives as simple as "point and click," they tend to make certain forms of crime equally simple. The internet, in particular, makes information not only

  • Identity Theft

    Consumer Beware: The Growing Problem of Identity Theft American consumers today are increasingly concerned, with good reason, about how to avoid joining the ranks of unfortunate millions who are already victims of the newest, most widespread national financial crime: identity theft. According to the web article "The Crime of Identity Theft": It can happen to anyone. The phone rings and a collection agency demands that you pay past-due accounts for goods

  • Identity Theft Corp Itc Is a New

    Identity Theft Corp (ITC) is a new company specializing on the identity theft service. The company assists customers to monitor their credit report in order to identify any suspicious charge. The company will also provide the leg work to clean up the mess left behind because of the identity theft and assist customers to rebuild their credits. The objective of this proposal is to provide strategic planning and implementation for Identity

  • Identity Theft Using the Knowledge

    Spyware runs automatically without the user's knowledge and transmits vital information. Spyware can also record your keystrokes and one might end up revealing all usernames, passwords and other details to identity thieves. (Atlantic Publishing, 2008); (Schwabach, 2005) Identity thieves have also found novel ways to steal and use identities. For instance, cyber criminals recently hacked Facebook, a popular social networking site, and changed a user's page asking people to help

  • Identity Theft but He That

    In one case in 2000, two-20-year-olds hacked into the Lowe's credit card mainframe from a white Pontiac Grand Prix parked outside a store, synching a single laptop to the wireless system that was meant for employees to use to locate products. The hackers, obviously to blame for the crime, played on the flaws of a computer system that should not have allowed for a security breach. While the same hackers

Read Full Term Paper
Copyright 2016 . All Rights Reserved