Identity Theft: A White-Collar Crime

Improved Essays
Identity theft is when an individual conjure up image from using another person background and began to imitate their existence. When this occurs the thief pretends to be another person and fools others into believing him. Identity theft is a white-collar crime that in many circumstances have no geographic boundaries, thus the criminal activity become a cross jurisdiction issue between different law enforcement agencies. When it comes to identity theft crimes law enforcement agents have a hard time bringing identity thefts to justice for many different reasons.
There are several different forms identity theft which are: identity cloning, financial, medical identity theft, criminal identity, theft synthetic identity, theft child identity. In cases that involve identity theft, the criminal justice system protects not only the victim but also have to respects the rights of the accused as well (Ingram L. J., 2009). The accused have safeguard protection within the 4th, 5th, 6th, and 8th Amendments no matter the nature of the crime insuring that the proceedings which follow are fair. What happen in an identity theft case where a person steals another person 's identity but, does not cause any monetary damage is it still consider a crime? Well first let get an understanding of monetary damages. Monetary damages (restitution or penalty) are money damages caused by accused that cause the victim to be out monies. Compensation is usually given to an injured party by a liable party in the. Knowing the above, it is felt that even when a person steals another person 's identity but, does not cause any monetary damage it should still be consider a crime.
…show more content…
The reason why is the accused individual has wrongfully obtains and uses another person 's personal information for self-gain in some way (Identity theft and identity fraud, n.d). No matter the reason fraud or deception should not be permitted for any reason. One can commit identity fraud even if you never actually benefit from the persons information once the other individual identity is obtain, possess, or use someone else’s with an intent to later fraudulently use it has became a crime. For example, if a person went to the grocery store and as he/she is walking out they drop their card but …show more content…
Public law state that criminal intent is “knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes violation of Federal law, or that constitutes a felony under any applicable State or local law;’’ (Public law 105–318, 1998).
The Identity Theft and Assumption Deterrence Act was what used in the early prevention of identity theft crimes, however, there have been some changes over the years. The Identity Theft Penalty Enhancement Act the was implemented to make the penalty for identity theft crimes hasher for those who commit such acts also each state invoked their own state laws on top of the mandatory felony punishment. Therefore, identity thefts can be punished at state or a federal level depends of the offense. The Fair Credit Reporting Act and the Fair and Accurate Transaction Act was most recently add to allow individuals to correct any mistake on their credit report and set limitation on the release of information. The Fair and Accurate Transaction Act allow individual to receive free copy of their credit

Related Documents

  • Improved Essays

    In most cases victims are unaware that they are even victims until it is too late to do anything about the theft and there is already a multitude of debt built up in our name. There are so many different ways that identity theft is done these days that the best line of defense is to stay visitant and keep a journal of all expenditures, and check your credit reports regularly. In this chapter we learn that Staying alert to our credit monitoring is like setting a home alarm system (Kapoor, Dlabay, L, & Hughes, 2014). If when checking through financial records and credit reports if there is anything that seems peculiar or out of place immediately dispute and investigate to make sure if it is as simple as a billing error or in fact your identity has been compromised. If you do find that your identity has been stolen immediately report to the appropriate agencies (Kapoor, Dlabay, L, & Hughes, 2014).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    What is Identity robbery? Fraud is a type of taking somebody's character in which somebody puts on a show to be you with a specific end goal to have entry to assets, for example, getting your bank data, Visa numbers, and passwords to get to your own data. 9. How is fraud done? Fraud is finished by utilizing a PC, experiencing somebody's waste, skimming gadgets, spyware and programmers utilize a savvy project to have admittance to your money related data.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The first year to have statistical data on identity theft was 2005 which showed that 6.4 million residents were victims of identity theft to some extent (Bureau of Justice Statistics (BJS) Data Collection,…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    In conclusion although there are multiple federal and state agencies currently investigating Wells Fargo for their acts of fraud, from Congressional hearings, to the securities and exchange commission (SEC), and the federal bureau of investigation (FBI) just to name a few, it still does not address that root cause of why these acts of large scale white-collar crime persist, much less there is no real discussion as to what measures can be employed to prevent these acts from happening in the future. Some people would say that there must be mandatory sentencing for violators of white-collar crime where plea bargaining is essentially removed as an option of getting out of prison, and truth be told there is some validity to this argument since…

    • 170 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    All fraudulent individuals have three aspects in common: the opportunity to commit a crime, the financial pressure to ignite thoughts to commit a crime, and the rationalization to make a crime seem less ethically incorrect than it really is to commit (Will et al). Barry Minkow, after gaining high power and praise in the market by reporters and Oprah Winfrey herself, had all three of these aspects allowing him to commit his fraudulent white collar crime worth more than $200 million on paper (Ciulla). When Minkow was 16, he started his own carpet cleaning business in his parents’ garage under the name of ZZZZ Best (Ciulla). People viewed Minkow as a prosperous young entrepreneur, but they didn’t know that his carpet cleaning business was all…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    First of all, hackers are people who use the internet to gain access to other people’s private information with a malicious intent. They will attack innocent people and take their information for many reasons. Davis says that their behavior is anonymous and unethical. Identity theft is a form of hacking where people steal important information such as social security numbers, identification numbers, and credit cards. They can…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Emr System Pros And Cons

    • 437 Words
    • 2 Pages

    Identity theft can occur when unauthorized people gain access to confidential and sensitive records. Data loss is a major…

    • 437 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Fair Credit Report Act (FCRA) was passed in 1970 and is enforced by the Federal Trade Commission, the Consumer Financial Protection Bureau and private litigants. The FCRA is a United States Federal Government legislation that was created to help ensure accuracy, fairness, and privacy of consumer information that is obtained in files held by consumer reporting agencies. The Fair Credit Reporting Act along with the Fair Debt Collection Practices Act form the basis of consumer rights…

    • 558 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Michigan Incident Crime Reporting (MICR) Section has listed that Michigan’s auto thefts have risen 28% from 2015 to 2016. Reasons for current theft increases may include the following: 1. Anti-theft technologies have driven thieves to become more proficient in falsified paper crimes such as identity theft or false titles and documents used in the fraudulent purchases of an automobile. False identification is used in car rental companies where the thief acquires a vehicle and fails to return it. 2.…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    In October 1998, the Identity Theft and Assumption act were passed by the United States congress. Over the years since the passing of this bill federal and state governments have passed additional bills to try to strengthen the initial bill. In 2003, the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transaction Act (FACTA) were created. FACTA addressed a variety of changes but it primarily addressed consumer rights and more specifically identity theft. The Free credit report was a provision of FACTA which gave the consumer 1 free credit report through each of the three major credit reporting agencies (Equifax, Experian, and the TransUnion).…

    • 206 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    “In 2004, the government passed the Identity Theft Penalty Enhancement Act, which increased the severity of the punishment for identity theft crimes” (Crimes, 2006-2014). It brings a sense of relief to know that the criminals get what they truly deserve. Identity Theft is truly a selfish crime and the perpetrators should be penalized accordingly. According to the Identity Theft Penalty Enhancement Act, “The prison sentence for identity theft starts at up to five years, plus two more years for using the stolen identity in another crime. The prison sentence grows from there, depending on how many related crimes were committed” (Crimes, 2006-2014).…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With massive data breaches populating the headlines in recent years such as the recent breaches at Target and Home Depot, healthcare institutions are actively strengthening their arsenal against threats to patient history information (PHI). According to the Identity Theft Resource Center (ITRC, 2015), data breaches in healthcare accounted for 44 percent of all breaches in 2013, and that is expected to only inflate each year. A data breach is an incident when confidential data has been stolen or viewed by unauthorized individuals (Anandarajan, D'Ovidio, &Jenkins). In healthcare PHI is a high-value target due to the breaches that includes stolen prescriptions, fraud, and identity theft.…

    • 478 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    How SuccessfulIs Your Identity theft Protection? What is the ultimate effect of identity theft? If you become a sufferer of this white receiver criminal activity, your financial predicament are completely broken. It takes a lengthy time to recover from identity theft, especially if it took years before you learned about your regrettable situation. You should acquire the best id protection from theft because every responsible credit score holder should know how to avoid identity theft.…

    • 694 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Why Is Fcra Important

    • 586 Words
    • 3 Pages

    The Fair Credit Reporting Act (FCRA) was created by the federal government to determine how your credit information is handled. It affects the ways that credit reporting agencies protect your information. In addition, the FCRA requires these agencies to provide you with information about your credit record so that you can make sure that it is accurate. Protecting Your Credit With the Fair Credit Reporting Act, you are legally allowed free copies of your credit reports from the three largest credit bureaus.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Yes, many victims of identity theft crimes are not even aware that the crime has occurred until sometime well after the theft has been completed. As technology has advanced so have the methods an identity thief uses to commit their crimes. The days of a thief going through garbage to find the necessary information they need have been replaced by such things as RF card scanners where the perpetrator just passes by the victim and the scanner steals the information directly from the victims card without any awareness of what is happening. The best defense against identity thefts is for every person to be vigilant in how they handle their personal information. Everyone needs to utilize RF blocking wallets, along with shredding all records instead…

    • 160 Words
    • 1 Pages
    Decent Essays