Verified Document

Identity Theft Prevention, Detection, And Essay

When a Social Security number is stolen, contacting the Social Security Administration can help to place a watch on its use as well (SSA 2009). This particular problem can lead to many complications, as obtaining a new Social Security Number can create many difficulties for the victim while keeping the old number might allow the thief to continue using the victim's identity (SSA 2009). Generally, though, a new number is not necessary to stop most identity thieves. The government also plays a major role both in preventing identity theft and in addressing both the victims and the thieves after the crime has been committed. The Social Security Administration has set limits on the number of replacement cards an individual may obtain, as well as new and more stringent methods of identity verification when fulfilling a request for replacement cards (SSA 2009). Though this can also make things more difficult for victims and potential victims of identity theft, it is a much-needed precaution in the prevention of identity theft. Consumers can also file detailed police reports, called Identity Theft Reports, with most local police agencies; it night be difficult to have a report taken due to jurisdictional issues, but persistence usually wins out over attempts to resist filing a report by the police department, and the Federal Trade Commission can also assist in filing reports (ITRC 2009; FTC 2009). The U.S. Department of Justice is also involved in prosecuting many cases of identity theft through various federal statutes, including several...

But with the proper safeguards and precautions, individual consumers can protect themselves against cases of egregious fraud and theft. If everyone took the same precautions, the number of identity thefts -- and the number of identity thieves -- would be greatly reduced. Until then, carefully monitoring financial information associated with one's name and Social Security Number will remain essential.
Works Cited

FTC. (2009). "About Identity Theft." Federal Trade Commission. Accessed 2 October 2009. http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html#shouldyoufileapolicereportifyouridentityisstolen

ITRC. (2009). Identity Theft Resource Center. Accessed 2 October 2009. http://www.idtheftcenter.org/index.html

SSA. (2009). "Identity Theft." Social Security Administration. Accessed 2 October 2009. http://ssa-custhelp.ssa.gov/cgi-bin/ssa.cfg/php/enduser/std_alp.php?p_lva=&p_li=&p_accessibility=0&p_redirect=&p_page=1&p_cv=2.35&p_pv=&p_prods=&p_cats=16%2C35&p_hidden_prods=&cat_lvl1=0&p_search_text=&p_new_search=1&p_search_type=answers.search_nl

USDOJ. (2009). "Identity Theft." United States Department of Justice. http://www.usdoj.gov/criminal/fraud/websites/idtheft.html#whatdoing

Sources used in this document:
Works Cited

FTC. (2009). "About Identity Theft." Federal Trade Commission. Accessed 2 October 2009. http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html#shouldyoufileapolicereportifyouridentityisstolen

ITRC. (2009). Identity Theft Resource Center. Accessed 2 October 2009. http://www.idtheftcenter.org/index.html

SSA. (2009). "Identity Theft." Social Security Administration. Accessed 2 October 2009. http://ssa-custhelp.ssa.gov/cgi-bin/ssa.cfg/php/enduser/std_alp.php?p_lva=&p_li=&p_accessibility=0&p_redirect=&p_page=1&p_cv=2.35&p_pv=&p_prods=&p_cats=16%2C35&p_hidden_prods=&cat_lvl1=0&p_search_text=&p_new_search=1&p_search_type=answers.search_nl

USDOJ. (2009). "Identity Theft." United States Department of Justice. http://www.usdoj.gov/criminal/fraud/websites/idtheft.html#whatdoing
Cite this Document:
Copy Bibliography Citation

Related Documents

Prevention of Fraud
Words: 2387 Length: 6 Document Type: Essay

1500-Word Artefact Organization: Bank of England Fraud is intentionally deceiving a person such that he or she incurs a loss and the fraudulent person makes a gain. Instances of fraud can include misappropriation of funds or assets, inappropriate expenditures, fraudulent financial reporting etc. (Stephanie, 2008). A recent FBI statistic explores the extent of fraud in non-profit organizations. In its report, the FBI alleged that approximately 2,300 websites that solicited help for victims

Economic Impact of Online Identity
Words: 5767 Length: 20 Document Type: Thesis

The onus of who is responsible, the consumer, the private institutions, or even the government will come into question. A brief revue of the history of the credit card is also in order since the use of "plastic" money has certainly contributed to the identity theft crisis. Past and current legislation will be analyzed regarding this new crime in both its cyber and analog presentations. Lastly, an opinion and

Risk Minimization and Loss Prevention
Words: 16256 Length: 59 Document Type: Term Paper

Small Business' Need for a CPA One of the critical investments a small business can make to mitigate loss and risk is hiring a CPA and putting that CPA on the 'management team.' As Wells notes in his groundbreaking research, "Denise, a bookkeeper for a small trucking firm in Birmingham, Alabama, wishes she had never heard of Ralph Summerford, CPA. Because of his thoroughness, Denise is facing several years in prison

Insider Threats and Identity
Words: 1011 Length: 3 Document Type: Research Paper

Identity Governance and Administration Case Study 3_Technology and Product Review for Identity Governance and Administration While cyber security attacks are often executed by outsiders, insiders also present a major threat. Insider threats stem from, among other factors, user IDs and privileged accounts. This is particularly true at North-by-East Software, where controls over the issuance and management of user IDs and privileged accounts are considerably weak. The theft or loss of confidential information

Loss Prevention and Security
Words: 3607 Length: 11 Document Type: Research Paper

1. Introduction To prevent loss is one of the primary goals of the security system of a retail store. There are various tools, equipment, applications, and strategies that are used for retail security. However, this paper adopts a simple yet innovative approach towards preventing loss in the three identified auto stores – integration. Integration is an approach that seeks to improve the effectiveness of each specific loss prevention technology by thoughtfully

Data Breaches and Social Engineering
Words: 1639 Length: 5 Document Type: Essay

victims of an organization's data breach? The largest data brokers, government agencies, retailers, Internet businesses, financial institutions and educational institutions of the nation have disclosed a number of computer intrusions and data breaches. A data breach can take place in case of theft or loss of, or some kind of illegal access to the data that contains sensitive information which is personal and can compromise the integrity or confidentiality of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now