Verified Document

Sentencing Identity Theft For Monetary Term Paper

Question B: How would you incorporate the sentencing goals of retribution, incapacitation, deterrence, rehabilitation and restitution in your sentence of this individual for this particular crime?

Identity theft may often be a 'white collar' crime, but it is not a victimless crime. Jail time for a wide-spread scheme may be appropriate for this reason. Even if the victims whose identities were stolen did not suffer financial losses, the businesses such as the credit card companies who were defrauded may have experienced financial harms, and a loss of time as well as money. If possible, financial restitution might be appropriate especially if the crime was perpetuated by a syndicate of criminals or by an institution with substantial financial resources. The newly evolving nature of the crime may require that the guilty defendants be made 'examples' for the community.

As part of the sentencing, and perhaps for a reduction in jail time, the criminals might attempt to 'give back' to society, by educating...

This could have a positive effect upon the criminal's rehabilitation. The criminal must be made aware of the severity of the crime, and society must gain greater knowledge about how such crimes are perpetuated, and how people can protect their reputations and bank accounts against identity theft. As with all crimes of theft, there must be retribution, but society also has a great deal of learning to do about the offense, which can be accomplished through the use of creative community service sentencing techniques.
Works Cited

Amendment of Identity Theft and Assumption Deterrence Act." (1998). As amended by Public Law 105-318, 112 Stat. 3007 on Oct. 30, 1998. Retrieved 4 Mar 2007 http://www.ftc.gov/os/statutes/itada/itadact.htm#004

Identity Theft Resource Center. (2007). Nonprofit Website. Retrieved 4 Mar 2007 at http://www.idtheftcenter.org/curlaws.shtml

Sources used in this document:
Works Cited

Amendment of Identity Theft and Assumption Deterrence Act." (1998). As amended by Public Law 105-318, 112 Stat. 3007 on Oct. 30, 1998. Retrieved 4 Mar 2007 http://www.ftc.gov/os/statutes/itada/itadact.htm#004

Identity Theft Resource Center. (2007). Nonprofit Website. Retrieved 4 Mar 2007 at http://www.idtheftcenter.org/curlaws.shtml
Cite this Document:
Copy Bibliography Citation

Related Documents

Identity & Medical Theft Identity Theft and
Words: 644 Length: 2 Document Type: Essay

Identity & Medical Theft Identity Theft and Medical Theft Identity theft occurs when a victim's name, social security number, or other personal identifying information gets used to commit fraud or other crimes (Lafferty, 2007). Fraudsters use the information to set up loan accounts, draw from the victim's bank accounts, or set up other charge accounts in the victim's name. Identity theft is governed by the Identity Theft and Assumption Deterrence Act as

Insurance Fraud
Words: 11287 Length: 35 Document Type: Term Paper

Insurance Fraud After tax evasion, insurance fraud is considered the highest-ranked among white-collar crimes. The original concept of insurance, as a for-profit endeavor, was to collect funds from a large number of people to pay for damages and accidents that involved a small percentage of the population that paid premiums. Insurance fraud is an ever-growing problem. Solving or eliminating this problem requires the resources and knowledge of individuals or associations with

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Document Type: Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Police Corrupted
Words: 5292 Length: 16 Document Type: Research Paper

Course Number Police Corruption A Problem with the law Name [Date] Summary This paper will focus specifically on police corruption and the ways in which to lessen and decrease instances of police corruption. The first section includes an introduction explaining the effects of police corruption from rapes to murder and how it impacts society. It also expresses the need to act, as the United States becomes more like the exceedingly corrupt African countries of Nigeria and

Risk Minimization and Loss Prevention
Words: 16256 Length: 59 Document Type: Term Paper

Small Business' Need for a CPA One of the critical investments a small business can make to mitigate loss and risk is hiring a CPA and putting that CPA on the 'management team.' As Wells notes in his groundbreaking research, "Denise, a bookkeeper for a small trucking firm in Birmingham, Alabama, wishes she had never heard of Ralph Summerford, CPA. Because of his thoroughness, Denise is facing several years in prison

Dark Web, Darknet, Deep Web Essay
Words: 2173 Length: 7 Document Type: Essays

In this dark net essay, we will investigate the dark net.� We will describe what it is, what it is not, and how to access in it.� The essay will contain information about how the dark web became a way to engage in criminal activity, including: buying and selling drugs; buying and selling weapons; buying and selling fake IDs; trafficking in counterfeit goods; and buying and selling credit card information,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now