Identity Theft
From Computing and Software Wiki
Line 9: | Line 9: | ||
* '''Account Takeover Identity Theft''' : Refers to the situation in which stolen information is used to gain access to existing accounts (criminal/thief ''uses'' your personal information). | * '''Account Takeover Identity Theft''' : Refers to the situation in which stolen information is used to gain access to existing accounts (criminal/thief ''uses'' your personal information). | ||
- | Identity Theft Resource Center (ITRC), a California based nonprofit organization working on prevention and understanding of identity theft, actually sub-divides identity theft into four different categories based on information provided by the victims. According to their annual victimization survey report, Identity Theft: The Aftermath 2006, ITRC uses the following four | + | Identity Theft Resource Center (ITRC), a California based nonprofit organization working on prevention and understanding of identity theft, actually sub-divides identity theft into four different types or categories based on information provided by the victims. According to their annual victimization survey report, Identity Theft: The Aftermath 2006, ITRC uses the following four types: |
- | *Financial: | + | *Financial:Includes both account takeover and creation of new account (this is statistically the most reported type). |
- | *Criminal: | + | *Criminal: Victim's name is provided to the law enforcement to avoid charges in thief/criminal's name. |
- | *Governmental: | + | *Governmental: Victim’s information used to obtain government benefits (employment, driver’s license, welfare, etc.). |
- | *Cloning: | + | *Cloning: Usually refers to the combination of other identity types or categories(because of this it is considered the most serious). |
Revision as of 22:22, 30 November 2007
Identity Theft - (also known as Identity Fraud) refers to crimes in which personal information is obtained without person’s and used by a criminal or an impostor to commit a fraud or a crime usually for the purpose of economic gain. Some information commonly used by the thieves is: social insurance number (SIN), driver's license, credit card or bank information, birth certificate, passport etc.
Contents |
Types
Identity theft is usually divided into two main types based on the uses of stolen information:
- True Name Identity Theft : Refers to the situation in which stolen personal information is used to open new accounts or obtain services (criminal/thief adopts your identity).
- Account Takeover Identity Theft : Refers to the situation in which stolen information is used to gain access to existing accounts (criminal/thief uses your personal information).
Identity Theft Resource Center (ITRC), a California based nonprofit organization working on prevention and understanding of identity theft, actually sub-divides identity theft into four different types or categories based on information provided by the victims. According to their annual victimization survey report, Identity Theft: The Aftermath 2006, ITRC uses the following four types:
- Financial:Includes both account takeover and creation of new account (this is statistically the most reported type).
- Criminal: Victim's name is provided to the law enforcement to avoid charges in thief/criminal's name.
- Governmental: Victim’s information used to obtain government benefits (employment, driver’s license, welfare, etc.).
- Cloning: Usually refers to the combination of other identity types or categories(because of this it is considered the most serious).