Identity Theft

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 9: Line 9:
* '''Account Takeover Identity Theft''' : Refers to the situation in which stolen information is used to gain access to existing accounts (criminal/thief ''uses'' your personal information).
* '''Account Takeover Identity Theft''' : Refers to the situation in which stolen information is used to gain access to existing accounts (criminal/thief ''uses'' your personal information).
-
Identity Theft Resource Center (ITRC), a California based nonprofit organization working on prevention and understanding of identity theft, actually sub-divides identity theft into four different categories based on information provided by the victims. According to their annual victimization survey report, Identity Theft: The Aftermath 2006, ITRC uses the following four categories:
+
Identity Theft Resource Center (ITRC), a California based nonprofit organization working on prevention and understanding of identity theft, actually sub-divides identity theft into four different types or categories based on information provided by the victims. According to their annual victimization survey report, Identity Theft: The Aftermath 2006, ITRC uses the following four types:
-
*Financial:
+
*Financial:Includes both account takeover and creation of new account (this is statistically the most reported type).
-
*Criminal:
+
*Criminal: Victim's name is provided to the law enforcement to avoid charges in thief/criminal's name.
-
*Governmental:
+
*Governmental: Victim’s information used to obtain government benefits (employment, driver’s license, welfare, etc.).
-
*Cloning:
+
*Cloning: Usually refers to the combination of other identity types or categories(because of this it is considered the most serious).

Revision as of 22:22, 30 November 2007

Identity Theft - (also known as Identity Fraud) refers to crimes in which personal information is obtained without person’s and used by a criminal or an impostor to commit a fraud or a crime usually for the purpose of economic gain. Some information commonly used by the thieves is: social insurance number (SIN), driver's license, credit card or bank information, birth certificate, passport etc.


Contents

Types

Identity theft is usually divided into two main types based on the uses of stolen information:

  • True Name Identity Theft : Refers to the situation in which stolen personal information is used to open new accounts or obtain services (criminal/thief adopts your identity).
  • Account Takeover Identity Theft : Refers to the situation in which stolen information is used to gain access to existing accounts (criminal/thief uses your personal information).

Identity Theft Resource Center (ITRC), a California based nonprofit organization working on prevention and understanding of identity theft, actually sub-divides identity theft into four different types or categories based on information provided by the victims. According to their annual victimization survey report, Identity Theft: The Aftermath 2006, ITRC uses the following four types:

  • Financial:Includes both account takeover and creation of new account (this is statistically the most reported type).
  • Criminal: Victim's name is provided to the law enforcement to avoid charges in thief/criminal's name.
  • Governmental: Victim’s information used to obtain government benefits (employment, driver’s license, welfare, etc.).
  • Cloning: Usually refers to the combination of other identity types or categories(because of this it is considered the most serious).


Obtaining information

Reduce the risk

What to do if it happens to us ?

See also

External links

References

Personal tools