SlideShare una empresa de Scribd logo
1 de 7
RESEARCH PAPER:
CYBER LAW
IDENTITY THEFT
CYBER LAW
My paper involved the aspect of identity theft within the
cyber world. As more and more people are using the internet
to conduct their lives identity theft is becoming more
prevalent.
I dealt with four aspects:
• How Identity theft occurs
• Protecting your identity
• Recovering from identity theft
• Technology in Cyber Law
CYBER LAW
How Identity theft occurs:
Many people fall under the threat and attack of identity theft
more often. Many times a person does not know they have
been a victim until it’s to late. Knowing how your identity is
taken it can help in preventing it not happening.
• Accessing your information online
• Stealing mail
• Getting robbed
• Having your pin number stolen at ATMs and gas pumps
CYBER LAW
Protecting your Identity:
Using common sense when it comes to your personal
information is critical. Using systems that are in place that can
be purchased or by your bank can help protect your identity.
Checking your credit report and securing social security and
driver’s license numbers helps with protection.
• Signing up for fraud alerts
• Place spending limits on your debit/credit cards
• Pulling a credit report
• Keeping up with your social security and driver’s license
number
• Place security questions on your accounts
CYBER LAW
Recovering from Identity theft:
Filing a police report is crucial in majority of all identity thefts
because a crime has happened to you. Freezing accounts to
protect your remaining money is one step. Contacting the FTC
and IRS is another step in tracking down the person(s) who
committed the crime. This can take weeks to months before a
resolution is handed down.
• Pull a credit report.
• File a police report on the fraudulent accounts.
• File a report with the Federal Trade Commission.
• Place a freeze on bank accounts.
• Contact the IRS and file a report if social security number is
used.
CYBER LAW
Technology in Cyber Law:
Technology makes our lives easier in today’s world, but it can be used
against us to take things from us. Using Data chips on your debit/credit
card can help protect your information. Even buying RFID wallets or
purses that block data scanners from accessing your information from
a distance or up close. Not place everything on social media, and using
hard access questions and passwords on emails can help with
protection.
• Biometrics being used to access accounts such as voice access,
eye, fingerprints, and face recognition.
• Using security USB drives with passwords.
• Thieves will use scanners to pull information from cards.
• Being mindful of what a person places on social media.
CYBER LAW
Works Cited
Experian. (2015, February 6). How Does Identity Theft Happen? Retrieved from
CreditReport.com: https://www.creditreport.com/blog/how-does-identity-theft-happen/
Fredman, C. (2016, January 5). New Scams to Avoid in 2016. Retrieved from Consumer
Reports: http://www.consumerreports.org/consumer-protection/new-scams-to-avoid-in-2016/
I.I.I. (2016, October 20). Identity Theft and Cybercrime . Retrieved from Insurance Information
Institute: http://www.iii.org/fact-statistic/identity-theft-and-cybercrime
LaPonsie, M. (2015, July 31). 9 Things to Do Immediately After Your Identity Is Stolen .
Retrieved from U.S.News: http://money.usnews.com/money/personal-
finance/articles/2015/07/31/9-things-to-do-immediately-after-your-identity-is-stolen
Renzulli, K. A. (2015, March 11). How To Get Your Money Back If Your Tax Refund Is Stolen.
Retrieved from Money Subscribe: http://time.com/money/3709141/stolen-tax-refund/
Weisman, S. (2016, January 9). How to avoid identity theft in 2016. Retrieved from USA TODAY:
http://www.usatoday.com/story/money/columnist/2016/01/09/weisman-avoid-identity-theft-
tips/78280302/
Woods, J. (2013, December 10). Technology That Can Help Prevent Identity Theft. Retrieved
from Identity Protection.com: http://www.identityprotection.com/education/protect-
yourself/technology-that-can-help-prevent-identity-theft

Más contenido relacionado

La actualidad más candente

PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and securityDheeraj Kumar Tiwari
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerceSudeshna07
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.pptshaks9151
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessJohann Lo
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsBlake A. Klinkner
 

La actualidad más candente (20)

PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber security
Cyber security Cyber security
Cyber security
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
 
Data security
Data securityData security
Data security
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
English in written
English in writtenEnglish in written
English in written
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 

Similar a Cyber Law (Identity Theft)

Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)ameyjakate
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptxSPMTPCAMPUS
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxSPMTPCAMPUS
 

Similar a Cyber Law (Identity Theft) (20)

Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Safeguarding Yourself from Identity Theft
Safeguarding Yourself from Identity TheftSafeguarding Yourself from Identity Theft
Safeguarding Yourself from Identity Theft
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
 
Identity theft
Identity theftIdentity theft
Identity theft
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 

Cyber Law (Identity Theft)

  • 2. CYBER LAW My paper involved the aspect of identity theft within the cyber world. As more and more people are using the internet to conduct their lives identity theft is becoming more prevalent. I dealt with four aspects: • How Identity theft occurs • Protecting your identity • Recovering from identity theft • Technology in Cyber Law
  • 3. CYBER LAW How Identity theft occurs: Many people fall under the threat and attack of identity theft more often. Many times a person does not know they have been a victim until it’s to late. Knowing how your identity is taken it can help in preventing it not happening. • Accessing your information online • Stealing mail • Getting robbed • Having your pin number stolen at ATMs and gas pumps
  • 4. CYBER LAW Protecting your Identity: Using common sense when it comes to your personal information is critical. Using systems that are in place that can be purchased or by your bank can help protect your identity. Checking your credit report and securing social security and driver’s license numbers helps with protection. • Signing up for fraud alerts • Place spending limits on your debit/credit cards • Pulling a credit report • Keeping up with your social security and driver’s license number • Place security questions on your accounts
  • 5. CYBER LAW Recovering from Identity theft: Filing a police report is crucial in majority of all identity thefts because a crime has happened to you. Freezing accounts to protect your remaining money is one step. Contacting the FTC and IRS is another step in tracking down the person(s) who committed the crime. This can take weeks to months before a resolution is handed down. • Pull a credit report. • File a police report on the fraudulent accounts. • File a report with the Federal Trade Commission. • Place a freeze on bank accounts. • Contact the IRS and file a report if social security number is used.
  • 6. CYBER LAW Technology in Cyber Law: Technology makes our lives easier in today’s world, but it can be used against us to take things from us. Using Data chips on your debit/credit card can help protect your information. Even buying RFID wallets or purses that block data scanners from accessing your information from a distance or up close. Not place everything on social media, and using hard access questions and passwords on emails can help with protection. • Biometrics being used to access accounts such as voice access, eye, fingerprints, and face recognition. • Using security USB drives with passwords. • Thieves will use scanners to pull information from cards. • Being mindful of what a person places on social media.
  • 7. CYBER LAW Works Cited Experian. (2015, February 6). How Does Identity Theft Happen? Retrieved from CreditReport.com: https://www.creditreport.com/blog/how-does-identity-theft-happen/ Fredman, C. (2016, January 5). New Scams to Avoid in 2016. Retrieved from Consumer Reports: http://www.consumerreports.org/consumer-protection/new-scams-to-avoid-in-2016/ I.I.I. (2016, October 20). Identity Theft and Cybercrime . Retrieved from Insurance Information Institute: http://www.iii.org/fact-statistic/identity-theft-and-cybercrime LaPonsie, M. (2015, July 31). 9 Things to Do Immediately After Your Identity Is Stolen . Retrieved from U.S.News: http://money.usnews.com/money/personal- finance/articles/2015/07/31/9-things-to-do-immediately-after-your-identity-is-stolen Renzulli, K. A. (2015, March 11). How To Get Your Money Back If Your Tax Refund Is Stolen. Retrieved from Money Subscribe: http://time.com/money/3709141/stolen-tax-refund/ Weisman, S. (2016, January 9). How to avoid identity theft in 2016. Retrieved from USA TODAY: http://www.usatoday.com/story/money/columnist/2016/01/09/weisman-avoid-identity-theft- tips/78280302/ Woods, J. (2013, December 10). Technology That Can Help Prevent Identity Theft. Retrieved from Identity Protection.com: http://www.identityprotection.com/education/protect- yourself/technology-that-can-help-prevent-identity-theft