2. CYBER LAW
My paper involved the aspect of identity theft within the
cyber world. As more and more people are using the internet
to conduct their lives identity theft is becoming more
prevalent.
I dealt with four aspects:
• How Identity theft occurs
• Protecting your identity
• Recovering from identity theft
• Technology in Cyber Law
3. CYBER LAW
How Identity theft occurs:
Many people fall under the threat and attack of identity theft
more often. Many times a person does not know they have
been a victim until it’s to late. Knowing how your identity is
taken it can help in preventing it not happening.
• Accessing your information online
• Stealing mail
• Getting robbed
• Having your pin number stolen at ATMs and gas pumps
4. CYBER LAW
Protecting your Identity:
Using common sense when it comes to your personal
information is critical. Using systems that are in place that can
be purchased or by your bank can help protect your identity.
Checking your credit report and securing social security and
driver’s license numbers helps with protection.
• Signing up for fraud alerts
• Place spending limits on your debit/credit cards
• Pulling a credit report
• Keeping up with your social security and driver’s license
number
• Place security questions on your accounts
5. CYBER LAW
Recovering from Identity theft:
Filing a police report is crucial in majority of all identity thefts
because a crime has happened to you. Freezing accounts to
protect your remaining money is one step. Contacting the FTC
and IRS is another step in tracking down the person(s) who
committed the crime. This can take weeks to months before a
resolution is handed down.
• Pull a credit report.
• File a police report on the fraudulent accounts.
• File a report with the Federal Trade Commission.
• Place a freeze on bank accounts.
• Contact the IRS and file a report if social security number is
used.
6. CYBER LAW
Technology in Cyber Law:
Technology makes our lives easier in today’s world, but it can be used
against us to take things from us. Using Data chips on your debit/credit
card can help protect your information. Even buying RFID wallets or
purses that block data scanners from accessing your information from
a distance or up close. Not place everything on social media, and using
hard access questions and passwords on emails can help with
protection.
• Biometrics being used to access accounts such as voice access,
eye, fingerprints, and face recognition.
• Using security USB drives with passwords.
• Thieves will use scanners to pull information from cards.
• Being mindful of what a person places on social media.
7. CYBER LAW
Works Cited
Experian. (2015, February 6). How Does Identity Theft Happen? Retrieved from
CreditReport.com: https://www.creditreport.com/blog/how-does-identity-theft-happen/
Fredman, C. (2016, January 5). New Scams to Avoid in 2016. Retrieved from Consumer
Reports: http://www.consumerreports.org/consumer-protection/new-scams-to-avoid-in-2016/
I.I.I. (2016, October 20). Identity Theft and Cybercrime . Retrieved from Insurance Information
Institute: http://www.iii.org/fact-statistic/identity-theft-and-cybercrime
LaPonsie, M. (2015, July 31). 9 Things to Do Immediately After Your Identity Is Stolen .
Retrieved from U.S.News: http://money.usnews.com/money/personal-
finance/articles/2015/07/31/9-things-to-do-immediately-after-your-identity-is-stolen
Renzulli, K. A. (2015, March 11). How To Get Your Money Back If Your Tax Refund Is Stolen.
Retrieved from Money Subscribe: http://time.com/money/3709141/stolen-tax-refund/
Weisman, S. (2016, January 9). How to avoid identity theft in 2016. Retrieved from USA TODAY:
http://www.usatoday.com/story/money/columnist/2016/01/09/weisman-avoid-identity-theft-
tips/78280302/
Woods, J. (2013, December 10). Technology That Can Help Prevent Identity Theft. Retrieved
from Identity Protection.com: http://www.identityprotection.com/education/protect-
yourself/technology-that-can-help-prevent-identity-theft