Identity Theft

Topics: Identity theft, Fair Credit Reporting Act, Credit card Pages: 2 (565 words) Published: October 29, 2012
Speech Outline
Identity Theft

There are 10 million victims of identity theft every year this breaks down to 19 new victims every minute of every day. What’s so bad about identity theft is that many victims don’t know they are victims until it is way too late. Identity Theft is a crime when someone uses another person’s personal identifying information without permission to commit fraud. This includes names, social security number, home information, and credit card numbers. According to the Federal Trade Commission you or someone you know may have experienced some form of identity theft. The Federal Trade Commission has handled more than 345,000 documented complaints which are about 39 percent of the total number of complaints this year. A victim of Identity Theft can be affected in many different ways this crime can hurt for months or maybe years of the person trying to clean up the mess thieves have made to a person good name and credit records. I will inform you today on how thieves are capable of stealing your identity, what the thieves do with your identity after it has been stolen, and ways you can deter or prevent your identity from being stolen. Body

I. How can thieves steal your identity? They may use varieties of ways to get a hold of a person’s personal information. A. They can steal your mail, wallet or purse
B. They can pose as legitimate companies and get your personal information through email like phishing or even lie to you over the phone. C. They may take your information from businesses or institutions by stealing personnel records bribing or conning employees whom have access to personal records.

II. What do thieves do with your stolen identity?
A. They may open up credit card accounts in your name when they use the cards and don’t pay the bills the delinquent accounts appear in your name. B. Change your billing address on your credit cards so that...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay on Cyberstalking: Identity Theft and Online Community Websites
  • Identity Theft Essay
  • Essay on Hacking: Identity Theft and Information
  • Cause and Effect Essay on Identity Theft
  • Essay about Preventing Phishing and Identity Theft at Client Side
  • Essay on Identity Theft White Collar Crime
  • Identity Theft Essay
  • Identity Theft Essay

Become a StudyMode Member

Sign Up - It's Free