Identity Theft

Topics: Identity theft, Federal Trade Commission, Theft Pages: 4 (1364 words) Published: April 17, 2005

There is currently a huge growing number of criminals that now do greater and more widespread damage to their victims without ever meeting them. Identity theft surfaced in the early 1990s and turned peoples everyday transactions into a data gathering game. Bits of personal information such as bankcards, credit card accounts, income, social security numbers or just someone name, address, and phone numbers are now collected and could be used illegally by these individuals without anyone's knowledge.

The purpose of this study is to investigate what is being done to help control this growing crime in North Carolina. This includes the evaluation of the identity theft policies that the banks in North Carolina have in place. The study attempted to determine which bank had better and tougher policies as well as whether or not these security policies had helped reduce identity theft complaints in North Carolina since the date of it's origin. Background of the study

Identity theft is whereby an individual obtains some piece of an unsuspecting victim's sensitive information and uses it without their knowledge to commit fraud or theft. According to the Federal Trade Commission (FTC), "people whose identities have been stolen can spend months or years and their hard earned money trying to clean up the mess the thieves have made of their good name and credit record. Some victims have lost job opportunities, been refused loans for education, housing, cars or even arrested for crimes they didn't commit."

According to the FBI statistics, Identity Theft is the fastest growing crime in the U.S.'s (Tribune Business News, 2003). Identity theft thieves have perfected the art of collecting information of unsuspecting victims and now all the law enforcement agencies, as well as affected companies, are working hard to find ways to combat these issues.

There are several ways that identity theft thieves gain access to your personal information. Lost wallets,...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Identity Theft Essay
  • Essay on Hacking: Identity Theft and Information
  • Identity Theft Essay
  • Essay about Identity Theft
  • Essay about Identity Theft
  • Identity Theft Essay
  • Identity Theft Essay
  • Credit Protection and Identity Theft Essay

Become a StudyMode Member

Sign Up - It's Free