The typical definition of the term identity theft coined in 1964, says that it is the impersonation of someone else's identity to elicit undue monetary benefits, conceal personal identity and other things as well. The assault of privacy brings with it the threat of being held responsible for the predator's action. The purpose is to obtain credit card information and account information or any other such important information.
There are mainly two types of identity thieves, namely identity theft rings and individual identity thieves. Identity theft rings resemble little mafias with a boss and a group of underlings who do the more risky tasks, such as setting up credit accounts and going into retail stores to purchase merchandise using fake credit cards. Many rings actually manufacture valid-appearing credit cards, or hire specialists to do it for them. These types of theft rings use hit-and-run tactics, working in a fixed location for few months then disappearing.
Identity cloning identity theft is when the someone impersonates someone else and the victim may not come to know about this for an indefinite span of time. Cloning is mostly done to cover up identity and not perform any other heinous crime. Illegal immigrants may find this way the most suitable for survival.
In these days one's social security number is very easy to achieve. All a crook needs is an account with an information broker online and one's name and address. Then, give victim's social security number and a little additional information like DOB. Now all fields are set for identity theft. The thief can set up all kinds of charge accounts in victim's name, arranging to have the bills sent to a phony address so that it will take longer to catch on to what's happening.
In India, the rule for protecting identity has been established. It is the information technology Act 2000, at the 9th chapter, it is mentioned that if a person anyhow connected with the network system computer, if a person downloads, copy or extract any information of another without his/her permission, would be liable to identity theft of that person and have to pay it back and spend time in jail.
There are mainly two types of identity thieves, namely identity theft rings and individual identity thieves. Identity theft rings resemble little mafias with a boss and a group of underlings who do the more risky tasks, such as setting up credit accounts and going into retail stores to purchase merchandise using fake credit cards. Many rings actually manufacture valid-appearing credit cards, or hire specialists to do it for them. These types of theft rings use hit-and-run tactics, working in a fixed location for few months then disappearing.
Identity cloning identity theft is when the someone impersonates someone else and the victim may not come to know about this for an indefinite span of time. Cloning is mostly done to cover up identity and not perform any other heinous crime. Illegal immigrants may find this way the most suitable for survival.
In these days one's social security number is very easy to achieve. All a crook needs is an account with an information broker online and one's name and address. Then, give victim's social security number and a little additional information like DOB. Now all fields are set for identity theft. The thief can set up all kinds of charge accounts in victim's name, arranging to have the bills sent to a phony address so that it will take longer to catch on to what's happening.
In India, the rule for protecting identity has been established. It is the information technology Act 2000, at the 9th chapter, it is mentioned that if a person anyhow connected with the network system computer, if a person downloads, copy or extract any information of another without his/her permission, would be liable to identity theft of that person and have to pay it back and spend time in jail.
About the Author:
Looking to find the best deal on identity theft protection, then visit www.trust-guard.com to find the best advice on identity theft protection for you.
No comments:
Post a Comment