Download presentation
Presentation is loading. Please wait.
Published byElisabeth Leonard Modified over 8 years ago
1
IDENTITY THEFT Allyson W. Haynes Assistant Professor of Law Charleston School of Law
2
What is identity theft? Use of an individual’s personal information, particularly financial information and social security numbers, to impersonate that individual – usually via credit card acquisition, etc. How does it come about? Hacking Hacking Phishing/vishing Phishing/vishing Poor disposal methods Poor disposal methods
3
How prevalent is identity theft? Average 4% of adult population victims Average 4% of adult population victims Online personal information disasters Online personal information disastersChoicepointLexisNexis VA records theft
4
What are relevant laws governing identity theft? Federal Legislation Fair Credit Reporting Act Fair Credit Reporting Act “FACT” Act “FACT” Act Identity Theft and Assumption Deterrence Act Identity Theft and Assumption Deterrence Act Computer Fraud and Abuse Act Computer Fraud and Abuse Act Electronic Communications Privacy Act Electronic Communications Privacy Act CAN-SPAM Act CAN-SPAM Act Gramm-Leach-Bliley Gramm-Leach-Bliley
5
Relevant law continued State Legislation State spam laws State spam laws Security breach notification laws Security breach notification laws State criminal identity theft statutes State criminal identity theft statutes Common law Huggins v. CitiBank NA, 585 S.E.2d 275 (S.C. 2003) (no tort of “negligent enablement of imposter fraud” in SC) Huggins v. CitiBank NA, 585 S.E.2d 275 (S.C. 2003) (no tort of “negligent enablement of imposter fraud” in SC)
6
What recourse does a victim have? Notifying companies who might have been used by the identity thief Notifying companies who might have been used by the identity thief Notifying government agencies Notifying government agencies Monitoring and/or freezing credit report Monitoring and/or freezing credit report Suit for failure to use adequate security pursuant to federal statute Suit for failure to use adequate security pursuant to federal statute
7
How can identity theft be prevented? Beware of providing social security numbers Do not provide any personal information or passwords in response to unsolicited email Avoid use of easily obtainable passwords Be careful what you reveal on online networking sites or other public sites Secure or shred information-laden documents
8
CONCLUSION
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.