Internet Privacy Protection Laws: Have They Been Successful In Protecting Individuals From Identity Theft Essay
Submitted By robb4242
Words: 1726
Pages: 7
The title of the proposed research topic is Internet Privacy Protection Laws: Have They Been Successful In Protecting Individuals From Identity Theft? Almost daily the news tells the story of a new case of identity theft. It is mostly left up to individuals to protect themselves, the government has seemed to be incapable of providing the protection necessary for our identity. The majority of laws and statutes passed regarding identity theft are reactive measures which allow for a person to recover a little easier from identity theft. The FTC estimates that it takes an average of six months and 200 hours of work to recover from identity theft, and this is just to ensure you are not liable for the debts that thieves incur in your name. It is really questionable whether the government is really helping people after identity theft, but it what are they doing to prevent it from happening to begin with?
To determine if the government is doing enough to protect the public, we need to understand the effectiveness of the current laws which prevent or deter identity theft. We need to determine if the laws we have now are effective in deterring criminals from attempting identity theft or if we need to create stronger laws in order to protect law-abiding citizens from this crime. To date, there is very little in the way of research in the effectiveness of identity theft laws. One of the reasons for this is that the majority of law is controlled by the individual state. Given the way the Internet works, seldom is the criminal and victim in the same state when the crimes occur. Even if there were a sufficient federal law, much of that would be compromised due many criminals residing outside of the United States. The criminals would need to be extradited to the United States in order to face prosecution.
I propose to study the effectiveness of the Virginia identity theft law and compare it to the law that is in effect in other states. In Virginia the state law for identity theft is § 18.2-186.3 - Identity theft; penalty; restitution; victim assistance. This law provides all of the coverage for identity theft in the state of Virginia. In addition to comparing the effectiveness of this law to other states, there are additional questions that will be attempted to resolve.
Are all state laws basically the same?
What makes the law different in other states?
How do the state and federal governments work together to enforce these laws since many happen across state boundaries?
Would we be better served making identity theft a federal crime and covered under federal law than leaving it to the states?
It is the hope of this researcher that the answer to these questions can open the debate which will lead to better protection for our citizens. Currently, with the rate of growth in the area of identity theft it seems like the government and the laws created to protect citizens have fallen behind and need to be caught up, but it needs to be done correctly. This study will show what works and does not work when it comes to providing a deterrence to committing identity theft.
In order to complete this study, we will use a mix of data collection methods from several different audiences. The goal of this research is to conduct analytical research. In this research we will be attempting to understand why the laws that currently protect personal identity work or do not work and provide an explanation for why it is that they work or do not work. The desire is that upon conclusion of the research we will have an idea of what can be done to better protect people’s identity from identity thieves and that we can present this to lawmakers so that the laws can be improved. To conduct this research we will use a mixture of quantitative and qualitative research methods (Howie, 2010).
The quantitative methods that we will be using include surveys and we will be conducting an analysis of arrests and conviction rates based on the identity theft
Related Documents: Internet Privacy Protection Laws: Have They Been Successful In Protecting Individuals From Identity Theft Essay
accepted 30 March 2003 Abstract The Internet has increasingly been used for communication between people. Most users have no problem relaying messages, which do not contain confidential information, over a network. Yet, for it to be accepted as a medium of conducting monetary transactions there will need to be a higher degree of confidence in the technology’s reliability and security. No one will agree to send his or her financial information over the Internet if there is any doubt in the security…
True/False 1. International, federal, and state laws and industry regulations mandate that organizations invest in cybersecurity defenses, audits, and internal controls to secure confidential data and defend against fraud and unauthorized transactions, such as money laundering. 2. People wanting to use their mobile devices at work has led to the practice of “bring your own device (BYOD)” 3. People wanting to use their mobile devices at work is part of a growing trend called Dual-Use Mobile…
Business Law Term Paper Legal Analysis of Dating Site User Agreement Chosen Site: eHarmony BUSI 2601B Dr. G. Levasseur March 8th, 2015 Table of Contents I Executive Summary 1 II Introduction 3 Overview and Objectives: 3 Methodology: 3 Business Relationship: 5 III Clausal Description and Explanation 6 Document 1: Privacy Policy (3 pages) 6 Document Two: Terms of Service (five pages) 18 IV Application of Legal Principles 32 V Lessons Learned, Recommendations and Example Scenario 46…
Computer crime involves: Theft by computer (including identity theft and phis hing) Software piracy and intellectual property misuse Software sabotage (malw are- including worms, viruses, Trojan horses, e tc.) Hacking and electronic trespassing. The computer crime dossier Computer crime: any crime accomplished through knowledge or use of computer technology Businesses and government institutions lose billions of dollars every year to computer criminals The majority of crimes is committed…
term of social media is becoming increasingly popular presently, the amount of social media users is growing dramatically, and the monetization of social media has been discussed in publications but not in details. Nowadays, the most frequently used approach to make money for social media is online advertising. However, the successful company like Tencent proves other potentials of monetization. Because the business model is critical to make profit for a company, a company’s financial performance…
Brothers Cover Printer: Leghigh-Phoenex Color Text Font: 10/12, Times Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within the text. Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation…