Planning and Reviewing of an Identity Theft Case Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

The planning and evaluation process of the identity theft case against the university professor will require several action steps. The actions that will be taken to recover the identity of the university professor will depend on the nature of the identity theft and the fraud committed.

The first step will be to request the professor to confirm the presence of any anomalies in his monthly statements. If he observes any anomalies on his credit cards statements, or financial reports, he will be advised to inform his credit agencies immediately (Dadisho, 2005).

The second action plan will depend on the errors detected in the professor’s monthly credit cards statements. Once the professor reports any anomaly, and the fraud team concludes there are grounds to believe a fraud has taken place, the fraud team will recommend to the professor that he files a preliminary fraud alert with his credit cards companies, or other agencies that deal with identity theft. He will also be asked to confirm his accounts details with these companies (Dadisho, 2005).

Once a fraud is confirmed, the professor will be advised to file a protest form with the trade agency and an identity theft statement with the local law enforcement unit. Following this step, the professor will be instructed to make several copies of the police report and preserve the originals in a secure place. These documents will facilitate the investigation process (FBI, 2012).

Depending on the nature of the identity theft, the professor will be advised to contemplate a second fraud notification. This type of alert lasts seven years. It obliges creditors to contact the professor in-person prior to opening new accounts. This final step helps creditors authenticate the identity of the person opening an account with them. This minimizes the chances of an identity theft (FBI, 2012).

How to Stop or Minimize Identity Theft

It is possible to stop or minimize identity theft. This argument is confirmed by the B. J. Thomas case. Miss Thomas lost 65,000 dollars in identity theft. A Federal Bureau of Investigation agent K. Barrows managed to solve this case, which was one of Americas’ long running fraud cases (O’brien, 2004).

With the advent and increase in identity theft cases in modern years, major credit agencies across the world such as Equifax and Experian, began recommending credit supervision and personality fraud facilities to their customers for a fee (Roberson, 2008).

Recommendations

I would recommend several measures to prevent and minimize odds of fraud as a result of identity theft. First, I would recommend close monitoring of credit cards. Given that credit card statements contain transactions history, watchful credit card users can observe anomalies in their transactions. In view of this, credit users may need to subscribe to identity theft monitoring services, as an additional safety measure.

Second, people should be advised to preserve their financial transactions data and review their monthly statements regularly to identify errors and anomalies in the statements. Third, people have to invest and install defense softwares in their computers. In addition, they should keep these computer applications updated, to protect against online hackers and other pilfering computer applications (Mitic, 2009).

I would also recommend to people to avoid sharing documents with private information, they be cautious of strange email with attachments and active links, they keep personal documents with sensitive data such as credit card numbers and bank account numbers protected and they stay informed about modern day frauds (Mitic, 2009).

References

Dadisho, E. (2005). Identity Theft and the Police Response: The Problem. Web.

Federal Bureau of Investigation. (2012). A stolen identity is a powerful cloak of anonymity for criminals, terrorists, and a danger to national security and private citizens alike. Web.

Mitic, S. (2009). Stopping Identity Theft: 10 Easy Steps to Security. Berkeley, California: Nolo.

O’brien, T. L. (2004). Identity Theft Is Epidemic. Can It Be Stopped? The New York Times, p. 1.

Roberson, C. (2008). Identity Theft Investigations. New York: Kaplan Publishing.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2018, November 6). Planning and Reviewing of an Identity Theft Case. https://ivypanda.com/essays/planning-and-reviewing-of-an-identity-theft-case/

Work Cited

"Planning and Reviewing of an Identity Theft Case." IvyPanda, 6 Nov. 2018, ivypanda.com/essays/planning-and-reviewing-of-an-identity-theft-case/.

References

IvyPanda. (2018) 'Planning and Reviewing of an Identity Theft Case'. 6 November.

References

IvyPanda. 2018. "Planning and Reviewing of an Identity Theft Case." November 6, 2018. https://ivypanda.com/essays/planning-and-reviewing-of-an-identity-theft-case/.

1. IvyPanda. "Planning and Reviewing of an Identity Theft Case." November 6, 2018. https://ivypanda.com/essays/planning-and-reviewing-of-an-identity-theft-case/.


Bibliography


IvyPanda. "Planning and Reviewing of an Identity Theft Case." November 6, 2018. https://ivypanda.com/essays/planning-and-reviewing-of-an-identity-theft-case/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1