Essay On Identity Theft

1615 Words4 Pages

Privacy security breach, social networking, on-online data security and phishing can all in some way lead to identity theft. When one's personal information is overriden by an unknown person, either because the information was leaked from an agency or given by yourself on a social networking website. You may just have clicked on an URL that your not aware of, and given your information.

When sensitive information is lost, then use of such information can be so destructive that it leads to you losing your identity in society. When your details have been compromised, or erased by an mischievous person, or put to use in for different cause, then this sort of theft is very endangering to the person who lost it.

Identity, if to be is summarised, can be described as "Body + Information = Identity" (McNally, 2011).

Of course, we can say that fingerprints are one of the ways in which our identity can be proved, but personal information is definitely also a tool which is neccessary for proving your existence in society. This may be stored in the form of documentation such as Social Security Number, Passport etc.

There is a thin border line between biological evidence to information on the documents, such as your existence is obvious that you were born but information to support the location date and time of your birth is very relavant to your identity. Such information all constitutes your identity. Having said that identitying information such be kept safe or it can be used against us and can be harmful to our social existence.

The IRS (Internal Revenue Service) is the government agency responsible for tax collection and tax law enforcement in the U.S. (IRS, 2014). It has been striving to fight against Identity theft. They have rec...

... middle of paper ...

...hese connections. Technology has allowed us to extend and enhance our social lives, whether for business or personal reasons, and there is a much greater variety and richness in our relationships.

Devices such as smartphones have become essential - over 1 billion smart phones were sold worldwide last year (Zeman, 2014). However, our reliance on technology has its pitfalls, and we are also more vulnerable, often in ways we do not know or understand. If we are to maintain our security we need to find ways to do this that fit in with our lifestyles. We can change behaviours, by education and training, but ideally we should design in security from the ground up, rather than adding it on, or trying to force actions that people simply won’t follow because they find them irritating or think they’re simply not important. Security should be something that just happens.

More about Essay On Identity Theft

Open Document