logo

Technology and Identity Theft

   

Added on  2023-06-13

11 Pages2881 Words450 Views
 | 
 | 
 | 
Running head: Technology and Identity Theft 1
Technology and Identity Theft
Roselee Lopez
DeVry University
Technology and Identity Theft_1

Technology and Identity Theft 2
What is your narrowed topic? Be detailed in your answer. You can use any of the versions
you’ve developed for prior assignments.
I managed to narrow my topic to Technology and Identity Theft. The essay look into the
organization such as the Congress and the FTC which are tasked to deal with cases relating to
Identity fraud.
Who is your primary audience or reader? Why? Be detailed in your answer about your
audience.
I intend the audience to be my fellow colleagues in the department members and my lecturer
professor -------- since this thesis is academic related.
In a sentence or short paragraph, what is your thesis statement, including your angle?
Write what will appear in your essay.
My thesis will try to cover what various task forces elected by the government in trying to
eradicate the vice of Identity theft. From my point of view, it is well to note that the task force
officials which includes the Federal Government have developed better ways to combat as well
as eliminate identity theft. The specialized units have been formed that targets and uproots the
hide outs of the identity thieves. Assistance provided by the office of the Attorney which is in the
Technology and Identity Theft_2

Technology and Identity Theft 3
forefront in appointing and creating task forces groups. The attorney ensures that there is
organized meetings aimed at discussing issues brought up and try to resolve them.
My well-worn edge expresses that administration authorities have triggered an anxiety on the
governor over data fraud. On the off chance that the matters of shielding information and the
broad utilize and conveyance of Social Security numbers were appropriately tended to, it is less
demanding to stick point the immediate wellspring of data fraud. Additionally, if periodical
credit articulations were dispensed the matter would diminish.
What topic sentences will you use as the foundation of your communication? (If necessary,
add more points.)
Who should be held responsible for the increased cases of the Identity thieves is it the
victims, Congress or the Bureau? And which measures are to be taken to ensure that these
vices are eradicated? Is the task force doing enough to curb the issue?
What are the other methods that can be embraced to abolish Identity thieves?
Identity fraud can be successfully wiped out by formation of a team or working groups
that represents considerable authority in battling Identity theft.
Effects of Identity fraud on the lives of the victims socially, economically and
psychologically.
What method of organization and development will you use to develop your paragraphs?
Introduction:
Technology and Identity Theft_3

Technology and Identity Theft 4
o Identity fraud can prompt an overwhelming effect on one's monetary and
passionate dependability because of character hoodlums acquiring casualty's data
at regular intervals through the Internet or different methods for technology.
o The case of Lucy Angela who became a victim of Theft Identity despite being too
cautious on her side, how it affected her, and how she handled the situation as a
case study.
Body:
o Government has shown will to fight against Identity theft as they have created
specialized unit that will work closely with other forces such as the police and
other stakeholders involved so as to fight this gigantic vice. The office of the
attorney has assisted in providing much needed assistance by prosecuting the
culprits responsible as well as providing legal guideline and parameters to be
adhered. To eliminate the act of Phishing as well as pharming one should be able
to create a strong password as well as encrypting the files in transit.
o The task force has been put in place that will be mandated to help to combat the
vice. The congress has created rules and regulations that will help the FACTA to
address how social security numbers should be distributed and kept safe.
o So as to eradicate and avoid this gigantic iniquity of identity theft, strict adhering
to the rules and regulation set by the FACTA should be the key. There are other
regulatory that do offer proper regulatory policies such as the Federal Trade
Commission (FTC), and the congress in conjunction with the department of
Justice on the matter relating to the online and offline sensitive information.
Technology and Identity Theft_4

End of preview

Want to access all the pages? Upload your documents or become a member.