Wednesday, June 28, 2006

identity theft

Identity Theft

Information is collected about an individual almost from birth. The paper trail begins. The problem is that most individuals believe collected information about them would not be available to anyone beyond those who they freely provided such information. Specifically, personal information shared about where they live and who has access to their funds. This morning paper provides a glaring example of how folks private information gets into the hands of total strangers,with the unexpected theft of Allen County Government employees’ personal information.

Many folks believe that they have a right to privacy guaranteed under the fourth amendment to their personal effects, which would include their personal papers and money. However, when the government fail to protect this provision of the constitution when an individual's identity is stolen; the individual attempt to protect one self with insurance.

Now, that the government has gone after personal banking account, individuals again feel that government having access to all information somehow violates their right to privacy. We have a limited right to privacy. In order to maintain the limited protected right to privacy, we have the right to remain silent and hide our stuff. However, exercising the right to remain silent will not prevent you from going to jail, until you speak. Susan Mc Dougal landed in jail for refusing to testify against the late President William Clinton. The New York’s Times’ journalist Judith Miller went to jail for refusing to disclose her confidential source.

The government has determined that the theft of little folk’s money is not as important as money stolen from businesses or the government.



The most folks can do is to monitor their personal affairs. Keeping records of anyone you give your personal information to, family, friends, and even strangers. You are monitoring your own records to insure that the only person accessing your record is you. The government and private companies has provided you tracking tools to monitor others who are monitoring you. You must create an identity beyond your own personal identity. This is information that you share with no one including members within your circle. The moment that something shows up that is different from your routine you ought to check it out, because more than likely someone is tracking you.

Most petty theft is committed by those who are familiar with your personal habits, and personal contacts. Most individuals seeking identity theft is for personal gains, by having access to your money to support their lifestyle. Other types of identity theft are those seeking information about you,just to be nosy.

The government is creating laws to prosecute both types of individual who collect your personal information and use that information. These newly crafted laws can be compared to slander and libel laws, in order to prevent others from freeing disseminating information about you gained from sources other than you. With the internet it is so easy to obtain individuals’ information; such laws are a good thing from the bad guys.

No comments:

Post a Comment