943
Views
21
CrossRef citations to date
0
Altmetric
Original Articles

Counteracting Identity Fraud in the Information Age: The Identity Theft and Assumption Deterrence Act

Pages 183-192 | Published online: 21 Jul 2010

References

  • 1983 . Webster's New Twentieth Century Dictionary 902, , 2nd edn
  • Trubow , G B . 1994 . 'Protecting informational privacy in the information society' . N. Ill. U.L. Rev. , 10 : 521 526 The Department of Health and Human Services, the Selective Service System, and the Internal Revenue Service all cross-reference information using Social Security numbers. As a result, 'anyone who knows an individual's SSN can amass a wealth of highly sensitive information about that individual'
  • Indeed, the Internet is a veritable treasure trove of personal information where, starting with a person's name and address, one can find out, in a relatively short amount of time, 'what you do for a living, the names and ages of your spouse and children, what kind of car you drive, the value of your house and how much taxes you pay on it'(J Quitmer 'Invasion of privacy' Time, 25 August 1997, at 33 (quoting C Lane Naked in Cyberspace: How to Find Personal Information Online, 1997). See also The Stalker's Home Page: A Stalking We Go! (visited 8 December 1998) (listing hyperlinks to web sites containing addresses, phone numbers, Social Security numbers, property taxes, and similar information).
  • Hendricks , E . 1998 . 'Identity theft key to major medical fraud operation' . Privacy Times , 6 February : 3–4 For other illustrations of hardships suffered by victims of identity theft, see, e.g.
  • 1997 . 'Are You a target for identity theft?' . Consumer Reports , 62 ( 9 ) September : 11
  • Fickenscher , L . 1996 . 'Credit industry strains to stem tide of identity theft' . American Banker , 14 October : 12
  • McMenamin , B . 1996 . 'Invasion of the credit snatchers' . Forbes , 26 August : 258
  • 1996 . 'An identity crisis, an identity crisis' . Chicago Tribune , 24 September Section C ('Your money') at 7
  • Lemos , R . 1998 . 'Identity theft a big business' . ZDNet News , 15 April (visited 8 December 1998)
  • Grossman , M . 1998 . 'The other you: the misery of identity theft' . Broward Daily Business Review , 4 September : BI
  • 1998 . 'Identity theft: how to take steps to clear your name' . Orange County Register , 23 August : K4
  • Kristof , K M . 1998 . 'New law to assist victims in fight against identity fraud' . Los Angeles Times , 31 October : Cl
  • Lemos , R . 1998 . 'Protecting your digital ID' . ZDNet News , 13 February Theft and misuse of biometric identification data, including voice, retinal, and facial prints, are increasing in frequency. See, e.g.
  • Erikson , E H . 1980 . Identity and the Life Cycle , New York : W W Norton & Co . For an extensive treatment of the concept of 'identity' in its social and cultural context, see, generally
  • Ellis , V . 1998 . 'Thriving trade in fake drivers' licenses poses tough problem for DMV . Los Angeles Times , 5 April : A1 A26
  • Winn , J K . 1998 . 'Open systems, free markets, and regulation of Internet commerce' . Tul. L. Rev. , 72 : 1177
  • Ford , M D . 1998 . 'Identity authentication and "E-Commerce" ' . J. Info. L. & Tech. , (visited 8 December 1998)
  • Ferraro , A . 1998 . 'Electronic commerce: the issues and challenges to creating trust and a positive image in consumer sales on the World Wide Web' . First Monday , 3 ( 6 ) (visited 8 December 1998)
  • For a comprehensive discussion of information criminal and privacy protection law, see, generally, R T Nimmer Information Law, 8.01-.25 and 9.01-14

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.