-
1
-
-
84993048845
-
The Financial War on Terrorism and the Administration's Implementation of the Anti-Money Laundering Provisions of the USA Patriot Act: Hearing Before the Senate Comm. On Banking, Housing, and Urban Affairs
-
Identity theft can be distinguished from identity fraud. The latter is a broader term that refers to the criminal use of false identities or fraudulent identification documents. Identity theft is limited to the use of the means of identification of another person. A prime example of identity fraud is the 9/11 terrorists who procured drivers’ licences in their own names using false addresses supported by fraudulently obtained identification documents. US Senate, statement of Michael Chertoff, Assistant Attorney General; Willox, N. and Regan, T. (2002) ‘Identity Fraud: Providing a Solution’, Lexis-Nexis, March
-
Identity theft can be distinguished from identity fraud. The latter is a broader term that refers to the criminal use of false identities or fraudulent identification documents. Identity theft is limited to the use of the means of identification of another person. A prime example of identity fraud is the 9/11 terrorists who procured drivers’ licences in their own names using false addresses supported by fraudulently obtained identification documents. US Senate (2002) ‘The Financial War on Terrorism and the Administration's Implementation of the Anti-Money Laundering Provisions of the USA Patriot Act: Hearing Before the Senate Comm. On Banking, Housing, and Urban Affairs’, statement of Michael Chertoff, Assistant Attorney General; Willox, N. and Regan, T. (2002) ‘Identity Fraud: Providing a Solution’, Lexis-Nexis, March, pp. 1-17.
-
(2002)
, pp. 1-17
-
-
-
2
-
-
84993011592
-
Losses from Identity Theft to Total $221 Billion Worldwide
-
23rd May
-
Surmacz, J. (2003) ‘Losses from Identity Theft to Total $221 Billion Worldwide’, 23rd May, http://www.csoonline.com/metrics/viewmetric.cfm?id=551
-
(2003)
-
-
Surmacz, J.1
-
3
-
-
84898568755
-
FTC Overview of the Identity Theft Program
-
Federal Trade Commission, September, os/2003/09/timelinereport.pdf
-
Federal Trade Commission (2003) ‘FTC Overview of the Identity Theft Program’, September, http://www.ftc.gov/ os/2003/09/timelinereport.pdf
-
(2003)
-
-
-
4
-
-
84898362929
-
Identity Theft on the Rise, FTC Warns
-
KnightRidderBusinessNews, 4th September
-
DeMarrais, K. (2003) ‘Identity Theft on the Rise, FTC Warns’, KnightRidderBusinessNews, 4th September, pp. 1-4.
-
(2003)
, pp. 1-4
-
-
DeMarrais, K.1
-
5
-
-
84993011587
-
Identity Theft Costs Businesses $48 Billion a Year
-
Wall Street Journal, 4th September
-
Schaefer, S. (2003) ‘Identity Theft Costs Businesses $48 Billion a Year’, Wall Street Journal, 4th September, p. D2.
-
(2003)
, pp. D2
-
-
Schaefer, S.1
-
7
-
-
84992932443
-
They've Got Your Number
-
Inc., August
-
Cringely, R. (2003) ‘They've Got Your Number’, Inc., August, pp. 61-62.
-
(2003)
, pp. 61-62
-
-
Cringely, R.1
-
8
-
-
84993040922
-
Identity Theft Hits Millions of Americans
-
Knight Ridder Business News, 4th September
-
Fikes, B. (2003) ‘Identity Theft Hits Millions of Americans’, Knight Ridder Business News, 4th September, pp. 5-6.
-
(2003)
, pp. 5-6
-
-
Fikes, B.1
-
9
-
-
31444431752
-
Forcing the Choice Between Commerce and Consumers: Application of the FCRA to Identity Theft
-
Couch, C. (2002) ‘Forcing the Choice Between Commerce and Consumers: Application of the FCRA to Identity Theft’, Alabama Law Review, Vol. 53, pp. 583-597.
-
(2002)
Alabama Law Review
, vol.53
, pp. 583-597
-
-
Couch, C.1
-
10
-
-
84868092300
-
Business Identity Theft
-
Collins, J. (2003) ‘Business Identity Theft’, Journal of Forensic Accounting, Vol. 4, No. 2, pp. 303-306.
-
(2003)
Journal of Forensic Accounting
, vol.4
, Issue.2
, pp. 303-306
-
-
Collins, J.1
-
11
-
-
84993071325
-
Dismantling the Financial Infrastructure of Global Terrorism
-
‘Prepared Remarks Before the House Committee on Financial Services, hearing on ’, 3rd October
-
Lormel, D. (2001) ‘Prepared Remarks Before the House Committee on Financial Services, hearing on “Dismantling the Financial Infrastructure of Global Terrorism” ’, 3rd October, p. 6.
-
(2001)
, pp. 6
-
-
Lormel, D.1
-
13
-
-
84993059918
-
-
US v Massey No. 99-60116-01-AA (D. Or. 6th October).
-
US v Massey No. 99-60116-01-AA (D. Or. 6th October, 2000).
-
(2000)
-
-
-
14
-
-
34548684649
-
Identity Theft: The Crime of the New Millenium
-
Hoar, S. (2001) ‘Identity Theft: The Crime of the New Millenium’, Oregon Law Review, Vol. 80, No. 4, pp. 1423-1447.
-
(2001)
Oregon Law Review
, vol.80
, Issue.4
, pp. 1423-1447
-
-
Hoar, S.1
-
15
-
-
84993011564
-
-
Pub. L. No. 105-318, 112 Stat. 3010 (codified at 18 USC§1028).
-
Pub. L. No. 105-318, 112 Stat. 3010 (2003) (codified at 18 USC§1028).
-
(2003)
-
-
-
16
-
-
84993071280
-
-
Pub. L. No. 105-318, 112 Stat. 3010 (codified at 18 USC §1028(d)(4)).
-
Pub. L. No. 105-318, 112 Stat. 3010 (2003) (codified at 18 USC §1028(d)(4)).
-
(2003)
-
-
-
17
-
-
84992976976
-
-
Pub. L. No. 105-318, 112 Stat. 3010 (codified at 18 USC §1028(d)(4)(A)-(D)).
-
Pub. L. No. 105-318, 112 Stat. 3010 (2003) (codified at 18 USC §1028(d)(4)(A)-(D)).
-
(2003)
-
-
-
18
-
-
84993071289
-
-
Pub. L. No. 105-318, 112 Stat. 3010 (codified at 18 USC §1028(b)(1)(D)).
-
Pub. L. No. 105-318, 112 Stat. 3010 (2003) (codified at 18 USC §1028(b)(1)(D)).
-
(2003)
-
-
-
20
-
-
84993071292
-
-
75 Fed. Appx. 392 (6th Cir. ).
-
75 Fed. Appx. 392 (6th Cir. 2003).
-
(2003)
-
-
-
21
-
-
84992982887
-
-
346 F.3d 22 (2d Cir. ).
-
346 F.3d 22 (2d Cir. 2003).
-
(2003)
-
-
-
22
-
-
84992930884
-
-
US Dist. LEXIS 1331 (EDNY 2004).
-
2004 US Dist. LEXIS 1331 (EDNY 2004).
-
(2004)
-
-
-
23
-
-
84993099701
-
-
Pub. L. No. 106-102, 113 Stat. 1436 (codified at 15 USC §§6801-6827).
-
Pub. L. No. 106-102, 113 Stat. 1436 (2003) (codified at 15 USC §§6801-6827).
-
(2003)
-
-
-
24
-
-
84993020397
-
-
CFR §314.3(a).
-
16 CFR §314.3(a).
-
, vol.16
-
-
-
25
-
-
84993011427
-
-
CFR §314.4.
-
16 CFR §314.4.
-
, vol.16
-
-
-
26
-
-
0037791012
-
Update on Consumer Financial Privacy Legislation and Regulation
-
Benoit, M. and Lovoy, E. (2003) ‘Update on Consumer Financial Privacy Legislation and Regulation’, Business Lawyer, Vol. 58, pp. 1163-1179.
-
(2003)
Business Lawyer
, vol.58
, pp. 1163-1179
-
-
Benoit, M.1
Lovoy, E.2
-
27
-
-
84993059132
-
-
Pub. L. 104-191, 110 Stat. (2003) (codified at 42 USC §§1320 onward).
-
Pub. L. No. 104-191, 110 Stat. 1936 (2003) (codified at 42 USC §§1320 onward).
-
(1936)
-
-
-
28
-
-
84993076460
-
HIPAA: Data Trade Prosecutions on the Horizon?
-
Business Crimes, 12th October
-
Levine, R. (2003) ‘HIPAA: Data Trade Prosecutions on the Horizon?’, Business Crimes, 12th October, pp. 1-6.
-
(2003)
, pp. 1-6
-
-
Levine, R.1
-
29
-
-
84992982891
-
-
Pub. L. No. 104-191, 110 Stat. (2003) (codified at 42 USC §1320d-6).
-
Pub. L. No. 104-191, 110 Stat. 1936 (2003) (codified at 42 USC §1320d-6).
-
(1936)
-
-
-
30
-
-
84993090511
-
-
Pub. L. No. 104-191, 110 Stat. (2003) (codified at 42 USC §1320d-6(b)).
-
Pub. L. No. 104-191, 110 Stat. 1936 (2003) (codified at 42 USC §1320d-6(b)).
-
(1936)
-
-
-
31
-
-
84992966703
-
-
Pub. L. No. 98-473, 98 Stat. 2190 (codifiedat 18 USC §1030).
-
Pub. L. No. 98-473, 98 Stat. 2190 (2003) (codifiedat 18 USC §1030).
-
(2003)
-
-
-
32
-
-
84992988241
-
Potential Corporate Liability for Employee Computer Crime
-
Texas Lawyer, 5th January
-
Mills, T. and Cain, T. (2004) ‘Potential Corporate Liability for Employee Computer Crime’, Texas Lawyer, 5th January, pp. 19-20.
-
(2004)
, pp. 19-20
-
-
Mills, T.1
Cain, T.2
-
33
-
-
84992966691
-
-
Pub. L. No. 90-321, 84 Stat. 1128 (codifiedat 15 USC §§1681-1681t).
-
Pub. L. No. 90-321, 84 Stat. 1128 (2003) (codifiedat 15 USC §§1681-1681t).
-
(2003)
-
-
-
35
-
-
84993090492
-
-
Pub. L. No. 108-159, 117 Stat. (2003) (codified at 15 USC §1681 et seq.).
-
Pub. L. No. 108-159, 117 Stat. 1953 (2003) (codified at 15 USC §1681 et seq.).
-
(1953)
-
-
-
36
-
-
84993011470
-
Help on the Way for ID Theft Victims
-
MSNBC News, 26th November, 998144.asp
-
Sullivan, B. (2003) ‘Help on the Way for ID Theft Victims’, MSNBC News, 26th November, http://msnbc.com/news/ 998144.asp
-
(2003)
-
-
Sullivan, B.1
-
37
-
-
84992965818
-
-
California Civil Code §1798.82 onward
-
California Civil Code §1798.82 onward (2003).
-
(2003)
-
-
-
38
-
-
84993076427
-
One State's New ID Theft Act Has Worldwide Implications
-
New York Law Journal, 15th July
-
Treglia, S. (2003) ‘One State's New ID Theft Act Has Worldwide Implications’, New York Law Journal, 15th July, pp. 5-8.
-
(2003)
, pp. 5-8
-
-
Treglia, S.1
-
39
-
-
84949686191
-
Incidence of Workplace Identity Theft Signals Need for Proactive Measures
-
New York Law Journal, 15th December
-
Solomon, T., Gordon, P. and New, L. (2003) ‘Incidence of Workplace Identity Theft Signals Need for Proactive Measures’, New York Law Journal, 15th December, pp. 9-10.
-
(2003)
, pp. 9-10
-
-
Solomon, T.1
Gordon, P.2
New, L.3
-
40
-
-
84992965801
-
Uncle Sam Struggles to Stamp Out Identity Theft
-
Corporate Legal Times, October
-
Deligiannis, A. (2003) ‘Uncle Sam Struggles to Stamp Out Identity Theft’, Corporate Legal Times, October, pp. 20-22.
-
(2003)
, pp. 20-22
-
-
Deligiannis, A.1
-
42
-
-
84993011419
-
-
663 NW 2d 550 (Minn. ).
-
663 NW 2d 550 (Minn. 2003).
-
(2003)
-
-
-
43
-
-
84993099689
-
Employment Records Prove Ripe Source for Identity Theft
-
USA Today, 23rd January
-
Armour, S. (2003) ‘Employment Records Prove Ripe Source for Identity Theft’, USA Today, 23rd January, p. B1.
-
(2003)
, pp. B1
-
-
Armour, S.1
-
44
-
-
84993037800
-
-
263 F. Supp. 2d 1209 (D. Minn. ).
-
263 F. Supp. 2d 1209 (D. Minn. 2003).
-
(2003)
-
-
-
47
-
-
84993099664
-
-
Pub. L. No. 104-294, 110 Stat. (codified at 18 USC §§ et seq.).
-
Pub. L. No. 104-294, 110 Stat. 3488 (2003) (codified at 18 USC §§1831 et seq.).
-
(1831)
, vol.3488
-
-
-
49
-
-
84986018717
-
The Internal Auditor as Fraud-Buster
-
Hillison, W., Pacini, C. and Sinason, D. (1999) ‘The Internal Auditor as Fraud-Buster’, Managerial Auditing Journal, Vol. 14, No. 7, pp. 351-362.
-
(1999)
Managerial Auditing Journal
, vol.14
, Issue.7
, pp. 351-362
-
-
Hillison, W.1
Pacini, C.2
Sinason, D.3
-
51
-
-
3042825662
-
Remembrance ofData Passed: A Study ofDisk Sanitization Practices
-
January/February.
-
Garfinkel, S. L. and Shelat, A. (2003) ‘Remembrance ofData Passed: A Study ofDisk Sanitization Practices’, IEEE Security & Privacy, January/February.
-
(2003)
IEEE Security & Privacy
-
-
Garfinkel, S.L.1
Shelat, A.2
-
52
-
-
84993011458
-
Your Money or Your Life! Which Would You Rather Lost to Hackers: Private Customer Data or Your Website?
-
25th June
-
Chuvakin, A. (2001) ‘Your Money or Your Life! Which Would You Rather Lost to Hackers: Private Customer Data or Your Website?’, 25th June, http://www.security-watch.com/RES/June25.html.
-
(2001)
-
-
Chuvakin, A.1
-
53
-
-
34147189543
-
The Unlikely Heroes of Cyber Security
-
May/June
-
Groves, S. (2003) ‘The Unlikely Heroes of Cyber Security’, The Information Management Journal, May/June, pp. 34-40.
-
(2003)
The Information Management Journal
, pp. 34-40
-
-
Groves, S.1
-
54
-
-
84993076446
-
Insurers Offer Firms Identity Theft Coverage
-
15th January
-
Levick, D. (2004) ‘Insurers Offer Firms Identity Theft Coverage’, Knight Ridder Tribune Business News, 15th January, p. 1.
-
(2004)
Knight Ridder Tribune Business News
, pp. 1
-
-
Levick, D.1
|