Preview

Australia According To The Criminal Code Act 1995 (Cth)

Good Essays
Open Document
Open Document
1046 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Australia According To The Criminal Code Act 1995 (Cth)
According to the Criminal Code Act 1995 (Cth), identity theft occurs ‘when a criminal gains access to your personal information (such as your name, address, date of birth or bank account details) to steal money or gain other benefits.’ The legal issue to be addressed is that in an Australian society with increasingly complex social and technological advances, identity theft has progressively become more detrimental to victims. Current measures have only been somewhat effective in engaging with, and fighting this type of crime and this is due to the current legislations in Australia inadequately protecting society to the extent where there is a rapid upsurge in identity theft offences throughout the country. Another legal issue that needs to be addressed is whether sections 132.1 and 134.2 of the Criminal Code Act 1995 (Cth) (to be referred to as the Act), and section 134.2 (1) of the Crimes Act 1914 (Cth); inadequately protects victims and other stakeholders from identity theft and its detrimental consequences. Section 132.1 of …show more content…

The law being investigated is sections 132.1 and 134.2 of the Criminal Code Act 1995 (Cth). Part (1) of section 132.1 addresses the issue of identity theft being an individual who commits the offence of dishonestly receiving stolen personal identity, knowing or believing the identity is stolen. Under part (1) section 134.2 identity theft refers to an individual; by a deception, dishonestly obtaining financial advantage from another individual. Identity theft is commonly referred to as the fraudulent practice of using another individual’s name or personal information usually for financial

You May Also Find These Documents Helpful

  • Powerful Essays

    The legal fiction upon which Australia was founded refers to the British doctrine, “terra nullius”. The phrase translates to “land without ownership”. When Australia was founded, even though the colonisers acknowledged the presence of the Indigenous they considered the Aboriginals too primitive to be actual owners. The Aboriginals were considered too primitive with no identifiable hierarchy or political structure. This legal fiction had a significant impact on Australia with the widely known Mabo Case. In May 1982, Eddie Mabo and four other plaintiffs of the Murray Islands pursued confirmation of their traditional land rights in the High Court of Australia. Their claim had been that Murray Island (Mer) had been previously inhabited and had been possessed by the Meriam people with their own social and political organisations. After 10 years and the death of Mabo, on June 3 1992, the High Court ruled that the lands of Australia were not terra nullius when European settlement occurred and the Meriam people were entitled to the lands of Murray Island. Then in December 1993, the Native Title Act was produced as part of the Commonwealth’s response to the High Court’s decision to protect the native lands of Aboriginals. The legal fiction has therefore had a major impact on Australia’s legal history with the introduction of the Native Title Act where the Aboriginal and Torres Strait Islanders were compensated for the dispossession of their lands.…

    • 2019 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Wojna, Lisa. Identity Theft in Canada. Outrageous Tales and Preventions Strategies, 2012. Wed. 8 October 2014…

    • 2325 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    The power dynamic within employment relationships has a direct bearing, and often can be decisive in the outcomes of industrial disputes. Indeed, the ability of employees to effectively negotiate agreeable working conditions is dependent upon their actual or perceived ability to withdraw their labour. A powerful form of industrial protest available to employees and trade unions is the picket line. This essay aims to discuss the legal treatment of picketing under the current law in Australia and the range of relief options available for employers. Further, it will examine the whether the law should move beyond a merely formal recognition of workers’…

    • 1728 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    commonwealth law

    • 1509 Words
    • 7 Pages

    Before the formation of the Australia, there were six colonies ruling the land of Australia, which were Victoria, Queensland, Tasmania, New South Wales, Western Australia and South Australia (Harvey 2009). It was stated that each colonies has their own government and laws to manage the colonies.…

    • 1509 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    When people steal the identity of another person it causes that person to lose a lot of money feel…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Many principles of Classical Criminology can be seen in many forms of sentencing legislation and crime prevention methods used in contemporary society today. The Crimes Act ( Vic) 1958 is a prime example of legislation, which sets out an array of crimes and their prescribed punishments. One of the main points of the Classical School can be seen in this act, ‘the seriousness of the crime should be determined by the harm caused to society; crimes and punishments needed to be defined by legislature’. Section 18B of the Sentencing Act (vic) 1999 provides that the court may impose harsher sentences to offenders deemed a threat to the community. Another example in accordance to the principle that punishment should be proportionate to the crime and…

    • 160 Words
    • 1 Page
    Good Essays
  • Good Essays

    Australian Criminal Law

    • 788 Words
    • 4 Pages

    The codification of the Criminal Code has marked a watershed on Australian legal jurisprudence. In this essay I will discuss the problems that may occur when interpreting the Criminal Code (The Code), the creation of uniformity and the also accessibility that the Code creates.…

    • 788 Words
    • 4 Pages
    Good Essays
  • Good Essays

    "Identity theft is the unauthorized use or attempted use of an existing credit or debit card, bank account, telephone account, online account, or insurance account; the unauthorized use or attempted use of another person’s information to open such an account, secure a loan, or commit another crime; or the misuse of another person’s information for a fraudulent purpose" (Conklin, 2013, p. 58). The techniques performed by offenders to achieve identity theft can be very strategic, focusing on naiveness of focal groups. One example is where offenders impersonate government officials and ask for personal information with threats of losing benefits by not submitting. Due to this, the most appropriate theory that applies is rational choice theory.…

    • 258 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Provide three specific examples of how the Internet has aided criminal activity. One of the examples could be considered as identity theft. Identity theft is the use of one person 's personal information by another to commit fraud or other crimes. The most common forms of identity theft occur when someone obtains another person 's social security number, driver 's license number, date of birth, and the like and uses it to open a fraudulent bank, credit card, cellular telephone, or other account, or to obtain false…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The NSW criminal justice system relates to all areas associated with the law and law enforcement, including those who are incarcerated, on probation, or suspected of committing a criminal offence. In evaluating the effectiveness of the criminal justice system in NSW there are three issues which can be considered; alternatives to gaol, charge negotiation and the role of the courts. These issues promote or demote the effectiveness of the NSW criminal justice system, especially when evaluated in terms of equality, accessibility, resource efficiency, and the balance of rights for victims, offenders and society. These issues are also discussed widely in the media, which presents…

    • 844 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    concerns arising from this new medium. By mid-2001, the Federal government already had these major privacy…

    • 3371 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Morton, Heather "Identity Thieves: Let 's Catch Them If We Can." State Legislatures (2004). Academic Search Premier. EBSCO. Web. 21 Sept.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Identity theft is an important crime in society today and it needs to be heavily enforced and prosecuted. According to Transunion.com, As of 2015, 9.9 million Americans are victims of identity theft, with an incident happening on average every 19 seconds. This proves just how important of a crime identity theft is and that it should be better protected and have harsher consequences. The legal definition of identity theft according to Dakota Family Bank and Foundations of Computer Society is “the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.” Identity theft is in relation to the crime of stealing as if someone is committing Identity Theft, then they are taking the name of someone…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Identity Theft

    • 2587 Words
    • 11 Pages

    Bibliography: "Identity Theft: What to Do If It Happens to You | Privacy Rights Clearinghouse." Privacy Rights Clearinghouse | Empowering Consumers. Protecting Privacy. Web. 25 May 2011. .…

    • 2587 Words
    • 11 Pages
    Good Essays