Working with the Federal government I see daily the precautions taken to ensure that one’s identity is protected. This protection should be grant to the everyday people, as we are the ones at risk. Technology, strictly enforcing the laws against identity theft, and the purchase of a monitoring service …show more content…
Some individuals conduct research and there are those who meet at conferences to discuss the above. According to Passas, who attended a summit in which it was noted that legalities should be handled on a national level due to the sophistication of cyber-crimes. Computer based crimes are increasing, which calls for the needed advancement of provisions that establish the legal ramification against those who commit crimes against individual’s personal information by means of computers. Cases crossing numerous jurisdictions should be prosecutor friendly and handled in an expeditious manner. Passas further noted that in regards to financial fraud, security measures should be improved when individuals are banking on line. May student participate in on-line banking and shopping as this is more modern and convenient for their life …show more content…
Kenneally summarized how identity fraud is a major difficult for law enforcement (LE) to investigate, monitor, and track, as there are no standard way to globally record findings to be shared on a greater level. Project Who was created to establish continuality within the LE system to better assist those victimized by identify theft and fraud. If there is a ring of individuals using the same modus operandi (MO), sharing this information within a database system would greatly enhance LE. By increasing the ability to network cybercrime at the law enforcement level, college students from campuses throughout Texas can stay informed of campus crimes, as the LE could electronically track reported cybercrime by different criteria. It is alarming that individuals can lose their identity by their vehicle being broken into. How many students come on campus and lock their purse, briefcase, and or other personal items in the car? Individual’s personal information is also stolen by means of their medical records, maintained by their doctor’s office. In today’s world most medical records are electronic which may them more vulnerable to be compromised. Many college students may not think twice of providing information to a new medical facilities as they dorm may be located in a different state from the