Identity Theft

Fundamentals of Criminal Law by Adam J. McKee

In the modern era, identity theft is recognized as a significant criminal offense. Laws are designed to protect individuals’ personal information and prevent the unauthorized use of such data for fraudulent purposes. Federal statutes, along with state laws, provide a legal framework to combat this crime.

Federal Identity Theft and Assumption Deterrence Act

The Federal Identity Theft and Assumption Deterrence Act, established in 1998, represents a pivotal moment in the legal battle against identity theft at the federal level. It categorically criminalizes the act of knowingly transferring or using another person’s means of identification without lawful authority, especially when such actions are intended to commit or assist in unlawful activities. The breadth of this legislation is noteworthy as it encompasses a wide array of fraudulent activities.

For instance, it addresses crimes like credit card fraud, where perpetrators use stolen identity information to unlawfully acquire credit cards and rack up charges. Equally, it extends to more intricate crimes such as stealing social security numbers, a tactic often employed to commit more complex forms of identity fraud, including tax fraud or opening fraudulent accounts. This act serves as a robust foundation in federal law, aimed at curbing various manifestations of identity theft, thus offering a significant layer of legal protection for individuals’ sensitive personal information in an increasingly digital world.

State Laws

Most states have also enacted laws specifically addressing identity theft. These laws often complement federal legislation and may include additional protections or harsher penalties. State laws can vary significantly in terms of definitions, scope, and sanctions.

Elements of the Crime

Unlawful Acquisition of Personal Information

A key element is the unlawful acquisition of another person’s personal information. This can include stealing or obtaining personal data without authorization, such as social security numbers, bank account details, or personal identification numbers (PINs).

Intent to Commit Fraud

The perpetrator must have the intent to commit fraud or another crime using the stolen identity. This intent is crucial and separates identity theft from mere possession of another person’s information.

Use and Transfer of Stolen Identity

Fraudulent Use

Using the stolen identity to commit fraud, such as applying for credit cards, loans, or government benefits, is central to identity theft. The fraudulent use can result in financial losses for victims and financial institutions.

Transfer to Third Parties

The act of transferring the stolen identity to third parties for use in fraudulent activities is also punishable. This includes selling or giving away someone else’s personal information for unlawful purposes.

Legal Defenses and Exceptions

Lack of Knowledge

A defense often raised is the lack of knowledge or intent. If the accused can prove they were unaware that the information belonged to another person or did not intend to commit fraud, they may have a valid defense.

Lawful Authority

Another potential defense is having lawful authority to possess or use the information. This can apply in cases where the person had legitimate access to the data for specific purposes.

Penalties and Sanctions

Federal Penalties

Under federal law, identity theft can lead to significant fines and imprisonment. The severity of the penalties often depends on the magnitude of the fraud and the harm caused.

State Penalties

State penalties can include fines, restitution to victims, and imprisonment. Some states have minimum mandatory sentences for identity theft, reflecting the seriousness of the crime.

Conclusion

Modern laws against identity theft are comprehensive and robust, reflecting the serious nature of this crime. The emphasis is on protecting personal information, punishing perpetrators, and providing restitution to victims. As technology evolves, so do the methods of identity theft, making it imperative for legislation to adapt accordingly.

Modification History

File Created:  07/17/2018

Last Modified:  10/30/2023

[ Back | Content | Next]


This work is licensed under an Open Educational Resource-Quality Master Source (OER-QMS) License.

Open Education Resource--Quality Master Source License

 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.