You are on page 1of 21

1.

0 ABSTRACT

Identity theft is increasing at an alarming rate in Malaysia and globally. It has caused
millions of ringgit in losses and damage, especially to the reputation and credit health of
innocent consumers. But do you know what identity theft is? Could you possibly be the next
victim and if so how it could endanger you?

2.0 INTRODUCTION

2.1 Identity Theft

Identity theft or identity fraud occurs when someone steals information that defines
your personal identity such as your name, identity card number, bank account numbers, and
credit card numbers to reap the benefits of posing as you. Personal data that is highly
susceptible to being stolen include credit and debit card numbers, as well as information
regarding bank accounts, insurance policies and medical records.

This personal information is misused for different purposes such as opening new
account, gain control over victims credit account, gain benefits from government and
withdraw law by using fake identity. Unfortunately identity theft methods are hidden to the
victim because usually people is aware when they denied for new loans or credit cards,
disproved employment or when debt collector asks payment for a debt that victim did not cause.
Sometimes victims spend billions of money annually to compensate the effects of identity theft
and personal data breach.

Identity theft is a cybercrime growing rapidly in the world. Proper care must be taken
by the customers to protect their identity and it is also their responsibility to take measures to
disallow any data breach. 2011 was the year of data breaches, more than 232.4 million identities
were exposed as indicated in Figure 1.

Figure 1: Timeline of Identity Breach in 2011

1
2.2 The Dangers of Having Your Information Stolen

Thieves often use stolen credit or debit card information to make purchases, especially
online. They can call a bank and pretend to be the owner of a credit card, then cancel the credit
card of a victim citing various reasons, request a new card to be routed to an address where the
thief can receive it, and subsequently go on shopping sprees. In more serious cases, identity
theft may be used to facilitate or fund other crimes including terrorism, illegal immigration and
phishing. With sufficient stolen information, thieves can steal tax returns, pretend to be
someone else if arrested, or exhaust the victims medical insurance coverage (medical identity
theft). Some warning signs that you may be a victim of identity theft:

Youve been expecting a new credit or debit card to arrive in the mail but its way
overdue
You notice purchases you didnt make when you check your credit card statements
Important letters, packages or mail youve been expecting has consistently gone
missing
Youve received a litigation notice or court document for something youve not done.

2
3.0 RESEARCH FINDINGS AND ARTICLES
3.1 Main Article: Identity theft a huge concern for Malaysians

Identity theft a huge concern for Malaysians

Malaysians are becoming more and more vulnerable to identity theft as average income
increases and customers make more online purchases and transactions. Moreover, only one in
about four consumers check their credit reports regularly, a good practice to prevent identity
theft, according to a maiden consumer survey conducted by RAM Credit Information
(RAMCI). For the average person, checking their credit reports at least once a year is the least
they should do. Identity thieves can apply for loans or credit using the victims identity, which
will not show up on any bill until the loan is approved, paid out to the thief, and the repayment
bill is sent to the victim.

The survey found that 14% of respondents have experienced identity theft, while 26% knew
someone who had been a victim of the crime. It is important for consumers to check their credit
reports regularly to identify illegal activity, according to Dawn Lai (pictured), CEO of RAMCI.
Early detection is the key to minimising the damages fraudulent activities can have on their
credit profile.

A credit report is a record of ones borrowing history and repayment behaviour, which includes
a record of ones credit cards, loans or other credit facilities applied for and even involvement
in litigation cases. There are several steps one can take to keep an eye on their credit
transactions and ensure there is no identity theft. Checking your credit card bill for suspicious
transactions is a good practice, said Lai, as an advice to consumers. According to the survey,
while over 70% of respondents admitted to having some knowledge of credit reports, only a
small 28% of respondents make the effort to check their own. Of the small group who check
their own credit reports, 30% did so when their legitimate credit applications were rejected,
while 13% did it out of suspicion of identity theft.

By then, it may already be too late to prevent the fraudulent transaction, said Lai. The process
to resolve fraudulent transactions can take up to months if not years, which may delay victims
from making possible investments or milestone purchases such as buying a home. In cases
where there are inaccuracies or disputes regarding information found in the credit report,
consumers should contact the Credit Reporting Agency (CRA), who are duty bound by the
Credit Reporting Agency Act set in 2010, to verify and rectify the information free of charge.

Our survey shows that more than half of respondents are unaware of the CRAs responsibility
to provide accurate and updated information to its subscribers, said Lai. This survey is the
first step RAMCI is taking to ramp up educational efforts to help consumers take control of
their credit information and protect themselves against identity theft. Lai stressed again: Dont
wait till you notice suspicious activity in your credit profiles. Take the initiative to keep up to
date and monitor your credit report to avoid identity theft.

(Source: http://www.marketing-interactive.com/identity-theft-a-huge-concern-for-malaysians-says-report/)

3
3.2 Supporting Article: Beware of identity theft risks

Beware of identity theft risks


KUALA LUMPUR, Jul 29: Manan (not his real name), a security guard, in his mid-twenties,
at first couldnt care less when his friends told him about RAM Credit Information Sdn Bhd
(RAMCI), Malaysias leading credit reporting agency.
The agency was conducting an awareness campaign on credit management at Manans work
place in Ipoh.

He finally relented to his friends persuasion and checked his credit report for free with
RAMCI. It was most fortunate and timely that he checked his credit report.

He was shocked to find out there was a RM10,000 loan application under his name pending
approval. A loan that he never applied! The startled guard was advised to contact the bank and
cancel the loan before the money was disbursed to an unknown individual.

How did it happen? Someone had used Manans personal details to apply for the loan.

Not isolated cases


In another case, Ng (not his real name), 33, from Kota Baru had no idea of identity theft until
he ran into problem himself.
One day he received a notice from an electronics and furniture retailer informing him on the
outstanding amount totalling RM11,200 for four items purchased from the retailer.
Ng quickly made a police report and met the retailer to seek information on the purchase. He
was informed that the transaction could be traced in the credit report. So he contacted RAMCI,
and was told the information on the transaction would be released when the investigation was
over.
(Source: Bernama, 29 July 2016, 03:25PM)

These were the two identity fraud cases disclosed by RAMCI to Bernama recently that
involved identity theft. Based on the agency's maiden consumer survey, 14% of respondents
had experienced identity theft first hand and 26% knew someone who had been a victim.
RAMCI CEO, Dawn Lai described the result as worrying and that the public should be alarmed.

A credit report is a record of one's borrowing history and repayment behaviour. It


includes a record of one's credit cards, loans or other credit facilities applied for, and even
financial litigation cases. According to RAMCI's Consumer Survey, there is a lack of
awareness among consumers on credit reports. While over 70% admitted to having some
knowledge regarding credit reports, only 28% took the trouble to view theirs. Of those who
viewed their credit reports, up to 30% of the respondents did it when their legitimate credit
applications were rejected while 13 percent did it because of suspected identity theft.

4
Methods used to fraudulently obtain one's personal information are through stolen
MyKads or credit cards, loss of personal documents in the mail and inadvertently giving out
personal information to fraudulent phone calls and emails. Furthermore, based on those article,
we have identify that identity theft may could cause major financial loss. In some cases, in
which the loan has been disbursed, the victims have to pay for the loan while waiting for the
case to be resolved. This is to avoid their own credit record from being blemished or their name
blacklisted.

In order to guard ourselves against identity theft, she said that the widespread use of
biometric verification, particularly by banks and other main institutions has helped in
protecting their clients identity. However, there are many non-bank credit providers namely
furniture retailers and motorcycle hire purchase loan providers who have yet to implement such
safety measure. Therefore, she stressed that early detection was the key in minimising the
damage caused by identity theft.

For the average person, she strongly suggested that they check their credit reports at
least once a year. However, for a more comprehensive protection the agency offers an identity
theft protection plan namely the My Credit Watch (MCW). With a minimal annual fee, the plan
checks and monitors the credit report daily and alerts its subscribers to important changes in
their report. RAMCI, according to her, would continue to promote awareness on good credit
management and the importance of viewing one's credit profile throughout the year. Afterall,
she concludes:

"We envisage that in the future all parties and individuals will utilise the credit report,
not just those who grant credits, but also employers and landlords who can get information of
their potential employees or tenants credit background respectively from the report. Thus
will lead to better financial and credit management among the people.

5
3.3 TECHNIQUE USED AND DOCUMENTED IN IDENTITY THEFT

There are many different types of schemes identity criminals use. This can range from
non-technological to technological schemes. The following is a listing of just some of the most
common methods identity criminals have been known to use to obtain your personal
identifiable information.

Non-Technological Methods

Old-fashioned theft: Old-fashioned theft is a popular identity theft technique. It occurs


when a thief will break into a home, car or bank to obtain documents and information. They
will even pickpocket or go through unattended bags to get fast cash, credit cards or other
personal information.
Dumpster diving: It occurs when a thief going through trash to obtain items with personal
information on them such as old receipts, bank statements, medical insurance, utility bills
and personal information that has been tossed in the trash without being shredded.
Shoulder surfing: It occurs when a thief overhearing a person give out personal
information over a public telephone or cell phone or looking over a person's shoulder as
they use an ATM or fill out forms. To bribe employees to hand over personal customer
information and physically stealing confidential files or computer hard drives in which
identity information is stored.
Mail theft: It occurs when someone targets your mailbox and removes mail that has
pertinent information on it. Thieves have been known to re-route your mail without your
knowledge or permission by submitting a change of address to the post office.

Technological Methods

Pretexting: It occurs when a thief call someone pretending to be a bank official, survey
taker, IRS agent or other official in order to make them divulge their personal information.
Skimming: It occurs when a thief acquiring personal information by a copying a cards
magnetic strip through a fake card reader. Once the card is swiped, the information from
the magnetic strip is downloaded and can be used to create a forged card.
Phishing: It occurs when someone is receiving an email from someone claiming to be a
legitimate organization, such as a bank or credit card company, in an attempt to get the user
to surrender private information to be used for identity theft.

6
3.4 COMMON TYPES OF IDENTITY THEFT

3.4.1 Financial Identity Theft

Financial identity theft occurs when a persons credit card and bank account
information is stolen and used to purchase goods and services. Financial identity theft is the
most common form of identity fraud. When people hear the words identity theft, they often
think of credit card fraud, when thieves use stolen credit cards or card numbers to purchase
goods and services. It its not detected in time, credit card fraud can max out your accounts and
affect your credit rating. There are also other more potentially serious forms of financial
identity theft. Thieves can use stolen bank account numbers, debit card numbers or other
personal and financial information to wipe out your accounts, take out loans or get new credit
cards.

3.4.2 Social Security Identity Theft

Social security number (SSN) is known as a national identification card number used
by the country of United States. In Malaysia, the citizens identity card known as MyKad card
has an embedded microchip that contains the individuals personal information including
access to bank accounts. With your MyKad card, thieves can access your taxes and work
history, bank accounts, credit cards, loans, government benefits and sometimes your medical
records. They can use your MyKad card to get a loan or a passport, file for your tax return or
claim your retirement benefits. Even if youre careful with your MyKad card and financial
documents, MyKads are one of the most valuable pieces of personal information stolen in data
breaches.

3.4.3 Medical Identity Theft

When someone takes or uses your health insurance, they are committing medical
identity theft. Thieves use the insurance themselves or sell it to someone who will pose as you
to get healthcare services. There is the danger of the thiefs medical records being merged with
your own. Doctors use your medical history to make informed decisions about treatment and
to diagnose illnesses or conditions based on your current and past medical history. Inaccurate
information can result in misdiagnosis or harmful treatment procedures. It can also use up your
medical benefits and leave you facing bills for medical treatment you didnt receive. Recovery
from medical identity theft is complicated because of healthcare privacy laws.

7
3.4.4 Drivers License Identity Theft

Criminals have many ways to use a stolen drivers license or information from a
drivers license. They may alter the picture on a drivers license and sell it to someone who fits
the description on the license or they may use the number to create a completely fake ID card.
If the imposter is caught for a traffic violation, drunk driving or drug-related charge, the crime
goes on your record. When the violator doesnt show up in court, police will be looking for
you. Drivers licenses are also shown to cash checks, pass domestic airport security, get
insurance and to provide ID for many activities, so an imposter could commit all kinds of
crimes that would be traced back to you.

3.4.5 Child Identity Theft

It occurs when a child's identity can be stolen when criminals create what is known as
a "synthetic identity," a process by which crooks "combine a child's identification card number
with a different date of birth. Children tend to have little or no financial history, and thieves
assume that no one is checking a childs credit report. Criminals can use a childs identification
card number to falsely claim dependent children or welfare payments from the government,
and to create fake ID documents that they can use to apply for loans or even commit crimes.

3.4.6 Criminal Identity Theft

As one of the most common types of identity thefts in America, criminal identity theft
affects numerous individuals. This type occurs when an individual commits a crime under
another persons name. Once a thief has your identity, they can commit crimes undercover by
using your name. When victims call the police or the criminals are cited or arrested, law
enforcement will be given your name, resulting in a warrant or a criminal record. You then
may have problems with employment background checks, face legal action or even be arrested.
Criminal identity theft is uncommon but potentially serious.

3.4.7 Tax Identity Theft

This identity theft occurs when someone uses your stolen identification card number to
file a tax return claiming a fraudulent refund. Tax identity theft manifests itself through
fraudulent tax refund claims. Criminals send these claims to the Internal Revenue Service (IRS)
using stolen personal details such as your identification card number and name. This can delay
your ability to access legitimate tax refunds, causing frustration and loss of funds.

8
3.4.8 Insurance Identity Theft

This type of identity fraud is closely related to the previously mentioned medical
identity theft and is sometimes viewed as being the same. It occurs when perpetrators steal
medical identity information to access your insurance in order to receive medical treatment.
This may have serious impact on victims as it can lead to higher insurance premiums and huge
medical bills.

In addition to medical identity theft, thieves can use stolen identities to claim other
kinds of insurance and benefit. For example, someone using a stolen identity could have an
accident (or multiple accidents) and make auto insurance claims. Insurance identity fraud can
result in higher premiums, denial of insurance or legal action if the insurance company
discovers the fraud and blames it on you.

3.4.9 Synthetic Identity Theft

Synthetic identity theft is one of the most sophisticated kinds of identity fraud. It occurs
when criminals use your identification card number in combination with fake information.
They may use a combination of fake credentials including addresses, names, birth dates and
other details resulting in the creating of new identities.

This enables the fraudsters to open new credit card accounts or access other financial
services. They may also use their new identities to build credit or apply for jobs. Important to
note is the fact that the main identifying source of information is the stolen Social Security
Number. Everything else is a tangled up mess of lies aimed to deceive you, lenders and law
enforcement agents.

9
3.5 EFFECTS OF IDENTITY THEFT

Unlike the theft of a watch or stereo, identity theft can result in serious consequences
that take both time and money to resolve, not to mention the emotional distress victims often
feel. Here are ways in which identity theft can affect your life and your future.

3.5.1 Financial Effects of Identity Theft

Of course, the most obvious loss is financial. If the thief has access to your checking,
savings or investment accounts, they can steal funds from your account. Victims of identity
theft can suffer many negative financial effects including, paying higher interest and insurance
rates, being denied for loans or lines of credit, and multiple bank fees, to name a few. The
following are a few things identity thieves may use your identity. Firstly, identity thieves may
call your credit card issuer to change the billing address on your credit card account. The
imposter then runs up charges on your account. Because your bills are being sent to a different
address, it may be some time before you realize there's a problem. This can result in unexpected
calls from creditors, and extensive damage to your credit rating.

Other than that, someone may open new credit card accounts in your name. When
someone else uses your credit and doesn't pay the bills, the delinquent accounts are reported
on your credit report. Moreover, a bank account could be opened in your name and bad checks
written on that account. Not only will this affect your ability to write and cash checks, if
fraudulent checks are written, you may end up with a warrant out for your arrest depending on
the degree of seriousness.

Furthermore, counterfeit checks or credit or debit cards may be obtained, or


authorizations for electronic transfers in your name to drain your bank account. No one wants
to have checks written for bills or go to withdraw cash, and find that not only is there no money
to cover these checks, but negative balance fees will be assessed to your account, sending you
in a major tailspin. Lastly, an auto loan or insurance policy may be taken out in your name.
This will not only increase your debt, but when the bills are not paid, collectors will call you
for payment, and report you to the credit bureaus.

10
3.5.2 Criminal Effects of Identity Theft

Identity thieves are not always after financial gain. Often, criminals will commit crimes
under their victim's name, thereby bypassing any negative effect to their criminal record under
their true name. It may seem farfetched, but if a criminal steals your identity and uses it to
commit a crime, you could get a criminal record. A crook could obtain an identification card
with your information and when that crook is arrested for a crime, the charges go on your
record. And if the crook skips bail or doesnt appear before court, its no loss to him because
the authorities have a warrant out for you. The worse part is that you may not even know that
you have a criminal record until you are pulled over for a traffic violation and arrested or when
you apply for a job and are turned down after a background check.

By using another person's identification or even several different identifications,


criminals who run meth labs, drug rings, and other illegal activities are creating a record for
victims completely unbeknownst to them. Once a criminal record is created and court dates are
put in place, when the identity theft victim unknowingly misses a court date, the consequence
is a warrant issued in their name. All it takes now is to get pulled over for a minor traffic
violation, and find yourself in handcuffs in the back of a police car.

Identity thieves can use a stolen identification across many states, creating a trail of
crimes and records that can sometimes be difficult to find out about. That is, until the most
inopportune time comes, and the victim finds out in the worst way possible, by being treated
as a criminal. If you become a victim of identity theft and the thief creates a criminal record
for you, it can be very difficult to clear your name and prove that you are not the one who
committed the crimes. The effects of identity theft can cost someone a job when a background
check is performed, land one in jail, and cause problems in renting housing.

11
3.5.3 Emotional Effects of Identity Theft

Identity theft is an intrusive crime and victims may seem violated as they discover what
damaging effects have occurred as well as wonder what else can happen. By not letting identity
theft overtake your like emotionally, you will have better control over the situation and be able
to handle it more effectively.

If your identity theft occurred as a result of carelessness on your part with your personal
information, you may have the feeling of guilt, and resentment. But regardless of what led to
the identity theft, you must now learn from your mistakes and move on to resolving your case
and becoming more aware of how to prevent the crime from occurring again in the future.

You may also be feeling overwhelmed, stressed, and confused about how to proceed
once you find out you have been victimized. There are several steps involved in returning your
life to "normal", and it may seem like more time, effort, or emotion than you can afford. But
there are resources to turn to for help. By turning to an expert in resolving identity theft issues,
you can become more assured that your case is being handled correctly and effectively. By
getting help with restoring your identity, you will relieve some of the stress of worrying about
what comes next, and how much time it will take away from your personal and work life.

It is not uncommon to feel you have been violated, and your privacy has been taken
away from you. It may help you to talk with a professional about your feelings and help you
regain your sense of trust and personal security. If your identity was stolen by a family member
or someone close to you, you may also feel betrayed by this person. Again, this is another
reason you may want to talk with a professional as you not only have the emotions associated
with identity theft, but ill emotions towards your family or friends.

Depression can become an emotion that takes over as you battle through financial or
worse, criminal effects of your identity theft. You can overcome the depression with help as
well as the effect you are contending with. Do not think you have to face everything alone, and
resolve your issues without assistance. You can recover from identity theft, and all of the effects
associated with if you know where to turn.

12
3.6 EXPECTED LOSS

Identity theft is a major crime in Malaysia costing millions of ringgit. Your identity
might be stolen for someone to commit financial fraud and other criminal activities involving
car and housing loans, credit card transactions, mobile phone bills, property deals and company
registrations. Many have fallen prey to fraudsters using their identities.

According to one of our local newspapers, it mentions that Malaysians have lost RM4
millions through phishing (one of identity theft method) within the first three months of the
year alone. There were 457 cases recorded in the first quarter of the year, exceeding the 353
reported for the whole of last year where the victims lost a total of RM1.2 millions. In 2009,
only 75 cases were reported with total losses of around RM215,000. Federal Commercial
Crime Investigations Department director Commissioner Datuk Syed Ismail Syed Azizan said
the number of cases reported this year had reached a record high with authorities and the
banking industry being almost powerless to curb it.

Bank Negara Malaysia (BNM) has warned of an email aimed at deceiving members of
the public into disclosing their personal banking details. A statement issued by the central bank
Thursday said the email, which claims to be from Bank Negara, urges people to update their
account details through a provided hyperlink. Intended victims receive emails purportedly
from BNM, informing them that BNM is collecting personal banking information to update its
database. They will be prompted to either click on a link or reply to the email directly. Once
the victim clicks on the link provided in the email, they are directed to a fake website requesting
disclosure of personal financial details such as credit or debit cards details including card code
verification or other personal identification numbers (PIN), the statement said.

Statistics for identity theft is on the increase annually. In 2008, identity theft affected
10 million victims most of them did not have the chance to get help to recover from their losses
nor given protection by their home country (Tom, 2009). In Malaysia, the citizens identity
card known as MyKad has an embedded microchip that contains the individuals personal
information including access to bank accounts. Previously, it was easy for Malaysians to
acquire the MyKad from the National Registration Department. However, with reported losses
of cards amounting to 2,123,611 the past seven years, the Parliamentary Secretary of the Home
Affairs Ministry, Datuk Abdul Rahman Ibrahim announced that fines will be imposed to
compel people to be more responsible with their MyKad. This year, 58,839 people lost their

13
MyKad, which means about 1,000 people lose their cards daily. These people gave various
reasons for losing their cards, like misplacing and carelessness (The Star, 2011).

With the influx of illegal immigrants to Malaysia, the need to acquire proper documents
is imminent to these foreigners to avoid being caught and deported. Consequently, the MyKad
and the Malaysian passports are indiscriminately sold in the black market. What the aliens did
not know is that the MyKad is actually secure and reliable with less invasion of privacy, forgery
and identity theft. Immigration and law enforcement officers are trained to detect fake cards
immediately. However, some isolated cases have surfaced where stolen cards have been
misused by offenders to commit financial fraud, applications of car and housing loans, credit
card and internet banking transactions, mobile phone bills, property deals and company
registration.

Some of these transactions are routine activities for Malaysians yet the risk of being an
identity theft victim is possible (New Straits Times, 2006). For instance, it was reported by the
media that an illegal immigrant, using a stolen MyKad was able to get a job as a security guard
at one of the countrys biggest security companies. He was able to enjoy the same benefits of
a true citizen but the possibility of harming the company and country is probable (New Straits
Times, 2006). On the other hand, victims of identity thefts were unable to get help as they are
unable to provide the necessary evidence to prove their innocence. In fact, the victim himself
was unaware that his personal information have been stolen and used by the offenders to
commit fraudulent activities. This is unfair to the victim because the law itself such as criminal
law does not recognize the person as the identity theft victims (Copes & Vieraitis, 2009).

14
3.7 RECOMMENDATION OF PREVENTIVE AND DETEVTIVE CONTROLS

This section describes problems faced as the result of identity theft and recommended measures
to assist in the prevention and detection of the crime.

3.7.1 Recommendation of Preventive Control

If you havent been a victim of identity theft, here are some steps for reducing your risk of
identity theft:

Online protection
When you are surfing the web, use a comprehensive security suite, such as McAfee Total
Protection software, which not only protects you against viruses, spyware, and other
emerging threats, but also provides safe search technology to help you steer clear of fake
websites that try to collect your information.

Use strong passwords


Passwords should be at least 10 characters long and should consist of a combination of
letters, numbers and special characters. Also, consider changing your passwords
periodically to reduce the likelihood that thieves can appropriate them and misuse them.
Do not share passwords with anyone, not even with friends and family.

Practice safe surfing on public hotspots


If you are using a public computer or accessing the Internet from a public hotspot or an
unsecured wireless connection, do not log in to banking and credit card sites. Do your
surfing at home on a secure network.

Secure wireless network


To prevent wardriving, enable the firewall on your router and change the administrators
password. Most routers come with a default user name and password, allowing you to set
up and configure the router, but hackers are often familiar with these defaults. You may
also want to change the default identifier on your router that is used to announce its presence
to devices in the immediate area and permit access only from computers or devices you
designate. Check your routers user manual to find out how to change these default settings.

15
Review financial statements promptly
Check your credit card and bank statements each month to make sure there are no
fraudulent charges and to confirm that you authorised all transactions.

Shred documents
The only way to keep thieves from digging up your personal information from the rubbish
is to shred sensitive documents, such as financial statements, credit card offers, and expired
identification cards.

Get a locked mailbox


Traditional mailboxes make it too easy for crooks to steal your bank statements and
sensitive financial documents. If you live in a residence with communal area for mail get a
mailbox that only you can access.

Keep documents safe


Put personal documents in a lockable drawer or cabinet at home and consider storing
valuable financial documents such as stock certificates at your bank.

Monitor credit history


Because it can take a long time to discover that youve become a victim of identity theft,
you should monitor your credit history to see if there are accounts or delinquent payments
of which you may be unaware.

Use a protection service


Identity protection services help safeguard your identity by monitoring your credit, as well
as providing proactive protection, such as sending notifications when new accounts are
opened in your name. These services are usually provided for a monthly fee and often
includes access to your credit reports.

16
3.7.2 Recommendation of Detective Control

If you discover that your identity has been compromised or stolen, take immediate steps to
address the situation.

Notify the credit bureaus and create a fraud alert


Call one of the credit reporting agencies and notify them of the situation. In Malaysia, they
are five credit reporting agencies which are CTOS Sdn Bhd, SME Credit Bureau Sdn Bhd,
RAM Credit Information (RAMCI) Sdn Bhd, Dun & Bradstreet Malaysia Sdn Bhd, and
Financial Information Services (FIS) Sdn Bhd. They can set up fraud alerts on your account
that will require creditors to call you before extending credit.

File a police report


If you know your identity has been stolen, file an identity theft report with your local police
department. Keep a copy of the report so you can give the number of your investigator to
creditors and others who may ask you to verify that your identity has been stolen.

Contact financial institutions and agencies where your accounts may be affected
Call your bank and creditors to inform them of the situation and flag any fraudulent charges
or withdrawals from your accounts and then follow up in writing. Verify that the charges
have been removed from your accounts and if necessary, close the account. Keep copies,
document conversations and maintain records related to the theft.

Monitor credit report


You can monitor your credit file so that you receive e-mail notifications every time a credit
application is made using your personal details. This will help ensure that you can act
swiftly to prevent any damage to your credit reputation if you see strange activity that you
did not authorise.

Keep a detailed journal


Feeling in control of your life can go a long way toward making you feel better. Keep
records of every call you make, every letter you receive, and every day you take action
toward resolving your claim.

17
3.7.3 THE ROLE OF TECHNOLOGY IN IDENTITY THEFT

In an ever evolving technological age, lets examine the role technology plays in preventing
identity theft and tips to safeguarding information stored on computer.

Use of antivirus software


Viruses can often cause your computer to send out files or other stored information.

Use a firewall
A firewall can be used to limit an applications access to your computer. Hackers can take
over your computer and access the sensitive information stored on it.

Use of authentication
Authentication is the method used to identify you via username and password when
accessing personal information on your PC or online.

Use of biometrics
Biometrics is a type of authentication that uses individually unique physical attributes such
as fingerprinting, iris/retina, facial structure, speech, facial thermograms, hand geometry
and written signatures.

Encryption of the files you store on your PC


Encryption uses keys to lock and unlock data while its being transmitted over the Internet,
so that only the intended recipient can view the data. Encryption is also use to protect email
messages and attachments stored on your PC. You can verify if websites use encryption to
transmit your personal information. In Internet Explorer this is done by checking the yellow
lock icon on the status bar.

18
4.0 RISK AND QUALITY PLANNING / DECISION MAKING

As Malaysia is moving towards an e-government and transactions to be done through


computers, we need to learn a lesson from the incidents and cases of identity theft which
occurred most in the developed countries such as the US. Furthermore, identity theft remains
at the top of the list of privacy violations.

Other than that, online banking needs to be monitored on the implementation and the
security aspects as the system will not know who is on the line doing all the banking
transactions. In this electronic age, our finances can be damaged within a matter of seconds by
this crime. Therefore, a measure needs to be taken by Bank Negara Malaysia and all the banks
in Malaysia to safeguard all the interests of Malaysians from being a victim of identity theft.

As for cases in Malaysia, specific laws need to be passed in combating the presence of
identity theft. The creation of such laws can be viewed from the perspective of the Bank Negara
Malaysia, relevant Ministries, Communications and Multimedia Commission, Securities
Commission, Judiciary Department, and other relevant agencies and organizations.

19
5.0 SUMMARY / COMMENTS

In conclusion, we can conclude that identity theft may be a serious crime. Being the
victim of identity theft can be extremely devastating not only because its your money being
stolen, but your name. Identity thieves can be very skilled at finding their targets and then
exploiting their findings. For this reason, to protect yourself you need to stay alert and be more
knowledgeable. To avoid becoming a victim, diligently protect your personal information,
monitor your accounts and credit report, and respond swiftly to any signs that your identity is
being misused.

The data stolen through identity theft my include the name of the person, date of birth,
identity card number, common knowledge about the victim, credit card information, bank
account numbers and others. In fact, this crime begins to become a complicated issue to be
solved in Malaysia, and the government must ensure that there are sufficient law provisions in
Malaysia to criminalize such offences. Existing criminal and civil laws may apply only to a
certain extent and is not intended to be comprehensive, as new cybercrimes like identity theft
need suitable new laws to combat new crimes and these identity thieves. Efficient law
enforcement must be done to combat and eradicate this problem to avoid greater loss arise from
this crime in the future.

20
6.0 REFERENCES

6.1 Books / Magazine / Journals

Buat apa saja untuk memperdaya Harian Metro, 16 Mac 2016.


Identity theft by brother lands him in big trouble The Straits Time, 22 July 2016.
ID theft: Have you been stolen? New Straits Time, 5 October 2006.

6.2 Web Addresses

https://www.myidcare.com/9-types-of-identity-theft
https://www.mountainalarm.com/blog/9-most-common-types-of-identity-theft/
http://www.ctoscredit.com.my/newsletter/Identitytheft.htm
http://www.nccc.org.my/v2/index.php/nccc-di-pentas-media/2006/287-new-straits-
times-id-theft-have-you-been-stolen
http://www.nccc.org.my/v2/index.php/nccc-di-pentas-media/2006/287-new-straits-
times-id-theft-have-you-been-stolen?format=pdf

21

You might also like