top of page

The Reality Of Identity Theft: Exposing Masks

ree



Krishi Gupta, Vivekananda Institute of Professional Studies - Technical Campus


ABSTRACT


Ever wondered what would happen when some stranger completely steals your identity and pretends to be you in front of someone else to gain some benefits? The sad reality is, this identity theft is very common nowadays. This can happen to anyone and can have extreme consequences. One must be aware of disclosing confidential information to anyone or on any platform. To prevent this, one must look for warning signs and be vigilant. This thief can get many benefits in your name as well as can get you in

danger. These people are such experts in this field, that you may not even notice how fast they take your information and use it against you. This is why, one must know about this grievous crime in order to know how to handle these situations. There are some measures which must be followed immediately after such an incident has happened. Reporting these fraudulent activities to appropriate authorities on time can only save us from such misrepresentation. This is a serious issue which needs to be addressed on a global level as the statistics of identity theft incidents are growing day by day. If you are not careful enough, you will not even notice when you are caught in the clutches of cybercriminals.


Keywords: identity, confidential information, warning signs, vigilant, fraudulent activities, misrepresentation, cybercriminals

Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Licensing: 

 

All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

 

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page