« Back to Glossary Index

Identity theft is the unauthorized use of someone else’s personal information, such as their name, Social Security number, credit card details, or other identifying information, typically for fraudulent purposes. This can involve gaining access to financial resources, obtaining credit, or other benefits in the victim’s name.

Key Points:

  1. Purpose: The primary objective of identity theft is to commit fraud by impersonating the victim. This can include accessing bank accounts, applying for loans or credit cards, making purchases, or even committing crimes under the victim’s identity.
  2. Methods of Identity Theft:
    • Phishing: Fraudsters use emails, text messages, or phone calls to trick individuals into providing personal information.
    • Skimming: Devices are attached to ATMs or point-of-sale terminals to capture card information during transactions.
    • Data Breaches: Large-scale theft of personal information from companies or institutions.
    • Dumpster Diving: Retrieving personal information from discarded documents.
    • Social Engineering: Manipulating individuals into revealing confidential information through deception.
    • Malware: Using malicious software to steal personal information from computers or mobile devices.
  3. Types of Identity Theft:
    • Financial Identity Theft: Using someone else’s identity to access financial accounts, obtain credit, or make unauthorized transactions.
    • Medical Identity Theft: Using another person’s information to obtain medical services or prescription drugs, or to submit false insurance claims.
    • Criminal Identity Theft: Giving another person’s information to law enforcement during an arrest, leading to criminal records in the victim’s name.
    • Synthetic Identity Theft: Creating a new identity by combining real and fake information.
    • Child Identity Theft: Stealing a child’s identity to apply for credit or commit other fraud, often unnoticed for years.
  4. Indicators of Identity Theft:
    • Unexplained Transactions: Unauthorized charges or withdrawals from financial accounts.
    • Credit Report Discrepancies: Accounts or credit inquiries that the victim did not initiate.
    • Denied Credit: Being denied credit or loans despite a good credit history.
    • Bills for Unfamiliar Services: Receiving bills for services or medical treatments not received.
    • Notifications of Data Breaches: Receiving notifications from companies or institutions that personal information may have been compromised.
  5. Prevention Measures:
    • Secure Personal Information: Shredding documents with personal information before disposal and keeping sensitive information secure.
    • Strong Passwords: Using complex passwords and changing them regularly.
    • Monitoring Accounts: Regularly reviewing bank and credit card statements, as well as credit reports, for unauthorized activity.
    • Identity Theft Protection Services: Enrolling in services that monitor for signs of identity theft and provide alerts.
    • Two-Factor Authentication: Using two-factor authentication for online accounts to add an extra layer of security.
  6. Detection and Response:
    • Monitor Credit Reports: Regularly checking credit reports from all major credit bureaus for any unauthorized activity.
    • Immediate Action: Reporting any suspicious activity to financial institutions and credit bureaus immediately.
    • Fraud Alerts and Credit Freezes: Placing fraud alerts or credit freezes on credit reports to prevent new accounts from being opened in the victim’s name.
    • Report to Authorities: Filing a report with the Federal Trade Commission (FTC) and local law enforcement.
  7. Regulatory Framework:
    • Fair Credit Reporting Act (FCRA): U.S. law that promotes the accuracy, fairness, and privacy of consumer information contained in the files of consumer reporting agencies.
    • Identity Theft and Assumption Deterrence Act: U.S. federal law that makes identity theft a crime and provides assistance to victims.
    • General Data Protection Regulation (GDPR): European regulation that strengthens data protection and privacy for individuals within the EU.
  8. Technological Solutions:
    • Encryption: Using encryption to protect sensitive information transmitted online.
    • Identity Verification: Implementing advanced identity verification methods, such as biometrics and multi-factor authentication, to secure online transactions.
    • Monitoring Tools: Using software to monitor for signs of identity theft, such as unusual account activity or data breaches.
« Back to Glossary Index
Vaidyanathan Chandrashekhar

Vaidyanathan Chandrashekhar

Advisors

“Chandy,” is a technology and risk expert with executive experience at Boston Consulting Group, Citi, and PwC. With over two decades in financial services, digital transformation, and enterprise risk, he advises iComply on scalable compliance infrastructure for global markets.
Thomas Linder

Thomas Linder

Advisors

Thomas is a global tax and compliance expert with deep specialization in digital assets, blockchain, and tokenization. As a partner at MME Legal | Tax | Compliance, he advises iComply on regulatory strategy, cross-border compliance, and digital finance innovation.
Thomas Hardjono

Thomas Hardjono

Advisors

Thomas is a renowned identity and cybersecurity expert, serving as CTO of Connection Science at MIT. With deep expertise in decentralized identity, zero trust, and secure data exchange, he advises iComply on cutting-edge technology and privacy-first compliance architecture.
Rodney Dobson

Rodney Dobson

Advisors

Rodney is the former President of ADP Canada and international executive with over two decades of leadership in global HR and enterprise technology. He advises iComply with deep expertise in international service delivery, M&A, and scaling high-growth operations across regulated markets.
Praveen Mandal

Praveen Mandal

Advisors

Praveen is a serial entrepreneur and technology innovator, known for leadership roles at Lucent Bell Labs, ChargePoint, and the Stanford Linear Accelerator. He advises iComply on advanced computing, scalable infrastructure, and the intersection of AI, energy, and compliance tech.
Paul Childerhose

Paul Childerhose

Advisors

Paul is a Canadian RegTech leader and founder of Maple Peak Group, with extensive experience in financial services compliance, AML, and digital transformation. He advises iComply on regulatory alignment, operational strategy, and scaling compliance programs in complex markets.
John Engle

John Engle

Advisors

John is a seasoned business executive with senior leadership experience at CIBC, UBS, and Accenture. With deep expertise in investment banking, private equity, and digital transformation, he advises iComply on strategic growth, partnerships, and global market expansion.
Jeff Bandman

Jeff Bandman

Advisors

Jeff is a former CFTC official and globally recognized expert in financial regulation, fintech, and digital assets. As founder of Bandman Advisors, he brings deep insight into regulatory policy, market infrastructure, and innovation to guide iComply’s global compliance strategy.
Greg Pearlman

Greg Pearlman

Advisors

Greg is a seasoned investment banker with over 35 years of experience, including leadership roles at BMO Capital Markets, Morgan Stanley, and Citigroup. Greg brings deep expertise in financial strategy and growth to support iComply's expansion in the RegTech sector.
Deven Sharma

Deven Sharma

Advisors

Deven is the former President of S&P and a globally respected authority in risk, data, and capital markets. With decades of leadership across financial services and tech, he advises iComply on strategic growth, governance, and the future of trusted data in AML compliance.