Computers are everywhere, and with the growth of technology, there is an increase in computer crimes. It has come out of necessity that we need computer security and legislation to attempt and protect a person’s personal information and finances. Cyber-crimes are more wide-spread than what has been reported because of the fear of public retribution. Many times laziness and neglect result in the unauthorized exposure of personal and …show more content…
According to our text, Identity theft comes in the category of organized crime (Taylor, 108). The FBI defines identity theft as an act when a person unlawfully obtains another person’s personal information with the intent to defraud that person (FBI). Identity Theft is so prevalent that either you have been a victim or you know someone close to you who has been a victim. According to the Alabama Criminal Code, Identity Theft is a Class B Felony, (Ala. Code § 13A-008-192(b) (1975)), with the punishment of not more than twenty (20) years but not less than two (2) years of imprisonment, (Ala. Code § 13A-005-006(a)(3) (1975)). Although imprisonment of two years is the least amount of time a person can get with an Identity Theft conviction, this isn’t a deterrent for a criminal. According to our text, the internet is a partial reason Identity Theft is so prevalent. (Taylor, 2) We are giving the criminals the opportunity to collect and gather information about us through social media, and every time we input our credit card information to purchase …show more content…
Businesses fear lawsuits, therefore, they are reluctant to report a computer breach. Recently, there have been ransomware attacks, costing our local government thousands of dollars to fix. The Department of Revenue has been contending with cyber-attacks on tax-payer information for years. The Federal Bureau of Investigations states that Identity Theft and Ransomware are their main concerns in cyber-crimes. The government saw a rampant growth in cyber-crimes, and has created different divisions and passed different legislation, in an attempt to combat the unwarranted attacks from criminals. Even individuals have started taking the proper precautions to keep their own information safe. To combat your own risk, it’s important to receive training and to expand your knowledge, so that you too can reduce your own