Jump to ContentJump to Main Navigation

You are looking at 1-7 of 7 items

  • Keywords: identity theft x
Clear All Modify Search

View:

Property

Lindsay Farmer

in Making the Modern Criminal Law: Criminalization and Civil Order

Published in print:
2016
Published Online:
March 2016
ISBN:
9780199568642
eISBN:
9780191801945
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199568642.003.0008
Subject:
Law, Criminal Law and Criminology, Philosophy of Law

This chapter looks at the idea of property in property offences. The first part looks at the development of property offences in the period up to the passing of the Larceny Act 1916. Developments in ... More


Fraud in Fee-for-Service and Managed Care: Different Sides of the Same Coin

Terry L. Leap

in Phantom Billing, Fake Prescriptions, and the High Cost of Medicine: Health Care Fraud and What to Do about It

Published in print:
2011
Published Online:
August 2016
ISBN:
9780801449796
eISBN:
9780801460807
Item type:
chapter
Publisher:
Cornell University Press
DOI:
10.7591/cornell/9780801449796.003.0003
Subject:
Sociology, Health, Illness, and Medicine

This chapter examines fraud in fee-for-service systems and managed care plans. A common health care fraud that is linked directly to fee-for-service is the submission of fraudulent claims to the ... More


Ghost Workers: The Labor Consequences of Identity Loan

Sarah Bronwen Horton

in They Leave Their Kidneys in the Fields: Illness, Injury, and Illegality Among U.S. Farmworkers

Published in print:
2016
Published Online:
May 2017
ISBN:
9780520283268
eISBN:
9780520962545
Item type:
chapter
Publisher:
University of California Press
DOI:
10.1525/california/9780520283268.003.0004
Subject:
Anthropology, Social and Cultural Anthropology

Migrant farmworkers’ exclusion from many labor protections and forms of social assistance forces them to rely on informal and illicit subsistence strategies. One such strategy is “identity loan,” in ... More


The Electronic Data Give-Away

Anita L. Allen

in Unpopular Privacy: What Must We Hide?

Published in print:
2011
Published Online:
January 2012
ISBN:
9780195141375
eISBN:
9780199918126
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780195141375.003.0007
Subject:
Philosophy, Feminist Philosophy, General

With recent US federal data-protection statutes in mind, along with the climate of indifference to privacy suggested by self-revelatory patterns of online conduct and high-tech personal archiving, ... More


Harboring Data: Information Security, Law, and the Corporation

Andrea M. Matwyshyn (ed.)

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
book
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.001.0001
Subject:
Law, Intellectual Property, IT, and Media Law

As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the ... More


Data Theft

Rob Kitchin

in Data Lives: How Data Are Made and Shape Our World

Published in print:
2021
Published Online:
September 2021
ISBN:
9781529215144
eISBN:
9781529215168
Item type:
chapter
Publisher:
Policy Press
DOI:
10.1332/policypress/9781529215144.003.0023
Subject:
Sociology, Science, Technology and Environment

This chapter details the consequences of data breaches for a company and its customers. Someone has discovered that the company has stored personal details of customers in an unencrypted database on ... More


Article 33 Notification of a personal data breach to the supervisory authority

Cédric Burton

in The EU General Data Protection Regulation (GDPR): A Commentary

Published in print:
2020
Published Online:
March 2021
ISBN:
9780198826491
eISBN:
9780191932267
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198826491.003.0069
Subject:
Law, EU Law

Recital 88; Article 4(12) (Definition of a personal data breach); Article 5(2)) (Accountability principle); Article 28(3)(f) (Processor); Article 32 (security of processing); Article 34 ... More


View: