<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Identity Theft - David Lindsey, Attorney at Law]]></title>
        <atom:link href="https://www.mdavidlindsey.com/blog/tags/identity-theft/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.mdavidlindsey.com/blog/tags/identity-theft/</link>
        <description><![CDATA[David Lindsey's Website]]></description>
        <lastBuildDate>Mon, 26 Aug 2024 19:06:26 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Top Five Computer Crimes and What to Do If You are Accused of Any of Them]]></title>
                <link>https://www.mdavidlindsey.com/blog/top-five-computer-crimes-and-what-to-do-if-you-are-accused-of-any-of-them/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/top-five-computer-crimes-and-what-to-do-if-you-are-accused-of-any-of-them/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Tue, 07 Apr 2015 18:51:52 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Cyberstalking]]></category>
                
                    <category><![CDATA[Hacking]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                <description><![CDATA[<p>Computer crime is on the rise and as more people do more things online, the incidence of criminal activity is expected to continue. In addition to not falling victim to computer crimes, you also need to ensure what you are doing online is not illegal. Technology is constantly changing and it can be difficult to&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <p><a href="/contact-us/">Computer crime</a> is on the rise and as more people do more things online, the incidence of criminal activity is expected to continue. In addition to not falling victim to computer crimes, you also need to ensure what you are doing online is not illegal. Technology is constantly changing and it can be difficult to keep up with what is and is not legal.</p>  <p>What are the five most common computer crimes?</p>  <p><strong>Use of Malware</strong></p>  <p>Malware is an umbrella term for viruses, worms, and other nefarious software programs intended to separate a computer user and his or her information or money. Some of the more popular malware programs appear to be virus software alerting users to an infection and asking that they purchase a related product to remove the virus. In reality, the seemingly helpful alert message is actually the virus and when you enter your payment information into the system to purchase “protection,” you are actually supplying that information to criminals.</p>  <p>To avoid falling victim to malware, do not download software from sites you do not trust. Avoid pirated software and do not open files unless you know their source. Avoiding accusations of law breaking when it comes to malware is simple: do not send viruses to other computer users and do not attempt to gain access to anyone’s information without their permission.</p>  <p><strong>Stealing a Person’s Identity</strong></p>  <p>Millions of people each year fall victim to identity theft. Someone gains access to their personal information and uses it for his or her own benefit. Hackers have the ability to gain access to financial accounts or social security numbers and destroy a person’s life.</p>  <p>To avoid having your identity stolen, never log into financial accounts using a public computer. Never share personal information in email, instant messaging, or any type of unencrypted communication. Any time you make a purchase online, check to ensure the site is secure and never provide your credit card information to a site that is not known to be reputable.</p>  <p>Chances are good you will not be accused of identity theft unless you step over the line and intend to commit a crime. If accusations do arise, you should contact an attorney familiar with computer crimes immediately.</p>  <p>The final three most common computer crimes on the list are the type that are more likely to trigger unwarranted accusations.</p>  <p><strong>Cyberstalking</strong></p>  <p>Cyber stalking is exactly what it sounds like: using the computer to stalk someone, harass them, and gain uninvited access to their life. Stalking is a common accusation in domestic violence cases and other family legal disputes, so if you are in the midst of ending a relationship, it is better to avoid interacting with your former romantic partner online. Any interaction can be twisted to look like an unwanted advance, so the less time you spend on social media sites the better. And never, under any circumstances, attempt to gain access to a former love interest’s email or other personal information online.</p>  <p><strong>Child Pornography</strong></p>  <p>It is no secret the Internet is a hot bed for pornographic material. Much of it is perfectly legal to access, but just as much of it is illegal because it features underage participants. Exploiting children online is big business and if you are accused of viewing child pornography without realizing you are doing anything wrong, you would not be the first person. To avoid breaking the law regarding child pornography, use common sense: never click on anything suspicious and if you cannot be 100% sure what you are downloading or viewing, avoid it.</p>  <p>Spam</p>  <p>The best way to avoid breaking laws associated with spam is to never send anyone an email without that person’s permission. If you operate any sort of organization or business online, make sure you offer an opt-in and opt-out feature for email and keep careful records of recipient requests. If you are accused of spamming, put your current email methods on hold and contact an attorney.</p>  <p>If you would like to learn more about these and other computer crimes, check out the <a href="http://www.fbi.gov/about-us/investigate/cyber/cyber" target="_blank" rel="noopener noreferrer">FBI’s cybercrimes website</a>.</p>  <p>Worried you might be accused of a computer crime? Think someone is trying to trick you into breaking the law online? You need legal support. David Lindsey can help. Contact him to schedule a consultation to discuss your case.</p>  <p> </p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Have You Been Falsely Accused of Identity Theft? Here’s What You Need to Know to Avoid Accusations and Defend Yourself if the Unthinkable Does Occur]]></title>
                <link>https://www.mdavidlindsey.com/blog/have-you-been-falsely-accused-of-identity-theft/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/have-you-been-falsely-accused-of-identity-theft/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Thu, 11 Dec 2014 16:52:52 GMT</pubDate>
                
                    <category><![CDATA[Fraud]]></category>
                
                
                    <category><![CDATA[Criminal Defense Lawyer]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[White Collar Crimes Defense]]></category>
                
                
                
                <description><![CDATA[<p>Identity theft occurs when one person uses another person’s identifying information, most often to gain access to money. For instance, if a person uses your social security number to apply for credit in your name, it is an example of identity theft. Identity theft is illegal and can result in serious legal consequences. Additionally, the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <p><a href="/criminal-defense/business-identity-theft/denver-identity-theft-attorney/">Identity theft</a> occurs when one person uses another person’s identifying information, most often to gain access to money. For instance, if a person uses your social security number to apply for credit in your name, it is an example of identity theft. Identity theft is illegal and can result in serious legal consequences. Additionally, the victim is faced with cleaning up the mess created by the identity thief – it can take months or years to restore good credit standing.</p>  <p>The FTC estimates that approximately 9 million Americans are victims of identity theft every year. Many do not even realize there is a problem until they are rejected for a loan or they review their credit report. More information about protecting yourself from identity theft is available <a href="http://www.consumer.ftc.gov/features/feature-0014-identity-theft" target="_blank" rel="noopener noreferrer">here</a>.</p>  <p><strong>Accidental Identity Theft</strong></p>  <p>Unfortunately, in addition to these many instances of legitimate identity theft, there are also times when accusations of identity theft are made against a person who had no intention of the breaking the law.</p>  <p>For instance, if your credit history is less than appealing and a friend suggests you to apply for credit in his or her name, you are breaking the law despite having permission. In addition to submitting a fraudulent credit application, your friend could also turn on you and accuse you of identity theft. This is highly likely if he or she is facing charges for willingly participating in the fraud.</p>  <p>In any instance an opportunity arises to use someone else’s identity, even if he or she has given you permission to do so, do not do it. Charges for committing fraud or identity theft do not require the so-called willing victim of the crime to report you or be unaware of your actions. Essentially, a defense of “but my friend said it was fine” will not carry much weight in the courtroom.</p>  <p>Likewise, if you gain information to the personal information of someone by accident, follow the appropriate steps for correcting the security breach. For instance, if you receive personal mail for someone who no longer lives at your residence, return the mail to the USPS.</p>  <p>Avoiding accusations of identity theft can be just as challenging as avoiding being victimized, depending on your circumstances. If you have been falsely accused of stealing someone’s personal information or you are in a situation that could result in accusations of a crime, you need to <a href="/lawyers/">speak to an attorney familiar with identity theft</a>. Contact David Lindsey, Denver criminal law attorney.</p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Have You Been Accused of a Computer Crime?]]></title>
                <link>https://www.mdavidlindsey.com/blog/have-you-been-accused-of-a-computer-crime/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/have-you-been-accused-of-a-computer-crime/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Tue, 08 Apr 2014 21:03:56 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Hacking]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                <description><![CDATA[<p>An accusation of a computer crime might not seem as serious as that of a violent crime or various other charges, but computer crimes are very serious. In most cases, committing a computer crime is a violation of federal law and for some could even violate international law. If you are suspected of a computer&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>An accusation of a <a href="/criminal-defense/computer-crimes-defense/">computer crime</a> might not seem as serious as that of a violent crime or various other charges, but computer crimes are very serious. In most cases, committing a computer crime is a violation of federal law and for some could even violate international law.</p>



<p>If you are suspected of a computer crime, you will be exposed to rigorous and intrusive investigation by various law enforcement agencies, including the FBI. If convicted, you could face prison time, steep fines, and long-term penalties that affect your employment. An accusation of a computer crime, <a href="/criminal-defense/computer-crimes-defense/denver-computer-hacking-defense-lawyer/">hacking</a>, or any type of criminal activity on the Internet MUST be taken serious.</p>



<p><strong>What Constitutes a Computer Crime?</strong></p>



<p>Computer crimes come in all shapes and sizes. In some cases, crimes committed using a computer or online could result in multiple charges. Computer crimes include:</p>



<ul class="wp-block-list">
<li><a href="/criminal-defense/fraud-crimes-defense/">Fraud </a></li>



<li> <a href="/criminal-defense/business-identity-theft/denver-identity-theft-attorney/">Identity theft using a computer</a></li>



<li> Denial-of-service attacks</li>



<li>Some instances of spamming</li>



<li>Deliberate circumvention of security systems</li>



<li>Unauthorized access to or modification of programs (hacking)</li>



<li>Intellectual property theft, including software piracy</li>



<li>Industrial espionage through access to or theft of computer materials</li>



<li>Creating or spreading viruses or worms</li>



<li>Salami slicing (stealing money repeatedly in extremely small quantities via computer)</li>



<li>Making and digitally distributing child pornography</li>
</ul>



<p><strong>Accidental Crimes</strong></p>



<p>Unfortunately, there are instances in which individuals are accused of computer crimes that were unknowingly committed. Criminal computer activity is extremely complex and a person can break the law without even realizing it. This is especially common for those working in the data industry. A simple push of the wrong button could result in actions that appear to be criminal.</p>



<p>The Internet has expanded our reach throughout the world and it is easier than ever before to communicate with people at the drop of a hat. Despite the benefits, this opportunity has created a great deal of risk, too. Every time you open an email attachment or strike up a discussion, you are at risk. Often, computer crime charges result from misunderstanding or ignorance. If your actions have led to accusations of criminal behavior, you need the assistance of a computer crimes attorney.</p>



<p>Proving a law has been broken unintentionally is an important part of a solid defense strategy. If you have been accused of a computer crime, but had no intention of breaking the law, you need the support of an attorney that understands the complexities of computer crime laws. Contact David Lindsey, Denver criminal law attorney to <a href="/contact-us/">schedule a free consultation</a> to discuss the specifics of your situation.</p>
]]></content:encoded>
            </item>
        
    </channel>
</rss>