Human Identification Theory and the Identity Theft Problem

IF 2.2 2区 社会学 Q1 LAW Texas Law Review Pub Date : 2001-05-03 DOI:10.2139/SSRN.263213
Lynn M. LoPucki
{"title":"Human Identification Theory and the Identity Theft Problem","authors":"Lynn M. LoPucki","doi":"10.2139/SSRN.263213","DOIUrl":null,"url":null,"abstract":"This paper builds on the theory of human identification proposed by Professor Roger Clarke and uses the product as the basis for a proposed solution to the identity theft problem. The expanded theory holds that all human identification fits a single model. The identifior matches the characteristics of a person observed in a first observation with the characteristics of a person observed in a second observation to determine whether they are the same person. From the theory it follows that a characteristic used for identification in the credit reporting system, such as social security number, mother's maiden name and date of birth, must be known to all entities participating in that system. Because those characteristics - and any substitute for them - must be distributed so widely, it is unrealistic to think they can at the same time remain secret. Hence the current efforts to curb identity theft by keeping personal information secret are doomed to failure. As an alternative solution to the identity theft problem, this paper proposes a system by which persons concerned about identity theft can register their identities through a government agency that will make their names, social security numbers, and non-sensitive contact information publicly available on an open-access website. Credit grantors and credit reporting agencies would have the option to contact the registrant to verify that he or she is in fact the credit applicant. Creditors who opted to use the system to identify a borrower would retain their current exemption from legal liability for misidentification. Those who did not would be liable for misidentification under common law principles, including theories of defamation, invasion of privacy, and negligence. In cases in which credit grantors and credit reporting agencies used the system, the effect would be to give the individual person control over the process of his or her own identification in credit transactions, with no meaningful loss of privacy.","PeriodicalId":47670,"journal":{"name":"Texas Law Review","volume":null,"pages":null},"PeriodicalIF":2.2000,"publicationDate":"2001-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.2139/SSRN.263213","citationCount":"58","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Texas Law Review","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.2139/SSRN.263213","RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"LAW","Score":null,"Total":0}
引用次数: 58

Abstract

This paper builds on the theory of human identification proposed by Professor Roger Clarke and uses the product as the basis for a proposed solution to the identity theft problem. The expanded theory holds that all human identification fits a single model. The identifior matches the characteristics of a person observed in a first observation with the characteristics of a person observed in a second observation to determine whether they are the same person. From the theory it follows that a characteristic used for identification in the credit reporting system, such as social security number, mother's maiden name and date of birth, must be known to all entities participating in that system. Because those characteristics - and any substitute for them - must be distributed so widely, it is unrealistic to think they can at the same time remain secret. Hence the current efforts to curb identity theft by keeping personal information secret are doomed to failure. As an alternative solution to the identity theft problem, this paper proposes a system by which persons concerned about identity theft can register their identities through a government agency that will make their names, social security numbers, and non-sensitive contact information publicly available on an open-access website. Credit grantors and credit reporting agencies would have the option to contact the registrant to verify that he or she is in fact the credit applicant. Creditors who opted to use the system to identify a borrower would retain their current exemption from legal liability for misidentification. Those who did not would be liable for misidentification under common law principles, including theories of defamation, invasion of privacy, and negligence. In cases in which credit grantors and credit reporting agencies used the system, the effect would be to give the individual person control over the process of his or her own identification in credit transactions, with no meaningful loss of privacy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
人的身份理论与身份盗窃问题
本文以Roger Clarke教授提出的人类身份识别理论为基础,以该产品为基础,提出了一种身份盗窃问题的解决方案。扩展理论认为,所有的人类认同都符合一个单一的模型。所述识别符将在第一次观察中观察到的人的特征与在第二次观察中观察到的人的特征相匹配,以确定它们是否为同一个人。从理论来看,信用报告系统中用于识别的特征,如社会安全号码、母亲的婚前姓名和出生日期,必须为参与该系统的所有实体所知。因为这些特征- -以及它们的任何替代品- -必须如此广泛地传播,因此认为它们能够同时保持秘密是不现实的。因此,目前通过保密个人信息来遏制身份盗窃的努力注定要失败。作为身份盗窃问题的另一种解决方案,本文提出了一个系统,通过该系统,担心身份盗窃的人可以通过政府机构注册他们的身份,该机构将在开放访问网站上公开他们的姓名,社会安全号码和非敏感联系信息。授信人和信用报告机构可以选择与登记人联系,以核实他或她实际上是信用申请人。选择使用该系统识别借款人的债权人将保留其目前对错误识别的法律责任豁免。根据普通法原则,包括诽谤、侵犯隐私和疏忽等理论,那些没有这样做的人将对错误识别负责。在授信人和信用报告机构使用该系统的情况下,其效果将是让个人在信用交易中控制自己的身份识别过程,而不会造成有意义的隐私损失。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
1.40
自引率
6.20%
发文量
0
期刊介绍: The Texas Law Review is a national and international leader in legal scholarship. Texas Law Review is an independent journal, edited and published entirely by students at the University of Texas School of Law. Our seven issues per year contain articles by professors, judges, and practitioners; reviews of important recent books from recognized experts, essays, commentaries; and student written notes. Texas Law Review is currently the ninth most cited legal periodical in federal and state cases in the United States and the thirteenth most cited by legal journals.
期刊最新文献
Guarantor of Last Resort Demystifying Nationwide Injunctions Feminism and the Tournament Tracing Equity: Realizing and Allocating Value in Chapter 11 State Public-Law Litigation in an Age of Polarization
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1