首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
So-called "identity theft" occurs when a person pretends to be someone else(say that victim is you)and a financial institution o
So-called "identity theft" occurs when a person pretends to be someone else(say that victim is you)and a financial institution o
admin
2015-09-30
53
问题
So-called "identity theft" occurs when a person pretends to be someone else(say that victim is you)and a financial institution or government agency accepts as proof of identity the criminal’s knowledge of your personal data such as your Social Security account number or birth date. This personal data is then treated like a "master password" that allows access to your accounts—or even allows for the creation of new accounts in your name. Obviously, so-called identity theft is not really a case of stolen identity, but is instead a case of impersonation.
To prevent ID fraud, government agencies such as the Federal Trade Commission glibly advise individuals to not disclose their personal data. As we all know, however, that advice is laughable. Most Americans are powerless to prevent disclosure of their personal data to strangers. Take, for example, employer benefits programs. The programs routinely use such data as an employee ID, Social Security account number, and birth date as the required keys to access the employees’ accounts. Without disclosing such data to a stranger, who is frequently a person in a call center in a foreign country, many individuals can’t even make appointments for routine dental checkups or eye exams. Considering the growing popularity of companies’ relocating their call centers overseas, one can only imagine how much this trend will increase identity theft if unchecked.
Criminals can also access our personal data through other means. Wholesale dissemination(sometimes accidentally)of large amounts of personal data happens via government agencies, employers, and other businesses. This can take place through computer backup tapes that are lost or retired without being erased, through the outsourcing of computer operations jobs to people inside as well as outside of the United States, and through lax enforcement of immigration laws thereby allowing foreign criminals to obtain computer jobs in America—just to name a few. In the state of Wisconsin recently a company printed the Social Security numbers of 171 ,000 citizens on 2006 tax booklets that were to be sent through the mail. The printing company is sent a list of Social Security numbers from the state each year. They arc supposed to use parts of each taxpayer’s confidential information to create an identifying code, but they erred.
Virtually every Tom, Dick, and Harry in America, along with numerous people in call centers in India and other foreign countries, have access to people’s Social Security account numbers, birth dates, and other personal data. Let’s face it—your personal data just isn’t a secret anymore.
The author believes that nobody can keep his personal data secret because______.
选项
A、one’s personal information is easily accessible to many people
B、identity theft has been increasing much faster than ever before
C、personal information is needed to create an identifying code
D、more companies have relocated their call centers overseas
答案
A
解析
根据第四段第一句“Virtually every…,along with numerous people…countries,haveaccess to people’s…personal data”,A应为答案。
转载请注明原文地址:https://kaotiyun.com/show/qPzZ777K
0
考研英语一
相关试题推荐
Accordingtothepassage,theAmericanhealth-caresystem______.Whendemandforhospitalservicesfell,hospitals______.
Inthelasttenyears,theInternethasopenedupincredibleamountsofinformationtoordinarycitizens.ButusingtheInternet
Cultureisactivityofthought,andreceptivenesstobeautyandhumanefeeling.【C1】______ofinformationhavenothingtodowith
ControlanUniversityLogisticNumber,BoycottSchoolFeesRiseOverthelasttwodecades,collegesanduniversitiesdoubled
(46)WhilemuchoftheattentiononfightingAIDSandotherdiseasesinpoorcountrieshasfocusedonaccesstoaffordabledrugs,
(46)Attheendofthenineteenthcentury,arisinginterestinNativeAmericancustomsandanincreasingdesiretounderstandNa
Itisallverywelltoblametrafficjams,thecostofpetrolandthequickpaceofmodernlife,butmannersontheroadsarebe
Thekeypositionandroleofwomenintheprocessofdevelopmentisincreasinglybeingrecognized.(1)_____thethreegreatWorl
Thekeypositionandroleofwomenintheprocessofdevelopmentisincreasinglybeingrecognized.(1)_____thethreegreatWorl
Sportpsychologyresearchhasdocumentedtheimportantroteofsignificantadultssuchasparentsandcoachesinyouthparticipa
随机试题
岩心渗透率提高率是注酸液前后,地层水通过岩心的渗透率之差与()地层水通过岩心的渗透率之比。
简述生产过程中劳动耗费的内容。
情绪按强度和持续时间可以分为_______、_______和_______。
A、观察,局部不进行处理B、局部按摩C、舌系带延长术D、牙槽突修整术E、上颌结节修整术患儿2周岁舌系短伸舌时出现舌尖“w”切迹,对进食无明显影响,此时应选择的方法
下列选项中,不属于项目具有的属性是()
未经税务机关批准,任何单位和个人不得拆本使用发票。()
基础教育课程评价的根本目的在于()。
某著名画家新近谈道:我年纪大了,却整天忙活,没时间去想死,也没心思去想。再说了,死就死呗,又不是只有我一个人死,别人都不死。李白死了,苏东坡死了,曹雪芹也死了,也没怎么样,只不过后人在读他们的作品而已。从画家的话中,只能合乎逻辑地推出下面哪个陈述?
继延安整风之后党的又一场马克思主义思想解放运动是指()
TheSaharaThenameSaharaderivesfromtheArabicwordfor"desert"or"steppe".At3.5millionsquaremiles,anarearough
最新回复
(
0
)