identity theft - traducción al Inglés
Diclib.com
Diccionario ChatGPT
Ingrese una palabra o frase en cualquier idioma 👆
Idioma:

Traducción y análisis de palabras por inteligencia artificial ChatGPT

En esta página puede obtener un análisis detallado de una palabra o frase, producido utilizando la mejor tecnología de inteligencia artificial hasta la fecha:

  • cómo se usa la palabra
  • frecuencia de uso
  • se utiliza con más frecuencia en el habla oral o escrita
  • opciones de traducción
  • ejemplos de uso (varias frases con traducción)
  • etimología

identity theft - traducción al Inglés

DELIBERATE USE OF SOMEONE ELSE'S IDENTITY, USUALLY AS A METHOD TO GAIN A FINANCIAL ADVANTAGE OR OBTAIN CREDIT AND OTHER BENEFITS IN THE OTHER PERSON'S NAME, AND PERHAPS TO THE OTHER PERSON'S DISADVANTAGE OR LOSS
Identity thieves; ID Theft; Online identity theft; False identity; Identity thief; IJacking; Identity Theft; Identity takeover; Computer identity theft; Privacy piracy; Privacy pirate; ID theft; Identity-theft; Identification theft; Stolen identity; Theft of identity; ID Robbery; Medial identity theft; Identity theft insurance; Tax identity theft
  • Medicare cards]]
  • Example of an identity theft crime: 1. The fraudster files tax return paperwork in the victim's name, claiming a refund. 2. The IRS issues a refund to the fraudster. 3. The victim submits their legitimate tax return. 4. The IRS rejects the return as a duplicate.

identity theft         
(n.) = robo de identidad, suplantación de identidad
Ex: We take identity theft seriously, but our banks are dragging their feet.
false identity         
1990 FILM BY JAMES KEACH
Identity thieves; ID Theft; Online identity theft; False identity; Identity thief; IJacking; Identity Theft; Identity takeover; Computer identity theft; Privacy piracy; Privacy pirate; ID theft; Identity-theft; Identification theft; Stolen identity; Theft of identity; ID Robbery; Medial identity theft; Identity theft insurance; Tax identity theft
falsa identidad
theft         
  • Securing construction equipment against thieves
  • Two young [[waif]]s steal a fine pair of boots.
  • [[Bicycle]]s can occasionally be stolen, even when locked up, by removing the wheel or cutting the lock that holds them.
  • The Robbers Stone, [[West Lavington, Wiltshire]]. This memorial warns against thieving by recording the fate of several who attempted highway robbery on the spot in 1839
ACT OF TAKING ANOTHER'S PROPERTY WITHOUT PERMISSION OR CONSENT
Stealing; Thieves; Theft in English law; Grand theft; Stealer; Stealers; Petty theft; Petty thief; Thief; Theives; Theft of property; Thieving; Felony theft; Thefts; Thiefing; Capital theft; Theif; Petit theft; Theft in Islam
(n.) = robo, hurto
Ex: I have never seen any statistics showing that nonbook materials are more subject to theft than books.
----
* anti-theft = antirrobo
* anti-theft strip = pegatina antirrobo, etiqueta antirrobo
* book theft = robo de libros
* electronic theft detection system = sistema electrónico de detección de robos
* execute + theft = cometer un robo, llevar a cabo un robo
* identity theft = robo de identidad, suplantación de identidad
* petty theft = hurto
* theft detection = detección de robos
* theft detection device = dispositivo de detección de robos
* theft proof = a prueba de robos

Definición

sameness
n.
1.
Identity, identicalness, oneness.
2.
Similarity, resemblance, correspondence, likeness.
3.
Monotony, want of variety.

Wikipedia

Identity theft

Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been statutorily defined throughout both the U.K. and the U.S. as the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's disadvantages or loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.

Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained. According to a report done for the FTC, identity theft is not always detectable by the individual victims. Identity fraud is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs. A U.S. Government Accountability Office study determined that "most breaches have not resulted in detected incidents of identity theft". The report also warned that "the full extent is unknown". A later unpublished study by Carnegie Mellon University noted that "Most often, the causes of identity theft is not known", but reported that someone else concluded that "the probability of becoming a victim to identity theft as a result of a data breach is ... around only 2%". For example, in one of the largest data breaches which affected over four million records, it resulted in only about 1,800 instances of identity theft, according to the company whose systems were breached.

An October 2010 article entitled "Cyber Crime Made Easy" explained the level to which hackers are using malicious software. As Gunter Ollmann, Chief Technology Officer of security at Microsoft, said, "Interested in credit card theft? There's an app for that." This statement summed up the ease with which these hackers are accessing all kinds of information online. The new program for infecting users' computers was called Zeus, and the program is so hacker-friendly that even an inexperienced hacker can operate it. Although the hacking program is easy to use, that fact does not diminish the devastating effects that Zeus (or other software like Zeus) can do on a computer and the user. For example, programs like Zeus can steal credit card information, important documents, and even documents necessary for homeland security. If a hacker were to gain this information, it would mean identity theft or even a possible terrorist attack. The ITAC says that about 15 million Americans had their identity stolen in 2012.

Ejemplos de uso de identity theft
1. Concerns over identity theft The news also comes at a time of increasing concerns over identity theft.
2. NYC Mayor Said to Be Target of Identity Theft NEW YORK –– Even the mayor of the largest U.S. city is apparently not immune to identity theft.
3. Seven Years for Identity Theft DAMMAM, 24 March 2007 — A court in Alkhobar sentenced a resident to seven years in jail for identity theft.
4. He was facing charges of identity theft and grand larceny.
5. They will also face identity theft or document fraud charges.