Found: 19
Select item for more details and to access through your institution.
Stealing (Identity) From the Poor.
- Published in:
- Minnesota Law Review, 2021, v. 106, n. 1, p. 59
- By:
- Publication type:
- Article
From the United States Supreme Court.
- Published in:
- Alabama Lawyer, 2020, v. 81, n. 3, p. 239
- Publication type:
- Article
Protecting Personal Data: A Survey of Consumer Protections Throughout North Carolina's Identity Theft Protection Act.
- Published in:
- Campbell Law Review, 2020, v. 42, n. 1, p. 191
- By:
- Publication type:
- Article
IN DEFENSE OF THE "DUTY TO REPORT" CRIMES.
- Published in:
- UMKC Law Review, 2017, v. 86, n. 2, p. 362
- By:
- Publication type:
- Article
Medical Identity Theft: A Case Report.
- Published in:
- 2017
- By:
- Publication type:
- journal article
THE MAKING OF THE "WRONGFULLY" DOCUMENTED WORKER.
- Published in:
- North Carolina Law Review, 2015, v. 93, n. 5, p. 1505
- By:
- Publication type:
- Article
GIVING OUT YOUR NUMBER: A LOOK AT THE CURRENT STATE OF DATA BREACH LITIGATION.
- Published in:
- Alabama Law Review, 2015, v. 66, n. 2, p. 395
- By:
- Publication type:
- Article
IDENTITY THEFT.
- Published in:
- Bench & Bar of Minnesota, 2013, v. 70, n. 7, p. 56
- By:
- Publication type:
- Article
INTERNATIONAL IDENTITY THEFT: HOW THE INTERNET REVOLUTIONIZED IDENTITY THEFT AND THE APPROACHES THE WORLD'S NATIONS ARE TAKING TO COMBAT IT.
- Published in:
- Florida Journal of International Law, 2013, v. 25, n. 2, p. 311
- By:
- Publication type:
- Article
DIGITAL PLANNING: THE FUTURE OF ELDER LAW.
- Published in:
- NAELA Journal, 2013, v. 9, n. 1, p. 135
- By:
- Publication type:
- Article
Fair Credit Reporting Act Update -- 2011.
- Published in:
- Business Lawyer, 2012, v. 67, n. 2, p. 585
- By:
- Publication type:
- Article
CREDIT-MONITORING DAMAGES IN CYBERSECURITY TORT LITIGATION.
- Published in:
- George Mason Law Review, 2011, v. 19, n. 1, p. 113
- By:
- Publication type:
- Article
STATE GOVERNMENT.
- Published in:
- Georgia State University Law Review, 2011, v. 28, n. 1, p. 51
- By:
- Publication type:
- Article
APPLYING THE COMMON-LAW CAUSE OF ACTION NEGUGENT ENABLEMENT OF IMPOSTER FRAUD TO SOCIAL NETWORKING SITES.
- Published in:
- Seton Hall Law Review, 2011, v. 41, n. 4, p. 1695
- By:
- Publication type:
- Article
Bill 219: An Insurmountable Goal.
- Published in:
- Manitoba Law Journal, 2011, v. 34, n. 3, p. 35, doi. 10.29173/mlj766
- By:
- Publication type:
- Article
Red Flag Rules - Do Audiology Practices Still Need to Comply?
- Published in:
- AudiologyOnline, 2011, p. 2
- By:
- Publication type:
- Article
THE COMPLETELY REIMBURSED "VICTIM": DID THE SENTENCING COMMISSION GET IT RIGHT?
- Published in:
- University of Toledo Law Review, 2011, v. 42, n. 3, p. 803
- By:
- Publication type:
- Article
THE TRUE IDENTITY OF AUSTRALIAN IDENTITY THEFT OFFENCES: A MEASURED RESPONSE OR AN UNJUSTIFIED STATUS OFFENCE?
- Published in:
- University of New South Wales Law Journal, 2010, v. 33, n. 2, p. 503
- By:
- Publication type:
- Article
Bounded rationality of identity thieves: Using offender-based research to inform policy.
- Published in:
- Criminology & Public Policy, 2009, v. 8, n. 2, p. 237, doi. 10.1111/j.1745-9133.2009.00553.x
- By:
- Publication type:
- Article