Identity Theft in UK Law
-
Various Claimants v WM Morrisons Supermarket Plc
“
First, I reject Ms Proops' argument that the disclosure on the web of the payroll data was disconnected by time, place and nature from Skelton's employment. I find, rather, that as Mr Barnes submitted there was an unbroken thread that linked his work to the disclosure: what happened was a seamless and continuous sequence of events.
Second, I find that Morrisons deliberately entrusted Skelton with the payroll data. It was not merely something to which work gave him access: dealing with the data was a task specifically assigned to him. Associated with this, I find that in his role with Morrisons, day in and day out, he was in receipt of information which was confidential or to have limited circulation only: and he was appointed on the basis that this would happen, and he could be trusted to deal with it safely.
-
Attorney General's Reference (No. 2 of 1982)
“
It is said, in effect, that their acts are necessarily the company's acts; that their will, knowledge, and belief are those of the company; and that their consent necessarily implies consent by the company. It is for this reason that in such cases there can be no conspiracy between the directors and shareholders on the one hand and the company on the other: R. v. McDonnell (1966) 1 QB 233 (C.A.).
-
Shogun Finance Ltd v Hudson
“
Thus, if the contents of the document are, without more, insufficient unequivocally to identify the actual individual referred to or if the identification of the party is non-specific, evidence can be given to fill any gap. This rule is one of the great strengths of English commercial law and is one of the main reasons for the international success of English law in preference to laxer systems which do not provide the same certainty.
-
Lauri Love v The Government of the United States of America
“
In our judgment, section 83A is clearly intended to provide a safeguard for requested persons, not distinctly to be found in any of the other bars to extradition or grounds for discharge, including section 87 and the wide scope of article 8 ECHR. They do not leave to the court the task of some vague or broader evaluation of what is just.
The true approach is more simply expressed by requiring the appellate court to decide whether the decision of the district judge was wrong. The appellate court is entitled to stand back and say that a question ought to have been decided differently because the overall evaluation was wrong: crucial factors should have been weighed so significantly differently as to make the decision wrong, such that the appeal in consequence should be allowed.
-
Lexi Holdings Plc ((in Administration)) v Luqman
“
The question whether a breach of duty constituted by total inactivity causes a particular loss raises issues of law, fact and hypothesis. The law serves to define the relevant duty, and the steps which that duty required these defendants to take is ascertained by the application of those legal principles to the relevant factual background including, importantly, the particular knowledge, experience and skill which each of Monuza and Zaurian actually had.
-
Fraud Act 2006
... ... in the Theft Act 1968 (c. 60)— ... any restriction on the meaning of deposit which arises from the identity of the person making it is to be disregarded ... ...
-
Sentencing Act 2020
... ... hostility related to transgender identity. This is ... is treated by section 137 as resulting from an offence under the Theft Act 1968 or Fraud Act 2006, or ... ...
- The Criminal Procedure Rules 2015
-
Criminal Procedure (Scotland) Act 1887
... ... shillings of money, the same having been dishonestly appropriated by theft or robbery ... You did utter as genuine a bill, on which ... ...
-
Identity theft vulnerability
Under the rubric of neoliberalism, the governance of populations occurs through new technologies and techniques of social control. Contemporary neoliberal discourses of crime control, in particular...
- Identifying Identity Theft
-
Online identity theft – an Indian perspective
Purpose: Today almost all businesses are connected online and net banking has becoming a buzzword. The concept of identity theft which was more known in the Western world is making its presence fel...
-
Identity theft complaints: exploring the state‐level correlates
Purpose: Identity theft is an emerging form of criminal behavior, with complaints about the behavior rising. However, little research has explored the correlates of these complaints, especially sta...
- Identity Theft: Don't Leave Yourself Exposed
-
Professional negligence: Another decision on liability for identity theft leaves the law uncertain
In Dreamvar (UK) Limited v (1) Mishcon de Reya (a firm) and (2) Mary Monson Solicitors Limited [2016] EWHC 3316 (Ch), Mr David Railton QC, sitting as a Deputy High Court Judge in the Chancery Divis...
-
New Research Exposes Perils of Bogus Access Requests Under GDPR, With Implications for CCPA
At the Black Hat conference in Las Vegas last week, a security researcher presented his research on using access rights available under the GDPR for identity theft purposes (slides available here; ...... ... his research on using access rights available under the GDPR for identity theft purposes (slides available here; whitepaper available here) ... ...
-
A Research Agenda For Consumer Insurance Covering Emerging Technology Harms
... ... data breaches of identity theft,blockchain systems enabling ... crypto-asset scams,bullying on ... ...