Identity Theft in UK Law
-
Various Claimants v WM Morrisons Supermarket Plc
“
First, I reject Ms Proops' argument that the disclosure on the web of the payroll data was disconnected by time, place and nature from Skelton's employment. I find, rather, that as Mr Barnes submitted there was an unbroken thread that linked his work to the disclosure: what happened was a seamless and continuous sequence of events.
Second, I find that Morrisons deliberately entrusted Skelton with the payroll data. It was not merely something to which work gave him access: dealing with the data was a task specifically assigned to him. Associated with this, I find that in his role with Morrisons, day in and day out, he was in receipt of information which was confidential or to have limited circulation only: and he was appointed on the basis that this would happen, and he could be trusted to deal with it safely.
-
Lauri Love v The Government of the United States of America
“
They do not leave to the court the task of some vague or broader evaluation of what is just. Nor is the bar a general provision requiring the court to form a view directly on which is the more suitable forum, let alone having regard to sentencing policy or the potential for prisoner transfer, save to the extent that one of the listed factors might in any particular case require consideration of it.
The true approach is more simply expressed by requiring the appellate court to decide whether the decision of the district judge was wrong. The appellate court is entitled to stand back and say that a question ought to have been decided differently because the overall evaluation was wrong: crucial factors should have been weighed so significantly differently as to make the decision wrong, such that the appeal in consequence should be allowed.
-
Attorney General's Reference (No. 2 of 1982)
“
It is said, in effect, that their acts are necessarily the company's acts; that their will, knowledge, and belief are those of the company; and that their consent necessarily implies consent by the company. It is for this reason that in such cases there can be no conspiracy between the directors and shareholders on the one hand and the company on the other: R. v. McDonnell (1966) 1 QB 233 (C.A.).
-
R (C) v Chief Constable of 'A' Police and another
“
Mr. Jones was not able to show me any precedent for the Court intervening to, in effect, close down an ongoing investigation on the basis that there was no prospect of a prosecution eventuating. That does not mean that such relief could never be granted, but it reinforces my own view that it will only be appropriate, if at all, in the most exceptional cases.
-
Richard Lloyd v Google LLC
“
In my judgment, the only applicable test is that “it must be possible to say of any particular person whether or not they qualify for membership of the represented class of persons by virtue of having” the same interest as Mr Lloyd “[a]t all stages of the proceedings, and not just at the date of judgment”. It has repeatedly been said that the number of claimants cannot itself affect the ability to use the representative procedure.
-
Fraud Act 2006
... ... (1) Omit the following provisions—(a) in the Theft Act 1968 (c. 60) —(i) section 15 (obtaining property by deception) ;(ii) ... any restriction on the meaning of deposit which arises from the identity of the person making it is to be disregarded.(12) For the purposes of ... ...
-
The Criminal Procedure Rules 2015
... ... (1) The defendant must notify the court officer of the identity of the intended defence trial advocate―(a) as soon as practicable, and ... ...
-
Criminal Procedure (Scotland) Act 1887
... ... property shall not be limited to the receiving of property taken by theft or robbery, but shall extend to the receiving of property appropriated by ... Superfluous particulars as to identity. 68 Superfluous particulars as to identity ... 68. When in the trial ... ...
-
Criminal Justice Act 1988
... ... (1) In section 12 of the Theft Act 1968 (taking motor vehicle or other conveyance without authority etc.) ... ...
-
Identity theft vulnerability
Under the rubric of neoliberalism, the governance of populations occurs through new technologies and techniques of social control. Contemporary neoliberal discourses of crime control, in particular...
- Identifying Identity Theft
-
Online identity theft – an Indian perspective
Purpose: Today almost all businesses are connected online and net banking has becoming a buzzword. The concept of identity theft which was more known in the Western world is making its presence fel...
-
Identity theft complaints: exploring the state‐level correlates
Purpose: Identity theft is an emerging form of criminal behavior, with complaints about the behavior rising. However, little research has explored the correlates of these complaints, especially sta...
- Identity Theft: Don't Leave Yourself Exposed
-
Professional negligence: Another decision on liability for identity theft leaves the law uncertain
In Dreamvar (UK) Limited v (1) Mishcon de Reya (a firm) and (2) Mary Monson Solicitors Limited [2016] EWHC 3316 (Ch), Mr David Railton QC, sitting as a Deputy High Court Judge in the Chancery Divis...
-
New Research Exposes Perils of Bogus Access Requests Under GDPR, With Implications for CCPA
At the Black Hat conference in Las Vegas last week, a security researcher presented his research on using access rights available under the GDPR for identity theft purposes (slides available here; ...
-
Cyber Security Month 2018
... ... they can, steal your details and possibly put you at risk of identity theft. In security we talk about 'resilience' and the ability to withstand ... ...