{"id":726,"date":"2022-03-22T11:07:23","date_gmt":"2022-03-22T10:07:23","guid":{"rendered":"https:\/\/www.susii.nrw\/what-happened\/identity-theft\/"},"modified":"2022-04-22T10:36:37","modified_gmt":"2022-04-22T08:36:37","slug":"identity-theft","status":"publish","type":"page","link":"https:\/\/www.susii.nrw\/en\/first-aid\/identity-theft\/","title":{"rendered":"Identity Theft"},"content":{"rendered":"\n<p class=\"has-text-align-center su-page-intro has-black-color has-text-color\">Help and recommended actions in case of identity theft on the Internet.<\/p>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-help su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7260\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">What is identity theft?<\/h2><div id=\"ac-7260\" class=\"c-accordion__content\">\n<p>Identity theft is the misuse of one&#8217;s name or personal information by unauthorized third parties. Identity theft can happen both on the Internet and in real life.&nbsp;<\/p>\n\n\n\n<p>On the Internet, cybercriminals use the victim&#8217;s identity to commit crimes in someone else&#8217;s name or to inflict damage on the victim. Specifically, this is, for example, defamation, cyberstalking or false profiles in social networks.&nbsp;<\/p>\n\n\n\n<p>Identity theft from the Internet also leads to unauthorized third parties purchasing goods in a victim&#8217;s name.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-gavel su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7261\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Legal situation with identity theft<\/h2><div id=\"ac-7261\" class=\"c-accordion__content\">\n<p>Identity theft as a criminal offense under the Criminal Code does not yet exist in Germany. However, there are other criminal offenses under the Criminal Code that may apply in cases of identity theft.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/dejure.org\/gesetze\/StGB\/164.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7 164 StGB False suspicion<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/dejure.org\/gesetze\/StGB\/202a.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7 202a StGB Spying out data<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/dejure.org\/gesetze\/StGB\/238.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7 238 StGB Re-enactment<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/dejure.org\/gesetze\/StGB\/263.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7 263 StGB Fraud<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/dejure.org\/gesetze\/StGB\/269.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7 269 Falsification of evidentiary data<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/dejure.org\/gesetze\/StGB\/276.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7 276 StGB Forgery of documents<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/dejure.org\/gesetze\/StGB\/303a.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7 303a StGB Data modification<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/dejure.org\/gesetze\/StGB\/303b.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7 303b StGB Computer sabotage<\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-info su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7262\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Examples identity theft<\/h2><div id=\"ac-7262\" class=\"c-accordion__content\">\n<p><strong>Name abuse in blogs, wikis, forums or social networks:&nbsp;<\/strong><\/p>\n\n\n\n<p>A perpetrator uses a victim&#8217;s name, for example, to discredit the victim through the remarks. For example, posts are written under this fake account, messages are written or even links are established with contacts of the victim under the false identity.&nbsp;<\/p>\n\n\n\n<p><strong>Goods orders<\/strong><br>Criminals use the victim&#8217;s name and address to order goods or services online.&nbsp;<\/p>\n\n\n\n<p><strong>False suspicion and imputation of crime<\/strong><br>Cybercriminals pretend, for example, that their victim is committing crimes on the Internet or in the real world. Another variant is actual criminal acts on behalf of the person concerned.&nbsp;<br>Cases of this are insults, abuse when ordering goods or the use of stolen credit card data.&nbsp;<\/p>\n\n\n\n<p><strong>Use of personal data<\/strong><br>Misuse of credit card data, identity card, social security number, the insurance card or e-mail address.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-help su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7263\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">When should criminal charges be filed?<\/h2><div id=\"ac-7263\" class=\"c-accordion__content\">\n<p>File an&nbsp;<a href=\"https:\/\/service.polizei.nrw.de\/anzeige\" target=\"_blank\" rel=\"noreferrer noopener\">criminal report online<\/a>&nbsp;with the police when unknown persons&nbsp;<\/p>\n\n\n\n<p>&#8211; use your email account to send spam mails&nbsp;<\/p>\n\n\n\n<p>&#8211; make purchases or cash withdrawals with your credit card data&nbsp;<\/p>\n\n\n\n<p>&#8211; use your user data or online account in social networks to insult others, suspect others or insinuate criminal acts&nbsp;<\/p>\n\n\n\n<p>&#8211; use your account to transfer funds without authorization&nbsp;<\/p>\n\n\n\n<p>&#8211; use your Internet connection for cyber attacks<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-help su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7264\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">What do I need to file a criminal complaint?<\/h2><div id=\"ac-7264\" class=\"c-accordion__content\">\n<p>If you file a\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/service.polizei.nrw.de\/anzeige\" target=\"_blank\">criminal complaint<\/a>, you should have the following ready:\u00a0<\/p>\n\n\n\n<p>&#8211; Exact details of the time of the crime \/ time of detection&nbsp;<\/p>\n\n\n\n<p>&#8211; Information about the crime (what happened, damage, injured party)&nbsp;<\/p>\n\n\n\n<p>&#8211; Information on the actions of the perpetrator or suspect&nbsp;<\/p>\n\n\n\n<p>&#8211; Screenshots or log files of the visited \/ affected Internet pages&nbsp;<\/p>\n\n\n\n<p>&#8211; Backup of case-related e-mails (communication with the perpetrator, e-mails of the injured party)&nbsp;<\/p>\n\n\n\n<p>&#8211; What actions have already been taken by you or others&nbsp;<\/p>\n\n\n\n<p>&#8211; Details of your PC or smartphone if malware is present<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-skip-next su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7265\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Other measures<\/h2><div id=\"ac-7265\" class=\"c-accordion__content\">\n<p>&#8211; Change all important passwords immediately&nbsp;<\/p>\n\n\n\n<p>&#8211; Contact the affected platforms and ask them to provide evidence (email address, IP address, log files, connection data)&nbsp;<\/p>\n\n\n\n<p>&#8211; After gathering evidence, ask the platform operators to delete the false information&nbsp;<\/p>\n\n\n\n<p>&#8211; With the help of a search engine, check if your stolen data can be found in other places on the Internet as well&nbsp;<\/p>\n\n\n\n<p>&#8211; Website operators and companies should inform their visitors or customers about the incident&nbsp;<\/p>\n\n\n\n<p>&#8211; If malware, spam or phishing emails are sent in your name &#8211; inform your customers, friends or acquaintances about it and warn them about it<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-link su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7266\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Related links<\/h2><div id=\"ac-7266\" class=\"c-accordion__content\">\n<p>BSI f\u00fcr B\u00fcrger: <a rel=\"noreferrer noopener\" href=\"https:\/\/www.bsi-fuer-buerger.de\/BSIFB\/DE\/Risiken\/ID-Diebstahl\/id-diebstahl_node.html\" target=\"_blank\">Identit\u00e4tsdiebstahl<\/a> <br>computerbetrug.de: <a rel=\"noreferrer noopener\" href=\"http:\/\/www.verbraucherzentrale.nrw\/rechte-beim-online-kauf-1\" target=\"_blank\">Informationen zu Identit\u00e4tsdiebstahl<\/a> <br>iRights.info: <a rel=\"noreferrer noopener\" href=\"https:\/\/irights.info\/artikel\/identittsdiebstahl-im-internet\/7227\" target=\"_blank\">Wie Identit\u00e4tsdiebstahl funktioniert und wie man sich sch\u00fctzen kann<\/a> <br>Welt.de: <a rel=\"noreferrer noopener\" href=\"https:\/\/www.welt.de\/finanzen\/verbraucher\/article129857932\/Ploetzlich-existiert-von-mir-ein-zweites-Ich-im-Netz.html\" target=\"_blank\">Pl\u00f6tzlich existiert von mir ein zweites Ich im Netz<\/a><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Help and recommended actions in case of identity theft on the Internet.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":704,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/726"}],"collection":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/comments?post=726"}],"version-history":[{"count":1,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/726\/revisions"}],"predecessor-version":[{"id":791,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/726\/revisions\/791"}],"up":[{"embeddable":true,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/704"}],"wp:attachment":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/media?parent=726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}