Free Essay

Theft

In:

Submitted By navz90
Words 5244
Pages 21
Project on theft - Section 378 of IPC

INTRODUCTION

In common usage, theft is the taking of another person's property without that person's permission or consent with the intent to deprive the rightful owner of it. The word is also used as an informal shorthand term for some crimes against property, such as burglary, embezzlement, larceny, looting, robbery, shoplifting and fraud. In some jurisdictions, theft is considered to be synonymous with larceny; in others, theft has replaced larceny.

For the offence of theft there is punishment of imprisonment of either description which may extend to 3 years, with fine, or both according to the Indian Penal Code. The offence of theft is even though cognizable [1] and non-bailable [2] it is compoundable[3]. So according to the criminal justice jurisprudence when the offence is compoundable then generally it cannot be term as serious category of an offence. Otherwise also the seriousness and gravity of an offence can be assessed by the fact and circumstances involve in any incidence of crime. Every citizen in a free country is having right to do fair, law based analysis of any judgment given by any courts in India without challenging the integrity of the person working as judge.

According to SECTION 378 OF INDIAN PENAL CODE, Whoever, intending to take dishonestly any moveable property out of the possession of any person without that per­son’s consent, moves that property in order to such taking, is said to commit theft.

OBJECTIVE

Theft literally means taking away someone’s property without his or her consent. The main objective of this project is to analyse the legal approaches to criminalise theft. It analyses the existing criminal law provisions to evaluate how far these provisions are effective. Section 379 is all about punishment for theft. This study is to understand how section 379 has played a role in curtailing the offence of theft in our Country.

CONTENT ANALYSIS

Section 378 of IPC reads:

Whoever, intending to take dishonestly any moveable property out of the possession of any person without that per­son’s consent, moves that property in order to such taking, is said to commit theft.

Explanation 1

A thing so long as it is attached to the earth, not being movable property, is not the subject of theft; but it becomes capable of being the subject of theft as soon as it is severed from the earth.

Explanation 2

A moving effected by the same act which affects the severance may be a theft.

Explanation 3

A person is said to cause a thing to move by removing an obstacle which prevented it from moving or by sepa­rating it from any other thing, as well as by actually moving it.

Explanation 4

A person, who by any means causes an animal to move, is said to move that animal, and to move everything which, in consequence of the motion so caused, is moved by that animal.

Explanation 5

The consent mentioned in the definition may be express or implied, and may be given either by the person in possession, or by any person having for that purpose authority either express or implied.

INGREDIENTS

The essential ingredients of the offence of theft as embodied in s 378, IPC, is well-explained by the Supreme Court in a leading decision in KN Mehra v. State of Rajasthan[4]. The alleged theft was of an aircraft, which belonged to the government (Indian Air Force Academy). Two youngsters, Mehra and Phillips, were cadets on training in the Indian Air Force at Jodhpur. Phillips was discharged from the Academy on 13 May 1952 for misconduct. On 14 May 1952, he was due to leave Jodhpur by train. His friend Mehra was due for flight in a Dakota, as part of his training along with one Om Prakash, a flying cadet. The authorised time to take off flight was between 6 am and 6.30 am on the morning of 14th May. Mehra and Phillips took off, not a Dakota but a Harvard T-22, before the prescribed time at 5 am without authorisation and without observing any of the formalities, which were pre-requisites for an aircraft flight. On the forenoon of the same day, they landed at a place in Pakistan about 100 miles away from the Indo-Pakistan border. On 16 May 1952 at 7 am, both of them met the Indian Commissioner in Pakistan at Karachi, and informed him that they had lost their way and force-landed in a field and that they had left the plane there. They requested his help to go back to Delhi. The Indian High Commissioner arranged for both of them to be sent back to Delhi in another plane. While they were on their way to Delhi, the plane stopped at Jodhpur and they were arrested and prosecuted for the offence of theft.

One of the main contentions of the accused was that if they had the inclination to take the aircraft to Pakistan, they would not have contacted the Indian High Commissioner at Karachi later. But the prosecution succeeded in proving that this apparent innocent move did not necessarily negative their intention at the time of taking off. It may be that after reaching Pakistan only, the impracticability of their scheme to get employment in Pakistan dawned upon them and they gave it up. It was enough to constitute the offence that they had the dishonest intention at the commencement of the journey. The fact that they took off Harvard T-22 plane rather than the allowed Dakota, and left India at 5 am instead of the scheduled time of 6 am, without waiting for Om Prakash, and that they also refused to respond to the wireless messages from Indian aerodrome authorities at 11 am, showed that they had the dishonest intention to take off a Harvard T-22 plane.

The court analysed the offence of theft under s 378 and hence the essential elements to constitute theft are as follows.

1. It should be a movable property;

2. In the possession of anyone;

3. A dishonest intention to take it out of that person’s possession;

4. Without his consent and

5. A moving in order to such taking.

The accused, in this case, were held guilty of the offence of theft under s 378 of IPC and were sentenced to undergo imprisonment by the trial court for 18 months and a fine of Rs 750 with simple imprisonment, in default of payment of fine for a further term of four months. In the final appeal, the Supreme Court reduced the sentence of imprisonment of the appellant KN Mehra to the period already undergone.

MOVABLE PROPERTY

Movable property is defined in sec 22 as including ‘corporeal property of every description except land and things attached to the earth, or permanently fastened to anything which is attached to the earth’. Any part of the earth whether it be stones, or clay or sand or any other component when severed from the earth is moveable property and is capable of being the subject of theft. A house cannot be the subject of theft, but there may be theft of its materials. Cart-loads of earth, or stones[5] carried away from the land of another are subjects of theft.

As per the Explanations 1 and 2 attached to Section 378 of IPC, things attached to the land may become movable property by severance from the earth, and that the act of severance may of itself be theft.

Human body whether living or dead (except bodies, or portions thereof, or mummies, preserved in museums and scientific institutions) is not movable property.

POSSESSION

The main right of the individual that is sought to be protected under ss 378 and 379 is undoubtedly his possession of the movables. The word ‘possession’ is not defined in the IPC, though its nature is one aspect indicated in s 27, wherein it is said that:

When property is in the possession of a person’s wife, clerk or servant, on account of that person, it is in that person’s possession within the meaning of this Code.

Constructive possession

In certain circumstances, a person who has no actual physical control over a thing will be deemed to have possession in the eye of law, which is called constructive possession. This is also called de jure possession or possession in law.

Joint Possession

Where there are several joint owners in joint possession and any one of them dishonestly takes exclusive possession, he will be guilty of theft[6]. A co-owner of movable property with another, whose share is defined, can be guilty of theft, if he removes the joint property without consent of the co-owner[7]. Similarly, if a coparcener dishonestly takes the separate property of another coparcener, he will be guilty of theft[8]. But the removal of even the whole of the crop by a tenant holding land from zamindar on a varam tenure without delivering it to the zamindar his share of the crop, does not constitute theft[9].

Mere custody will not amount to possession

This principle is expressly recognised in s 27, IPC. So, where a lady who wanted a railway ticket, handed the money to a stranger, who was near to the window of the ticket office, that he might procure a ticket for her, and he ran away with the money, this was held to be theft, as she never parted with the dominion over the money and merely used his hand in place of her own[10].

Temporary deprivation or Dispossession is also theft

In Pyare Lal Bhargawa v. State of Rajasthan[11], the accused was a superintendent in a government office. At the instance of somebody, he got a file from the secretariat through the clerk and took the file to his house for a day and made it available to a person to facilitate the removal of some papers and the insertion of some. Thereafter, the file was replaced. The question before the Supreme Court was whether the act amounted to theft. The Supreme Court held that to commit theft, one need not take movable property permanently out of the possession of another, with the intention not to return it to him. It would satisfy the definition if he took any movable property out of the possession of another person, though he intended to return it later. When the file was unlawfully taken away from the department, he deprived the department of the possession of the file and caused wrongful loss to the department. So, it was held that it amounted to an offence under s 378, IPC. The Supreme Court, in line with the Pyare Lal dictum, in State of Maharastra[12], held that the transfer of movable property without consent of the person in possession need not be permanent or for a considerable length of time nor is it necessary that the property should be found in possession of the accused. Even a transient transfer of possession is sufficient to meet the requisites of theft.

DISHONEST INTENTION

Intention is the gist of the offence. It is the intention of the taker at the time when he removes the article that determined whether the act is theft or not. The intention to take dishonestly exists when the taker intends to cause ‘wrongful gain’ to one person and ‘wrongful loss’ to another. Wrongful gain or wrongful loss must be involved in dishonesty[13]. Where, therefore, the accused acting bona fide in the interest of his employees, finding a party of fishermen poaching on his master’s fisheries, took charge of the nets, and retained possession of them, pending the orders of his employers, it was held that the accused was not guilty of theft[14]. When dishonest intention is totally absent, there is no theft[15]. Taking another man’s property believing, under a mistake of fact and in ignorance of law, that he has the right to take, therefore, does not amount to theft[16]. If the act done is not animo-furandi[17], it will not amount to theft.

WITHOUT CONSENT

The taking must be without the consent of the person in possession. There can be no theft where the owner actually consents to or authorises the taking. Thus, where a debtor gives up property to his creditor and subsequently discovering that the debt was time-barred, charged the latter with theft, the same was held unsustainable in Musumat Piari Oulaiy[18]a. The consent may be express or implied, may be given bt the person in possession or by any person having for that authority either express or implied.

MOVING OR TAKING

In addition to all the other ingredients, there must be moving of the property with an intention to take it. As the essence of the offence consists in the fraudulent taking, that taking must have commenced. The English equivalent term is asportation, which implies something more than mere moving, which alone is necessary under the IPC. For instance, where a man lifted up and set on end a package of linen, which was lying in a wagon and cut the wrapper to get at its contents, but was apprehended before he had taken anything out; and where a pick-pocket got a purse out of the owner’s pocket, but was unable to carry it away, because it was attached to his pocket by a string, the judges held that there had been no theft ‘for a carrying away, in order to constitute a felony [there] must be a removal of the goods from the place where they were; and the felon must, for the instant at least, have the entire and absolute possession of them’[19]. However in the case of a post office letter carrier, the taking out of the bag in which the letters were carried during delivery, and placing it in his own pocket was deemed sufficient, the jury having found that he put the letter in his own pocket intending to steal it[20]. So it was held in the Madras decision Venkataswami[21], where a letter-sorter instead of handing a letter out for delivery in the usual course, secreted it on his person, that he might give it to the delivery peon himself with a view to sharing the postage payable by the addressee; the high court ruled that by this act he took the letter out of the possession of the post office authorities without their consent for a fraudulent purpose and therefore committed theft.

THEFT BY OWNER OF HIS OWN PROPERTY

Paradoxical as it would seem, there is nothing in law against an owner being held guilty of theft in respect of his own goods. Theft arises when there is dishonest removal of a thing from the possession of a person who has a rightful claim to be in possession of it. Where the accused took a bundle belonging to himself, which was in the possession of a constable and for which the constable was accountable, it was held that the constable had special property in it and the accused was therefore guilty of theft. A person who removes his own cattle after attachment from the person to whom they have been entrusted without having recourse to the court under whose orders they were entrusted is guilty of theft. Similarly, a person who removes his cattle from pound without paying the legitimate fees to the pound-keeper comes becomes guilty of theft.

THEFT AS BETWEEN HUSBAND AND WIFE

There is no presumption in India, that a husband and wife constitute one person and as such there can be no prosecution for theft as between them. Hence, if a wife removes her husband’s property from his house with dishonest intention, she will be guilty of theft. In this case, a Hindu wife, during her husband’s absence, removed his property from his house to that of her paramour. On the husband’s return, he charged them both with theft and they were convicted of that offence by the trial court. The conviction was upheld by the Madras High Court.

There is no presumption of law that the wife and husband constitute one person in India for the purpose of criminal law. Theft is an offence against property. And where there is no community of property, each may commit theft in regard to the property of the other. The question is one of intention. If the wife, removing the husband’s property from his house, does so with dishonest intention, she is guilty of theft.

A spouse, therefore, may be guilty of theft if he/she dishonestly removes exclusive property of the other.

DIFFERENCE BETWEEN THEFT AND ROBBERY

S.390 of the IPC states that in all robbery cases, there is either extortion or theft. Theft is ‘robbery’ if, in order to commit the theft, or in committing the theft, or in carrying away or attempting to carry away property obtained by the theft, the offender, for that end, voluntarily causes or attempts to cause to any person death or hurt or wrongful restraint, or fear of instant death or of instant hurt, or of instant wrongful restraint. Extortion is ‘robbery’ if the offender, at the time of committing the extortion, is in the presence of the person put in fear, and commits the extortion by putting that person in fear of instant death, of instant hurt, or of instant wrongful restraint to that person or to some other person, and, by so putting in fear, induces the person so put in fear then and there to deliver up the thing extorted.

DIFFERENCE BETWEEN THEFT AND EXTORTION

Section 383 states: Whoever intentionally puts any person in fear of any injury to that person or to any other and thereby dishonestly induces the person so put deliver to any person any property or valuable security or anything signed or sealed which may be converted into a valuable security, commits extortion.

As To Consent:
In extortion, consent is obtained by putting the person in possession of property in fear of property in fear of injury to himself or any other person.
In theft, the offender’s intention is to take the property without the owner’s consent.
There is no element of force in theft.

Property:
In Extortion , both moveable and immoveable property may be the subject of the offence. In theft it is limited only to moveable property.

Element Of Force:
There is element of force in the offence of extortion as the property is obtained by putting a person in fear ofinjury to that person or any other.
There is no element of force in theft.

Scope:
Extortion is wider in scope as it coved any kind of property, valuable security or anything that may be converted into valuable security.
Theft covers only the cases of moveable property.

Taking Of Property:
In extortion, threat may be by one person and the property may be received by another person.
In theft, property must be move by person in order to such taking.

Effect:
In extortion, the property is delivered.
In theft, there is dishonest removal of property.

PUNISHMENT FOR THEFT

According to SECTION 379 OF INDIAN PENAL CODE, Whoever commits theft shall be punished with imprisonment of either description for a term which may extend to three years, or with fine, or with both.

According to this section, any person who commits the offence of theft will be punished with an imprisonment for a term of three years or with a fine specified by the court or with both. A person can be punished under this section only if he has commits theft as per section 378.

FORMS OF THEFT

According to SECTION 380 OF INDIAN PENAL CODE, Whoever commits theft in any building, tent or vessel, which building, tent or vessel is used as a human dwelling, or used for the custody of property, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine.

For attracting s 380 it is necessary to prove that ‘theft’ was committed in a ‘building’, ‘tent’ or ‘vessel’ used as ‘human dwelling’ or for ‘custody of property’.

The expression ‘building’ conveys a structure, whether covered or uncovered, made of any material whatsoever. The term postulates some structure intended for affording some sort of protection to the persons dwelling inside it or for the property placed there for custody. Therefore a structure which does not afford such a protection, though it serves as a fencing or other means of preventing ingress or egress, cannot be a ‘building’ within the meaning of s 380.

According to SECTION 381 OF INDIAN PENAL CODE, Whoever, being a clerk or servant, or being employed in the capacity of a clerk or servant, commits theft in respect of any property in the possession of his master or employer, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine.

To attract this section, not only the elements should be proved but also that the accused was a clerk or servant or employed in the capacity of a clerk or servant and he has removed the movable property out of possession of his master or employer. A servant or clerk, thus, has more easy opportunity for stealing than other persons would.

A clerk of the tahsil office, who took official papers out of possession of his fellow clerk without consent of the concerned tahsildar to show them to an advocate of one of the parties to the case, was held guilty under s 381. However, despite the fact that it is considered an aggravated form of theft, the Gujarat High Court, taking into consideration the harsh circumstances under which an employee committed theft of a petty sum, took a lenient view of the matter.

According to SECTION 382 OF INDIAN PENAL CODE, Whoever commits theft, having made preparation for causing death, or hurt, or restrain, or fear of death, or of hurt, or of restraint, to any person, in order to the committing of such theft, or in order to the effecting of his escape after the committing of such theft, or in order to the retaining of property taken by such theft, shall be punished with rigorous imprisonment for a term which may extend to ten years, and shall also be liable to fine.

The aggravating fact in this section is that the accused who went to steal was also prepared to cause personal injury or intimidation of the victim, if, the situation so warranted. The preparation may be in the nature of arming himself with a stick, knife or any other weapon, that is sufficient to cause harm or injury. It is important to note that mere preparation by a thief to cause harm indicated in the section is enough to bring him under the purview of s 382. It is neither necessary nor required under the section that hurt be caused or attempted to be caused. But if he, while committing theft, causes hurt, he becomes liable for committing robbery.

Section 382 is distinguished from that of robbery. If the accused goes beyond the preparation stage and actually causes hurt, injury, then it will amount to an offence of robbery. But, if it stops with preparation and the accused does not go beyond it, even if it was because there was no necessity to cause violence then it will be covered by this section.

RELATED CASES

Ø In Mahabir Singh v Commissioner of Police[22], the Supreme Court held that seizure of vehicle due to default in the payment of instalments stipulated under the mutually agreed schedule for payment attached to the agreement cannot be construed as theft.

Ø In K.A. Mathai alias Babu & Anr. Vs. Kora Bibbikutty & Anr[23], the Hon'ble Apex Court had taken a view holding that in case of default to make payment of installments, Financier had a right to resume possession even if the hire purchase agreement does not contain a clause of resumption of possession, for the reason that such a condition is to be read in the agreement. In such an eventuality, it cannot be held that the Financer had committed an offence of theft and that too, with the requisite mens rea and requisite dishonest intention. The assertions of rights and obligations accruing to the parties under the hire purchase agreement wipes out any dishonest pretence in that regard from which it cannot be inferred that Financer had resumed the possession of the vehicle with a guilty intention.

Ø In the case of Biswanath Patra vs Divisional Engineer[24], it was held that the theft of electricity would not be charged under section 379 of Indian Penal Code because When there is a specific/special law covering the question of theft of electricity i.e. Section 135 of the Act, the general law contained in Section 379, IPC will not be applicable. Special law will always prevail over the general law.

Ø In the case of Kesavan Nair vs State Of Kerala[25], it was held that an intention of the accused to 'take' any movable property out of possession of another person without the consent of the other person and also an intention to cause wrongful gain by unlawful means was necessary to be charged under Section 378 IPC. A mere removal of a movable property by a person from possession of another without the consent of the latter with the sole intention to evict him from a building will not be sufficient to make out an offence under Section 380 of IPC. Therefore the Charge against the accused in this case is quashed.

Ø In the case of Charanjit Singh Chadha And Ors. vs Sudhir Mehra[26], it was held that the owner re-possessing the vehicle delivered to the hirer under the hire purchase agreement will not amount to theft as the vital element of 'dishonest intention' is lacking. The element of 'dishonest intention' which is an essential element to constitute the offence of theft cannot be attributed to a person exercising his right under an agreement entered into between the parties as he may not have an intention of causing wrongful gain or to cause wrongful loss to the hirer. The re-possession of goods as per the term of the agreement may not amount to any criminal offence. The agreement which they had entered into specifically gave authority to the appellants to re-possess the vehicle and their agents have been given the right to enter any property or building wherein the motor vehicle was likely to be kept. Under the hire purchase agreement, the appellants have continued to be the owner of the vehicle and even if the entire allegations against them are taken as true, no offence was made out against them.

Ø In the case of Bandrappa vs State By Gadigenur Police on 21 March ILR[27], it was held that if a person dishonestly removes any movable property out of the possession of any person without that person's consent, the said person would commit theft. The Explanation 1 to the said section says “A thing so long as it is attached to the earth, not being movable property is not the subject of theft; but it becomes capable of being the subject of theft as soon as it is severed from the earth”. This explanation makes it further clear that, if the ore is removed from the earth, then it would be a subject-matter of theft. Illustration (a) to Section 378 of IPC makes it very clear that as soon as petitioner has severed the iron ore from the land in order to transport the same, it is to be said that he has committed a theft. In this view of the matter, the contention of the petitioner that the crime does not fall within the definition of 'theft' is liable to be rejected and therefore the accused is liable to be punished under section 379 of IPC.

Ø In the case of M/S. Sundaram Finance Ltd. vs Mohd. Abdul Wakeel And Another[28], it was held that if the applicant took possession of the vehicle under hire-purchase agreement, it cannot be said that he was guilty of theft because there was no intention to take the vehicle dishonestly. Thus, the essential ingredient of the offence of theft as per Section 378 of IPC was not there. Moreover the signing of agreement implied consent to the right of taking the possession of vehicle on failure of payment of money. Therefore this is not an offence under section 379 of IPC since the essential ingredient of the section is missing.

CONCLUSION

The actus reus of theft is usually defined as an unauthorized taking, keeping or using of another's property which must be accompanied by a mens rea of dishonesty and/or the intent to permanently deprive the owner or the person with rightful possession of that property or its use. These ingredients are necessary to commit the offence of theft under section 378 of IPC. If any of these ingredients is not found, then it would not come under the purview of sec 378 of IPC and the accused cannot be punished under sec 379 of IPC.

BIBLIOGRAPHY

Net sources

• www.indiankanoon.org

• www.wikipedia.org

• www.vakilno1.com

• bombayhighcourt.nic.in

Books referred

• Criminal Law by PSA Pillai, 10th edition

Statutes referred

• The Indian Penal Code, 1860

[1] cognizable offence is a criminal offence in which the police is empowered to register an FIR, investigate, and arrest an accused without a court issued warrant.

[2] non-bailable means shall not be automatically entitled to be released on bail [but does not mean that the court may not order him to be released on a suitable bail - with or without any conditions]

[3] Some offences largely affect only the victim and no considerable harm is considered to be done to the society. In such offences, if the offender and victim compromise, there is no need to waste court's time in conducting a trial. The process of reaching a compromise is called Compounding

[4] AIR 1957 SC 369, (1957) Cr LJ 552 (SC)

[5] Suri Venkatappayya Sastri v Madula Venkunna (1904) ILR 27 Mad 531 (FB)

[6] Virankutty v Chiyamu (1884) ILR 7 Mad 55

[7] Ramsharangat Singh (1966) Cr LJ 856

[8] Sita Ram Rai (1880) ILR All 181

[9] Subudhi Rantho v Balarama Pudi(1902) ILR 26 Mad 481

[10] R v Thompson 32 LJ (MC) 50

[11] AIR 1963 SC 1094

[12] (1979) Cr LJ 1193 (SC)

[13] KN Mehra v State of Rajasthan AIR 1957 SC 369, (1957) Cr LJ 552 (SC)

[14] Nobin Chandar Hoidar (1866) W R (Cri) 79

[15] Venkatanarayana v State of Andhra Pradesh (1979) Cr LJ (NOC) 179 (AP)

[16] Queen-Empress v Nagappa (1890) ILR 15 Bom 344

[17] Intention to steal

[18] (1904) 1 ALJ 508

[19] Charry’s case East PC 556

[20] R v Poynton L and C 247

[21] (1890) ILR 14 Mad 229

[22] 129 (2006) DLT 542

[23] 1996 (7) SCC 212

[24] Air 2007 Cal 189, 2008 (2) Chn 657

[25] 2005 (3) KLT 391

[26] 2001 VIIAD SC 75, AIR 2001 SC 3721

[27] 2007 KAR 3190

[28] 2001 Cri LJ 2441, 2001 (3) MPHT 12

Similar Documents

Premium Essay

Cyber Theft

...work and using more databases on the screens of technology. Therefore, people have started relying on computers to keep their important information safe. With that being said, computer crime rates have started to increase over time which created the cyber theft industry. Throughout this paper we will be discussing four angles about this industry: the ways criminals steal personal information, why criminals choose cybercrime, how to protect yourself, and cases of cyber theft. Cyber Theft Process Computers are to be considered as the mother of technology, meaning every new technology is developed through a computer. At the same time, computers could be compared to a dangerous weapon considering this technology could be used to steal other people’s personal information. Cyber theft is using a computer as a base and a network to travel through the internet to any device that is connected to the internet. However, cyber theft started when criminals started finding a way to hack into people's emails by sending someone an email that has an attachment. This attachment is actually a virus that will download itself to the person device and give the criminal access to the information they have on their computer. Over time cyber theft criminals set a bigger goal than just stealing emails, they went after the big companies....

Words: 1547 - Pages: 7

Premium Essay

Employee Theft

...Essay 5 Are you a victim of employee theft? Did you know that employee theft has cost from small businesses to major Fortune 500 companies over $37.14 billion in 2010 alone? Fraud against business includes the theft of physical assets such as cash or inventory. Essentially there are two types of inventory fraud: physical loss and financial statement fraud. Inventory shrinkage is the term use in accounting to describe the loss of inventory. Loss of inventory might be due to shoplifting, employee theft, damage, etc. Inventory fraud can occur in any company. Nearly 50% of retail inventory shrinkage comes from employee theft. Dr. Hollinger, who conducts the National Retail Security Survey, reported that shrinkage (as mentioned before) has cost the retail industry $37.14 billion in 2010. Shrinkage is divided into employee theft (43.7%), shoplifting (32.6%), administrative error (12.9%) and vendor fraud (5.4%). While is really hard for a manager or CFE to determine who can steal from a company you have to keep in mind that everyone with the right motives can steal from you. Even a longtime employee who has always been on time and loyal to the company may be tempted to commit theft due to recent live event such as a divorce, not enough money to send kids to college, etc. others do it simply because of greediness. I work for a mid-size property management company in Rockville, MD. The executive director, accountant and secretary where fired last month because they were stealing money...

Words: 1059 - Pages: 5

Premium Essay

Cases for Theft

...Cases For Theft Morris (1984) D swapped labels in supermarket, assuming the rights of the owner, and went to pay for the product at the till for a lower price; d does not have to assume all the rights of the owner Pitham and Hehl (1977) d planning to sell v's furniture and offered to do so without v's knowledge; it did not matter that the furniture had not yet been removed from the house, because d was assuming rights of the owner by offering to sell it to people Lawrence (1972) Italian student gave wallet to taxi driver to take fare, and he took more than he was owed; there was appropriation - even though the student had offered the wallet, they could not have consented Gomez (1993) D and others asked to supply stolen goods from shop in return for two stolen building society cheques, manager believed cheques were already authorised, bank dishonoured cheques; d appealed against conviction on basis manager had authorised the use of the cheques, but appeal dismissed Galasso (1993) D was a nurse responsible for v and managed their affairs, d opened a new trust account and paid in a cheque for v; it was held that taking property without owner's consent was appropriation regardless of the owner's mental state, but in this case there had been no appropriation Mazo (1997) d cashed cheques to the value of £37,000 and taken other valuables from 89 year old employer, argued they were gifts, but prosecution argued she had taken advantage of the vulnerability of v; jury...

Words: 1246 - Pages: 5

Premium Essay

Identity Theft

...IDENTITY THEFT: IN MORE WAYS THAN ONE Identity Theft: In More Ways than One Justin S. Evangelist CMRJ 306 D002 Criminal Investigation American Military University Identity Theft: In More Ways than One We have all watched the news; we have all heard the stories. It’s on commercials and television shows. Identity theft is sweeping across the nation and it something we should all take very seriously. Identity theft is a form of fraud or taking away someone else’s identity in order to gain something, usually financial means (Swanson, Chamelin, Territo & Taylor, 2009). The Federal Trade Commission estimates that as many as nine million Americans have their identity stole each year, resulting in over 50 billion dollars of financial loss (Mercuri, 2006). There are several different forms of identity fraud, several which not everyone has heard of. The three main types of identity theft consist of criminal identity theft, medical identity theft and child identity theft. Criminal identity theft occurs when a victim’s name, address, and other personal details are given to law enforcement officials during the commission of a crime. The victim is then mistakenly arrested (Mercuri, 2006). Often times, the imposter has obtained some sort of tangible, personal information from the victim, usually a driver’s license. Once the name of an innocent identity theft victim is assigned to the criminal act of the true perpetrator, it can be very difficult for the identity theft victim...

Words: 998 - Pages: 4

Premium Essay

Identity Theft

... 2013 Research Paper: Identity Theft Identity theft, also known as ID theft is a crime in which a criminal obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to pretend to be someone else. The information can be used to obtain credit, merchandise, and services using the victims’ name. Identity theft can also provide a thief with false credentials for immigration or other applications. One of the biggest problems with identity theft is that very often the crimes committed by the identity theft expert are often credited to the victim. A thief could take out a mortgage in your name or commit a crime and pretend to be you when caught. Thieves can even use your personal information to apply for a job or use your medical insurance. Identity theft has become one of the world’s leading crimes in the world. Identity theft drastically increased in the year 2000 by nearly 52%, occurring every half second all across the world. There are two primary types of identity theft: ~Account takeover ~True name theft Account takeover identity theft refers to the type of situation where an imposter uses the stolen personal information to gain access to the person’s existing accounts. Often the identity thief will use the stolen identity to run up current credit lines, by changing your address so that you never see the credit card bills that the thief constantly runs up. True name identity theft means that the thief uses personal...

Words: 485 - Pages: 2

Free Essay

Identity Theft

...Abstract Culprits of identity theft are the modern day con artists that are able to convince and persuade people out of their money by promising their victims a portion of wealth which will never come to be. This paper will describe what is classified as identity theft, how people become victims of this crime and how people can avoid being becoming a victim to this popular means of deception in the electronic world. On the average one hundred thousand people are affected by identity theft in the United States per year and over two billion dollars in revenue is stolen as shown in the surveys that were conducted in 2003 -2006 (Anderson, Durbin & Salinger). Because of this threat the consumer becomes skeptical of online transactions which cause loss of business to many retailers as they are based solely on internet sales. For the retailer to make sure that the consumer is protected from fraudulent transactions and the possibility of their personal information to be at risk of being intercepted by others, the retailers need to incorporate special systems onto their site and have special programs that could make the purchasing of items from their business complicated for the consumer and will also raise the price of the goods to offset their loss on the security measures. The way people are committing the crimes of identity theft are only limited by the imagination of the person that commits these types of crimes. The source can be from someone...

Words: 1459 - Pages: 6

Premium Essay

Idenity Theft

...Identity theft Identity theft surrounds us every day. from people stealing other people’s info and using it to gain credit or just to get out of trouble .identity theft can be as easy as just using someone’s name to using their whole identity, like name social security numbers . Anyone can go online if they have this information and apply for any type of credit which would assume your identity. Many creditors are hard to go through to prove that it wasn’t you. They will require many documents to prove the fact. People don’t even have to be online to steal your identity they can do it by copying your credit card information at your local restaurant to the local deli. In short it shows how very easily wrong doing can be done and a person can be misrepresented by just a simple click of a mouse or swipe of a card, some identify thieves have been as easy as using a smart phone to take pictures of the selected credit card and use it to buy many things in all running u a high bill then not worried about it cause usually hard to trace that it wasn’t you cause they have the stuff sent to a po box or different address. Best way to lower some identity theft is when you get any credit card applications in the mail shred those if you have a shredder this will stop identity theft people from being able to steal your identity and use it for their own personal gain. There are programs out there like life lock and credit karma that help you to watch your credit report so you can see if there...

Words: 565 - Pages: 3

Free Essay

Identity Theft

...Technology help Criminals Commit Identity Theft? Identity theft is becoming one of the fastest growing criminal offenses in the United States. Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name (Kiesbye). It is important for one to know that identity theft is not just a financial crime. It is a serious crime that can cause havoc on finances, credit history, and reputation. Identity theft can go unnoticed and can take time, money, and patience to resolve. Technology is constantly evolving making identity theft an easier crime to commit (Kiesbye). There are several ways in which technology plays a major role in assisting criminals commit identity theft (Knight Ridder/Tribune Business News). Some ways include computer hacking, telephone bugging, and old-fashioned stealing. Identity theft has become a very serious business for criminals (Knight Ridder/Tribune Business News). . Identity theft has been around for a number of years. The term identity theft was coined in 1964 however it does not mean to steal an identity but rather to impersonate another individual to commit fraud or deception (Vacca). Identity theft is not easily detectable by the individuals. Someone can steal or misappropriate personal information without the individual knowing then commit identity theft using the stolen information. According...

Words: 1341 - Pages: 6

Premium Essay

Idenity Theft

...Abstract This paper discusses identity theft in terms of its impact, its character and its prevention. In the paper, particular attention is given to the types of primary identity theft classifications, some online methodologies of identity theft and finally, some preventive measures. The paper discusses how identity theft is found to be a massive problem in terms of financial losses to both corporations and individuals and is expected to grow in severity over the next few years. From the Paper "Identity theft occurs when an unauthorized person obtains another's name and a piece of critical identifying information about that person such as a credit card or bank account number, social security number or driver's license number. With these two pieces of information, someone can open credit card accounts in someone else's name and go on spending sprees for personal items or for things that can easily be sold. When bills are not paid, the delinquent account shows up on that person's credit report. The identity thief can change the mailing address on the victim's credit card account thus delaying the discovery of the theft. The imposter then runs up big bills on the victim's account, and since they are being sent to the new address, one would have no way of knowing any of this was going on." Abstract The paper discusses the growing issue of identity theft through a case study. Due to the subject's fear of telling his wife what had happened, especially so he should not lose...

Words: 976 - Pages: 4

Free Essay

Identity Theft

...On Identity Theft A. Today is the big day. You have been saving for several months for a down payment to purchase your new car. You go to the dealership, pick out the car and fill out all the required paperwork. You start daydreaming about driving off the lot when the finance manager comes in and says the one word you were not expecting, DENIED. You have no idea what is going on because you know you have perfect credit. After some time consuming effort, you realize you are a victim of identity theft. B. The purpose of my speech is to inform the audience about identity theft. C. Identity theft can happen to anyone in this room. Your roommate, friend or a total stranger can gain access to your personal information. If you ever plan on taking out a student loan, purchasing a car or home, you should listen carefully to this speech. D. I was almost a victim of identity theft. Several years ago someone stole my checkbook. The person who found it started writing checks from my account to purchase a few very expensive items at my expense. I had no idea this was happening until I went to the ATM to withdraw some money. I called my bank and found out that my account was $2000.00 overdrawn. Fortunately, I reported it the police in a timely manner and they were able to apprehend the person before more damage could be done. The police told me about identity theft and how lucky I was. After the incident I started doing research on identity theft so I could...

Words: 1389 - Pages: 6

Premium Essay

Identity Theft

...new policies by the new government. There is one type of crime, which has consistently grown every year in the last decade, and also has been the fastest growing crime. It is a neither gun crimes nor the use and abuse of certain drug; it is identity theft. When searched for fastest growing crime on google.com the unanimous answer turned out to be identity theft. This crime basically proves that there is no doubt in the fact that there is something going wrong when dealing with identity theft. It seems like there is a piece of the puzzle which is missing. The main focus of this paper is to put some light on the issues concerning with identity theft, how it takes place in various manners and what are the current laws in place to act against identity theft. The role of credit card companies to deal with identity theft is also mentioned. Identity theft and identity fraud are words used to refer to all degrees of crime in which someone wrong fully acquires and exploit individual private information in numerous ways that engage scam or trickery, usually for financial gains. According to two studies done in July 2005 by Gartner research and Harris interactive, approximately seven million people became victims of identity theft in the year 2003, which increase to ten million people in 2004. That equals 19,178 per day, 799 per hour, and 13.3 people per minute (Gartner). Identities can consist of many items such as social security...

Words: 1086 - Pages: 5

Free Essay

Identity Theft

...Identification is ever more important in the online world, and identity-related crime is a growing problem related to this. This new category of crime is not restricted to high-profile instances of identity ‘theft’ or identity fraud; it is wide-ranging and complex, ranging from identity deletion to unlawful identity creation and identity ‘theft’. Commonly accepted definitions are lacking, thus blurring available statistics, and policies to combat this new crime are piecemeal at best. In order to assess the real nature and magnitude of identity-related crime, and to be able to discuss how it can be combated, identity-related crime should be understood in all its aspects. As a first key step, this article introduces a typology of identity-related crime, consisting of conceptual, technical, and legal categories. The conceptual categories are unlawful forms of identity deletion, identity restoration, and identity change; the latter category is subdivided in unlawful forms of identity takeover (‘identity theft’), identity delegation, identity exchange, and identity creation. The technical categories consist of 17 points of attack on identification. The legal categories distinguishes between identity-specific legal provisions, such as the US crime of identity theft, and identity-neutral legal provisions mainly used in Europe, subdivided in criminal, civil, and administrative provisions. This typology can be used as a comprehensive framework for future research, countermeasures, and...

Words: 1042 - Pages: 5

Premium Essay

Identity Theft

...The Two Mrs. Jane Does Diana Sours DeVry University The Two Mrs. Jane Does Identity theft, it can and will catch you off guard if you are not careful with your information, and it can have a devastating effect. “Another pre-screened credit offer?” thought Mrs. Jane Doe, as she walked back up to her house from checking her mail. She quickly realized that was not the case at all, as she opened the “offer” from Visa. Instead, what she was staring at was a bill addressed to her, that she had no recollection of making. She was now faced with the probability of being a victim of identity theft. Identity theft, in short, is using someone else’s personal information for one’s own financial gain. Identity theft laws need to be improved because this crime costs businesses money, costs credit card companies money, and financially hurts ordinary consumers. In 2006, “U.S. companies average identity theft-related costs of $182 per compromised record. While that figure averaged $660,000 per company in notification expenses and indirect costs, the total estimate, including lost business, tops $2.5 million. This staggering amount also includes costs and fees associated with legal expenses, fines, investigation, auditing, class action litigation, public relations damage control, and setting up monitoring, remediation practices, and a dedicated customer support phone number.” (Identitytheft.lifetips.com, 2014) Some of this cost is passed along to the credit card companies in the form of higher...

Words: 855 - Pages: 4

Free Essay

Identity Theft

...Lab 10: Identity Theft Identity theft is on the rise every day and we do not even know when it happens. Identity theft occurs when someone wrongfully obtains another’s personal information without their knowledge to commit theft or fraud (Federal Bureau of Investigation, n.d.). Identity theft crimes include credit card fraud, internet fraud, mail fraud, and many others. Anybody is at risk of identity theft; nobody is safe. As beginning IT students, it is important to learn the basic way to protect ourselves right now. Working on the Internet exposes your identity to many people. When a person uses your information without your consent and causes any type of harm is considered identity theft. Along with names, Social Security numbers and dates of birth, fraudsters also use Medicare numbers, addresses, birth certificates, passport numbers, financial account numbers (bank account or credit card), passwords (like mother’s maiden name, father’s middle name), telephone numbers, and biometric data (like fingerprints, iris scans) to commit identity theft (Federal Bureau of Investigation, n.d.). As you can see there are many types of information that can be used to steal your identity. Once your identity is stolen the restoration process is long and tedious. Beginning IT students should be aware of what precautions to take when handling important information. Knowing the facts will prevent or minimize the percentage of becoming an identity theft victim. Clear your logins and passwords...

Words: 479 - Pages: 2

Free Essay

Idenitty Theft

...a victim of identity theft. What is identity theft you ask? It is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. According to the national association of the attorneys general, “Identity theft is one of the fastest growing crimes in the nation with an estimated 700,000 victims each year and after the victim discovers their theft, they spend an average of 808 dollars to clear up the discrepancies along with 175 hours approx. Restoring their reputation by means of notifying the credit bureaus, cancelling cards, and negotiating with creditors (2006.) Currently those numbers are now even higher at 1,495 dollars in expenses and 609 hours to clean up credit”. Identity theft happens all the time. This is partly caused because of who you trust and what you put on the internet. In the paragraphs to come we will get into the types and stages of identity theft, who it affects and how you can protect yourself. According to the NIJ (National Institute of Justice), there are seven broad types of identity theft and three stages. The Seven stages are exploiting weakness in specific technologies and information system, financial scams, a motive for other crimes, facilitating other crimes, avoiding arrest, repeat victimization (“classic” identity theft), and organized identity theft. The three stages are;...

Words: 1118 - Pages: 5