1.
Introduction ^
2.
What do we mean by «identity»? ^
3.
What do we mean by «identity theft»? ^
3.1.
Economic or other gain ^
3.2.
Criminal detriment ^
3.3.
Other identity thefts ^
4.
Identity theft in the Finnish Criminal Code ^
5.
Conclusions ^
6.
References ^
Allardt, Erik, Ihminen ja moraali hyvinvointivaltiossa. In: Juhlajulkaisu Paavo Kastari 1907 – 13/11 – 1977. 1978.
Caeton, Daniel, The Cultural Phenomenon of Identity Theft and the Domestication of the World Wide Web. Bulletin of Science, Technology and Society, Vol. 27, no 1. February 2007. pp.11–23.
Gercke, Marco, Legal Approaches to Criminalize Identity Theft. In: Handbook on Identity-Related Crime. United Nations Office on Drugs and Crime. Vienna 2011. pp. 1–54.
Hallituksen esitys [HE]232/2014 (Government Bill) eduskunnalle laiksi rikoslain eräiden tietoverkkorikoksia koskevien säännösten muuttamisesta ja eräiksi siihen liittyviksi laeiksi.
Heinonen, Risto, Digitaalinen minä. Edita. Helsinki 2001.
Kangasniemi, Tea, Identiteettivarkaudet – haasteita rikostutkinnalle ja – oikeudelle, paljon vaivaa ja harmia uhrille. In: Perus- ja ihmisoikeudet rikosprosessissa. Helsingin hovioikeuden julkaisuja. Hakapaino. Helsinki 2012. pp. 217–238.
Lessig, Lawrence, Code and other laws of cyberspace. Basic Books. New York. 1999.
Nabeth, Thierry, Identity of Identity. In: Rannenberg, Kai / Royer, Denis / Deuker, André ( Eds.) The Future of Identity in the Information Society, Springer Berlin Heidelberg, 2009. pp. 19–69.
OECD, Online Identity Theft. March 2009.
Pöysti, Tuomas, Julkisen vallan velvoite edistää sähköisen identiteetin ja verkkoyhteiskunnan infrastruktuurin turvallisuutta. In: Oikeus 1/2000, pp. 91–112.
Report of the Legal Affairs Committee 29/2014.
Saarenpää, Ahti, Tietoturva ja tietosuoja, identiteetin näkökulma. In: Pohjois-Suomen tuomarikoulu. Julkaisuja 2/2002. Rovaniemi 2002, pp. 33–76.
Sisäasiainministeriö [Finnish Ministry of the Interior], Henkilöllisyyden luomista koskevan hankkeen loppuraportti. Sisäasiainministeriön julkaisuja 32/2010, Helsinki 2011.
Stets, J.E.: Justice, Emotion, and Identity Theory. In: Burke, Peter J. / Owens, Timothy J. / Serpe, Richard / Thoits, Peggy (Eds.). Advances in Identity Theory and Research. Kluwer Academics / Plenum Publicshers. New York 2003. pp. 105–122.
Taylor – Caeti – Loper – Fritsch – Liederbach, Digital Crime and Digital Terrorism, pp. 108–109. Available at: http://faculty.uml.edu/jbyrne/44.203/digital%20crime.pdf .
- 1 Federal Bureau of Investigations, Identity theft. Available at: https://www.fbi.gov/about-us/investigate/cyber/identity_theft (accessed on 26 January 2016)
- 2 Taylor – Caeti – Loper – Fritsch – Liederbach, Digital Crime and Digital Terrorism, p. 108–109. Available at: http://faculty.uml.edu/jbyrne/44.203/digital%20crime.pdf (accessed on 26 January 2016)
- 3 One acknowledged point of departure in the theory of identity is that the core of a person’s identity is the conception that he or she occupies a particular role. Stets, Justice, Emotion, and Identity Theory, p. 105.
- 4 Allardt Ihminen ja moraali hyvinvointivaltiossa, in Juhlajulkaisu Paavo Kastari 1907, 13/11, 1977 (1978), p. 24. See also Cast, Identities and Behavior, p. 43. On identity as a social role, see also Stone, G.P., Appearance and the Self, in A.M. Rose (ed.), Human behavior and social processes. pp. 86–118.
- 5 Lessig, Code and Other Laws of Cyberspace (1999), pp. 30–31.
- 6 Nabeth, Identity of Identity, p. 24. See also Hall, Identiteetti, p. 246.
- 7 A person’s digital identity is composed of information recorded in registers and his or her electronic trail. Heinonen, Digitaalinen minä, p. 13 and p. 253.
- 8 Saarenpää, Tietoturva ja tietosuoja, identiteetin näkökulma, p. 52.
- 9 This has been stated in the report issued by the EU’s Justice and Home Affairs Council in December 2010 and in Handbook on Identity Related Crime published by the UN. Internationally the most common terms referring to identity theft include «identity theft» and «identity fraud». They are particularly common in the United States and Great Britain. To be sure other expressions can be found as well. See Gercke, Legal Approaches to Criminalize Identity Theft, s. 25.
- 10 The lack of a uniform definition can be seen as one factor impeding efforts to combat identity theft internationally. OECD, Online Identity Theft, p. 9.
- 11 Kangasniemi, Identiteettivarkaudet – haasteita rikostutkinnalle ja –oikeudelle, paljon vaivaa ja harmia uhrille, p. 218–219. See also Gercke, Legal Approaches to Criminalize Identity Theft, pp. 19–20.
- 12 Sisäasiainministeriö [Finnish Ministry of the Interior], Henkilöllisyyden luomista koskevan hankkeen loppuraportti, p. 53. See also OECD, Online Identity Theft.
- 13 Sisäasiainministeriö [Finnish Ministry of the Interior], Henkilöllisyyden luomista koskevan hankkeen loppuraportti, pp. 47–48.
- 14 Sisäasiainministeriö [Finnish Ministry of the Interior], Henkilöllisyyden luomista koskevan hankkeen loppuraportti, pp. 53–58 and Gercke, Legal Approaches to Criminalize Identity Theft, p. 20.
- 15 For example, in the United States the Federal Bureau of Investigation has pointed out that identity thefts are generally committed to mask the identity of criminals and terrorists. For more detail, see: http://www.fbi.gov/about-us/investigate/cyber/identity_theft (accessed on 26 January 2016)
- 16 Report of the Legal Affairs Committee 29/2014, pp. 3–4
- 17 Pöysti, Julkisen vallan velvoite edistää sähköisen identiteetin ja verkkoyhteiskunnan infrastruktuurin turvallisuutta, p. 104.
- 18 Hallituksen esitys [HE]232/2014, pp. 3–4 [Government bill]
- 19 Hallituksen esitys [HE]232/2014, p. 1 [Government bill]
- 20 Hallituksen esitys [HE]232/2014, p. 38 [Government bill]
- 21 Hallituksen esitys [HE]232/2014, p. 36 [Government bill]
- 22 Hallituksen esitys [HE]232/2014, p. 36 [Government bill]
- 23 Hallituksen esitys [HE]232/2014, p. 36 [Government bill]
- 24 Hallituksen esitys [HE]232/2014, p. 37 [Government bill]
- 25 Hallituksen esitys [HE]232/2014, p. 37 [Government bill]
- 26 Hallituksen esitys [HE]232/2014, p. 37 [Government bill]
- 27 Hallituksen esitys [HE]232/2014, p. 37 [Government bill]
- 28 Back in 1998 the OECD drew attention to the importance of secure online connections, including the implications for identity theft. For more details, see OECD, A Borderless World: Realising the Potential of Global Electronic Commerce.
- 29 Sisäasiainministeriö [Finnish Ministry of the Interior], Henkilöllisyyden luomista koskevan hankkeen loppuraportti, p. 53.
- 30 OECD, Online Identity Theft, p. 16.
- 31 Caeton, The Cultural Phenomenon of Identity Theft…, p. 20