{"id":1688,"date":"2007-07-20T00:00:00","date_gmt":"2007-07-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/07\/20\/doj-sends-id-theft-bill-to-congress\/"},"modified":"2021-12-30T11:39:48","modified_gmt":"2021-12-30T11:39:48","slug":"doj-sends-id-theft-bill-to-congress","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/07\/20\/doj-sends-id-theft-bill-to-congress\/","title":{"rendered":"DoJ Sends ID Theft Bill to Congress"},"content":{"rendered":"<p>The Bush administration sent proposed legislation to Congress today that aims to update and improve federal identity theft laws.  The Identity Theft Enforcement and Restitution Act of 2007 would allow ID theft victims to recover the value of the time lost attempting to repair damage caused by identity theft.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;This proposed legislation is a firm step in the right direction in updating our identity theft laws to meet the needs of investigators and prosecutors who are working daily to punish identity thieves, and help victims put their lives back together,&#8221; Attorney General Alberto Gonzales said in a statement.<\/p>\n<p>Deborah Platt Majoras, chairman of the Federal Trade Commission and co-chair of the president&#8217;s Identity Theft Task Force with Gonzales, said the bill would enhance law enforcement&#8217;s ability to crack down on identity theft.<\/p>\n<p>http:\/\/www.internetnews.com\/bus-news\/article.php\/3689936<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1688","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1688"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1688\/revisions"}],"predecessor-version":[{"id":4175,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1688\/revisions\/4175"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}