What Is Identity Theft and How Does Criminal Law Address It?

مجال الممارسة:Criminal Law

المؤلف : Donghoo Sohn, Esq.



Identity theft involves the unauthorized use of another person's identifying information to commit fraud or other crimes, and New York law treats it as a serious felony with escalating penalties based on the value of loss and the number of victims affected.



Understanding identity theft from a legal standpoint requires examining how prosecutors establish intent, what evidence they rely on, and how courts distinguish between opportunistic fraud and organized schemes. The offense spans federal and state jurisdiction, meaning a single act can trigger investigation by local police, state authorities, and federal agencies like the FBI or Secret Service. This jurisdictional overlap creates procedural complexity that affects how charges are filed, what defenses are available, and where trial may occur.

Contents


1. What Conduct Qualifies As Identity Theft under New York Law?


New York Penal Law Section 190.80 defines identity theft as knowingly and with intent to defraud using, or attempting to use, personal identifying information of another person without that person's consent. The statute casts a broad net: identifying information includes name, address, telephone number, email address, social security number, date of birth, bank account numbers, credit card numbers, mother's maiden name, financial services account numbers, and biometric records.



Intent and Materiality in Prosecution


Prosecutors must prove both that you knew you were using another person's information and that you intended to defraud. This dual requirement means that mere possession of someone else's identifying data does not automatically constitute identity theft; there must be evidence of a deliberate plan to use that information for financial gain or other fraudulent purpose. Courts examine the timing between obtaining the information and using it, communications showing planning, and the nature of the transactions or accounts opened. From a practitioner's perspective, the distinction between recklessness and knowing intent often becomes the pivotal factual dispute at trial.



Scope of Identifying Information


The definition extends beyond obvious financial identifiers. Biometric records, email addresses, and phone numbers can all serve as identifying information if used without consent to commit fraud. This breadth means that identity theft charges can arise from scenarios ranging from opening a credit card account in someone else's name to creating fake social media profiles or obtaining medical services under another person's identity. Each use of the information can constitute a separate count.



2. How Do Prosecutors Prove Identity Theft Beyond Reasonable Doubt?


Prosecutors build identity theft cases through documentary evidence, digital forensics, and witness testimony that establishes the chain of unauthorized use. They typically obtain records from financial institutions, credit bureaus, telecommunications companies, and online platforms to show that accounts were opened or transactions conducted using the victim's information.



Documentary and Digital Evidence


Bank statements, credit card applications, loan documents, and email records form the backbone of most identity theft prosecutions. Prosecutors also rely on IP address logs, device identifiers, and geolocation data to place a suspect at the location where fraud occurred or to show access to accounts from a device the suspect controlled. Handwriting analysis or voice identification may be used if applications or transactions occurred in person or by phone. These records are often supplemented by subpoenaed communications between the suspect and merchants, lenders, or other third parties.



Victim and Witness Testimony


The victim typically testifies that they did not authorize the accounts or transactions and that they did not recognize the signature, voice, or other identifying markers on the fraudulent applications. Employees of financial institutions or credit card companies may testify about their company's procedures for opening accounts and verifying identity. In cases involving organized rings, law enforcement undercover operations or cooperating witnesses may provide evidence of the suspect's role in the scheme.



3. What Are the Felony Levels and Sentencing Exposure?


New York classifies identity theft into four felony grades depending on the amount of loss and the number of victims. Class E identity theft (the lowest grade) applies when the value of the fraud does not exceed $1,000 or involves a single victim. Class D applies to losses between $1,000 and $3,000 or more than one victim. Class C covers losses exceeding $3,000 but under $50,000, and Class B applies to losses of $50,000 or more or to patterns of identity theft affecting ten or more victims within a twelve-month period.



Sentencing and Collateral Consequences


Sentences range from probation for Class E felonies to up to fifteen years imprisonment for Class B convictions. Beyond incarceration, a conviction carries collateral consequences including mandatory restitution to victims, civil liability, professional license suspension or revocation, and employment barriers. In New York County and other high-volume courts, prosecutors often pursue restitution as a condition of plea agreements, requiring defendants to repay the full amount of documented loss. Documentation of loss timing and amount becomes critical early in the case, as incomplete or delayed victim affidavits can affect the restitution amount a court can order.



4. How Does Identity Theft Relate to Related Offenses?


Identity theft charges frequently appear alongside grand larceny, forgery, falsifying business records, and scheme to defraud charges. These companion offenses may carry equal or greater penalties and reflect the full scope of fraudulent activity. A single identity theft scheme can generate multiple charges across different statutes, each with separate sentencing exposure.



Relationship to Civil Liability


Beyond criminal prosecution, victims pursue civil remedies through identity theft lawsuits under federal law (the Fair Credit Reporting Act, the Identity Theft Enforcement and Restitution Act), and state common law. Civil liability does not require proof beyond a reasonable doubt; the standard is preponderance of the evidence, making civil recovery a lower procedural hurdle. A defendant may face both criminal penalties and civil damages simultaneously, creating parallel legal exposure that requires coordinated defense strategy.



5. What Defenses and Procedural Protections Exist?


Defenses to identity theft include lack of knowledge that you were using another person's information, absence of intent to defraud, authorization or consent from the victim, mistaken identity, and challenges to the reliability of digital or documentary evidence. Procedural protections include the right to discovery of all evidence the prosecution possesses, the right to challenge the admissibility of statements or evidence obtained in violation of constitutional protections, and the right to cross-examine witnesses.



Consent and Authorization Defenses


If the victim authorized the use of their identifying information, even for a limited purpose, the defendant may argue lack of criminal intent. For example, if a family member was authorized to use a relative's social security number for a specific transaction but exceeded that authorization, the scope of consent becomes a factual issue. Courts examine the nature and extent of the authorization granted and whether the defendant's conduct fell within those bounds.



Digital Evidence Challenges


IP addresses, device identifiers, and geolocation data are not always conclusive proof of a defendant's actions. Defense counsel often challenge the reliability of these records, the chain of custody of digital evidence, and whether law enforcement obtained the evidence in compliance with warrant requirements and statutory procedures. These technical challenges can significantly weaken the prosecution's case, particularly when the defendant argues that someone else had access to their device or account credentials.

Felony GradeLoss Amount / Victim CountSentencing Range
Class EUp to $1,000 or single victimProbation to 4 years
Class D$1,000–$3,000 or multiple victimsProbation to 7 years
Class C$3,000–$50,0001 to 15 years
Class B$50,000+ or 10+ victims in 12 months5 to 15 years

Understanding the statutory framework and evidentiary standards surrounding identity theft helps clarify where factual disputes are likely to emerge and which procedural safeguards may protect your interests. Early assessment of the evidence—particularly the digital forensics, documentary records, and witness credibility—allows for informed evaluation of negotiation posture and trial readiness. Documenting your own timeline, communications, and device access history before formal charges are filed can preserve information that may otherwise be lost or become difficult to reconstruct. If you are under investigation or have been charged, gathering records of authorization, consent communications, and your own financial transactions creates a foundation for defense strategy and positions counsel to challenge the prosecution's narrative from the outset.


08 May, 2026


المعلومات الواردة في هذه المقالة هي لأغراض إعلامية عامة فقط ولا تُعدّ استشارة قانونية. إن قراءة محتوى هذه المقالة أو الاعتماد عليه لا يُنشئ علاقة محامٍ وموكّل مع مكتبنا. للحصول على استشارة تتعلق بحالتك الخاصة، يُرجى استشارة محامٍ مؤهل ومرخّص في نطاق اختصاصك القضائي.
قد يستخدم بعض المحتوى المعلوماتي على هذا الموقع أدوات صياغة مدعومة بالتكنولوجيا، وهو خاضع لمراجعة محامٍ.

احجز استشارة
Online
Phone