S.2168 - Identity Theft Enforcement and Restitution Act of 2007110th Congress (2007-2008)
|Sponsor:||Sen. Leahy, Patrick J. [D-VT] (Introduced 10/16/2007)|
|Committees:||Senate - Judiciary | House - Judiciary|
|Latest Action:||02/04/2008 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions)|
This bill has the status Passed Senate
Here are the steps for Status of Legislation:
- Passed Senate
Summary: S.2168 — 110th Congress (2007-2008)All Information (Except Text)
Passed Senate amended (11/15/2007)
Identity Theft Enforcement and Restitution Act of 2007 - Amends the federal criminal code to: (1) authorize criminal restitution orders in identity theft cases to compensate victims for the time spent to remediate the intended or actual harm incurred; (2) expand identity theft and aggravated identity theft crimes to include offenses against organizations (currently, only natural persons are protected); (3) include conspiracy to commit a felony within the definition of "felony violation" for purposes of aggravated identity theft crimes; (4) include making, uttering, or possessing counterfeited securities, mail theft, and tax fraud as predicate offenses for aggravated identity theft; (5) enable prosecution of computer fraud offenses for conduct not involving an interstate or foreign communication; (6) eliminate the requirement that damage to a victim's computer aggregate at least $5,000 before a prosecution can be brought for unauthorized access to a computer; (7) make it a felony, during any one-year period, to damage 10 or more protected computers used by or for the federal government or a financial institution; (8) expand the definition of "cyber-extortion" to include a demand for money in relation to damage to a protected computer, where such damage was caused to facilitate the extortion; (9) prohibit conspiracies to commit computer fraud; (10) expand interstate and foreign jurisdiction for prosecution of computer fraud offenses; and (11) impose criminal and civil forfeitures of property used to commit computer fraud offenses.
Directs the U.S. Sentencing Commission to review its guidelines and policy statements for the sentencing of persons convicted of identity theft, computer fraud, illegal wiretapping, and unlawful access to stored information to reflect increased penalties for such offenses. Sets forth criteria for updating such guidelines and policy statements.