In law school, or while reading the law as an extern, the same classes/subjects are studied by all prospective lawyers. And each newly sworn lawyer makes the same oath to maintain ethics and professionalism.
First-year students must master the concepts of “Contracts, Torts, and Criminal Law,” across all American Bar Association approved schools.
Same goes for most State Bar certified schools.
So in general, most licensed practitioners are masters of the basics. (“Jack of all and master of none.”)
So does it matter which type of attorney is chosen for your particular legal claim?Well, first you must understand how massive law is now insofar as its various subdivisions are concerned. Yes, there are specialists. Lawyers such as those who handle patent law are one class.
But there are also trial lawyers who focus only on a particular area of tort law, like mass torts.
Imagine the law is like a giant skyscraper.Each room of the building represents an area of legal knowledge like:
“Negligence Law,” which would be a small room in the basement. And then, in that tiny room, maybe a desk drawer would contain the legal know how to navigate a bodily injury insurance claim, mediation, and trial.
“Wills and Trusts” with its sub-areas would be in a small room down the hall and so forth.
And then for argument’s sake, make the first few top floors criminal law.
All the lower floors would be civil law, and you can start to see how the law is stacked.
So to answer the original question, yes, as a general rule, it does make sense to hire a personal injury lawyer for a PI case. But only so long as your lawyer is reasonably competent in their particular practice.
After all, you need someone with above average skill for the type of case you have.
Lawyers certainly are not all the same. Therefore, it does matter which type of legal expert you selected.
Some lawyers are general practitioners who handle cookie cutter types of cases. Usually, the cases they handle are not always that complex. This kind of specialist will be the one you call for a canned divorce or bankruptcy, or a traffic ticket infraction, for example.
The takeaway from all of this is that a particular type of lawyer still may not always have the requisite training for your specific claim or case. So as a seeker of help, you must familiarize yourself with some best practices for consumers.
Then you’ll be able to hire the right type of help sensibly. So for now, we will drill down into a few of the many types of lawyers. So let’s try and understand the similarities and differences as discussed below.
What is a General Practice Lawyer (“GP”)?
Numerous types of attorneys have specialized knowledge in one particular area of law. And some even practice in a few different areas that are related. As noted, general practice lawyers do not just specialize in one particular area. In fact, GP’s usually practice simultaneously in some different areas of law.
It is not uncommon for a general lawyer to practice in several or all of the areas of law listed as follows:
Real Estate law
Corporate and Commercial Law
Civil Litigation Law
Labor and Employment Law
Intellectual Property Law
While there are some GP’s that limit the types of law they practice, this is rare. So there are some that accept cases and cash from virtually any kind of client, in a multitude of legal claims.
But by far the most popular and notorious lawyers in our culture are the specialized tort or personal injury lawyers.
So one who is guilty of committing a crime may be punished with jail time. But when a crime is determined, the guilty party or their insurance agency may still have to pay monetary compensation.
Compensation is money that gets paid to the party or parties that suffered the injury as reparations for the criminal OR civil act.
The District or City Attorney prosecutes crimes. The punishment can be a fine, imprisonment, or both.
A civil, or private lawyer sues for money in torts. There is no jail time.
Are you getting this so far? Personal injury attorneys often elect to take only accept specific kinds of negligence law cases. Most of them avoid hourly billing. So they don’t usually take on criminal clients at all.
Some areas of law he or she may choose to specialize in include the following:
What are Some Differences between General Lawyers and Personal Injury Attorneys?
A general practice lawyer doesn’t just apply their skills to one particular area of law. So this means they know a variety of different case types.
A tort attorney has specialized knowledge and skill in cases that involve personal injury and tort laws. So this means the knowledge they have about cases of bodily harm is more in-depth than a “GP.”
A general practitioner can be a tort specialist, and arguably can be a better lawyer. After all, he understands better how all the law interrelates.
For example, elder abuse law cases have elements of crimes and can even involve some probate issues. But in some cases, a GP lacks the specialized knowledge for a complex area of law, such as an asbestos case. So it can be a crap-shoot. That’s why you should hire ELFPI. PI cases are more targeted, and that’s what we do.
To learn more about these issues, contact us at (213) 596-9642.
By: Accident attorney Michael P. Ehline, Esq. After Google Places had merged our business law firm listing with a competitor about 40 miles away, and refused to fix it, we started researching identity theft. Hence, we created this pretty comprehensive treatise.
Definition of Identity Theft:
Identity theft occurs when another person assumes an individual’s identity. Here, the thief knows how to access financial resources of the individual, obtain credit and other benefits, using the person’s name.
Identity theft makes a victim of the individual. So it is he or she who suffers the adverse consequences of the thief using their credit. Sadly, many victims are stuck with all these costs. Plus, the name, Social Security number, credit card or bank account number are all exposed without permission. Criminals do this to commit crimes or fraud.
Understanding The History of Identity Theft
The term identity theft has been used since 1964. And while it is not totally possible to steal a person’s identity, the criminal can impersonate or assume their financial identity to commit fraud. Identity theft and data breaches can be challenging to recognize. After all, in most cases, the victim does not know that anyone else has their personal or financial information.
According to the Federal Trade Commission, when there has been a breach, victims often don’t know how their information was stolen. But they also found that identity fraud was not always a consequence of identity theft. After all, it is possible for someone to steal or misappropriate personal information, without committing fraud.
What is a Major Breach?
And this can occur when there is a significant data breach. Most data breaches, according to a U.S. Government Accountability Office study determined they did not result in detected occurrences of identity theft. The report did state that the full extent data breaches are unknown.
An unpublished study by Carnegie Mellon University reported that most cases of identity theft are unknown. But the probability of becoming a victim of identity theft as a result of a data breach is approximately 2%. One of the most significant data breaches consisted of about 4 million records and according to the association of consumer information companies; it resulted in approximately 1800 instances of identity theft.
An article entitled “Cyber Crime Made Easy,” discussed the level that hackers are using malicious software. Security specialist Gunter Ollmann asked: are you “Interested in credit card theft? There is an app for that.” What he was alluding to is the ease that hackers are accessing information online.
One of the newer programs that are infecting computers is called Zeus, which is hacker friendly. And this makes it easy to use even for a new hacker. It might be easy to use, but it is devastating for the computer user it affects.
The article said that programs like Zeus could be used to steal credit card information and relevant documents, even those necessary for homeland security use. Hackers gaining this information could not only use it for identity theft but possible terrorist attacks.
Criminal Identity Theft: This is posing as another person for financial or personal gain, which is a crime.
Financial Identity Theft: This is the use of someone else’s identity to obtain goods, services, and credit.
Child Identity Theft: This is the use of a child’s information to obtain credit, services, and goods or assume their identity.
Medical Identity Theft: This is the use of another person’s identity to obtain medical care or drugs.
Identity Cloning Theft: This is the use of someone else’s identity to assuming their status in life. It means using the person’s name in meeting people, employment, and other activities.
Cases of identity theft can be used to fund other crimes.
Also, identity cloning can be used to attack payment systems. Examples include online credit card processing and medical insurance.
Criminal Identity Theft Explained
In fact, this occurs when an identity thief impersonates another human to conceal their real identity. People that do this could be a person hiding from creditors or other persons. It could be an illegal immigrant or another who wants to become anonymous for personal reasons. Another type of euphemism for this is a “poser.”
A poser is a person that uses another’s photos and information on social networking sites, and they further relay credible stories. And many involve friends of a real person they are attempting to imitate. One of the other things this type of ID thief does is to acquire false credentials that will pass authentication in daily life. And this can continue indefinitely, without detection.
What is Identity Cloning?
So this is a great question. This theft happens when a thief assumes another’s name to conceal their real identity. So for example, this is their form of witness protection program. So let’s say they want to avoid being found by an ex-spouse or partner. And now this can continue for an indefinite amount of time. This remains especially true if the person can obtain false credentials in the assumed name that appear authentic.
Synthetic Identity Theft
This is a type of identity theft that has become familiar, with the use of characters that are either partially or wholly fictitious. Commonly the way this is done is by using a real social security number, with a birth date and name that is not attached to this person.
The person whose social security number is used can have adverse credit effects from this kind of identity theft. And this holds with respect to any creditor who issues a credit to the thief.
It’s hard to track this type of identity fraud since it does not usually show on the real person’s credit report directly. This could even show as a new file at the credit bureau or as a sub-file on the victim’s credit record.
What is Medical Identity Theft?
This is a type of identity theft that a person uses an individual’s name and some of their information to obtain medical care, services or drugs. The information they may use can include insurance information. The victim has no clue their name or other information is being used.
When this type of event occurs, it can cause the real owner of the insurance to receive improper medical care. This can lead to a potentially life-threatening medical decision since there has been incorrect information placed in their medical records.
What is Child Identity Theft?
This is identity theft of a minor child’s social security number that is used to gain credit. And it also gains other personal advantages. Of special interest, the child has no credit history. So this makes this social security number very valuable to the theft that wants to steal it. They can obtain credit, get a driver’s license, and make large purchases, like buying a house, all under the guise that the social security number is their own.
So here, a family member or friend can be the culprit. But it can be done by a stranger that targets children. The fraud can continue for years, without being detected. After all, the victim is a minor who will not be using their number for years.
According to Carnegie Mellon Cylab, Richard Power, using data from All Clear ID, it was discovered that approximately 10.2 percent of children were identity theft victims. So about 40,000 children had information exposed.
How Do ID Thieves Get Your Personal Information?
These criminals need to obtain personal information to use another person’s identity, to appear authentic. Some of the methods they use people are aware of. But other methods are less commonly known.
Digging in dumpsters or garbage cans for personal information is one way they get stuff.
I am using public records to gain personal information.
Skimming credit card or bank card information with the use of hand-held card readers in the general retail location and making clone cards.
I am using contactless credit card readers to obtain data from RFID-passports wirelessly.
Mail theft, breaking into homes or pick-pocketing checks, bank cards, credit cards, passports, and identification cards.
Theft of checks to obtain account numbers and routing numbers.
I am gaining personal and banking information with the use of malware, like Trojan horse keystroke logging programs, spyware, and breaches in browser security.
They hack computer networks, databases, and systems to gain access to large amounts of personal data.
Acting fraudulently as customer service representatives or help desk employees to con individuals into disclosing personal information, login information or changing the password access.
Account verification and compromise questions, like:“What is Your Mother’s Maiden Name?”
Use of social media sites to befriend individuals and gain trust to get their personal information.
Social media photos that are clickable and downloaded, which have low security and privacy protection.
They use information gained from an individual typing login and other personal information at public IT equipment locations. In fact, therm shoulder surfing describes this conduct.
Use of breaches that result in the publication of personal information, which may include name, address, credit card numbers, and social security number.
Impersonation of a trusted organization in emails, telephone calls, SMS text messages or other forms of communication to have an individual provide personal information or login information. Most of us know this form of data collection as phishing. Because of this, many corporations will never ask for this type of information on the phone or their website.
You are browsing social network sites, such as Facebook, Twitter or MySpace for personal information that users have published.
Attacking weak passwords and reset password questions.
They divert email or a post to gain personal information, credit card numbers, banking or credit statements and other personal data. And this can delay you knowing there is a compromised account.
What About Personal Identity Protection?
The person is often unaware of how naïve they are. So they are careless with their personal information or login information. Identity thieves count on this. And they can steal information like:
Bank statements and other things from a person’s vehicle, office, snatched purse or home.
The US Federal Trade Commission, websites and the Canadian Phone Busters organizations address identity theft. And they and offer recommendations on how to prevent personal information from reaching another person’s hands.
You can partially eliminate identity theft by not using identifying information unnecessarily. IT systems and organizations should not require an excessive amount of personal information for identification and authentication purposes.
The requirement and data storage of personally identifying information such as social security numbers, driver’s license number, credit card, national identification number, and other information, will increase the risk of identity theft. This theft will keep happening unless adequately stored all the time.
Tips to Avoid Hijacking
Hacking and phishing electronic identity theft or using malware, the person is advised to have and keep updated computer security. Keeping the operating system and browser secure, patched and running antivirus software can help avoid unwanted theft. The individual should be cautious of their IT use.
In some cases, the thieves use obituaries, gravestones and other sources to rip off the identity of a deceased person. They do so between their passing and the closing of their accounts. So this is a combination of a grieving family lacking concentration and the credit checking process. This crime can continue for an undetermined amount of time until a family member or credit company notices the events and take action.
Commercial identity theft protection services are available in many countries. For example, they offer protection from for an annual or monthly membership fee. How it works, is the service will typically set fraud alerts on your credit files. Also, alerts are placed with each of the three major credit bureaus. These services are heavily advertised. But the actual value of them has been questioned.
What are Identity Protection Organizations?
The Federal Trade Commission testified in May of 1998 in front of the United States Senate. There, representatives discussed the sale and use of personal identifiers and Social Security numbers, by data miners and credit raters. They agreed to self-regulating by the industry to restrict access to information on credit reports.
The industry restrictions vary according to the category of the customer. This variance exists because credit bureaus gather, disclose personal and credit information on a wide business range. Inadequate security by organizations holding personal data results in unauthorized access. So this places victims at risk of ID theft.
According to Privacy Rights Clearinghouse, they have documented more than 900 data breaches, since January 2005 by U.S. government agencies and companies. This breach has involved over 200 million records that contained sensitive personal information. The data included many that had social security numbers.
When a company has poor security standards it can include:
Failing to have adequate network security.
They are failing to shred confidential documents before putting them in dumpsters.
Brokering personal information to another business, without the assurance of the other company maintaining security.
Government failure in registering sole proprietorships, corporations, and partnerships to determine the article of incorporations officers are who they claim to be. This failure can result in criminals having access to personal information through credit ratings and data mining services.
Credit card numbers stolen by people like call center agents means there is access to the recorded calls.
Laptop computer or portable media theft or carried out of the location. Typically, it that contains personal information. Also, using encrypted devices reduces data exposure risks.
What is the Nationwide Impact of ID Theft?
Most of all, there was a decrease in the number of victims in the United States between 2003 and 2006. This decreased the dollar amount of identity fraud from $47 billion in 2003 to $15.6 billion in 2006. This resulted in the personal losses of $4789 in 2003 to $1882 in 2006.
According to the Identity Theft Resource Center in a 2003 survey:
Approximately 73% of those surveyed said the crime involved the thief gaining access to a credit card.
15% of known ID theft gets discovered from action taken by a business. So there, it took the victims about 330 hours to resolve.
Victim of identity fraud Michelle Brown testified in a U.S. Senate Committee Hearing. She said that between January 1998 and July 1999 a person used her identity to acquire more than $50,000 in goods and services. Brown said not only did the hacker damage her credit but escalated in crimes, including drug trafficking. This resulted in a warrant for Brown’s arrest; she had an erroneous arrest record and prison record. Here, the woman was booked into the Chicago Federal Prison under her name.
Also, fraud costs are estimated at £1.2 billion annually in the UK. But experts believe the figure is much higher. For example, privacy groups do not think the numbers to be correct. Mostly, they argue the statistics are a bargaining chip to hearken the introduction of national ID cards.
Microsoft Research claimed in 2001 that fraud remains widely exaggerated. And they say the surveys are compromised and biased. So they argue the findings are no good. But Australia estimated ID theft at between $1 billion and $4 billion in 2001.
The United States Legal Answers
In the United States, the increase in this crime has led to the enacting of the Identity Theft and Assumption Deterrence Act. In other words, the Federal Trade Commission appeared before the U.S. Senate to discuss FTC crimes. And that meeting happened after the mass exploitation of consumer credit.
How the Exploited Data Was Used:
Lines of credit
Credit card fraud, along with commodities and services fraud.
The Identity Theft Deterrence Act amended U.S. Code Title 18, § 1028. This statute says it is a federal crime to steal an ID. But it’s tricky because the perp must use an ID document issued by the United States. So you have to show the thief intended to defraud the United States. All this must apply to be tried on a federal level. Get it?
30 Years in Prison?
Yes, it’s true. This sentence is outlined in 18 U.S.C. § 1028 and can carry a 5, 15, 20 or 30-year prison sentence in federal prison. Also, § 1028 (aggravated identity theft), permits consecutive sentencing. Of particular interest, this act provided the Federal Trade Commission with authority to track incidences and dollar losses.
Their body mainly focuses on consumer financial crimes. And it does not include the full range of all identification crimes. Charges brought by states or local law enforcement agencies will have different penalties than criminal charges on a federal level. It will depend on the state laws, which each state can differ in their penalties.
Office of Privacy Protection
California and Wisconsin have created the Office of Privacy Protection. This department helps citizens avoid issues with theft and those recovering from identity theft. Other states have followed the California mandatory data breach notification laws. And this has resulted in all companies reporting data breaches to their customers.