Preventing Identity Theft in Your Business

  Preventing ID Theft in Your Business

 By Judith M. Collins, Ph.D. 





Identified by the FBI as the top crime of the 21st century, identity theft is most commonly committed inside the workplace, and the victims are always a company’s employees or customers. Preventing Identity Theft in Your Business presents a comprehensive, four-factor model for implementing an effective information security plan and provides step-by-step guidance on employee selection and training. Rich with real-world case studies illustrating how identity theft is committed and prevented, this resource clearly demonstrates how you and your employees can foster an honest work culture in your workplace.


Highlights include:


The legal requirements for business

How to tighten your business borders

How to recruit your employees for security

The e-business website

E-commerce best practices for customers

HIPPA: Security for healthcare companies

The security standard checklist



Product Details:
Copyright 2005
ISBN 0-471-69469-X
Hardcover, 245 pages
John Wiley & Sons Publishing

Table of Contents:


Chapter 1: What Is an “Identity”?

Chapter 2: Identity Theft: Effects on Victims

Chapter 3: Identity Crime Is Entrenched

Chapter 4: Identity Crimes Are Escalating

Chapter 5: Legal Requirements for Businesses

Chapter 6: Caveat Lector. Let the Reader Beware.

Chapter 7: The BISP Plan: Tighten Your Business Borders

Chapter 8: Begin the Exercises: Identify Your Business Identities

Chapter 9: Securing the People Front: The Security Job Analysis

Chapter 10: The People Front: Recruitment for Security

Chapter 11: The People Front: Personnel Selection for Security

Chapter 12: The People Front: Select for Motivation

Chapter 13: The People Front: Select for Integrity and Security

Chapter 14: The People Front: Select for Interpersonal Skills

Chapter 15: The People Front: Socialization, Company Culture, and the Realistic Job Preview

Chapter 16: The People Front: Socializing Newcomers to the Honest Company Culture

Chapter 17: The People Front: Appraisal and Feedback for Performance and Security

Chapter 18: The Process Front: Secure Business Information Processes

Chapter 19: The Property Front: The E-Business Web Site

Chapter 20: The Customer Security Program

Chapter 21: E-Commerce “Best Practices” for Customers

Chapter 22: The Legislative Process

Chapter 23: The HIPAA Database

Appendix A: The Security Standard Checklist

Appendix B: Checklist of Team Prerequisites

Appendix C: Structured and Formal Brainstorming: Step-by-Step Instructions

Appendix D: Cause and Effect Analysis: Step-by-Step Instructions

Appendix E: The Security Focus Group Interview

Appendix F: The Security Job Description

Appendix G: Industrial and Organizational Specialists in Test Development and Validation

Appendix H: One Company’s Short- and Long-Term Strategic Plan

Appendix I: The Information Process: Definition, Description, and Illustration

Appendix J: The Pareto Analysis: Definition, Description, and Illustration

Appendix K: Forerunners in the Support of Identity Theft Legislation