Your SlideShare is downloading. ×
  • Like
  • Save
Identity Theft Information for Businesses
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Identity Theft Information for Businesses


Guide for businesses on how to protect client information and avoid the facilitation of identity theft. Presented by the Better Business Bureau.

Guide for businesses on how to protect client information and avoid the facilitation of identity theft. Presented by the Better Business Bureau.

Published in Economy & Finance , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. Identity Theft For Business Don’t Let Bad Things Happen to Your Company’s Good Name
  • 2. ID Theft -- A Major Problem
    • 27.3 Americans victimized over 5 years;
    • 9.9 million over the past year;
    • $48 billion in losses to business;
    • $5 billion in out-of-pocket losses to consumers.
    • Source: Federal Trade Commission
  • 3. ID Theft – Case Histories
    • An employee of Prudential Insurance was accused of selling the personal information of 60,000 customers;
    • A man installed “keylogging” software in 14 Kinko stores in the New York area to steal customer’s data;
    • An Israeli man hacked into a U.S. company’s system to steal the data of 80,000 customers;
    • An employee of a communications firm stole the credit histories of thousands of people;
    • An employee of a Florida restaurant stole the credit card numbers of at least 18 customers.
  • 4. ID Theft -- Defined
    • ID Theft – a wholesale takeover of someone’s identity for financial gain.
    • ID Fraud – creating a brand new identity from several different sources to commit crimes and evade detection.
  • 5. Victims May Not Know Until:
    • They are contacted by a collection agency;
    • Credit charges show up that they never made;
    • A lender tries to repossess a car they never purchased;
    • They are contacted by police about a crime they didn’t commit.
  • 6. What Does the Thief Want?
    • A Social Security Number
    • A Driver’s License
    • Account Numbers
  • 7. Where Does the Thief Get These?
    • A Wallet or Purse
    • Your Mail
    • Your Trash
    • Your Computer
    • You
  • 8. How Is This Information Used?
    • Use credit cards to go on buying spree;
    • Open new accounts in their name;
    • Change mailing address on their accounts;
    • Buy a car, with loan in their name;
    • Get phone service in their name;
    • Drain their bank accounts;
    • Apply for a job in their name;
    • Use their name if arrested for a crime.
  • 9. Basic Rules To Protect Your Customers and Employees
    • If you don’t need it, don’t collect it;
    • If you need it once, don’t save it longer;
    • If you don’t need to save it, dispose of it carefully;
    • If you have to keep it, think security;
    • Don’t broadcast personal information;
  • 10. Basic Rules To Protect Your Customers and Employees
    • Don’t use social security number as customer account numbers;
    • Don’t give out personal information without positive confirmation;
    • Locks are a real deterrent.
  • 11. Technology and Information Security
    • Limit Access:
      • Servers in a secure location;
      • Access limited to trusted employees;
      • Critical data only available on a “need-no-know” basis, password protected and encrypted, if possible.
  • 12. Technology and Information Security
    • Passwords:
      • Use a password protection system for network and PC logins;
      • Avoid simple passwords:
        • This “th%d4get”
        • Not this “password” or “bob”
      • Change passwords regularly.
  • 13. Technology and Information Security
    • Virus Protection:
      • Install anti-virus software;
      • Scan your system regularly of often;
      • Subscribe to “automatic updates” of anti-virus software;
      • Never disable anti-virus protection.
  • 14. Technology and Information Security
    • Install a “firewall” – a gatekeeper to protect your system from outsiders;
    • Download and install security “patches”;
    • Back up data regularly;
    • Check for suspicious activity;
    • Understand file sharing risks.
  • 15. Technology and Information Security
    • Educate your employees:
      • Not to open e-mail from unknown sources;
      • What to do when they receive suspicious e-mails;
      • To disconnect from the Internet when not online;
      • To consider the risks of file-sharing;
      • How to perform data back-up procedures;
      • Actions to take if their computers become infected.
    • When an employee leaves, remove system access immediately
  • 16. When Things Go Wrong
    • Mitigate the damage;
    • Notify the police;
    • Notify your insurance carrier;
    • Notify those whose records have been compromised.
  • 17. Your BBB – A Source for Information and Help
    • Telephone – (Your Telephone)
    • Web Site – (Your URL)
    • ID Theft Web Site –
    • Video –
  • 18. Join Our Campaign
  • 19. Identity Theft
    • Don’t Let Bad Things Happen to Your Company’s Good Name