Identity Theft For Business Don’t Let Bad Things Happen to  Your Company’s Good Name
ID Theft -- A Major Problem <ul><li>27.3 Americans victimized over 5 years; </li></ul><ul><li>9.9 million over the past ye...
ID Theft – Case Histories <ul><li>An employee of Prudential Insurance was accused of selling the personal information of 6...
ID Theft -- Defined <ul><li>ID Theft  – a wholesale takeover of someone’s identity for financial gain. </li></ul><ul><li>I...
Victims May Not Know Until: <ul><li>They are contacted by a collection agency; </li></ul><ul><li>Credit charges show up th...
What Does the Thief Want? <ul><li>A Social Security Number   </li></ul><ul><li>A Driver’s License </li></ul><ul><li>Accoun...
Where Does the Thief Get These? <ul><li>A Wallet or Purse </li></ul><ul><li>Your Mail </li></ul><ul><li>Your Trash </li></...
How Is This Information Used? <ul><li>Use credit cards to go on buying spree; </li></ul><ul><li>Open new accounts in their...
Basic Rules To Protect Your Customers and Employees <ul><li>If you don’t need it, don’t collect it; </li></ul><ul><li>If y...
Basic Rules To Protect Your Customers and Employees <ul><li>Don’t use social security number as customer account numbers; ...
Technology and Information Security <ul><li>Limit Access: </li></ul><ul><ul><li>Servers in a secure location; </li></ul></...
Technology and Information Security <ul><li>Passwords: </li></ul><ul><ul><li>Use a password protection system for network ...
Technology and Information Security <ul><li>Virus Protection: </li></ul><ul><ul><li>Install anti-virus software; </li></ul...
Technology and Information Security <ul><li>Install a “firewall” – a gatekeeper  to protect your system from outsiders; </...
Technology and Information Security <ul><li>Educate your employees: </li></ul><ul><ul><li>Not to open e-mail from unknown ...
When Things Go Wrong <ul><li>Mitigate the damage; </li></ul><ul><li>Notify the police; </li></ul><ul><li>Notify your insur...
Your BBB – A Source for Information and Help <ul><li>Telephone – (Your Telephone) </li></ul><ul><li>Web Site – (Your URL) ...
Join Our Campaign
Identity Theft <ul><li>Don’t Let Bad Things Happen to  Your Company’s Good Name </li></ul>
Upcoming SlideShare
Loading in …5
×

Identity Theft Information for Businesses

1,775 views

Published on

Guide for businesses on how to protect client information and avoid the facilitation of identity theft. Presented by the Better Business Bureau.

Published in: Economy & Finance, Technology
  • Be the first to comment

Identity Theft Information for Businesses

  1. 1. Identity Theft For Business Don’t Let Bad Things Happen to Your Company’s Good Name
  2. 2. ID Theft -- A Major Problem <ul><li>27.3 Americans victimized over 5 years; </li></ul><ul><li>9.9 million over the past year; </li></ul><ul><li>$48 billion in losses to business; </li></ul><ul><li>$5 billion in out-of-pocket losses to consumers. </li></ul><ul><li>Source: Federal Trade Commission </li></ul>
  3. 3. ID Theft – Case Histories <ul><li>An employee of Prudential Insurance was accused of selling the personal information of 60,000 customers; </li></ul><ul><li>A man installed “keylogging” software in 14 Kinko stores in the New York area to steal customer’s data; </li></ul><ul><li>An Israeli man hacked into a U.S. company’s system to steal the data of 80,000 customers; </li></ul><ul><li>An employee of a communications firm stole the credit histories of thousands of people; </li></ul><ul><li>An employee of a Florida restaurant stole the credit card numbers of at least 18 customers. </li></ul>
  4. 4. ID Theft -- Defined <ul><li>ID Theft – a wholesale takeover of someone’s identity for financial gain. </li></ul><ul><li>ID Fraud – creating a brand new identity from several different sources to commit crimes and evade detection. </li></ul>
  5. 5. Victims May Not Know Until: <ul><li>They are contacted by a collection agency; </li></ul><ul><li>Credit charges show up that they never made; </li></ul><ul><li>A lender tries to repossess a car they never purchased; </li></ul><ul><li>They are contacted by police about a crime they didn’t commit. </li></ul>
  6. 6. What Does the Thief Want? <ul><li>A Social Security Number </li></ul><ul><li>A Driver’s License </li></ul><ul><li>Account Numbers </li></ul>
  7. 7. Where Does the Thief Get These? <ul><li>A Wallet or Purse </li></ul><ul><li>Your Mail </li></ul><ul><li>Your Trash </li></ul><ul><li>Your Computer </li></ul><ul><li>You </li></ul>
  8. 8. How Is This Information Used? <ul><li>Use credit cards to go on buying spree; </li></ul><ul><li>Open new accounts in their name; </li></ul><ul><li>Change mailing address on their accounts; </li></ul><ul><li>Buy a car, with loan in their name; </li></ul><ul><li>Get phone service in their name; </li></ul><ul><li>Drain their bank accounts; </li></ul><ul><li>Apply for a job in their name; </li></ul><ul><li>Use their name if arrested for a crime. </li></ul>
  9. 9. Basic Rules To Protect Your Customers and Employees <ul><li>If you don’t need it, don’t collect it; </li></ul><ul><li>If you need it once, don’t save it longer; </li></ul><ul><li>If you don’t need to save it, dispose of it carefully; </li></ul><ul><li>If you have to keep it, think security; </li></ul><ul><li>Don’t broadcast personal information; </li></ul>
  10. 10. Basic Rules To Protect Your Customers and Employees <ul><li>Don’t use social security number as customer account numbers; </li></ul><ul><li>Don’t give out personal information without positive confirmation; </li></ul><ul><li>Locks are a real deterrent. </li></ul>
  11. 11. Technology and Information Security <ul><li>Limit Access: </li></ul><ul><ul><li>Servers in a secure location; </li></ul></ul><ul><ul><li>Access limited to trusted employees; </li></ul></ul><ul><ul><li>Critical data only available on a “need-no-know” basis, password protected and encrypted, if possible. </li></ul></ul>
  12. 12. Technology and Information Security <ul><li>Passwords: </li></ul><ul><ul><li>Use a password protection system for network and PC logins; </li></ul></ul><ul><ul><li>Avoid simple passwords: </li></ul></ul><ul><ul><ul><li>This “th%d4get” </li></ul></ul></ul><ul><ul><ul><li>Not this “password” or “bob” </li></ul></ul></ul><ul><ul><li>Change passwords regularly. </li></ul></ul>
  13. 13. Technology and Information Security <ul><li>Virus Protection: </li></ul><ul><ul><li>Install anti-virus software; </li></ul></ul><ul><ul><li>Scan your system regularly of often; </li></ul></ul><ul><ul><li>Subscribe to “automatic updates” of anti-virus software; </li></ul></ul><ul><ul><li>Never disable anti-virus protection. </li></ul></ul>
  14. 14. Technology and Information Security <ul><li>Install a “firewall” – a gatekeeper to protect your system from outsiders; </li></ul><ul><li>Download and install security “patches”; </li></ul><ul><li>Back up data regularly; </li></ul><ul><li>Check for suspicious activity; </li></ul><ul><li>Understand file sharing risks. </li></ul>
  15. 15. Technology and Information Security <ul><li>Educate your employees: </li></ul><ul><ul><li>Not to open e-mail from unknown sources; </li></ul></ul><ul><ul><li>What to do when they receive suspicious e-mails; </li></ul></ul><ul><ul><li>To disconnect from the Internet when not online; </li></ul></ul><ul><ul><li>To consider the risks of file-sharing; </li></ul></ul><ul><ul><li>How to perform data back-up procedures; </li></ul></ul><ul><ul><li>Actions to take if their computers become infected. </li></ul></ul><ul><li>When an employee leaves, remove system access immediately </li></ul>
  16. 16. When Things Go Wrong <ul><li>Mitigate the damage; </li></ul><ul><li>Notify the police; </li></ul><ul><li>Notify your insurance carrier; </li></ul><ul><li>Notify those whose records have been compromised. </li></ul>
  17. 17. Your BBB – A Source for Information and Help <ul><li>Telephone – (Your Telephone) </li></ul><ul><li>Web Site – (Your URL) </li></ul><ul><li>ID Theft Web Site – www.bbb.org/idtheft </li></ul><ul><li>Video – www.bbbvideo.com </li></ul>
  18. 18. Join Our Campaign
  19. 19. Identity Theft <ul><li>Don’t Let Bad Things Happen to Your Company’s Good Name </li></ul>

×