O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Preventing Identity Theft in Your Business

Book Description

Preventing Identity Theft in Your Business is a reliable guide to help protect companies, their customers, and their employees from the growing problem of identity theft. Real-life examples show managers and executives how to identify business, customer, and employee identity theft, how these crimes are committed, how best to prevent them, and overall, develop an honest company culture. It also covers how to manage this threat in business reorganizations such as mergers, acquisitions, globalization, and outsourcing.

Table of Contents

  1. Cover
  2. Title
  3. Copyright
  4. Dedication
  5. ACKNOWLEDGMENTS
  6. PREFACE
  7. INTRODUCTION
  8. PART I: THE CURRENT STATE OF IDENTITY THEFT
    1. CHAPTER 1: WHAT IS AN “IDENTITY”?
      1. IDENTITY THEFT VERSUS IDENTITY CRIME
      2. “PERSONAL” IDENTITY THEFT
      3. “BUSINESS” IDENTITY THEFT
      4. IDENTITY THEFT AS AN “OVERARCHING” CRIME
    2. CHAPTER 2: IDENTITY THEFT: EFFECTS ON VICTIMS
      1. EFFECTS ON PERSONS
      2. EFFECTS ON BUSINESSES
    3. CHAPTER 3: IDENTITY CRIME IS ENTRENCHED
      1. HIPAA DATABASE
      2. CREDIT AGENCY DATABASES
      3. GOVERNMENT DATABASES
    4. CHAPTER 4: IDENTITY CRIMES ARE ESCALATING
      1. OUTSOURCING IDENTITIES
      2. JURISDICTIONAL PROBLEMS
      3. POLICE LACK RESOURCES
      4. LEGISLATION IS LACKING
    5. CHAPTER 5: LEGAL REQUIREMENTS FOR BUSINESSES
      1. MANY LAWS
      2. MANY “SUPERFICIAL” LAWS
      3. BISP SECURITY STANDARDS
    6. CHAPTER 6: CAVEAT LECTOR. LET THE READER BEWARE
      1. MESSAGE TO EXECUTIVES
      2. MESSAGE TO EMPLOYEES
  9. PART II: IDENTITY THEFT PREVENTION
    1. CHAPTER 7: THE BISP PLAN: TIGHTEN YOUR BUSINESS BORDERS
      1. BACKGROUND REVIEW: FOUR-FACTOR MODEL OF INFORMATION SECURITY
      2. SECURING THE FRONTS
    2. CHAPTER 8: BEGIN THE EXERCISES: IDENTIFY YOUR BUSINESS IDENTITIES
      1. STANDARD 1. WHAT ARE YOUR BUSINESS IDENTITIES?
      2. STANDARD 2. WHO HAS ACCESS TO YOUR BUSINESS IDENTITIES?
    3. CHAPTER 9: SECURING THE PEOPLE FRONT: THE SECURITY JOB ANALYSIS
      1. STANDARD 3. SCIENTIFIC JOB ANALYSIS FOR SECURITY DECISION MAKING
    4. CHAPTER 10: THE PEOPLE FRONT: RECRUITMENT FOR SECURITY
      1. STANDARD 4. RECRUITMENT FOR SECURITY
    5. CHAPTER 11: THE PEOPLE FRONT: PERSONNEL SELECTION FOR SECURITY
      1. STANDARD 5. PERSONNEL SELECTION FOR SECURITY
    6. CHAPTER 12: THE PEOPLE FRONT: SELECT FOR MOTIVATION
      1. STANDARD 6. SELECT FOR MOTIVATION
    7. CHAPTER 13: THE PEOPLE FRONT: SELECT FOR INTEGRITY AND SECURITY
      1. STANDARD 7. SELECT FOR INTEGRITY AND SECURITY
    8. CHAPTER 14: THE PEOPLE FRONT: SELECT FOR INTERPERSONAL SKILLS
      1. STANDARD 8. SELECT FOR INTERPERSONAL SKILLS
    9. CHAPTER 15: THE PEOPLE FRONT: SOCIALIZATION, COMPANY CULTURE, AND THE REALISTIC JOB PREVIEW
      1. STANDARD 9. COMPANY CULTURE AND THE REALISTIC JOB PREVIEW
    10. CHAPTER 16: THE PEOPLE FRONT: SOCIALIZING NEWCOMERS TO THE HONEST COMPANY CULTURE
      1. STANDARD 10. THE SECURITY ORIENTATION PROGRAM
    11. CHAPTER 17: THE PEOPLE FRONT: APPRAISAL AND FEEDBACK FOR PERFORMANCE AND SECURITY
      1. STANDARD 11. THE ORGANIZATIONAL APPRAISAL AND FEEDBACK SYSTEM
      2. INDIVIDUAL APPRAISAL
      3. GROUP APPRAISAL
      4. SELF-APPRAISAL
      5. DEPARTMENTAL ASSESSMENT
      6. A MESSAGE TO THE PROJECT TEAM
    12. CHAPTER 18: THE PROCESS FRONT: SECURE BUSINESS INFORMATION PROCESSES
      1. SELECT A NEW PROJECT TEAM
      2. QUALITY-TO-SECURITY TOOLS
      3. STANDARD 12. INFORMATION PROCESS RISK ASSESSMENT
    13. CHAPTER 19: THE PROPERTY FRONT: THE E-BUSINESS WEB SITE
      1. STANDARD 13. WEB SITE SECURITY ASSESSMENT
  10. PART III: MONITORING IDENTITY THEFT
    1. CHAPTER 20: THE CUSTOMER SECURITY PROGRAM
      1. STANDARD 14. CUSTOMER SECURITY PROGRAM
      2. CONCLUSION
    2. CHAPTER 21: E-COMMERCE “BEST PRACTICES” FOR CUSTOMERS
      1. STANDARD 15. E-COMMERCE “BEST PRACTICES”
    3. CHAPTER 22: THE LEGISLATIVE PROCESS
      1. STANDARD 16. IDENTITY THEFT LEGISLATIVE PROCESS
    4. CHAPTER 23: THE HIPAA DATABASE
      1. THE BISP SECURITY STANDARDS AND HIPAA
  11. APPENDICES
    1. APPENDIX A: THE SECURITY STANDARD CHECKLIST
      1. IDENTITY THEFT PREVENTION
    2. APPENDIX B: CHECKLIST OF TEAM PREREQUISITES
    3. APPENDIX C: STRUCTURED AND FORMAL BRAINSTORMING: STEP-BY-STEP INSTRUCTIONS
      1. DEFINITION OF FORMAL BRAINSTORMING
      2. STEP-BY-STEP INSTRUCTIONS
    4. APPENDIX D: CAUSE AND EFFECT ANALYSIS: STEP-BY-STEP INSTRUCTIONS
    5. APPENDIX E: THE SECURITY FOCUS GROUP INTERVIEW
    6. APPENDIX F: THE SECURITY JOB DESCRIPTION
      1. THE INFORMATION SECURITY RESEARCH INSTITUTE, LLC
      2. THE SECURITY JOB DESCRIPTION
    7. APPENDIX G: INDUSTRIAL AND ORGANIZATIONAL SPECIALISTS IN TEST DEVELOPMENT AND VALIDATION
    8. APPENDIX H: ONE COMPANY’S SHORT- AND LONG-TERM STRATEGIC PLAN
    9. APPENDIX I: THE INFORMATION PROCESS: DEFINITION, DESCRIPTION, AND ILLUSTRATION
      1. DEFINING THE INFORMATION PROCESS
      2. DESCRIBING AN INFORMATION PROCESS
      3. ILLUSTRATING THE INFORMATION PROCESS RISK ASSESSMENT
      4. A KEY POINT
    10. APPENDIX J: THE PARETO ANALYSIS: DEFINITION, DESCRIPTION, AND ILLUSTRATION
      1. DEFINING PARETO ANALYSIS
      2. DESCRIBING PARETO ANALYSIS
      3. ILLUSTRATING THE PARETO DIAGRAM
    11. APPENDIX K: FORERUNNERS IN THE SUPPORT OF IDENTITY THEFT LEGISLATION
      1. U.S. SENATORS
      2. STATE OFFICIALS
      3. OTHERS
  12. NOTES
  13. INDEX
  14. END USER LICENSE AGREEMENT