What personal information is kept in computer databases

Assignment Help Business Law and Ethics
Reference no: EM131658437

Question: Identity theft is probably the fastest-growing crime in the United States. The Federal Trade Commission received 686,683 complaints of consumer fraud in 2005. Of these, 255,000 (about 37 percent) were for identity fraud. It is estimated that identity theft occurs every seventy-nine seconds and that annual losses due to this crime will have exceeded $70 billion by 2008. Dollar loss is not the only cost. Victims of identity theft spend, on average, about six hundred hours resolving the situation after someone has fraudulently used their names to purchase goods or services, open accounts, or make unauthorized charges to their accounts. Moreover, businesses typically are unable to recoup the costs of these unauthorized purchases because they usually can hold only the thief responsible. Sources of Information That Might Be Used The rise in identity theft has been fueled by the vast amount of personal information stored in databases. Educational institutions, governments, and businesses all store vast quantities of information about their students, clients, and customers. As a number of recent incidents demonstrate, unless measures are taken to secure these databases, they are vulnerable to thieves.

For example, personal information was stolen from numerous universities (including Georgetown University, Ohio University, the University of Texas, and Vermont State College). Even more disturbing is the number of U.S. government databases that have been breached. For example, a laptop computer containing confidential information for about 26.5 million veterans was stolen from an employee at the Department of Veteran Affairs. The U.S. Navy reported that the records of seventy-five thousand student loan recipients, employees, and military personnel and their families were breached. Cities, counties, Internet sources (such as Hotels.com and Neinet), insurance companies (such as Aetna), manufacturing firms (such as Honeywell), nonprofit organizations, and even newspapers (such as the Boston Globe) have lost copious amounts of personal information in the last few years. In 2005, Bank of America reportedly lost tapes containing records of 1.2 million federal employees. Businesses sometimes do not publicly report incidents of theft, so the list is probably even longer. Although not all of the lost data will ultimately be used for identity theft, the potential is huge.

CHECKLIST FOR THE BUSINESS OWNER

1 Review what personal information is kept in your computer databases. Wherever possible, eliminate Social Security numbers and other personal information and code all account numbers to limit access to the account holder.

2 Review employee access to databases containing personal account information. Some employees should have no access, some limited access, some full access. Instruct your employees in how computers and personal information are to be used and not used.

3 Establish policies on what types of information may be stored on portable sources, such as laptop computers. Monitoring is important. Also maintain accurate records of where confidential data are kept and who has access to the data.

4 Consider using passwords and digital signatures to protect your computer system and data against unauthorized use.

5 Shred paper documents as much as possible- remember that theft can come from rummaging through your trash.

6 Be prepared for possible identity theft when your wallet, purse, credit card, checks, or mail is stolen- report the loss immediately to credit-card companies, banks, and credit bureaus. Do not keep passwords or personal identification numbers in your wallet.

7 Avoid giving any personal information over the telephone and always verify the identity of the caller.

Reference no: EM131658437

Questions Cloud

About business management sustainability : Write 3-4 paragraphs about Business management sustainability, Why is so important? When do a company use it?
Standardization is important in quality deployment : Standardization is important in quality deployment for the following reasons:
One of the three different t-tests : Describe an experiment that would require use of one of the three different t-tests (One Sample, Correlated Samples, or Independent Groups)
What is the average holding cost per year : What is the optimal size of the production run? What is the average holding cost per year?
What personal information is kept in computer databases : Review what personal information is kept in your computer databases. Wherever possible, eliminate Social Security numbers and other personal information.
Take a moment to reflect on the social media sites : What personal information are you communicating that could have implications on your professional image
Critically analyse other key financial ratios for apn : Critically analyse other key financial ratios for APN. Outline any significant changes to have occurred to firm's capital structure during the past three years.
Community and current activity underway to address issues : Identify current airport noise and safety issues that remain of concern to the community and current activity underway to address those issues.
Discuss how the master''s prepared nurse depending quality : Discuss how the master's prepared nurse dependingupon the chosen track can promote improvement in clinical quality outcomes

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Legal environment of business caselet

The assignment in Law deals with the topic "Legal Environment of Business". A case study about Mary, a newly joined employee who is working in the USA and Europe. She faces few issues at her work place in Europe and tries to talk to her manager who s..

  Business ethics & legal issues caselet

This assignment is about the concept of Business Ethics & Legal Issues. The laws relating to these can be found in Antitrust laws. These laws are concerned with those large corporations which have a majority of market share, mergers and acquisitions.

  Questions on business law and ethics

Examples of securities that are exempted from the registration provisions of the 1933 Act and involving misstatement of material facts in a prospectus.

  Discuss the doctrine of ratification of pre-incorporation

With the aid of a decided cases, discuss the doctrine of ratification of pre-incorporation contract.

  Discuss the extent of phoenixing activity

It has been estimated that about 6,000 phoenix companies operate in Australia, costing government and the community hundreds of millions of dollars per year and impacting on individuals.

  Application of law to facts

Company Law, Application of Law to Facts and Conclusion.

  Question on business law and ethics

This assignment related to business law.

  Questions on business law

Answer all the questions under business law.

  Iidentify the issue raised by the facts

Iidentify the issue(s) raised by the facts, identify the relevant legal principles, apply the relevant legal principles to the facts, reach a conclusion.

  Evaluation of software development

Prepare a report and present an evaluation of the subsequent methodologies for software development in terms of cost, resources and time.

  Business value and ethics

Business value and ethics,  Bart agrees to put Sam's Super Bowl champion-ship autographed football in his sports store to sell for $1,500. Sam agrees to pay Bart a 15% commission for selling the ball. If Joe comes in the sports store and offers Bart ..

  Explain what is meant by income by ordinary concepts

Advise what tax consequences arise in respect of the payments.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd