Discover Ways To Protect - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

Discover Ways To Protect

Description:

Discover Ways To Protect Yourself From Identity Theft Cost of Dishonesty: The average business loses 6% in revenues every year due to employee theft. – PowerPoint PPT presentation

Number of Views:119
Avg rating:3.0/5.0
Slides: 13
Provided by: BLE60
Category:

less

Transcript and Presenter's Notes

Title: Discover Ways To Protect


1
  • Discover Ways To Protect
  • Yourself From Identity
  • Theft

2
Cost of Dishonesty 
  • The average business loses 6 in revenues every
    year due to employee theft.
  • Insider theft is growing at 15 a year.
  • Employees steal more than 1 Billion a week from
    their employers.
  • 1/3 of all employees steal from work
  • Failure to protect sensitive data can lead to
    identity theft
  • or other harm to consumers and also
  • can harm your company.

3
Working Definition
  • A person shall be guilty of theft if he
    dishonestly appropriates property belonging to
    another with the intention of permanently
    depriving the other of it.
  • It is immaterial whether the appropriation is
    made with a view to gain, or is made for the
    thiefs own benefit.
  • Taking, using, or keeping someone else's property
    without the person's consent.
  • If you were to mistakenly keep something that
    belongs to someone else, this wouldn't be
    considered theft because you were unaware that
    you had the item that belonged to someone else.
  • Identity Theft when an individuals personally
    identifying information is used without their
    permission to commit fraud (deception for gain or
    benefit) or other crimes

4
Identity Theft
  • How careful am I with personal information?
  • Do I give personal information on the phone or
    internet?
  • Do I watch what information I put in my trash?
  • Do I take unnecessary chances of losing my purse
    or wallet?
  • Do I know how my bank/businesses use my
    information?

5
Common Misconceptions
  • I dont have much moneyno one would want to
    steal my identity.
  • If I share my personal info with my bank, no one
    else will get hold of it.
  • If I lose my purse/wallet, all I have to do is
    cancel my credit cards and nothing else to worry
    about.
  • As long as I know my password, no one can access
    my online accounts.
  • Leaving my bills in my home mailbox is safe.

6
Types of I.D. Theft
  • Social Security Numbers
  • Credit Cards
  • Internet Scams
  • Check Fraud
  • Cell Phone
  • ATM Skimming
  • Stolen Purse/wallet
  • Phishing

7
Internet Scams/ Phishing
  • Internet Scams
  • No preview pane and File a consumer complaint.
  • Contact police and notify bank or credit card
    company immediately if believed to be a victim
  • Limit amount of personal information out there
  • DO NOT complete Internet profiles for rebates
    and contests.
  • Be cautious with online resume postings,
    e-mailing lists online purchases and other public
    data sources
  • Phishing
  • Con artist initiates contact with consumers under
    false pretences to gain access to their
    finances/personal information.
  • Fraudulent e-mails most common may pose as bank,
    credit card company, government agency, stores,
    E-mails look like company website.
  • Beware of someone who unexpectedly asks for
    personal information PIN, password, account
    number, credit card, Social Security Number.
  • Beware of e-mail warning that your account will
    be shut down unless you reconfirm your
    financial information

8
Symptoms of Theft
  • Increase in standard of living or
  • charges in spending habits.
  • objections to procedural change
  • Unreasonable devotion to work

9
Why do Employee Steals?
  • Resentment to real or imagined injustice.
  • To augment poor salary
  • For excitement (kleptomania).
  • In time of crises.
  • Psychological need (Dire needs, Greed, Hunger).
  • Hereditary (inborn, excitement etc.)

10
Control Measures
  • Sound and effective control of companys asset
    (Personal Accountability).
  • Heightened morals of employee (commendation and
    rewards)
  • Investigation of past employment records of a new
    employee.
  • Adopting a system that can make stealing almost
    impossible (award system).
  • Live within your income and be contented with it.
  • Honesty of employee (moral justification).

11
Five Key Principles
  • Take stock
  • 2. Scale down
  • 3. Lock it
  • 4. Pitch it
  • 5. Plan ahead
  • Scale down Keep only what you need for your
    business and streamline storage.
  • Collect only what you need and keep it only for
    the time you need it.
  • Scale down what you store on devices connected to
    the Internet.
  • Slip Showing? For receipts you give to customers,
    properly truncate credit card number and delete
    the expiration date.
  • Social Security numbers can be used by identity
    thieves to commit fraud.
  • Dont collect Social Security numbers out of
    habit or convenience.
  • Take Stock Know what you have and who has access
    to it.
  • Check files and computers for What information
    you have and Where its stored. Dont forget
    portable devices and offsite locations.
  • Trace the flow of data from entry to disposal. At
    every stage, determine who has access and who
    should have access.

12
Five Key Principles cont'
  • Lock it Protect the information you keep.
  • Lock offices, store rooms, desks and drawers and
    train employees to keep them that way.
  • Limit access to areas and databases with
    sensitive files.
  • Secure data thats shipped or stored offsite.
  • Plan ahead Create a plan to respond to security
    incidents and be ready to help consumers.
  • Put together a What if? plan to detect and
    respond to a security incident.
  • Designate a senior staff member to coordinate
    your response.
  • Investigate right away and preserve evidence,
    such as computer logs.
  • Take steps to close off vulnerabilities, e.g.,
    disconnect compromised computers from the
    Internet.
  • Consider whom to notify if a breach occurs.
  • If sensitive personal information is compromised,
    consumers may be at risk of identity theft.
  • Plan to notify, as appropriate, law enforcement,
    other businesses and consumers.
  • Pitch it Properly dispose of what you no longer
    need.
  • Shred, burn, or pulverize paper records you dont
    need.
  • Use wipe utility programs on computers and
    portable storage devices.

Thank you for coming
Write a Comment
User Comments (0)
About PowerShow.com