StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Safe Guarding Identity Data vs Identity Theft - Assignment Example

Cite this document
Summary
Safe Guarding Identity Data vs Identity Theft Name Institution Over years, threats against personal information have been on the rise point to the need of securing personal information and reducing the threat of identity, which have far-reaching effect (Hoffman, & McGinley, 2010)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
Safe Guarding Identity Data vs Identity Theft
Read Text Preview

Extract of sample "Safe Guarding Identity Data vs Identity Theft"

Safe Guarding Identity Data vs Identity Theft Over years, threats against personal information have been on the rise point to the need of securing personal information and reducing the threat of identity, which have far-reaching effect (Hoffman, & McGinley, 2010). Because online transactions and recording of personal information constitutes an important element of e-commerce, organizations have a primary role of establishing policies that secure customer data from theft and possible use in identify theft.

The privacy matrix on identify theft; underscore the value of policies, which organization could implement to align its workforce with principles that protect customer’s data. This policy guides the organization implementing it on how to identify threats to personal data, detect breaches, respond to breaches, and update the program to reflect the growing need to update tactics of preventing breaches of identity theft. The policy provides protection for covered accounts according to the Fair and Accurate Credit Transaction Act of 2003.

This policy, which aims at detecting, preventing, and mitigating identity theft issues, governs the conduct of conduct of the workforce. First, the policy identifies several concepts such as identity theft, red flag, and covered account as vital in the success of the policy. This policy defines identity theft as an act or attempted act of using individual personal identifying information without their authority. A red flag, defines a practice that hints to a possible identify theft. Lastly, the policy defines a covered account as on where the organization administers within its information system.

Within the organization of use, this policy identifies several red flags. There are many forms of Red Flags such as customers or employees raising dispute on their credit use, and persons presenting forged documents or cards. Persons who provide wrong demographic information or appear to have cards with photographs, that are not consistent with the bearer, are likely to hint at identify theft. Persons with different signatures and reports of forgery are vital red flags of identity theft. The above red flags are vital in curbing identity theft and safeguarding identity theft.

As per the privacy matrix, polices are vital in promoting confidentiality, justice and veracity. As a result, this policy requires the organization to verify customer’s during registration processes and when persons register (Reynolds, 2011). Review of other identification document is also vital in reveling breaches and possible identify theft. When persons make new request to the organization, such as change of address and contact information, the organization will require persons to provide a verification of their request.

To prevent and mitigate identify theft; the organization will continue to monitor covered account and check for any red flag pointing to possible identity theft. In addition, the organization will implement security measures such as enforcing change of passwords or devices give access to covered account. Most important, the organization will work with other organization to ensure that its systems are encrypted and protected using passwords and other authentication devices (Roberson, 2008). These strategies are important in limiting access within and outside the organization to personal identifying information.

Where significant breaches occur, this policy requires the organization to notify law enforcement agencies. To make program effective, the organization will train its workforce and continually update the program. Updating the policy recognize that new trends emerge and incorporating them to prevention and mitigation strategies are fundamental to promoting safety of identity data and reducing cases of identity theft. The policy is very essential for the success of the organization implementing it.

First, it will create an environment where the workers implement processes that boost the security of identity data. This implies that persons providing data to the organization will enjoy security and possibly improve their trust in the organization. Equally true, the organization will have fewer cases of lawsuits that could result from identify theft arising from issues such as data breach within the organization’s information. Largely, the policy will improve the rating and the standing of the organization within the industry especially among the regulators.

The above policy program has several advantages and a few disadvantages. First, the program will require new structures and processes, which may influence the performance of other functions within the organization. For instance, customers will have to experience new vetting and verification process (Reynolds, 2011). In addition, the employees will undergo new training that will make them conversant with the policy and implement and this could place demand on the workflow of the organization. However, the policy will improve security of identity data, limit cases of fraud, and promote awareness between customer and staff.

This policy improves the trust customer will have when providing identify data. Conflicts between organizational and personal ethical beliefs and organizational commitment to ethical professional conduct The above policy imposes a conflict between organization and personal ethical beliefs. With the implementation of the policy, there could be a conflict arising from personality and the policy. Being that the policy demands for follow-up in issues such as verification and access to personal records, this could conflict with my belief to being less intrusive (Reynolds, 2011).

However, the above policy reinforces the organization’s commitment to professional conduct. This is because the policy promotes justice, veracity, beneficence among the employees. Implication of a breach on the policy Given the importance of the policy, employees who fail to follow the policy risk will face disciplinary action. On realization of such conduct, the organization will determine the extent of the impact and propose a punitive measure that could reduce the occurrence of such a behavior in the future.

Largely, failure to implement the policy could lead to an employee’s facing punishment in accordance with the organizations policy. References Hoffman, S. K., & McGinley, T. G. (2010). Identity theft: A reference handbook. Santa Barbara, Calif: ABC-CLIO. Reynolds, G. W. (2011). Ethics in information technology. Mason, Ohio: South-Western. Roberson, C. (2008). Identity theft investigations. New York: Kaplan.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Safe Guarding Identity Data vs Identity Theft Assignment”, n.d.)
Safe Guarding Identity Data vs Identity Theft Assignment. Retrieved from https://studentshare.org/information-technology/1469352-safe-guarding-identity-data-vs-identity-theft
(Safe Guarding Identity Data Vs Identity Theft Assignment)
Safe Guarding Identity Data Vs Identity Theft Assignment. https://studentshare.org/information-technology/1469352-safe-guarding-identity-data-vs-identity-theft.
“Safe Guarding Identity Data Vs Identity Theft Assignment”, n.d. https://studentshare.org/information-technology/1469352-safe-guarding-identity-data-vs-identity-theft.
  • Cited: 0 times

CHECK THESE SAMPLES OF Safe Guarding Identity Data vs Identity Theft

Information Security for Small Businesses

identity theft and credit card frauds are aggravating crimes that are witnessed due to criminal acts of data thefts.... One such incident was witnessed last year with Sony PlayStation when their PlayStation network in the British division faced data theft.... The customers wanted compensation from Sony for the damages caused by the data theft at Sony.... The data thefts of such nature are likely to cause credit card frauds and bank frauds while attempting identity thefts....
4 Pages (1000 words) Research Paper

Car Crime in London; Selling Car Parts and Exporting Overseas

Car Crime in London; Selling Car Parts and Exporting Overseas Table of Contents Table of Contents 2 Introduction 3 The Car theft Index 4 Factors Contributing to Car theft 6 Description and Justifications of Different Elements of Car Crime Reductions 8 Sold Secure Scheme 8 Vehicle Identity Check (VIC) 11 Justification of the Effectiveness of Car Crime Reduction Scheme 13 Theory of Change for Car Crime Reduction in London, UK 14 Identifying Goals and Assumptions 15 Backwards Mapping and Connecting Outcomes 16 Developing Indicators 17 Identifying Interventions 17 Writing Narrative 18 Summary Evaluation Plan 18 Quasi Experimental Design 19 Potential Problems Associated With the Evaluation 21 Conc… lusion 22 References 24 Introduction Motor vehicle theft has emerged as a serious problem in recent times....
14 Pages (3500 words) Essay

Credit Card Frauds: Shell Chip and Pin

The report “Credit Card Frauds: Shell Chip and Pin” aims at detailing the £ 1 million Shell Chip and Pin fraud that took place in 2006, within months of the introduction of the Chip and Pin payments.... The case was considered critical, as the consumers started losing trust in the new system....
16 Pages (4000 words) Case Study

Online Identity Theft: The Crime of the Future

Everyone seems to know about it, and yet the scandal of online (electronic) identity theft continues to be a substantial problem all across the world.... No other theft can be accomplished quite as easily as online identity theft; no names, no faces, and no fingerprints left behind. … This classification of theft is becoming a largely recognized and yet troublingly unstoppable crime that is actually increasing in occurrence rather than the other way around, even though certain prevention methods are beginning to be taken against it....
34 Pages (8500 words) Essay

Information Technology Security

Then we focus on what is identity theft, its growth using computers, and the possible precautions.... To understand the seriousness of identity theft we firstly need to know the different types of electronic frauds.... With the increased usage of computers and the Internet, there is a lot of movement data and personal information.... Computer as known are automated data processing, communication or storage devices.... Also another common fraud is hacking, or cracking of software to modify customer data, like phone number and address can be changed easily without any proof or evidence....
15 Pages (3750 words) Essay

Summaries of the Articles about the Computing Enviroment

The "Analysis of the Articles about the Computing Environment" paper contains the summaries of articles such as "Anonymous Attacker" by Hurst, " Survey reveals our identity theft fears" from Alpha Galileo 2010.... Then the author examines identity theft in the UK.... Another literature that has been chosen for the respective research is a guideline for the insurance of identity theft (Defaqto Media 2010).... The results showed that the most feared crime on the internet is identity theft in the UK....
7 Pages (1750 words) Term Paper

IT in Criminal Issues

Therefore, the authors aimed at examining the identity of the theft from the analytical angle with their focus on the elaborate versatilities of this contemporary criminal (Wang, and Huang, 2011).... After the identification of the samples, they defined and provided the typology of the crime based on the United States legislation of theft identity.... nbsp;The article The Evolutional View of the Types of identity Thefts and Online Frauds in the Era of the Internet is a research conducted by W....
6 Pages (1500 words) Article

E-Commerce Strategy

These online security threats include fraud and identity theft.... nbsp;… Many of the fraud or identity theft cases reported as per the case studies, it was found that these cases are concerned with identity theft based on the characterization of activity and associated keywords.... nbsp;Most of the information available and the cases reported provided insufficient information about these cases of identity theft.... nbsp; Most of the information available and the cases reported provided insufficient information about these cases of identity theft....
11 Pages (2750 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us