Workplace Identity Theft: The Threat From Within

 


Visitors: 860

Recent headlines have shed light on a growing problem, individuals who retrieve and sell personal information that a business has collected for legitimate reasons. Consider the following:

  • A former help desk worker used his position at a credit checking company to obtain the personal information of thousands of individuals. The worker allegedly conspired with an accomplice to sell the victims’ credit reports to an identity theft ring. The ring supplied the pair with the name and social security numbers of the individuals whose identities they wanted to steal. The worker, who left the company in 2000, allegedly used codes he had obtained as an employee to access credit reports. He was also accused of providing access codes and passwords to at least one cohort who then used the codes to obtain consumer credit reports.

  • A ring of identity thieves targeted a group of high-ranking executives. A temporary employee working at the company’s world headquarters obtained personal information about company executives and then sold it. The information, including social security numbers and birthrates was used to obtain credit cards. The police estimated about $100,000 was charged to the cards.

  • The former employee of an insurance company stole a database containing 60,000 personnel records and sold some of the private information over the Internet. The suspect posted a message on an electronic bulletin board announcing that he had thousands of names and social security numbers for sale. Further investigation revealed he had also posted the credit card number of a former supervisor. At the same time, he allegedly created false e-mail addresses and sent harassing messages to colleagues.

    So how does this happen? An individual can do everything right, from shredding documents containing sensitive personal information to monitoring credit reports but the reality is your personal information is only as safe as the organization protecting it.

    Identity theft occurs when someone uses the identifying information of another person, such as name or social security number to commit fraud or engage in other unlawful activities. While numerous variations of the crime exist, an identity thief can fraudulently use personal identifying information to, among other things:

  • Open new credit card accounts;
  • Take over existing credit card accounts;
  • Apply for loans;
  • Rent apartments;
  • Establish services with utility companies;
  • Write fraudulent checks;
  • Steal and transfer money from existing bank accounts;
  • File bankruptcy; and
  • Obtain employment using the victim’s name.

    Identity theft rings have been known to recruit individuals who work within an organization or they seek employment themselves in positions where they have access to personnel records, credit reports or other sources of personal information. Identity theft rings pay individuals anywhere from $20-60 an identity.

    One major problem with incidents of this nature is some organizations try to avoid potential embarrassment and negative publicity by not informing employees or customer that their personal information may have been compromised.

    When whole groups of people are victimized, there are more clues.

    In one case, a teacher at a middle school complained to a colleague when bill collectors started calling him at work. Another teacher who had also been victimized overheard him. When they began to inquire they soon found out various other teachers had also been the victims of identity theft.

    After checking credit records four teachers found they had the same fraudulent address on their credit reports. The identity thieves had also applied for the same card on almost every teachers record.

    Times have changed and organizations can no longer take a head in the sand approach when dealing with identity theft.

    Organizations can implement the following safeguards to prevent identity theft in the workplace:

  • Properly dispose of personal information and other sensitive material. This could be accomplished by shredding documents. Do not allow intact documents containing personal information to be thrown in dumpsters.

  • Conduct background checks on all individuals with access to personal and/or sensitive information, including cleaning and temporary service.

  • Limit the number of temporary agencies your company uses. If possible, maintain the services of one trusted firm.

  • Develop guidelines to safeguard personal and/or sensitive information; the guidelines should address issues such as practices for handling such information responsibly.

  • Train staff on information security issues and include information on the topic in new employee orientations. Educate them on why certain information needs protection and procedures on how to protect it.

  • Limit the use of social security numbers in the workplace. Don’t use the number on items such as employee identification badges, time cards or paychecks for the whole world to see. Use alternative numbers.

  • Control access to personal information and limit it to those employees who have a legitimate reason for access. Audit who looks at what personal information.

  • Secure employees’ personal information in a locked file cabinet or other secure area. Sensitive files stored on the computer should be password protected and encrypted.
  • Implement and enforce password security procedures for all computer users. Passwords should be changed on a regular basis.

    There are numerous opportunities to educate employees on identity theft prevention and the steps to take if they become victims: new employee orientations, annual staff orientations, training conferences, workshops, and departmental meetings are just a few. Brown-bag lunch training sessions have also been found to be helpful.

    Security awareness could also be increased through the use of posters, newsletter articles, e-mails, video presentations and other promotion vehicles such as brochures or booklets that address identity theft. Stock relevant publications and audio-visual programs and make them accessible to company executives and employees.

    Identity theft is a crime of opportunity. Vigilance and awareness is essential in combating the fast growing non-discriminatory crime.

    Johnny May is an independent trainer/consultant who specializes in protecting individuals and organization from identity theft. He is also the author of Johnny May's Guide to Preventing Identity Theft and the featured expert in the video production Identity Theft: How to Protect Your Credit, Your Money and Your Good Name. For more information visit http://www.identitytheftinfo.com or e-mail at secres@prodigy.net

  • (1073)

    Article Source:


     
    Rate this Article: 
     
    Identity Theft Fact! Take These Steps To Not Be At Risk of Identity Theft.
    Rated 4 / 5
    based on 5 votes
    ArticleSlash

    Related Articles:

    The Everyday Threat of Identity Theft Online

    by: Mark F Hargreaves (June 26, 2008) 
    (Legal/Identity Theft)

    Identity Theft - A Growing Problem in the Workplace; an Opportunity for ..

    by: Peter Marshall (December 30, 2005) 
    (Legal/Identity Theft)

    Identity Theft Prevention - Prevent Identity Theft From Happening When You Shop .

    by: Caleb Liu (December 06, 2008) 
    (Legal/Identity Theft)

    Internet Identity Theft Protection, How Can You Stop Online Identity Theft From .

    by: Daryl Plaza (June 16, 2007) 
    (News/Crime)

    Try Our Identity Theft Protection Quiz Are You Safe From Identity Theft?

    by: Jenna Scaglione (June 19, 2008) 
    (Legal/Identity Theft)

    Recovering From Identity Theft? 4 steps To take if A victim of identity theft?

    by: William McRand (July 16, 2007) 
    (Business/Marketing)

    Identity Theft is Real - An Identity Theft Prevention Primer

    by: Tyler Previd (August 13, 2008) 
    (Legal/Identity Theft)

    Identity Theft - The Most Common Mistakes After Identity Theft Occurs

    by: Darrell Causey (June 15, 2007) 
    (Legal/Identity Theft)

    Identity Theft Protection And Prevention - How To Protect Yourself From ..

    by: Pete Marks (February 11, 2008) 
    (Legal/Identity Theft)

    Identity Theft Fact! Take These Steps To Not Be At Risk of Identity Theft.

    by: Clyde Whyte (November 04, 2010) 
    (Legal/Identity Theft)