Preventing Identity Theft in Your Business: How to Protect Your Business, Customers, and Employees
PART I: THE CURRENT STATE OF IDENTITY THEFT.
Chapter 1: What Is an “Identity”?
Chapter 2: Identity Theft: Effects on Victims.
Chapter 3: Identity Crime Is Entrenched.
Chapter 4: Identity Crimes Are Escalating.
Chapter 5: Legal Requirements for Businesses.
Chapter 6: Caveat Lector. Let the Reader Beware.
PART II: IDENTITY THEFT PREVENTION.
Chapter 7: The BISP Plan: Tighten Your Business Borders.
Chapter 8: Begin the Exercises: Identify Your Business Identities.
Chapter 9: Securing the People Front: The Security Job Analysis.
Chapter 10: The People Front: Recruitment for Security.
Chapter 11: The People Front: Personnel Selection for Security.
Chapter 12: The People Front: Select for Motivation.
Chapter 13: The People Front: Select for Integrity and Security.
Chapter 14: The People Front: Select for Interpersonal Skills.
Chapter 15: The People Front: Socialization, Company Culture, and the Realistic Job Preview.
Chapter 16: The People Front: Socializing Newcomers to the Honest Company Culture.
Chapter 17: The People Front: Appraisal and Feedback for Performance and Security.
Chapter 18: The Process Front: Secure Business Information Processes.
Chapter 19: The Property Front: The E-Business Web Site.
PART III: MONITORING IDENTITY THEFT.
Chapter 20: The Customer Security Program.
Chapter 21: E-Commerce “Best Practices” for Customers.
Chapter 22: The Legislative Process.
Chapter 23: The HIPAA Database.
Appendix A: The Security Standard Checklist.
Appendix B: Checklist of Team Prerequisites.
Appendix C: Structured and Formal Brainstorming: Step-by-Step Instructions.
Appendix D: Cause and Effect Analysis: Step-by-Step Instructions.
Appendix E: The Security Focus Group Interview.
Appendix F: The Security Job Description.
Appendix G: Industrial and Organizational Specialists in Test Development and Validation.
Appendix H: One Company’s Short- and Long-Term Strategic Plan.
Appendix I: The Information Process: Definition, Description, and Illustration.
Appendix J: The Pareto Analysis: Definition, Description, and Illustration.
Appendix K: Forerunners in the Support of Identity Theft Legislation.