Syndetics cover image
Image from Syndetics

Preventing identity theft in your business : how to protect your business, customers, and employees / Judith M. Collins.

By: Collins, Judith M.
Material type: TextTextPublisher: Hoboken, N.J. : Wiley, c2005Bibliography: Includes bibliographical references and index.Description: x, 245 p. ; 24 cm.ISBN: 047169469X (cloth).Subject(s): Identity theft -- United States -- PreventionDDC classification: 658.4/72 Online resources: Table of contents
Contents:
What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- The BISP plan: tighten your business borders -- Begine the exercises: identify your business identities - Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- The people front: socialization, company culture, and the realistic job preview -- The people front: socializing newcomers to the honest company culture -- The people front: appraisal and feedack for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- The HIPAA database.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Includes bibliographical references and index.

What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- The BISP plan: tighten your business borders -- Begine the exercises: identify your business identities - Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- The people front: socialization, company culture, and the realistic job preview -- The people front: socializing newcomers to the honest company culture -- The people front: appraisal and feedack for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- The HIPAA database.

There are no comments on this title.

to post a comment.

Powered by Koha