Summary of Preventing Identity Theft in Your Business

Looking for the book?
We have the summary! Get the key insights in just 10 minutes.

Preventing Identity Theft in Your Business book summary
Start getting smarter:
or see our plans

Rating

7 Overall

9 Applicability

7 Innovation

5 Style

Recommendation

Based on research conducted at Michigan State University, this step-by-step, practitioner’s guide shows you how to implement an identity-theft protection program. Author Judith M. Collins includes useful background information about the types and frequency of identity thefts and identity crimes. She emphasizes the steps your company can take to prevent and remediate identity theft. She also provides a chapter on "best practices" for customers and advises companies to include these best practices in their marketing materials. If your company is serious about dealing with identity theft, getAbstract recommends this book as an extremely useful guide.

In this summary, you will learn

  • How to define identify theft and its causes;
  • What impact identity theft and identify crime have;
  • What eight steps you can take to prevent identity theft in your business;
  • How to avoid becoming a victim of identity theft; and
  • How to help identity-theft victims.
 

About the Author

Judith M. Collins is associate professor of industrial and organizational psychology in the School of Criminal Justice at Michigan State University. She teaches information security management and directs the University Identity Theft Partnership in Prevention.

 

Summary

Identity Theft and Identity Crime
Most identity thefts occur in the workplace. Relatively few involve dumpster diving or burglary. Although personal identity theft has made headlines, businesses can be victims of identity theft - they can also be unwitting accomplices. However, identity...

Get the key points from this book in 10 minutes.

For you

Find the right subscription plan for you.

For your company

We help you build a culture of continuous learning.

 or log in

Comment on this summary

More on this topic

Customers who read this summary also read

More by category