Identity Theft is a Major Problem: Whose Responsibility is It to Protect the Consumer?

We have heard a lot about consumers' personal information getting into the hands of identity thieves. More and more people are taking steps to minimize their exposure to such theft by reducing information on personal checks, refusing to share social security numbers with just anyone who asks, being prudent in their use of credit cards, and shredding "junk" mail that might allow another person to pose as them. However, we can do little to protect ourselves against lackadaisical security methods or unscrupulous business practices.

Because recent reports confirm that personal information continues to fall into the wrong hands, consumers have become increasingly concerned about how companies handle their personal information. But consumers can only do so much; then it's up to businesses to provide their customers with privacy policies that will ensure their information is handled appropriately and secured from the hands of would-be opportunists, as well as outright crooks.

How can this be accomplished? As business owners, managers, or supervisors, we need to establish and enforce effective company privacy policies. These polices should outline the handling, reviewing, storage, and destruction of customers' personal information, as well as that of employees. Once privacy polices are drawn up, they must be carried out. All employees should be trained in the handling of sensitive information. When employees obtain personal information from customers, several questions need to be asked. Who is allowed to handle it? How long will the information be unsecured? Can information viewed on computer screens be seen by others? How will the information be secured? Who will have access to it? How long will it be kept, and when will it be destroyed?

Establishing strict information handling procedures may be cumbersome. However, they are necessary if we are to gain and keep the confidence of our customers and our employees. Review the following privacy policies that should be established and practiced by every business.

? Adjust computer screens so customer information is not visible by anyone standing in close proximity. If the screen cannot be moved, place something in the line of sight to block unwanted viewers. Hanging plants, room dividers or frosted glass can block the view.

? Computers should be password protected. When an employee leaves his/her computer, it should always be secured and protected by a password. Even if you leave your computer for just a few minutes, unsecured information could be accessed by anyone passing by.

? Customer files should never remain unattended on a desk that can be accessed by customers or unauthorized employees (including cleaning or maintenance staff). Files left unattended can be quickly viewed and documents stolen or copied. Files should always be in a secured drawer or locked room when not in use.

? Customer information should be secured as quickly as possible. Once information is obtained from a customer, the document or program should not be left unattended. Secure all information before servicing another customer.

? When customer information is secured, assign specific employees who will have access to the information. The more employees who have access to the information, the more chances exist for misappropriation. Don't tempt employees with the access if they don't really need it.

? Don't discuss customer information when other customers or employees are able to hear. When requesting information from the customer, have the customers write it down for you. Once you are finished with the written information, it is very important that you hand it back to the customer. This way the customer can dispose of it, and there are no concerns that the written information is intentionally or inadvertently passed on to someone else.

? Don't leave outgoing mail out over night or over the weekend. Mail or any other documents that are waiting in an "out box" can be easily access by cleaning, maintenance, or service staff, as well as by children or friends of employees. Keep outgoing items secured until pick up time. A central location should be designated for such items during the week. Often items placed with other out going mail or documents are quickly forgotten, that is, until the recipient notifies you that the document has not been received. The more time that has lapsed between sending and receiving the mail or documents, the less likely you will be to locate them.

? Documents waiting to be shredded should be in a secure place. Many offices use a box under each desk, where documents are thrown until the end of the week. This system provides easy access to documents that are seldom noticed if they go missing. Shred bins should be locked or kept in a locked room. Larger bins are often used to store documents until a document disposal company takes them. These bins should also be locked or kept in a secured area.

As employers, we often obtain information from Consumer Reporting Agencies (CRAs), to help with our hiring decisions. The Fair and Accurate Credit Transaction Act (FACTA) places emphasis on the accuracy of information, and under new FACTA provisions, any business that uses consumer reporting agencies must adopt proper disposal procedures for the information obtained.

Consumer Reporting Agencies are not just "credit" reports issued by one of the three major credit bureaus. Consumer reports include medical records or payments, insurance claims, employment history, check writing history, and residential or tenant rental history. There are several companies that specialize in providing reports for specific purposes. FACTA defines companies that issue non-credit reports as "nationwide specialty consumer reporting agencies." Consumers may request a free annual report from any of the specialty CRAs.

FACTA also says that receipts for credit and debit card transactions can include no more than the last five digits of the credit card number and expiration date. If you are using a merchant processing machine check to make sure the program is not printing the entire number. If it is, call your provider and request the program be updated to comply with FACTA. Noncompliance could result in fines.

Take steps now to ensure that your merchant processing program will not print the entire credit/debit card number. This does not apply to merchants who only accept handwritten or imprinted card information. This method creates its own problem of securing the consumers card information at all times.

What all this boils down to is that we, as employers, business owners, managers, and supervisors need to make a greater effort to provide our customers with the peace of mind that their identities and their information are safe with us. All of our employees need to handle customer information with care and respect that is apparent to all customers. Without our help in the secure handling of the personal information of our customers and employees, the fight to stop identity theft and fraud will continue to rage. We need to be smarter than the crooks by eliminating their means of obtaining information.

Who knows, the next customer to have information stolen might just be you.

Cindy Schroeter Graham
Identity Theft Prevention Coach
whoelseisyou@easyas123.biz
whoelseisyou@easyas123.biz

Cindy is the author of the book, "Who Else is You?" In it, she outlines strategies on how to reduce the risk of becoming an identity theft victim. An expert who has studied current identity theft trends and has been presenting Identity Theft Prevention seminars since 2002, Cindy understands the risks of business owners and consumers when it comes to the exposure of personal information. For more information on her speaking, consulting or book, please visit: whoelseisyou@easyas123.biz or call 970-285-1581 or email whoelseisyou@easyas123.biz.

custom home cleaning Lincolnshire ..
In The News:

Amazon Prime Day shoppers face threats from 120,000-plus scam websites as cybercriminals prepare phishing traps and malware ahead of the July sales event.
Fox News' AI Newsletter brings you the latest on this rapidly evolving technology.
The AEON humanoid robot tackles labor challenges with Nvidia AI, Microsoft Azure cloud and advanced spatial awareness, working alongside industry leaders Schaeffler and Pilatus.
Google's Ask Photos feature brings AI-powered searches to your photo library, letting you find memories with natural language queries while maintaining privacy controls.
The return of blue book exams emerges as universities fight widespread AI academic dishonesty and educators debate whether to ban AI tools or teach responsible usage.
Signs your phone might be hacked include strange behavior, unauthorized texts, battery drain and pop-ups, while protection involves updating software and avoiding public Wi-Fi.
Tokyo startup H2L has launched Capsule Interface technology enabling full-body robot control with muscle sensors, offering immersive remote operation.
The A.I. industry seems set for growing pains as Big Tech companies scramble for solutions to the medium's unprecedented strain on the power grid.
Fourth of July fireworks cause a 60% spike in lost pets, but GPS trackers and AI photo-matching services like Love Lost can help reunite missing dogs with their families.
Protect yourself from jugging, the rising crime by which thieves monitor ATM users and follow them to steal cash, with six practical safety tips to stay alert and secure.
U.S. airlines like Delta, American and United are selling your domestic flight records to government agencies through the little-known Travel Intelligence Program.
Autonomous robots from Uber Eats are rolling out across U.S. cities, featuring LIDAR sensors, secure compartments and all-weather operation for food and grocery delivery.
Costco has expanded into EV infrastructure with new ultra-fast charging stations that can charge most electric vehicles to 80% in 20-60 minutes while shoppers browse the warehouse.
The new Gemini Robotics On-Device AI allows robots to perform complex tasks without internet, offering enhanced privacy, reliability and adaptability for real-world use.
Protect yourself from Amazon phishing scams by spotting red flags like suspicious sender addresses and spelling errors while using Amazon's Message Center to verify communications.
GAC Group's new Govy AirCab flying car combines lightweight design with advanced safety systems and smart cabin technology to revolutionize city travel with an 18.6-mile range.
The Berkeley Humanoid Light (BHL) is a lightweight, open source humanoid robot that anyone can build using 3D-printed parts and off-the-shelf components.
Meta’s new AI chatbot is getting personal, and it might be sharing more than you realize.
A new threat targets both Android and iPhone users: SparkKitty, a powerful mobile malware strain that scans private photos to steal cryptocurrency recovery phrases and other sensitive data.
Thanks to a team at the University of California, Davis, there's a new brain-computer interface (BCI) system that's opening up real-time, natural conversation for people who can't speak.
Privacy risks are hiding in plain sight, as your personal data is likely being collected, tracked, and sold without your knowledge.
VenHub, a fully autonomous, AI-powered smart store just opened at the LAX/Metro Transit Center in Los Angeles.
A woman's Facebook account takeover reveals dangerous social engineering tactics and provides lessons on recovery, avoiding scams and enacting stronger security measures.
Shanghai engineers are using 432 walking robots to relocate a complex, preserving Shikumen architecture while creating space for a modern underground hub and cultural center.
Major healthcare data analytics firm Episource had a cybersecurity incident exposing 5 million patients' medical records and personal information in recent breach.

I Want to Buy a Home - Now What?

If you were to ask 100 women "What would you... Read More

What is a Traditional IRA?

With a traditional Investment Retirement Account (IRA) you pay taxes... Read More

What Are We Teaching our 2005 Graduates about Money?

Now that we are in the month of June I... Read More

How to Save for A Down Payment

Saving for a Down Payment is hard work, so it's... Read More

Personal Finance ? Why You Should Compare, not Despair

Sorting out your personal finances can be a tricky and... Read More

How to Save Money in a Grocery Store

Now there are ways to save money in the grocery... Read More

Personal Finance - Have Consumers Had a Belly Full of Personal Debt?

For months, we were trigger-swipe happy, putting our groceries, clothes,... Read More

Do You Really Need the Power of Money Management Software?

I have been a loyal user of Quicken(R) for more... Read More

Introduction to Australian Superannuation

Australians, in general, constitute some of the worst savers in... Read More

Honor Those Who Serve with Checking Account Supplies

Our global society has had a wake up call in... Read More

If I Had a Structured Settlement, I Would Use It to Pay for Gas

Has anyone been to the gas pumps lately? Soon $3... Read More

Credit Card Debt ? Watch Your Credit Report and Your Bill

Most consumers are aware of the importance of their credit... Read More

Saving Money On Gasoline For Your Automobile

The gas that we fill our tanks with every week... Read More

How You Feel Affects How You Shop & How Much You Spend

Have you ever stopped to think about how your "mood"... Read More

10 Money-Saving Tips

1. If you have your haircut every 3 weeks, try... Read More

How to Draw a Personal Budget that Works

Many people spend their little income haphazardly without any planning... Read More

How to Choose Wisely a Credit Card

So, you've made the decision to apply for a credit... Read More

Simple Ways to Save Money

Things are so expensive these days. We seem to be... Read More

Saving Money - The Magic 20 Percent

Saving money is not easy and is made more difficult... Read More

7 Simple Ways To Save Money

Each of us knows how to spend money, but do... Read More

Improve Your Professional Image Using Address Labels

One of the simplest ways to improve your professional image... Read More

Budgeting Before Buying

With interest rates being at an all-time low, I can... Read More

How to Choose the Right Bank for Your Online Business

You should thoroughly consider your business needs when selecting a... Read More

Ways to Save Energy and Slash Electricity Bills

1. Lighting & Light Bulbs Install low energy light... Read More

Reduce College Debt with Scholarships

Six Scholarship judges were sitting around an oval table. Forms... Read More

move in cleaning service Glencoe ..