Anti-fraud moves at Companies House to prevent "company hijack"

January 2005
Credit Control;2005, Vol. 26 Issue 1, p40
Trade Publication
Reports on the British Companies House's introduction of electronic services to help companies avoid fraud. Identification of companies at risk of "company hijack"; Launch of the Protected Online Filing;


Related Articles

  • Third of firms lax on B2B data cleaning.  // Data Strategy;Feb2007, Vol. 3 Issue 4, p10 

    The article reports on a survey which reveals that one third of companies never check their business-to-business (B2B) customer and prospect data against suppression files or preference services, thus increasing their risk of non-compliance with data protection regulations and incurring...

  • The Hackers Are On The Inside -- You Just Haven't Seen Them Yet.  // Database & Network Journal;Feb2012, Vol. 42 Issue 1, p17 

    The article offers guidelines on how to prevent computer hacking conducted by rogue employees. Activities associated with the Operation Shady Remote Access Trojan (RAT) are highlighted. Steps on how to protect confidential data from unauthorised access are provided. According to the author,...

  • Deletion or destruction? Dorion, Pierre // Storage Magazine;Sep2008 Special Issue, Vol. 7 Issue 8, p8 

    The article illustrates the advantages and disadvantages of either deleting or destroying data. Corporate retention and deleting policies were created to address the growth of data and compliance regulations. It is said that deleting a file in the computer only means that the space it occupies...

  • THIEVES IN THE NIGHT. Gage, Deborah // Baseline;12/15/2005, Issue 53, p26 

    The article presents the case of ChoicePoint, a data broker firm based in Alpharetta, Georgia that experienced theft of customers' personal information. Around 5,054 people were notified by ChoicePoint for their lost of control of identifications and passwords of customers. James Lee, chief...

  • An electronic database with a compilation of k0 and related data for NAA. Kolotov, V.P.; De Corte, F. // Journal of Radioanalytical & Nuclear Chemistry;Sep2003, Vol. 257 Issue 3, p501 

    An electronic data base (DB) containing recently evaluated k0 and related data has been developed. The tables composing the DB are relationally linked to support data integrity. The purpose of the DB development is to make an official source of data used for electronic synchronization of the...

  • A secure utility. Stoller, Jocob // CMA Management;Apr2004, Vol. 78 Issue 2, p47 

    This article focuses on the need of data security by means of "utility computing" in facing security challenges by companies using information technology (IT). The need to deliver sophisticate technology simply and efficiently has become a key imperative for the IT industry. Utility computing or...

  • The perils of disk-covery. Jessen, John H. // Electric Perspectives;Nov/Dec97, Vol. 22 Issue 6, p48 

    Discusses the problems regarding the use of corporate electronic data as evidence in litigations. Benefits of undertaking an electronic evidence management plan; How to create a management plan for electronic data. INSETS: A printout isn't enough.;All, unfortunately, is not lost..

  • Study on the Security Strategy of Digital Information -Take our School Library as an Example. Haixia Wang // Applied Mechanics & Materials;2014, Issue 526, p367 

    In this paper, we propose a general discussion on the digital library security from the perspectives of management risk, security demand and target, the security architecture of library digital information. The specific solution for implementation is presented for the information security of...

  • Privacy Preserving Combinatorial Reverse Auction Protocol for a Market-Oriented Grid Based on Secure Group Communication. Chakraborty, Sumit; Sharma, Sushil Kumar // Journal of Information Privacy & Security (Ivy League Publishing;2005, Vol. 1 Issue 3, p42 

    Negotiation is a means for intelligent agents of a market-oriented grid to communicate and compromise for reaching mutually beneficial agreements in terms of cost and quality of service. In this paper, we have presented a secure negotiation protocol for efficient management of resources in a...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics