TITLE

SAFE SECRETS

AUTHOR(S)
Lager, Marshall
PUB. DATE
January 2006
SOURCE
CRM Magazine;Jan2006, Vol. 10 Issue 1, p28
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article talks about identity theft and security of data concerning customers. Companies are advised not to ask information they already have because customers get suspicious when asked for information that should already be on file. Some companies are utilizing data warehousing as one solution to information security problems. Some of the places where customer data needs to have safeguards, include database security and access control.
ACCESSION #
19577330

 

Related Articles

  • 'ChoicePoint Law' May Already Be Inevitable. Paletta, Damian // American Banker;3/9/2005, Vol. 170 Issue 46, p1 

    Discusses how momentum for new data security laws threatens to overtake federal regulators, who have been slow to enact rules mandated by Congress as long ago as 1999. Eagerness of politicians to address data security in the wake of the fraud that hit information broker ChoicePoint Inc., and the...

  • Online Banking: It's Still Safe. Bigda, Carolyn // Money;Aug2005, Vol. 34 Issue 8, p48C 

    Offers information about how to conduct online banking while still protecting your identity and data. Report that the majority of identity theft occurs outside of the Internet; Security features used by banks, credit-card issuers, and online retailers; Use of anti-virus and anti-spyware programs...

  • ID Theft Prevention. Storey, Charlene Komar // Credit Union Management;Jul2011, Vol. 34 Issue 7, p14 

    The article reports on the inclusion of identity (ID) theft protection in a variety of products offered by credit unions. It discusses various product offering of credit unions based on their desire to maximize coverage, minimize cost and making it easy for members to sign up with ID theft...

  • Data Security: The Time Is Now. Delaney, John F.; Fischer, L. Richard; Kahn, Sherman W.; Kennedy, Charles H.; Warrington, Joan P.; Wugmeister, Miriam H. // Venulex Legal Summaries;2005 Q3, p1 

    The article focuses on the need for tougher data security policies in companies to protect themselves from information theft and liabilities resulting from such incidents. A credible data security policy begins with a thorough risk assessment to identify internal and external threats to the...

  • Every day's a data protection day.  // Credit Management;Mar2008, p8 

    The article offers information on the European Data Protection Day introduced by the Council of Europe in 2007. It aims to raise awareness of the protection of privacy in the European Union, to encourage the public to be certain of personal data protection and their rights and responsibilities....

  • Viruses, schmiruses? Southgate, Liam // Building Design;1/20/2006, Issue 1705, p25 

    The article provides tips for computer security. Keylogger programs are gaining popularity as the most viable virus installer since it can be spread via electronic mails and instant messages. Thus, computer networks must adopt integrated and holistic strategy. All firms must also manage their...

  • FirstSearch In Your Nighty. Schneider, Karen G. // American Libraries;Sep99, Vol. 30 Issue 8, p92 

    Offers information on the ability of library patrons to access research databases from outside libraries. How patrons gain access using a library barcode; Dangers, including possible ability of others to access resources; Security options, including authentication tools.

  • Protecting your identity.  // Consumer Reports Money Adviser;Sep2008, Vol. 5 Issue 9, p1 

    The article advises U.S. consumers of some ways to protect their personal and financial data against identification (ID) theft. They include placing security freezers on a consumer's credit report to check on fraudulent uses of their accounts and putting fraud alerts for lenders to verify an ID....

  • Raging Red Flags. Thorson, Mary // Independent Banker;May2015, Vol. 65 Issue 5, p84 

    The article offers information on the navigating complicated rules on consumer identity-theft protection procedures. It mentions that the Fair and Accurate Credit Transactions Act of 2003 amended the Fair Credit Reporting Act to include seven major titles dedicated to the protection of consumer...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics