TITLE

Protecting Client Data

PUB. DATE
June 2006
SOURCE
Journal of Financial Planning;Jun2006, Vol. 19 Issue 6, p26
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article discusses methods that financial planners can use to ensure the security of their clients' confidential data. The United States Department of Justice estimates that nearly 4 million U.S. households were victims of identity theft in 2004, illustrating the necessity for financial planners to safeguard client information. Many financial planning firms believe that they are too small to garner attention from identity thieves, but technology consultants like IND say that all business are at risk. INSETS: Data Protection Advice for Clients;Reducing Wireless Exposures;Stop That Car!.
ACCESSION #
21691188

 

Related Articles

  • TAKING A BITE OUT OF IDENTITY THEFT. Lewis, Peter // Fortune;5/2/2005, Vol. 151 Issue 9, p36 

    The article mentions how companies mishandle personal data and recommends using a paper shredder at home. Last year, according to a Better Business Bureau report, more than nine million Americans were victims of identity theft. Security experts say that, contrary to popular belief, the majority...

  • iDENTITY FRAUD.  // Finweek;6/17/2010, Special section p4 

    The article offers information about identity fraud or theft. It indicates that identity fraud is an attempt to get sensitive information including names, passwords and credit card details. According to Jayson O'Reilly, identity thieves and hackers are targeting home computers due to less or...

  • Digital Thieves Dominate Data Breaches. Larkin, Erik // PCWorld;Apr2010, Vol. 28 Issue 4, p44 

    The article discusses a report issued by the Identity Theft Resource Center (ITRC) in the U.S. that hackers have become the top cause of publicly reported data breaches in April 2010. It says that the ITRC started tracking the cause of breaches several years ago, with data on the move as the...

  • Threats. Lindenmayer, Isabelle // American Banker;12/2/2005, Vol. 170 Issue 230, p5 

    The article reports on various methods of fraud, forgery and identity theft discovered recently. The holiday shopping season has provided new opportunities for criminals. Moreover, because 90% of babies are issued a social security number before they leave the hospital and because they do not...

  • PAYING the price.  // Information Security;Apr2006, Vol. 9 Issue 4, p34 

    Discusses the information security breach that occurred at CardSystems Solutions in May 2005. Extent of the damage caused by computer hackers on the company; Measures implemented by Joe Christensen, vice president of security and compliance at CardSystems, to help the company earn compliance...

  • Limits of token gestures. King, Stuart // Computer Weekly;4/4/2006, p22 

    This article presents views of the author on computer security. Although the author does not advocate providing a blood sample to enable him to log into his bank account from home, he likes the idea of his bank providing him with an extra form factor and using two-factor authentication. No...

  • Beware of pirates. Szala, Ginger // Futures: News, Analysis & Strategies for Futures, Options & Deri;Aug2005, Vol. 34 Issue 10, p10 

    Focuses on the issue of identity theft in electronic trading. Cases of account identification theft; Protection of trading accounts from hackers; Use of phising by hackers to obtain accounts on the Internet.

  • How to Secure Your Online Communications. Dock, Patti // Advisor Today;Apr2009, Vol. 104 Issue 4, p68 

    The article offers tips to secure online communication against identity theft and fraud. Financial advisors are advised to use secure encryption to ensure the integrity of the information and to prevent hackers from hacking the information. They are suggested to secure external workflow...

  • New 41st Parameter Security Software. Wolfe, Daniel // American Banker;7/13/2006, Vol. 171 Issue 133, p13 

    This article describes security software available from The 41st Parameter Inc. The software enables banks to identify specific computers used to visit bank Web sites. The software is invisible to the consumer, but when someone logs in to a bank account, it can spot suspicious activity. It can...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics