how to protect your business, customers, and employees /
First Statement of Responsibility
Judith M. Collins
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Hoboken, N.J. :
Name of Publisher, Distributor, etc.
John Wiley,
Date of Publication, Distribution, etc.
c2005
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
x, 245 p. :
Other Physical Details
ill. ;
Dimensions
24 cm
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references (p. 235-242) and index
CONTENTS NOTE
Text of Note
What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- The BISP plan : tighten your business borders -- Begin the exercises : identify your business identities -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- The people front : socialization, company culture, and the realistic job preview -- The people front : socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- The HIPAA database