Tuesday Mar 10, 2009

The Solution isn't Always a Computer

After I blogged recently about Identity theft, I received a note from a representative of Uni-Ball, the pen company, who pointed out their contribution to fighting Identity Theft:

"As it becomes more difficult to get new lines of credit, identity thieves may be drawn more to commit check fraud. These crimes may take the form of stolen checks, using checks thrown into the trash by unknowing consumers, or a type of identity theft known as "check washing." Check washing occurs when checks or other tax-related documents are stolen from the mail or by other means and the ink is erased using common household chemicals, allowing thieves to endorse checks to themselves. This is where something as simple and inexpensive as a select uni-ball pen can help. Select uni-ball pens contain specially formulated gel ink (trademarked Uni-Super Ink™) that is absorbed into the paper's fibers and can never be washed out."

We in the information systems business too often think of all problems being solved by innovative applications of computers and software.  Here is one example of how a key part of the solution to Identity theft is solved in a much simpler way.

Technorati Tags: , ,

Thursday Mar 05, 2009

Business-focused Identity Theft

Today's Phoenix Business Journal included an interesting article about how businesses, not just individuals, are increasingly becoming a target for identity thieves.  Arizona leads the nation in the rate of identity theft, with the dubious honor of having "149 identity theft cases reported for every 100,000 people for last year."

"The number of incidents has increased as the economy has sunk into recession, and it’s creating a situation of a 'perfect storm' in the information technology security business," said Eduard Goodman, chief privacy officer for Scottsdale-based Identity Theft 911 LLC.

The article further states, "Businesses have unique challenges when dealing with the problem. As storehouses for employee and customer information, a stray laptop left in a car or at the airport can have dramatic ramifications."

In that light, Goodman has some good advice for all of us, "Businesses need to treat personal identifiable information like they would money.  You wouldn’t leave cash lying around" for someone to steal.   Don't make that mistake with your data.

From the consumer viewpoint, the Arizona Federal Credit Union website offers some valuable information about how to prevent and/or recover from identity theft.


Technorati Tags:

Thursday Oct 16, 2008

Theft by Deception

Interesting commentary on the excesses of the modern economy ...
Technorati Tags: , , ,
About

Discovering Identity was founded on blogs.sun.com in May 2005 as a means of documenting my exploration of the field of Identity and Access Management. In February, 2010, I switched to hosting the blog at DiscoveringIdentity.com. In March 2012, I began posting Oracle-related information in both places.

Thanks for stopping by.

Please connect with me in cyberspace at LinkedIn or Twitter.


The views expressed on this blog are my own and do not necessarily reflect the views of my employer, Oracle Corporation, or any other person or organization.

Search

Archives
« July 2014
SunMonTueWedThuFriSat
  
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  
       
Today