Content area
Abstract
The second part of ICI Mutual Insurance Co's identity theft study captioned The Two Faces of Identity Theft: of Data and Dollars is presented. Strategies and techniques used by fund groups to manage risks associated with identity theft are necessarily influenced by a number of factors, including the size of the fund group, the extent of its reliance on outside vendors and service providers, and the nature of the fund group's computer systems, applications, and interactions with shareholders and other third parties. In establishing data security programs, many fund complexes have found it useful to establish relative priorities for protecting sensitive information. The sheer amount of information stored and processed in electronic form highlights the importance of implementing strong and effective programs for managing data security risks. Effective data security programs seek, among other things, to ensure that access to sensitive data is limited to users whose identity has been properly authenticated.