Content area

Abstract

The second part of ICI Mutual Insurance Co's identity theft study captioned The Two Faces of Identity Theft: of Data and Dollars is presented. Strategies and techniques used by fund groups to manage risks associated with identity theft are necessarily influenced by a number of factors, including the size of the fund group, the extent of its reliance on outside vendors and service providers, and the nature of the fund group's computer systems, applications, and interactions with shareholders and other third parties. In establishing data security programs, many fund complexes have found it useful to establish relative priorities for protecting sensitive information. The sheer amount of information stored and processed in electronic form highlights the importance of implementing strong and effective programs for managing data security risks. Effective data security programs seek, among other things, to ensure that access to sensitive data is limited to users whose identity has been properly authenticated.

Details

Title
The Two Faces of Identity Theft: Of Data and Dollars
Author
Anonymous
Corporate/institutional author
Pages
3-10
Publication year
2008
Publication date
Mar 2008
Publisher
Aspen Publishers, Inc.
ISSN
10754512
Source type
Trade Journal
Language of publication
English
ProQuest document ID
225231772
Copyright
Copyright Aspen Publishers, Inc. Mar 2008