SlideShare a Scribd company logo
1 of 2
Download to read offline
Employers Face Liability for
Five Kinds of Identity Theft
By Joanne Deschenaux, SHRM’s senior legal editor

ATLANTA—The workplace is the site of more than half of all identity thefts, Michael Hall, a certified identity risk
management specialist, told attendees at the SHRM Atlanta Human Resource Conference Oct. 6. There are
five types of identity theft, and employers can potentially be held liable for any or all of them, he said. Because
“many thieves these days don’t care about stealing money; they just want your information, which they can
use to make money,” he stressed that it is crucially important for businesses to take steps to safeguard
employees’ personal information.


Types of Identity Theft                                     In this type of theft, criminals obtain your health
Financial identity theft. When thinking about identity      insurance information or Social Security number to
theft, most people first focus on the theft of personal     get health care. Because this means that your medi-
information being used to obtain credit cards or to raid    cal history could include someone else’s information,
existing bank or credit card accounts, Hall said.           this type of identity theft can be life threatening, Hall
Thieves can deplete your accounts, run up credit card       noted. For example, as a result of someone else
bills in your name and destroy your credit. But there       pretending to be you, it would be possible for your
are other types of identity theft as well, Hall told the    blood type to be listed incorrectly on your medical
session attendees.                                          records.

Driver’s license identity theft. A thief can use your
                                                            Character/criminal identity theft. Your personal
information to acquire a driver’s license in your name
                                                            information might be given to the police instead of the
and claim to be you during a traffic stop. This could
result in the suspension or revocation of your driving      thief’s information. This can result in your arrest for
privileges or in criminal charges for offenses such as      crimes that you did not commit.
driving while intoxicated.
                                                            Most Identity Theft Starts at Work
Social Security identity theft. A thief might use your      Because the workplace is the site of so much identity
Social Security number to gain employment or to             theft, “executives must stop thinking about data
report income under your name. An illegal immigrant         protection as solely an IT problem,” he advised.
may use your Social Security number to get a job.           Further, the problem lies not with the data, but with
Similarly, a convicted criminal may want to use your
                                                            the people. There are five main causes of data
number to get around an employer’s background
                                                            breaches at work, Hall noted:
check. Thieves also may be interested in getting paid,
but not paying taxes. “The Internal Revenue Service         • Disgruntled or dishonest staff.
and the Social Security Administration don’t neces-         • Untrained or careless employees.
sarily talk to one another,” Hall said, and there have      • Lost or stolen laptops.
been instances of people finding out that their tax         • Service providers, contractors and visitors.
returns have already been filed and that someone            • Hackers.
else has received their refunds.
                                                            The Federal Trade Commission (FTC) has advised
Medical identity theft. This is the fastest growing         that “information security should be a priority for every
type of identity theft, Hall observed, noting an AARP
                                                            business in America,” Hall said and added that “any
study that found that stolen health insurance cards
                                                            business comes under some information protection
are being sold on the black market for $500 to $600
dollars.                                                    law.”
                                                                                                             [MORE]
These laws (and regulations) include:
• At least 44 state laws concerning identification theft and notification of data breaches.
• The Health Insurance Portability and Accountability Act, for health information.
• The FTC Act, which reaches “unfair and deceptive business practices.”
• The Gramm-Leach-Bliley Act for financial information.
• The Fair Credit Reporting Act and the Fair and Accurate Credit Transactions (FACT) Act.
• New federal agency rules for FACT Act compliance, which go into effect on Nov. 1, 2008.

Steps To Take
As an employer, you can be subject to criminal liability for data theft as well as civil liability to employees whose
personal information has been stolen. In addition, the company may suffer costly damage to its reputation, Hall
warned. There are announcements of data breaches almost every day, he noted. So what can you as an
employer do to prevent these breaches? Hall suggested some basic steps:

• Develop a written data protection plan.
The plan should be designed to protect all data throughout the company.
• Appoint a security manager.
This should be an upper level managerial employee, Hall advised.
• Provide training for employees.
Employers should implement a training schedule and ask every employee to sign an agreement that he or she
will follow the company standards.
• Before you outsource any company function, investigate that firm’s data security practices.
• Consider offering identity theft protection as an employee benefit.
This typically would include restoration services—help to the employee in reclaiming his or her identity.

Some day soon, you may see an ad on television, Hall said, advising all employees whose personal data has
been stolen at the workplace to contact a lawyer for information about suing their employers. You want to do
everything you can to prevent such a lawsuit from happening, Hall suggested, but also noted that “you can’t
prevent all identity theft.” However, showing that you took all the steps that you reasonably could have taken will
go a long way toward defending a legal action based on theft of employees’ personal data.

Joanne Deschenaux is SHRM’s senior legal editor.

www.shrm.org/hrnews_published/archives/CMS_026842.asp

More Related Content

What's hot

Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4danc752
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Legal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionLegal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionDowney Law Group LLC
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
Identity Theft and Your company
Identity Theft and Your companyIdentity Theft and Your company
Identity Theft and Your companyguest61ff5a
 
I D Theft Employee Presentation2
I D Theft Employee Presentation2I D Theft Employee Presentation2
I D Theft Employee Presentation2Heather Smith
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 
Proceed with Caution When Employment Involves Immigration
Proceed with Caution When Employment Involves ImmigrationProceed with Caution When Employment Involves Immigration
Proceed with Caution When Employment Involves ImmigrationHuman Resources & Payroll
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 

What's hot (20)

Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Legal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionLegal Ethics for a Changing Profession
Legal Ethics for a Changing Profession
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Identity Theft and Your company
Identity Theft and Your companyIdentity Theft and Your company
Identity Theft and Your company
 
I D Theft Employee Presentation2
I D Theft Employee Presentation2I D Theft Employee Presentation2
I D Theft Employee Presentation2
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Proceed with Caution When Employment Involves Immigration
Proceed with Caution When Employment Involves ImmigrationProceed with Caution When Employment Involves Immigration
Proceed with Caution When Employment Involves Immigration
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 

Similar to SHRM: Employers Face Liability for Identity Theft

Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Adrs Presentation Folder 051909
Adrs Presentation Folder 051909Adrs Presentation Folder 051909
Adrs Presentation Folder 051909julchap
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Identity Advocate
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 

Similar to SHRM: Employers Face Liability for Identity Theft (16)

Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Adrs Presentation Folder 051909
Adrs Presentation Folder 051909Adrs Presentation Folder 051909
Adrs Presentation Folder 051909
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity Theft
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Adrs2
Adrs2Adrs2
Adrs2
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Ten things to know about identity theft
Ten things to know about identity theftTen things to know about identity theft
Ten things to know about identity theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 

Recently uploaded

How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified Binance Account
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 

Recently uploaded (20)

How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 

SHRM: Employers Face Liability for Identity Theft

  • 1. Employers Face Liability for Five Kinds of Identity Theft By Joanne Deschenaux, SHRM’s senior legal editor ATLANTA—The workplace is the site of more than half of all identity thefts, Michael Hall, a certified identity risk management specialist, told attendees at the SHRM Atlanta Human Resource Conference Oct. 6. There are five types of identity theft, and employers can potentially be held liable for any or all of them, he said. Because “many thieves these days don’t care about stealing money; they just want your information, which they can use to make money,” he stressed that it is crucially important for businesses to take steps to safeguard employees’ personal information. Types of Identity Theft In this type of theft, criminals obtain your health Financial identity theft. When thinking about identity insurance information or Social Security number to theft, most people first focus on the theft of personal get health care. Because this means that your medi- information being used to obtain credit cards or to raid cal history could include someone else’s information, existing bank or credit card accounts, Hall said. this type of identity theft can be life threatening, Hall Thieves can deplete your accounts, run up credit card noted. For example, as a result of someone else bills in your name and destroy your credit. But there pretending to be you, it would be possible for your are other types of identity theft as well, Hall told the blood type to be listed incorrectly on your medical session attendees. records. Driver’s license identity theft. A thief can use your Character/criminal identity theft. Your personal information to acquire a driver’s license in your name information might be given to the police instead of the and claim to be you during a traffic stop. This could result in the suspension or revocation of your driving thief’s information. This can result in your arrest for privileges or in criminal charges for offenses such as crimes that you did not commit. driving while intoxicated. Most Identity Theft Starts at Work Social Security identity theft. A thief might use your Because the workplace is the site of so much identity Social Security number to gain employment or to theft, “executives must stop thinking about data report income under your name. An illegal immigrant protection as solely an IT problem,” he advised. may use your Social Security number to get a job. Further, the problem lies not with the data, but with Similarly, a convicted criminal may want to use your the people. There are five main causes of data number to get around an employer’s background breaches at work, Hall noted: check. Thieves also may be interested in getting paid, but not paying taxes. “The Internal Revenue Service • Disgruntled or dishonest staff. and the Social Security Administration don’t neces- • Untrained or careless employees. sarily talk to one another,” Hall said, and there have • Lost or stolen laptops. been instances of people finding out that their tax • Service providers, contractors and visitors. returns have already been filed and that someone • Hackers. else has received their refunds. The Federal Trade Commission (FTC) has advised Medical identity theft. This is the fastest growing that “information security should be a priority for every type of identity theft, Hall observed, noting an AARP business in America,” Hall said and added that “any study that found that stolen health insurance cards business comes under some information protection are being sold on the black market for $500 to $600 dollars. law.” [MORE]
  • 2. These laws (and regulations) include: • At least 44 state laws concerning identification theft and notification of data breaches. • The Health Insurance Portability and Accountability Act, for health information. • The FTC Act, which reaches “unfair and deceptive business practices.” • The Gramm-Leach-Bliley Act for financial information. • The Fair Credit Reporting Act and the Fair and Accurate Credit Transactions (FACT) Act. • New federal agency rules for FACT Act compliance, which go into effect on Nov. 1, 2008. Steps To Take As an employer, you can be subject to criminal liability for data theft as well as civil liability to employees whose personal information has been stolen. In addition, the company may suffer costly damage to its reputation, Hall warned. There are announcements of data breaches almost every day, he noted. So what can you as an employer do to prevent these breaches? Hall suggested some basic steps: • Develop a written data protection plan. The plan should be designed to protect all data throughout the company. • Appoint a security manager. This should be an upper level managerial employee, Hall advised. • Provide training for employees. Employers should implement a training schedule and ask every employee to sign an agreement that he or she will follow the company standards. • Before you outsource any company function, investigate that firm’s data security practices. • Consider offering identity theft protection as an employee benefit. This typically would include restoration services—help to the employee in reclaiming his or her identity. Some day soon, you may see an ad on television, Hall said, advising all employees whose personal data has been stolen at the workplace to contact a lawyer for information about suing their employers. You want to do everything you can to prevent such a lawsuit from happening, Hall suggested, but also noted that “you can’t prevent all identity theft.” However, showing that you took all the steps that you reasonably could have taken will go a long way toward defending a legal action based on theft of employees’ personal data. Joanne Deschenaux is SHRM’s senior legal editor. www.shrm.org/hrnews_published/archives/CMS_026842.asp