Identity Theft Awareness
Defend yourself with knowledge, awareness, and detection.
Book the real Danny Lents to speak to your group about identity theft.
  

ID Theft Speaker

Almost 10 million Americans become victims of identity theft each year. I became a victim in 2001. I've researched identity theft extensively to protect myself and help others. I want to help you avoid this nightmare.

Your odds of becoming a victim are greatly reduced with knowledge, awareness, and detection. Take action now to avoid becoming the next identity theft victim.

Book the real Danny Lents to speak to your group about identity theft:

dlents@IdTheftAwareness.com

Seminar Flyer (pdf file)

Data Management Reminders to Deter Identity Theft

Businesses have a responsibility to protect the sensitive personal data that they manage. Here is a short list of data management reminders to consider.

Medical records source for identity theft
  1. If you don't need it, don't collect it.
  2. If you need it once, don't save it longer.
  3. If you've got it, but you don't need to save it, dispose of it carefully.
  4. If you have to keep it, think security.
  5. Formally document data life cycle that includes collection, storage, use, and destruction.
  6. Don't broadcast personal information.
  7. Create and enforce a data-removal policy that limits who can remove sensitive data from your office and how they must secure it.
  8. Don't use Social Security numbers as account numbers, ID badges, time cards, or other publicly exposed documents.
  9. Don't give out employee or customer information to anyone whose identity can't be positively confirmed.
  10. Locks and alarms are a real deterrent.
  11. Conduct background checks on all individuals with access to personal and/or sensitive information, including cleaning and temporary service.
  12. Limit the number of temporary agencies your company uses. If possible, maintain the services of one trusted firm.
  13. Don't let customers or other unauthorized people view sensitive information on your desk, computer monitor, etc.
  14. Secure job applications
  15. Don't cover up data breaches. Have a data breach policy and procedure in place.
  16. Perform regular data management audits.
  17. Read the FTC guides
  18. Read the National Institute of Standards and Technology publication, "Guide to Protecting the Confidentiality of Personally Identifiable Information"
  19. Read the Bureau of Consumer Protection article about Copier Data Security.