The first step will be reviewing the school’s security controls over computer operating system and networks. This is because most identity thieves steal personal information from computer networks by hacking, diverting personal emails to obtain individuals’ emails and using malware programs to steal information. Secondly I will interview university staff to identify potential identity thieves among them. As much as there may be strong security controls around computer systems, they will not deter identity thieves within the organization. Recent studies show that more than fifty percent of identity frauds occur in the victims’ workplace by fraudulent employees who steal credit card numbers, social security card numbers and other important information from their co-workers . Lastly I will interview the University professors on their awareness of how to detect and prevent identity fraud. Their level of awareness is important in assessing their risk of falling victims of identity theft.
It is difficult to completely stop identity theft because the culprits always come up with new ways of beating established anti-identity theft measures. However, the possibility of its occurrence can be minimized. Some of measures that can be taken to minimize identity theft include keeping computer operating systems and networks fully protected against security vulnerability and frequently performing system scans with up-to-date antivirus software to protect against malware and hacking . School professors should be advised not to divulge personal information to strangers unnecessarily. They should shred all documents that contain personal information such as bank statements, as soon as they are done with them. It is also advisable to directly log onto websites rather than using links provided on emails. Lastly, all incidents of identity theft should be reported to the Federal Trade Commission and at to the police so that the culprits are prosecuted. This will act as a deterrent to prospective offenders. Identity theft is a criminal offence under the Identity Theft and Assumption Deterrence Act of 1998. For example in Fort Worth, Texas, an identity thief, Billy Coat, was sentenced to 25 years in prison for identity theft in 2007 .
Hoffman, S. K., & McGinley, T. G. (2009). Identity theft: a reference handbook (revised ed.). Chicago: ABC-CLIO.
Loberg, K. (2008). Identity theft: how to protect your name, your credit and your vital information-- and what to do when someone hijacks any of these. New York: Silver Lake Publishing.
Vacca, J. R. (2003). Identity theft (illustrated ed.). New York: Prentice Hall Professional.