tag:blogger.com,1999:blog-2630186760095824791.post4597822010308765884..comments2023-09-26T08:42:57.079-07:00Comments on Identity Theft and Business: New Data Initiatives Converge For Information ProtectionJohn Taylorhttp://www.blogger.com/profile/15220821369172645158noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-2630186760095824791.post-14742418465013488342009-06-04T05:53:54.103-07:002009-06-04T05:53:54.103-07:00Reguardless to how much IT security practices you ...Reguardless to how much IT security practices you put in place you have to make sure or double check that your employees are following standards and procedures to protect theft of data. There will always be that employee who will have access and abuse it. This is something that can not be stopped. You do want co-workers to report any suspicious co-worker activity though.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-2630186760095824791.post-21515240975981402992009-05-27T08:33:42.771-07:002009-05-27T08:33:42.771-07:00John:
Excellent post. Thanks for explaining HITEC...John:<br /><br />Excellent post. Thanks for explaining HITEC. There is so much to learn about identity theft, data security, and relevant legislation.<br /><br />George<br />Editor<br />http://ivebeenmugged.typepad.comGeorge Jenkinshttp://ivebeenmugged.typepad.comnoreply@blogger.com