Identity Theft: Do Your Employees Have Too Much Access?

About a month after a woman was hired to help with receptionist duties, accounting, invoicing and filing at a small Midwest shipping company, she started calling in sick.

When she was out, packages started arriving that were addressed to unknown recipients. Her boss sent them back. But on another day when the receptionist was out, a delivery person told the owner that one of the reclaimed packages was part of a potential fraud investigation. His records showed the receptionist had signed for the package a few days earlier.

The receptionist was immediately terminated, the business owner told Fortune Small Business magazine, which featured the story in a series of articles on “employees from hell.”

The next week, the office received a letter from a credit card company addressed to a former employee, who told her old boss that her identity had been stolen a few months prior.

Turns out, the fired receptionist had dug through employee records to steal identities and open credit card accounts to buy items that were being delivered to the office. And her absences? She needed her sick days to appear in court on other identity theft charges.

A recent study by Javelin Strategy and Research said that 8.4 million U.S. adults suffered some form of identity fraud in 2006, down from 10.1 million in 2002, the New York Times reported. The Federal Trade Commission and the Los Angeles County Sheriff’s Department, which operates an aggressive identity theft task force, also said it is leveling off.

To combat the ID theft problem, the Midwestern company in the Fortune Small Business example decided it would not allow new hires to have access to personnel files, which are now kept locked. Personal information has been removed from invoices. The company offered free credit-fraud alerts to all current and former employees. And, the company now keeps a lawyer on retainer to deal with personnel crises.

While in this case, the records involved paper files, the array of technology devices available make data theft from the workplace even easier. Consider the USB memory stick or an iPod. Because they can hold so much data, they are being used to copy files from corporate networks. So-called ‘pod-slurping,’ involves using a computer program to download vast amounts of data to an iPod in minutes, ElectronicsWeekly.com reported. Cameras and MP3 players are being used as well. Some companies and governments that need sensitive information have banned mobile devices as a preventive measure.

You may like these other stories...

IRS must take oath on Lerner emails: judgeMackenzie Weinger of Politico reported on Thursday that a federal judge ordered the IRS to explain under oath how it lost emails connected to Lois Lerner, the ex-IRS official at the...
From May 20-23, the Association for Accounting Marketing (AAM) held its annual conference. Frequent contributor Sally Glick picked up some ideas that she will be sharing with us in the coming days, as she has done in...
Credit Suisse says pension assets at risk unless court delays sentencingJohn Letzing of the Wall Street Journal reported on Wednesday that Credit Suisse Group AG says its management of billions of dollars in assets for...

Upcoming CPE Webinars

Jul 16
Hand off work to others with finesse and success. Kristen Rampe, CPA will share how to ensure delegated work is properly handled from start to finish in this content-rich one hour webinar.
Jul 17
This webcast will cover the preparation of the statement of cash flows and focus on accounting and disclosure policies for other important issues described below.
Jul 23
We can’t deny a great divide exists between the expectations and workplace needs of Baby Boomers and Millennials. To create thriving organizational performance, we need to shift the way in which we groom future leaders.
Jul 24
In this presentation Excel expert David Ringstrom, CPA revisits the Excel feature you should be using, but probably aren't. The Table feature offers the ability to both boost the integrity of your spreadsheets, but reduce maintenance as well.