ITEC 1010 Lecture 17: ITEC 1010 Lecture 17
Document Summary
In addition to theft of data and software, all types of computer systems and equipment have been stolen from offices. Portable computers such as laptops and portable storage devices (and the data and information stored in them) are especially easy for thieves to take. In many cases, the data and information stored in these systems are more valuable than the equipment and there is a risk that the data can be used in identity theft. In addition, the organization responsible receives a tremendous amount of negative publicity that can cause it to lose existing and potential future customers. Often, the responsible organization offers to pay for credit monitoring services for those people affected in an attempt to restore customer goodwill and avoid law suits. Here are a few more examples of laptops stolen that contained personal information. Tennessee election office containing personal information for more than 337,000 registered voters: ja(cid:374)ua(cid:396)y 200(cid:1012) :