ITEC 1010 Lecture 17: ITEC 1010 Lecture 17

9 views3 pages

Document Summary

In addition to theft of data and software, all types of computer systems and equipment have been stolen from offices. Portable computers such as laptops and portable storage devices (and the data and information stored in them) are especially easy for thieves to take. In many cases, the data and information stored in these systems are more valuable than the equipment and there is a risk that the data can be used in identity theft. In addition, the organization responsible receives a tremendous amount of negative publicity that can cause it to lose existing and potential future customers. Often, the responsible organization offers to pay for credit monitoring services for those people affected in an attempt to restore customer goodwill and avoid law suits. Here are a few more examples of laptops stolen that contained personal information. Tennessee election office containing personal information for more than 337,000 registered voters: ja(cid:374)ua(cid:396)y 200(cid:1012) :

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents