CLICK for Home Page and HR Administration Overview
Website Launched:  12/26/1994
Last Update:  2/14/2013
The Integrity Center, Inc.

(972) 484-6140
[ Since 1984 ]
HOME Reference Articles
 
SCREENING
Check List
Backgrounds
TUTORIALS
SERVICE MENU
FCRA
THIS COMPANY
Our Methods
Why Use Us
Myths
Pitfalls
CHECK MYSELF
CHECK NANNY
USEFUL LINKS
Library
Statistics
PRESS RELEASE
The Integrity News
Vol. XIII No. 11
ISSN 1081-2717

 

The Integrity Center, Inc.
"objective risk management services"


June 2, 2004 


Cyber Age
Employee Crimes

Two current articles look at some of the new angles on
employee crime:



ID Theft Usually An Inside Job
MSNBC,   May 20, 2004

"Up to 70% of cases start with an employee heist"

"As much as 70 % of all identity theft starts with theft of personal data from a company by an employee."

"Today, what we have to think about, in the Information Age, is employees stealing information."    "Why steal merchandise when they can steal data and get money ?"

From a major national study they quote:  "In 50% of  the cases, the victim's identity was originally pilfered by  a company employee.   In another 20% of cases, evidence  strongly suggested dirty play by an insider."

"Perhaps the greatest surprise:  a large number of the identities were stolen not by an employee --- but by the business owner."

The report on the study continues:  "It only makes sense.   A majority of the (personal) information is in the hands of corporate America."    "In most cases, temporary workers or employees stealing data from other  departments were to blame.   That suggests companies need to tighten up data security practices."

Because information equals cash, organized crime rings are placing members in low-level jobs in order to commit identity theft and other crimes.   Terrorists are attempting to infiltrate companies too.   Recall the airline that found out that it was employing an Al Qaeda baggage handler.

While "men tend to be more risk-takers, and committing crime is high risk, ID Theft is low risk."    "About half the  criminals in the study were women -- suggesting that identity theft is a new kind of equal opportunity crime."

Congress is working on the "Identity Theft Penalty Enhancement Act" which includes additional jail time  for criminals who steal data on the job.    "It's an extra two years if you are an insider, and steal data, and that data is used for a crime."   And the article says, in the  current proposed legislation, there is "no provision for  corporate liability when employees steal data".


Disgruntled Former Employees
May Use the Internet For Revenge

Workforce  --  Legal Insight,   May, 2004

"with the reach of the Internet, they have a much more effective and invasive method for harassing their former employers"

"In the past, unhappy former employees might have  sent a letter to the editor of the local newspaper, or complained loudly to their neighbors.   With the widespread availability and expansive reach of the Internet, however, they have a much more effective and invasive method for harassing their former employers."

In one case, the ex-employee "posted two authentic looking job listings on a Web site, announcing that the former employer was seeking applications for their Director of Human Resources position.   The employer was not seeking such applications."   In addition, the ex-employee "registered the email address of the  current HR Director on a number of pornographic Web sites."    In addition to the "huge amounts of sexually explicit emails that the Director began to receive at work", there was also a new quantity of "unwanted  catalogs for pornographic materials" arriving at work.

"Human resources professionals have always had to  deal with disgruntled ex-employees who speak out  against their former employers.   However, the Internet can raise this problem to an entirely new level."

"The legal solution to the cyber-harassment campaign  came from a traditional cause of action, rarely seen or applied in courtrooms today, and created well before the days of computers and the Internet.   The solution was to sue the former employee for 'trespass to chattels'."

"A chattel is simply an article of personal property.   A claim for unlawful trespass to chattels must show that  a person dispossessed another person of his property, or used or otherwise meddled with the person's property in a way that damaged the property."    "Trespass to chattels, therefore, is something less than outright theft;  it is more like unlawful borrowing."    "In theft, the cause of action is called 'conversion' -- the person converted your property to his own by stealing it.   The little brother of conversion is called 'trespass to chattels'."

"In the case above, the chattel was the employer's computer system, where the 'use and meddle' with the computer system and email accounts was the depleted hard drive space, the drained processing power, and the adverse effect on the other computer system resources."    The court found that the computer system was damaged.

"If a company can prove damage to its computer, Internet, or email systems, it could obtain legal relief to stop the harassment."    However, "not every unwanted email from a former employee will result in a lawsuit."   "Employers should also take proactive steps to defend themselves against cyber-harassment campaigns."

THINGS TO DO

    "Purchase Internet and email filters that stop unwanted
materials from entering their computer systems."

    "If the employee receives a severance payment, the employer
should insist on a clear non-disparagement agreement in the
release obtained for the severance payment."   "The
non-disparagement clause should clearly extend to all forms
of communication, including emails, chat rooms, instant
messaging, and all other forms of electronic communication."

    "The employer should carefully monitor any actions taken
or emails sent by the ex-employee to see if the person makes
any false statements, either in an email or elsewhere on the
Internet, that could be the basis for a defamation claim."

    "Remember the importance of disciplining and terminating
employees with fairness and honesty.
   An employee who is
given opportunities to improve his or her performance, a
thoughtful and honest explanation of why he or she was
not a good fit for the employer, and assistance in
transitioning, is much less likely to resort to such extreme
and destructive behavior.    Human Resources can play a
critical role in preventing costly and time-consuming legal
action.
"

For additional information about the business risks related to employee crimes, browse The Integrity Center, Inc.   website and feel free to call (972) 484-6140  to discuss  a particular situation that you have.   Helping you with your  Risk Management and HR Automation is what we do.


EARLIER
NEWS ITEMS
The Resume
   Problem
Immigration Reform
   Will Mean:
   Employers MUST
   Enforce
   Employment
   Eligibility
   Verification
Economic
   Espionage
Guerrilla
   Reference
   Checks
The Mobile
   Integrity
   Connection (tm)
NEW U.S.
   Law Increases
   Employer Risk
Time
   To
   Shred
Three New
   H.R. Videos
"7 Ways
   To Avoid
   Employees From
   Hell"
Form I-9 Update
   and NEW
   Form I-9 Tools
New Federal Laws
   To Consider
Access To News
   Items For HR
   And Security
   Professionals
Sarbanes-Oxley
   and
   Background
   Checking
Using
   Credit Bureau
   Reports In The
   Hiring Process
Talent Assessments
   Before Mergers
   Acquisitions
   or Investments
Vicarious
   Liability
Medical
   Identity Theft
Federal
   Civil
   Litigation
   Histories
New Items
   for HR and
   Security
   Professionals
Employers
   Offer Help
   Fighting
   I.D. Theft
Avian Flu:
   Business Thinks
   The Unthinkable
New Federal
   Rules That
   Govern Online
   Recruiting
Gaffe Shows Need
   To Screen Current
   Employees At
   Promotion Time
The
   Baby Boomer
   Exodus
Document
   Disposal Law
   Kicked In
   June 1, 2005
A New Wrinkle
   On Age Bias
Don't Let Your
   Vendors
   Compromise
   Employee
   Identity Data
Annoying Hacking
   Has Now Become
   Organized Crime
Persuading
   Your Company
   Management To
   Encourage
   Training
Mainstream Media
   FINALLY Address
   Risks Of Using
   Databases For
   Employment
   Screening
HR Automation
   Can Improve
   Company Finances
   And Innovation
Employers Beware
   The
   "Seal of Approval"
Identity
   Verification
The
   Outsourcing
   Hole
Cyber Age
   Employee Crimes
Security Risk
   From Mobile
   Media Devices
More FCRA
   Amendments
   Could Be Coming
   By Year's End
The FCRA
   Was Amended
   On 12/4/03
Physical Security
   and Information
   Security are
   Merging
Increase
   HR Productivity
Homeland
   Security
   Guidelines
Sarbanes-Oxley:
   Road To
   Compliance
WARNING
Stored Data
   Warning Signs
How to FIND,
   FIX or FIRE,
   Your POOR
   PERFORMERS
ID Verification --
   Inexpensive and
   VERY Effective
The Darkest Side
   Of Identity Theft
Companies Dig
   Deeper Into
   Executive's Pasts
Fraud And New
   Scrutiny Of
   Executives
Be Careful With
   Instant Messaging
   and Wi-Fi
STRESS
Identity
   Management
California
   Data Privacy Rule
Obtaining
   Criminal Histories
   In New York State
"The Privacy Rule"
   in HIPAA
Putting A Crimp In
   The Management
   Of Spam
New Technology
   Facilitates
   Corporate
   Espionage
Identity Theft
   Checklist
Monitoring
   Employees
The Domestic
   Security
   Enhancement Act
NEW
   Overtime
   Pay Rules
The High Cost
   Of Penny-Ante
   Scams
"Signs" That
   You Need To Do A
   Periodic Check
FTC Charges A
   Company With
   FCRA Violations
The NEW
   Integrity
   Connection (tm)
Workplace
   Safety
   Checklist
HR is Splitting
   Into Two
   Separate Parts
Keep Your Eye On
   RFID Technology
Improv At
   The Interview
Real Security
   Won't Come Easy
   Or Cheap
DOs & DON'Ts
   To Minimize
   Violence
Identity
   Theft
Snapshots of
   Federal Laws
TIPS for
   Gramm-Leach-Bliley
   Compliance
The Sarbanes -
   Oxley Act
NEW Calif.
   Background
   Checking Laws
The Benefits
   Of Online
   Job Applications
Compensation
   --- Now It's
   Getting Personal
The United States
   Security Network
Supreme Court
Limits ADA
Supreme Court Will
   Review Law On
   Age Discrimination
Management Sleaze
The Examiner (tm)
Helps You Uncover
The New Face
Of Corporate
Responsibility
The Sarbanes-Oxley
   Corporate
   Reform Law
The Corporate Spy
National Wants and
   Warrants Illegal
No Dangerous
   Jobs For Disabled
Security
   Precautions
   for Businesses
Terminating
   An Employee
Listening in an
   Interview
Arbitration
   vs.
   Litigation
Supreme Court
   Eases Rules for
   Workers Who Sue
Drug Abuse
   Statistics
The Enemy
   Within
Priority:
   Integrity
Funding Terrorism
   With
   Information Theft
Corporate America
vs.
Copyright Theft
Mental Illness
   Workplace Costs
How to
   Fire Properly
Lying
   On Resumes
Workplace
   Guidelines
   To Be Voluntary