Identity, Secure Documents & Anti- Counterfeiting. A Report By Ingenia Technology

Size: px
Start display at page:

Download "Identity, Secure Documents & Anti- Counterfeiting. A Report By Ingenia Technology"

From this document you will learn the answers to the following questions:

  • What do consumers want to make more secure?

  • Passports , licences and certificates are examples of what type of document?

  • What type of documents are driving licenses and passports?

Transcription

1 Identity, Secure Documents & Anti- Counterfeiting A Report By Ingenia Technology May 2012

2 Contents 1. Introduction 3 2. Results analysis What is a secure document? What makes a document secure? Secure documents and security checks Managing secure documents 7 3. Protecting identities 8 4. Conclusion 10 Ingenia Technology (UK) Ltd All rights reserved 2

3 1. Introduction When we think about counterfeiting it s easy to conjure up images of fake products like perfume and other luxury goods. As for our identity, these days it is very easy to think of our online identities built up over numerous services and networks. However, it would be very premature if we did not still consider physical documentation. Passports, licences and certificates remain a huge part of what makes up our identity, and as a result they remain a major target for criminals and counterfeiters. Despite the growing importance of securing our online information, physical identification documents continue to proliferate rather than recede - Frost & Sullivan s 2011 Quantative Global Forecaster report stated that the Government & ID market worldwide grew significantly last year reaching 198 million units shipped. A report from ABI Research released in March 2012 signalled that shipments of driving licences, healthcare, national ID, and voters' cards achieved year-on-year growth of 18% in These secure documents, much more than our online details, are what we use to prove conclusively who we are on a regular basis and to gain access to a range of services, provided by both public and private organisations. This importance, combined with their ubiquity, makes it easy to understand why these documents are such a target for fraudulent and criminal activity. Indeed, just to highlight the size of the problem, in April 2012 the European Parliament estimated that of the 6.5 million biometric passports in circulation in France between 500,000 and one million are false having been obtained using counterfeit documents. That caveat is hugely significant - the passports themselves are not counterfeit, but they have been obtained fraudulently with other counterfeit documents. If legitimate identification can be obtained in this way then it begs the question - what makes up our identity? Clearly our identities do not begin and end at passports. But how broadly should we cast the net? How secure is this other documentation that can be used to access trusted items like passports? Do people have faith in these documents or the security measures applied to them? Ingenia Technology (UK) Ltd All rights reserved 3

4 To answer these questions Ingenia Technology commissioned YouGov 1 to question 2,103 British adults about their experiences of secure documents, which documents they considered part of their identity, their attitudes to existing anti-counterfeiting measures and how they manage their identification documentation. This report presents those findings and also examines the anti-counterfeiting measures that are currently available for document producers and what consumers and producers can do to make their physical documentation more secure. 1 All figures, unless otherwise stated, are from YouGov Plc. Total sample size was 2103 adults. Fieldwork was undertaken between 13th - 16th April The survey was carried out online. The figures have been weighted and are representative of all UK adults (aged 18+). Ingenia Technology (UK) Ltd All rights reserved 4

5 2. Results analysis 2.1 What is a secure document? This is a fundamental question, but clearly documents that contain personal information or identification details need to be in some way secure. Unsurprisingly therefore, when asked which personal documents, from a given list, people would describe as secure, the two most popular responses were passports (68%) and driving licenses (56%). However, our research also revealed a worrying lack of faith in the security of personal documents. Given that the two documents mentioned are possibly the most common forms of identification, the fact that nearly a third of people (32%) didn t consider passports to be secure, and 44% of people didn t feel driving licenses to be secure is quite staggering. It is perhaps even more astonishing given that newer passports in particular have so many security features embedded in them, incorporating biometric security overt and covert anti-counterfeiting features and other special printing techniques 2. But these consumer doubts go further than just passports and driving licenses. Indeed 16% of people responded that they didn t consider any of the personal documents listed in figure 1 to be secure. Moreover, as you can see, only a quarter of people said that they felt their bank statement is secure and even fewer (14%) thought that their utility bill is a secure document. It isn t hard to see why they are not considered secure either when bills and statements are often simple printed documents with very few or no security features beyond corporate branding. However, these documents are regularly used to prove our identity, to gain access to services or to apply for other forms of identification like passports. Figure 1 Which, if any, of the following personal documents would you describe as 'secure'? Percentage of responses 1. Passport 68% 2. Driving license 56% 3. Birth certificate 45% 4. Bank statement 25% 5. Land registry documents 20% 6. None of these 16% 7. Utility bill 14% 8. Don t know 9% 2 Ingenia Technology (UK) Ltd All rights reserved 5

6 2.2 What makes a document secure? There are many security features that can be applied to documents, both overt and covert, so we asked our panel of consumers which of these they had most faith in when it comes to making their identification documents secure. As you can see from figure two the three most trusted features were holograms (61%), identification photos (59%) and watermarks (50%). Obviously all three of these are overt measures. Although they are perhaps the most familiar security features for consumers - featuring on passports, driving licenses and even bankcards in the case of holograms - they are also inherently the simplest for a counterfeiter to identify, pass-off in some form and fool the unwary consumer into believing the document is genuine. For well-funded and determined criminals overt measures such as these are a more obvious target than covert measures like using security inks. Perhaps the most significant statistic revealed by our research though is that a significant proportion of people do not have faith in any of the common security measures listed. As shown in figure two nearly one in ten people (9%) did not believe that any of the features listed made their identification documents secure. Figure 2 Which, if any, of the following make you feel as though identification documents (e.g. passport, driving license etc.) are secure? Percentage of responses 1. Holograms 61% 2. An identification photo 59% 3. Watermarks 50% 4. Special print techniques 43% 5. Barcode / serial numbers 38% 6. Security ink 33% 7. Official branding / logos 23% 8. None of the above 9% 9. Don t know 12% Ingenia Technology (UK) Ltd All rights reserved 6

7 2.3 Secure documents and security checks Our research also revealed more insight into the importance of personal documents beyond passports. One of the key figures to emerge was that nearly one in five people (17%) said that they had passed a security check without the use of a passport when it was assumed that one would be needed. Respondents who had passed a security check without a passport said that these incidents, where other documents may have been used, included the airport, for example security checks (11%), other border crossings by road or ferry (3% and 6% respectively), opening bank accounts (11%) or for a job-related reason such as applications and employment background checks (7%). These figures are significant not because other forms of ID are inadequate forms of identification, but because it highlights how much documents other than passports make up our identities. However, as mentioned above, despite this fact many personal documents remain very insecure. 2.4 Managing secure documents Of course another important element of document security is how they are used. Our research showed that 7% of people have had personal documents either stolen or faked. Although it is encouraging that this figure is not higher, it cannot be dismissed. So we wanted to find out more about how people manage their own documents, in particular how people dispose of their personal documents a key issue in the security of documents. When asked how they had disposed of secure documents 78% of people said they had shredded documents. Interestingly our research revealed that older people were more likely to have done so, with 84% of people over 55 shredding documents compared to just 68% of people aged between 18 and 24, potentially suggesting that younger people are not as careful with their personal identification. Despite this, a number of people admit to have either simply thrown secure documents in the regular waste (9%) or recycled with other paper waste (8%). Can document producers help consumers, especially those who do not take additional measures themselves, do more to protect their documents? Ingenia Technology (UK) Ltd All rights reserved 7

8 3. Protecting identities As valuable and important as our passport and other high level documents like driving licences are, it is clear that our identities are not defined and authenticated by these documents alone. Instead our identities span a much broader range of items. However, these other items fundamentally lack the security features that have been embedded in items like passports in recent years. Although it is encouraging that our research has not revealed it as a widespread issue, consumers documents are being targeted by criminals and falling victim to theft of information and fraudulent activity at the expense of their own identity. Although media coverage has tended to emphasise the risks posed to the online aspects of our identities in recent times, there is undoubtedly consumer awareness of the steps that can be taken to protect identification documents. Indeed our research has shown that a significant majority of people (78%) have shredded at least some of their secure documentation before disposing of it. Of course the burden of protection should not fall squarely on consumers and certainly secure document producers, particularly at the high level, have always taken steps to ensure that those documents that contain personal and sensitive data are as secure as possible. However, can more still be done to protect the all-important documents that make up our identity? The answer to that question is undoubtedly yes. Well-funded and determined criminals are always looking at ways around anti-counterfeiting measures and document producers must continue to invest in new measures to stay ahead of the counterfeiters. Of course this is not just about adding further security features to passports. It is also a matter of extending the use of anticounterfeit and security features to cover a much bigger range of documents. Multi-layered approach As the results of our research have demonstrated, there is not one singular anti-counterfeiting measure that consumers trust as a primary measure for tackling the problem of counterfeit documents. Indeed a significant number of consumers (9%) said that they don t trust any of the most common security features that we listed. There are many possible explanations for this lack of trust. For many it may be because they do not expect one measure alone to withstand all attacks. It may also be because the sophistication of techniques now available to criminals producing fake items can make it difficult at times for legitimate producers themselves to tell one of their authentic items from a fake. The key to countering this lack of trust is to deploy a number of techniques in a document to create tailored anti-counterfeit solutions to fit each specific Ingenia Technology (UK) Ltd All rights reserved 8

9 usage scenario. The overt security measures on the market, such as holograms, watermarks and security inks still have a marked value in the industry, but these must be coupled with covert technology to ensure a truly multi-layered approach to keeping the fakes at arms length. New technology Technology is being embraced across all industries to create sophisticated solutions for consumers. The pace of innovation is ever increasing and this is no different within the anti-counterfeiting space. There are now technologies, which allow products to be authenticated and identified down to unit level, without adding or taking anything away from the surface of the material. One such method is Laser Surface Authentication (LSA ), this can rapidly analyse the surface of any item and produce a unique digital serial code for the item. This code, which has been described as being like a fingerprint or DNA sequence for the item, is unique for every document, card and carton and can be used to uniquely and unambiguously authenticate and trace that item. The serial code is naturally occurring and is not added by any manufacturing step. Hence, there is no way to reproduce it. By embracing new techniques, such as LSA, document producers can ensure that they continue to stay ahead of the counterfeiters. Moreover, many of these new techniques can be incorporated cost-effectively into new sectors and documents where suppliers may not have considered embedding security features previously due to cost concerns. Ingenia Technology (UK) Ltd All rights reserved 9

10 4. Conclusion As consumers we are often preoccupied by the priorities in our life, with smaller concerns, at times, going unnoticed, this is no different when it comes to protecting our identities. We ensure we know the location of our passport at all times, and demand the tightest of security solutions to be attached, but we will not think twice about throwing our insurance renewal policy with our account numbers, address and payment details out into the street. In the anticounterfeiting market, it is often these secondary documents that receive less attention - from consumers and producers. But in many ways these documents are the most important. While we have been encouraged by some of the results of our research, it has also shown that attitudes and the reality of how secure documents are perceived and used is a much broader issue that requires serious attention from all of the stakeholders in the industry. The subject of protecting our identities across not only the main documents, but also moving towards a situation where all items that contain personal information can be traced and protected is one that needs to receive more attention than it currently does. This process is as much about education as it is implementation and legitimate suppliers need to grasp the nettle, supported by new and innovative technologies. Legitimate producers need to take the fear out of document security and instead use anti-counterfeiting measures as positive offerings for consumers - helping them to protect their identities and their personal information. Ingenia Technology (UK) Ltd All rights reserved 10

Financial capability and saving: Evidence from the British Household Panel Survey

Financial capability and saving: Evidence from the British Household Panel Survey CRS02 NOVEMBER 2010 Financial capability and saving: Evidence from the British Household Panel Survey About the Consumer Financial Education Body The Consumer Financial Education Body (CFEB) is an independent

More information

Personal Information. About you. Personal information and your identity.

Personal Information. About you. Personal information and your identity. Personal Information About you. Personal information and your identity. 213301 Keeping you safe and stopping fraud. More and more people are worried about identity theft and fraud. We re working 24/7 to

More information

Explaining the difference your project makes A BIG guide to using an outcomes approach. Sara Burns and Joy MacKeith Triangle Consulting October 2006

Explaining the difference your project makes A BIG guide to using an outcomes approach. Sara Burns and Joy MacKeith Triangle Consulting October 2006 Explaining the difference your project makes A BIG guide to using an outcomes approach Sara Burns and Joy MacKeith Triangle Consulting October 2006 Explaining the difference your project makes Stock code

More information

DOCUMENT SECURITY ISSUES

DOCUMENT SECURITY ISSUES DOCUMENT SECURITY ISSUES Part of a Series of Datacard Group White Papers for the Secure Document Issuer DESIGNING AN ID DOCUMENT FOR ENHANCED SECURITY Overview Governments today are being driven to increase

More information

Cash, tax evasion and the hidden economy. Call for evidence Publication date: 25 th November 2015 Closing date for comments: 27 th January 2016

Cash, tax evasion and the hidden economy. Call for evidence Publication date: 25 th November 2015 Closing date for comments: 27 th January 2016 Cash, tax evasion and the hidden economy Call for evidence Publication date: 25 th November 2015 Closing date for comments: 27 th January 2016 Contents 1 Introduction 3 2 What do changing trends in payment

More information

THE FUTURE OF MOBILE PAYMENTS

THE FUTURE OF MOBILE PAYMENTS THE FUTURE OF MOBILE PAYMENTS A Study of UK Consumers by Prepaid International Forum INTRODUCTION Mobile payments are an exciting new area of prepaid services that have received much hype in the media

More information

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs 1 GOVERNMENTS ADOPTING DIGITAL STRATEGIES Governments designing/operating digital ecosystems to create, transform and optimize

More information

An Executive Recruitment Game Changer?

An Executive Recruitment Game Changer? An Executive Recruitment Game Changer? There has been much talk about the role of LinkedIn in the recruitment process. It s easy to see why. It has over 300 million members, and has just reported fourth

More information

Olympic employee engagement

Olympic employee engagement Your guide to Olympic employee engagement Page 3 of 8 Olympic Games July 27 - August 12 Paralympic Games August 29 - September 9 On July 27 a six-week sporting bonanza kicks off as London 2012 begins.

More information

Lost, Stolen and Recovered Passports - LSR Team Policy

Lost, Stolen and Recovered Passports - LSR Team Policy Lost, Stolen and Recovered Passports - LSR Team Policy Purpose Overview Process Electronic LS notification Creating an LS record when an LS01 is not present Examining the LS record The LS01 form Resolving

More information

Integrated Skills in English ISE II

Integrated Skills in English ISE II Integrated Skills in English Reading & Writing exam Sample paper 4 10am 12pm Your full name: (BLOCK CAPITALS) Candidate number: Centre: Time allowed: 2 hours Instructions to candidates 1. Write your name,

More information

BIG DATA S BIG FAILURE: The struggles businesses face in accessing the information they need

BIG DATA S BIG FAILURE: The struggles businesses face in accessing the information they need BIG DATA S BIG FAILURE: The struggles businesses face in accessing the information they need Great ideas, inspired people and outstanding companies can rise or fall for all kinds of reasons. Navigating

More information

Security in а multi-device world: the customer s point of view

Security in а multi-device world: the customer s point of view the customer s point of view August, 2013 Introduction The world of digital devices is constantly changing. New gadgets, online services and applications are appearing all the time. More and more people

More information

5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper

5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper 5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business An IDology, Inc. Whitepaper No matter how big your company is or what industry you are in, every business typically

More information

Microsoft Get It Done Survey of Office Workers

Microsoft Get It Done Survey of Office Workers Microsoft Get It Done Survey of Office Workers Executive Summary and Survey Results Presented by: Harris Interactive Public Relations Research November 2013 About the Survey Survey Method This survey was

More information

PayPoint.net Gateway Guide to Identifying Fraud Risks

PayPoint.net Gateway Guide to Identifying Fraud Risks PayPoint.net Gateway Guide to Identifying Fraud Risks Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced in any form or disclosed to

More information

What Do CEOs Want From Marketing?

What Do CEOs Want From Marketing? Market Leader Issue 27, Winter 2004 www.warc.com What Do CEOs Want From Marketing? Anthony Freeling McKinsey Fiona Stewart Antennae Fran Cassidy The Cassidy Media Partnership Top of the CEO agenda is the

More information

The Future of Retirement

The Future of Retirement The Future of Retirement Generations and journeys Global The Future Report of Retirement Generations and journeys Foreword Approaches to finances Finances in retirement Practical steps Key findings Priorities

More information

Portfolio & Relationship Management in the Cloud

Portfolio & Relationship Management in the Cloud Portfolio & Relationship Management in the Cloud Software without the technology headaches White Paper by David Wilson, Director, International Sales & Marketing 23 rd May 2013 Index Can you have your

More information

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association

More information

Evaluation of the first year of the Inner North West London Integrated Care Pilot. Summary May 2013. In partnership with

Evaluation of the first year of the Inner North West London Integrated Care Pilot. Summary May 2013. In partnership with Evaluation of the first year of the Inner North West London Integrated Care Pilot Summary May 2013 In partnership with 2 The North West London Integrated Care Pilot is a large-scale programme incorporating

More information

UNDER AGE & PROXY SALES: A GUIDE FOR LICENSEES

UNDER AGE & PROXY SALES: A GUIDE FOR LICENSEES UNDER AGE & PROXY SALES: A GUIDE FOR LICENSEES Produced by the Thames Valley Police Licensing Team September 2011 2 c o n t e n t s introduction 4 page under age sales 5 challenge policies 5 refusal logs

More information

The future of charitable donations

The future of charitable donations The future of charitable donations Contents 3 Introduction 4 Section one: How are donations being made? 5 Who are donations coming from? 6 Assessing the digital preferences of donors 7 Section two: Breaking

More information

A guide to basic bank accounts

A guide to basic bank accounts A guide to basic bank accounts Information about basic bank accounts It is our policy to pay Housing Benefit directly into a bank account. This type of payment is called a BACS payment. In order for us

More information

RSA Adaptive Authentication For ecommerce

RSA Adaptive Authentication For ecommerce RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers

More information

Token Security or Just Token Security? A Vanson Bourne report for Entrust

Token Security or Just Token Security? A Vanson Bourne report for Entrust Token Security or Just Token Security? A Vanson Bourne report for Entrust Foreword In 2011, Entrust Inc., an identity-based security company, partnered with respected technology research firm Vanson Bourne

More information

Staff Training ALCOHOL SALES It is important all staff know the four licensing objectives

Staff Training ALCOHOL SALES It is important all staff know the four licensing objectives Staff Training ALCOHOL SALES It is important all staff know the four licensing objectives PUBLIC SAFETY PROTECTION OF CHILDREN FROM HARM PREVENTION OF PUBLIC NUISANCE PREVENTION OF CRIME AND DISORDER This

More information

Egg and sperm donation in the UK: 2012 2013

Egg and sperm donation in the UK: 2012 2013 Egg and sperm donation in the UK: 2012 2013 Contents Introduction 2 Background to this report 2 Terms and acronyms used in this report 4 Methodology 5 How we gathered the data 5 Understanding the data

More information

Office of the Privacy Commissioner of Canada. Identity Theft and You

Office of the Privacy Commissioner of Canada. Identity Theft and You Office of the Privacy Commissioner of Canada Identity Theft and You There have always been scammers who pose as somebody else to carry out fraudulent activities. With today s proliferation of technology,

More information

Draft Guidance: Non-economic Regulators: Duty to Have Regard to Growth

Draft Guidance: Non-economic Regulators: Duty to Have Regard to Growth Draft Guidance: Non-economic Regulators: Duty to Have Regard to Growth January 2014 Purpose of this document The duty to have regard to the desirability of promoting economic growth (the growth duty )

More information

Using QR codes to track and identify counterfeit products

Using QR codes to track and identify counterfeit products perspective Using QR codes to track and identify counterfeit products Abstract The development of a new product or technology always comes with the risk of counterfeiting, something that could affect company

More information

Fraud Prevention and Detection for Credit and Debit Card Transactions

Fraud Prevention and Detection for Credit and Debit Card Transactions August 2009 Fraud Prevention and Detection for Credit and Debit Card Transactions Richard Collard Senior Business Lead and SME - Market Development ILOG, Software Sales, IBM Sales and Distribution Page

More information

The Future of Network Security Sophos 2012 Network Security Survey

The Future of Network Security Sophos 2012 Network Security Survey The Future of Network Security Sophos 2012 Network Security Survey Sophos and Vanson Bourne surveyed 571 IT decision makers globally to gain a deeper understanding of how IT teams are responding to technology

More information

Identity Fraud: What about the Victim?

Identity Fraud: What about the Victim? Identity Fraud: What about the Victim? Research Findings Tim Pascoe Katy Owen Gemma Keats Martin Gill March 2006 Perpetuity Research & Consultancy International (PRCI) Ltd 148 Upper New Walk Leicester

More information

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority MEMBER IDENTITY PROTECTION Protect Your Identity Security of Personal Information is Our Top Priority Imagine this Unexpectedly, you get turned down for a loan, you get a call from a collection agency

More information

Outsourcing of services or in-house staff?

Outsourcing of services or in-house staff? Chapter 5 Outsourcing of services or in-house staff? Reasons to outsource services Outsourcing services can be a very emotive subject as you are dealing with the livelihoods of your staff. It must always

More information

2011 municipal and county council elections

2011 municipal and county council elections Important voter information 2011 municipal and county council elections Election day is 12 September. Remember to bring ID! English engelsk 2011 municipal and county council elections The municipal council

More information

The Power of Protection. Confidence in the future. Global Report

The Power of Protection. Confidence in the future. Global Report The Power of Protection Confidence in the future Global Report 2 The Power of Protection Confidence in the future Contents 4 Foreword 6 Key findings 8 A positive outlook 10 Planning for the future 14 Sufficiently

More information

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products David M. Dreyfus Justin A. Heinonen Rod Kinghorn A-CAPP Backgrounder October 2013 Supply chain management can be the

More information

When being a good lawyer is not enough: Understanding how In-house lawyers really create value

When being a good lawyer is not enough: Understanding how In-house lawyers really create value When being a good lawyer is not enough: Understanding how In-house lawyers really create value Contents Foreword... 3 Do you really understand how In-house lawyers create value?... 4 Why creating value

More information

Choosing the right data collection mode. for a changing. research landscape

Choosing the right data collection mode. for a changing. research landscape Choosing the right data collection mode New considerations for a changing research landscape Pete Cape, Global Knowledge Director, SSI Online, the most popular research methodology worldwide is certainly

More information

Biometrics for payments. The use of biometrics in banking

Biometrics for payments. The use of biometrics in banking Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,

More information

Parents views: A survey about speech and language therapy

Parents views: A survey about speech and language therapy Parents views: A survey about speech and language therapy 1 Executive summary NDCS carried out a survey to find out what parents think about the speech and language therapy services that their children

More information

The Hidden Dangers of Public WiFi

The Hidden Dangers of Public WiFi WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect

More information

SMALL BUSINESS REPUTATION & THE CYBER RISK

SMALL BUSINESS REPUTATION & THE CYBER RISK SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to

More information

UK - New licence Requirements for Overseas Gambling Operators by Marcos Charif

UK - New licence Requirements for Overseas Gambling Operators by Marcos Charif And the New Year s Resolution for 2010 is New licence Requirements for Overseas Gambling Operators The Gambling Act 2005 (the Act) came into force in 2007 and was hailed as a model for the rest of the

More information

Privacy, Identity, And Security: A Spotlight On Why Insurance Companies Should Offer Identity Theft Solutions

Privacy, Identity, And Security: A Spotlight On Why Insurance Companies Should Offer Identity Theft Solutions A Thought Leadership Spotlight September 2014 Commissioned By LifeLock Privacy, Identity, And Security: A Spotlight On Why Insurance Companies Should Offer Identity Theft Solutions Results Focusing on

More information

OUTLOOK VIEWS OF OUR PROFESSION. Winter 2014 15

OUTLOOK VIEWS OF OUR PROFESSION. Winter 2014 15 HR OUTLOOK VIEWS OF OUR PROFESSION Winter 2014 15 The CIPD is the professional body for HR and people development. The not-for-profit organisation champions better work and working lives and has been setting

More information

Shredding. Security. Recycling

Shredding. Security. Recycling Shredding Security Recycling WHO WE ARE PHS Datashred has the knowledge, capability and experience to ensure the safe and secure disposal of your confidential material. Trusted by over a third of FTSE

More information

FEELING VULNERABLE? YOU SHOULD BE.

FEELING VULNERABLE? YOU SHOULD BE. VULNERABILITY ASSESSMENT FEELING VULNERABLE? YOU SHOULD BE. CONTENTS Feeling Vulnerable? You should be 3-4 Summary of Research 5 Did you remember to lock the door? 6 Filling the information vacuum 7 Quantifying

More information

TAXREP 01/16 (ICAEW REP 02/16)

TAXREP 01/16 (ICAEW REP 02/16) TAXREP 01/16 (ICAEW REP 02/16) January 2016 ICAEW research survey: HMRC Customer Service Standards 2015 Results of the ICAEW 2015 research survey among ICAEW smaller agents about HMRC service standards.

More information

Changes in Schengen visa application process

Changes in Schengen visa application process Changes in Schengen visa application process As part of the worldwide introduction of the Visa Information System (VIS) 1, the Schengen States will launch the VIS in India (and in the neighbouring countries

More information

A simple tscheme guide to securing electronic transactions

A simple tscheme guide to securing electronic transactions A simple tscheme guide to securing electronic transactions 1 A simple tscheme guide to securing electronic transactions Electronic Transactions An electronic transaction is best thought of as a type of

More information

Office 365 Adoption & Risk Report

Office 365 Adoption & Risk Report Office 365 Adoption & Risk Report 2016 Q2 Table of Contents INTRODUCTION...2 MICROSOFT S LAND AND EXPAND STRATEGY...3 A DEEPER LOOK AT CONSUMPTION BY APPLICATION AND INDUSTRY...7 INSIDER THREATS AND COMPROMISED

More information

Guide to Media Evaluation. 1. What is the purpose of Media Evaluation? 2. What forms can it take?

Guide to Media Evaluation. 1. What is the purpose of Media Evaluation? 2. What forms can it take? Guide to Media Evaluation 1. What is the purpose of Media Evaluation? Good strategic management of corporate and marketing communication requires clear vision, planning and review. Effective communication

More information

International IPTV Consumer Readiness Study

International IPTV Consumer Readiness Study International IPTV Consumer Readiness Study Methodology The Accenture International IPTV Study is based on structured telephone interviews using a standard questionnaire and quantitative analysis methods

More information

IMPLEMENTING BUSINESS CONTINUITY MANAGEMENT IN A DISTRIBUTED ORGANISATION: A CASE STUDY

IMPLEMENTING BUSINESS CONTINUITY MANAGEMENT IN A DISTRIBUTED ORGANISATION: A CASE STUDY IMPLEMENTING BUSINESS CONTINUITY MANAGEMENT IN A DISTRIBUTED ORGANISATION: A CASE STUDY AUTHORS: Patrick Roberts (left) and Mike Stephens (right). Patrick Roberts: Following early experience in the British

More information

Track and trace solution for returnable asset management

Track and trace solution for returnable asset management Track and trace solution for returnable asset management An industry whitepaper 3960 Fabian Way Palo Alto, CA 94303 650-397- 2550 www.frequentz.com Copyright 2014 Frequentz. All rights reserved. Returnable

More information

BPM 2015: Business Process Management Trends & Observations

BPM 2015: Business Process Management Trends & Observations BPM 2015: Business Process Management Trends & Observations 1 I BPM 2015: Business Process Management Trends & Observations BPM 2015: Business Process Management Trends & Observations Executive Summary

More information

CE Marking. Caveat Emptor Buyer Beware

CE Marking. Caveat Emptor Buyer Beware CE Marking November 2012 ANEC-SC-2012-G-026final The European Association for the Co-ordination of Consumer Representation in Standardisation Av. de Tervueren 32, box 27 B-1040 Brussels, Belgium - phone

More information

Card Not Present Fraud Webinar Transcript

Card Not Present Fraud Webinar Transcript Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share

More information

What impact will automatic enrolment have on small businesses?

What impact will automatic enrolment have on small businesses? What impact will automatic enrolment have on small businesses? Enrolsme White Paper March 2015 Enrolsme: a quick, simple, online workplace pension solution for small businesses and charities. Contents

More information

Different nonprofits devote different

Different nonprofits devote different Is Grant Proposal Writing a Fundraising Expense? by Mark A. Hager Editors Note: Detailed information on nonprofit organizations and their finances has never been more readily available. Nonprofit organizations

More information

STRATEGIC PLANNING TEN-STEP GUIDE. Planning is a critical component of good business and good management of business.

STRATEGIC PLANNING TEN-STEP GUIDE. Planning is a critical component of good business and good management of business. STRATEGIC PLANNING TEN-STEP GUIDE THE IMPORTANCE OF PLANNING Planning is a critical component of good business and good management of business. Planning helps assure that a business remains relevant and

More information

Why you MUST protect your customer data

Why you MUST protect your customer data Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are

More information

Using Managed Print Services to Improve Document Security

Using Managed Print Services to Improve Document Security Using Managed Print Services to Improve Document Security A Staples, Inc. White Paper September 2012 Using Managed Print Services to Improve Document Security By Staples Technology Solutions Summary Keeping

More information

Qualitative Research and Advisory Panel Meetings Outputs Executive Summary

Qualitative Research and Advisory Panel Meetings Outputs Executive Summary Qualitative Research and Advisory Panel Meetings Outputs Executive Summary A comparethemarket.com, supported by The University of Sheffield, report on the issue of inertia across the UK #wheresyourheadat?

More information

Writing a degree project at Lund University student perspectives

Writing a degree project at Lund University student perspectives 1 Writing a degree project at Lund University student perspectives Summary This report summarises the results of a survey that focused on the students experiences of writing a degree project at Lund University.

More information

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office:

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office: 2009 1 City of Geneva Policy Number: Effective Date: Last Revised Date: Responsible Office: 1.0 April 28, 2009 April 27, 2009 Tammy Shuttleworth Status: Draft Under Review Approved Obsolete IDENTITY THEFT

More information

An Oracle White Paper July 2010 U.S. CARD FRAUD

An Oracle White Paper July 2010 U.S. CARD FRAUD An Oracle White Paper July 2010 U.S. CARD FRAUD Contents Card fraud can be placed into six categories:... 3 2 Card fraud costs the U.S. card payments industry an estimated US$8.6 billion per year. Although

More information

the future of digital trust

the future of digital trust the future of digital trust A European study on the nature of consumer trust and personal data September 2014 2 the future of digital trust my data value As outlined in the first instalment of The Future

More information

European SME Export Report. Export / import trends and behaviours of SMEs in Europe

European SME Export Report. Export / import trends and behaviours of SMEs in Europe European SME Export Report Export / import trends and behaviours of SMEs in Europe July 2015 < 2 > Introduction Small and medium-sized enterprises (SMEs) play a fundamentally important role in Europe's

More information

Cutting Paper: The SME FD's Guide to Document Management. A White Paper by Pegasus Software

Cutting Paper: The SME FD's Guide to Document Management. A White Paper by Pegasus Software Cutting Paper: The SME FD's Guide to Document Management Understanding the challenge Research 1 commissioned by Pegasus Software highlights that slow economic recovery combined with a steep increase in

More information

THE STATE OF THE New ECONOMY

THE STATE OF THE New ECONOMY THE STATE OF THE New Zealand DIGITAL ECONOMY October 2012 CONTENTs EXECUTIVE SUMMARY 2 EXPANDING THE DIGITAL ECONOMY 3 THE PROMISE OF THE DIGITAL ECONOMY 5 CLOUD COMPUTING: THE BENEFIT OF NEW TECHNOLOGIES

More information

Data & Analytics Survey

Data & Analytics Survey FROM ID G 2016 Data & Analytics Survey Exclusive Research from IDG Enterprise Data and Analytics Survey 2016 Big Data and Its Use Cases Keep Growing Companies still consider data-driven initiatives potentially

More information

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities

More information

Responsibility Deal between Government and the waste and resource management sector. June 2011

Responsibility Deal between Government and the waste and resource management sector. June 2011 www.defra.gov.uk www.esauk.org Responsibility Deal between Government and the waste and resource management sector June 2011 Department for Environment, Food and Rural Affairs Nobel House 17 Smith Square

More information

LIVE STREAMING VIDEO FOR BRANDS AND RETAILERS

LIVE STREAMING VIDEO FOR BRANDS AND RETAILERS LIVE STREAMING VIDEO FOR BRANDS AND RETAILERS A RESEARCH REPORT Conducted by Brandlive, Inc. FEBRUARY 2016 www.yourbrandlive.com Copyright 2016 Brandlive, Inc. TEL 866 532 2154 HQ 1941 NW QUIMBY STREET

More information

Six top tips for travel managers to create savings in 2015

Six top tips for travel managers to create savings in 2015 Six top tips for travel managers to create savings in 2015 E-Guide 2 Introduction Savings remain a key focal point for Travel Managers in 2015 and through regular reviews and analysis, using management

More information

TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS. Mary Olson, Senior Marketing Manager, Citizen Solutions

TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS. Mary Olson, Senior Marketing Manager, Citizen Solutions TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS Mary Olson, Senior Marketing Manager, Citizen Solutions INTRODUCTION Government organizations are regularly challenged

More information

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED ONLINE AND MOBILE BANKING, YOUR RISKS COVERED WITH KASPERSKY FRAUD PREVENTION ONLINE AND MOBILE BANKING, YOUR RISKS COVERED WITH KASPERSKY FRAUD PREVENTION Financial fraud is a serious risk with damaging

More information

Discover Germany s Electronic Passport

Discover Germany s Electronic Passport Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize

More information

Why Use Tideway s Final Salary Pension Transfer Advice

Why Use Tideway s Final Salary Pension Transfer Advice Tideway Why Use Tideway s Final Salary Pension Transfer Advice June 2015 Why Use Tideway Specialist Final Salary Transfer Advisers Taking a final salary pension transfer is a complex irreversible transaction

More information

Informing the audit risk assessment Enquiries to those charged with governance Calderdale Council. Year ended 31 March 2013

Informing the audit risk assessment Enquiries to those charged with governance Calderdale Council. Year ended 31 March 2013 Informing the audit risk assessment Enquiries to those charged with governance Calderdale Council This version of the report is a draft. Its contents and subject matter remain under review and its contents

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions Fighting Identity Fraud with Data Mining Groundbreaking means to prevent fraud in identity management solutions Contents Executive summary Executive summary 3 The impact of identity fraud? 4 The forgery

More information

A guide to. basic bank and credit union accounts

A guide to. basic bank and credit union accounts A guide to basic bank and credit union accounts Information about basic bank and credit union accounts It is our policy to pay Housing Benefit directly into a bank or credit union account. This type of

More information

LONDON S CULTURAL TOURISTS

LONDON S CULTURAL TOURISTS LONDON S CULTURAL TOURISTS CONTENTS Overview 4. SECTION 01 About this research 6. SECTION 02 Visits to London 9. SECTION 03 Factors of influence 13. SECTION 04 Cultural itineraries 16. SECTION 05 Popular

More information

In 2014 China to Crack Down More on Foreign Corruption

In 2014 China to Crack Down More on Foreign Corruption LAW OFFICES OF DAVID D. MURRAY 1300 Bristol Street North, Suite 100 Newport Beach, CA 92660 Tel: +(1)(949) 833-8021 Email: davidmurraylawyer@gmail.com Web: www.inteconlaw.com In 2014 China to Crack Down

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Sample Discussion Questions for Group Reflection on your Data Sample Needs Assessment Report Outline Sample Recommendations

Sample Discussion Questions for Group Reflection on your Data Sample Needs Assessment Report Outline Sample Recommendations What will I find in this section of the toolkit? Toolkit Section Introduction to the Toolkit Assessing Local Employer Needs Market Sizing Survey Development Survey Administration Survey Analysis Conducting

More information

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world

More information

Examiner s report F8 Audit & Assurance December 2014

Examiner s report F8 Audit & Assurance December 2014 Examiner s report F8 Audit & Assurance December 2014 General Comments The examination consisted of twelve objective test questions in Section A, worth 20 marks and six questions in Section B worth 80 marks.

More information

How To Find Out What People Think About Hipaa Compliance

How To Find Out What People Think About Hipaa Compliance Healthcare providers attitudes towards HIPAA compliance in 2015 Created July, 27 2015 Healthcare providers attitudes towards HIPAA compliance in 2015 Over the course of this last year the healthcare industry

More information

TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT

TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT Would you rather know the presumed status of the henhouse or have in-the-moment snapshots of the fox? If you prefer to use a traditional

More information

Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target.

Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target. White Paper Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target. Research provided by Javelin Strategy & Research February 2010 Risk Solutions Financial

More information

Evidence of Identity: Breeder Documents and Beyond Barry J. Kefauver International national Standards ds Organization ation Why Care? A false passport in the hands of a terrorist is as dangerous as a bomb

More information

What are the key current issues shaping equity release by older home owners?

What are the key current issues shaping equity release by older home owners? What are the key current issues shaping equity release by older home owners? Round table discussion November 7th 2012 About this project Focus today on equity release but a bigger picture. Initial proposal

More information

Despite Widespread Concerns about Online Security, Three in Four Adults Access Financial Accounts Online

Despite Widespread Concerns about Online Security, Three in Four Adults Access Financial Accounts Online Despite Widespread Concerns about Online Security, Three in Four Adults Access Financial Accounts Online Nine in Ten Say Companies Should Be Doing More to Protect Personal and Financial Information Online

More information

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Sponsored

More information