One of the first things you hear about offshoring is that it would increase the potential for data theft. Let us assess this perception in a common sense way. When we talk about any "increase" we have to say compared to what. In this case the CPA has to assess the data security for on-shore operations before he can assess the increased risk posed by offshoring. What is the typical level of data security in a small business or a CPA office? Since there are few staff members, there is little separation of duties. Such lack of separation encourages internal security problems. The data resides in paper files. Paper files are vulnerable to fire and water damage. The office is not physically secure. Staff members, leasing office personnel, and janitors have keys to the office. Any of them can copy confidential data. Paper records are not shredded before being discarded. The computers have no protection from unauthorized users or have relatively weak password control. Often the password is taped to the workstation. Any email communication is done in the clear. Workstations have recording devices which makes it easy to copy data. Usually all workstations have email and internet access. It makes unauthorized transmission of data easy. Let us look at how these factors change when accounting is sent offshore. Internal control improves because the people who are authorizing the transactions are separated from the people doing the record-keeping. All files are maintained electronically. Such data is backed up to an off-premises secure server. So threats from fire, water, and copying are significantly reduced. Offshore contractors restrict physical access to keep unauthorized people out. Workstations have access to only the data that is processed on that workstation. Email communications are encrypted. All recording devices on the workstations are disabled. Only supervisors have access to email and internet. We believe that best security practices can be installed when the client, the CPA, and the offshore contractor work together. The first line of responsibility lies with the client. Technical solutions are not enough. They must be combined with good practices in everyday management of the company. The CPA should advise the client to implement the common sense measures advocated in this pamphlet. The offshore contractor must apply the same real world as well as technical solutions to security. The offshore contractor must consider the sensitivity of the data being entrusted to them and take appropriate measures to safeguard the information. A responsible contractor would only accept data than is essential to the task. Let us now look at whether popular offshore destinations like India are more vulnerable to data theft. According to a March 2007 Symantec report entitled Symantec Internet Security Threat Report Trends for July- December 2006, US was the country with highest level of malicious activity. China was next and India did not make it into the top ten. Another common sense conclusion one can draw is that the thieves concentrate on high value targets. During 2005, 2006, through June 20, 2007 they reported 155 million records having been compromised. Out of that less than 1000 records were compromised in attacks that netted 100 records or less. Thus records from an offshore contractor serving small businesses are less likely to be a target of identity thieves. The CPA needs to assess the sensitivity of the data and put a value on it. The CPA can have the contractor include a liquidated damages clause if the said data is compromised. If the contractor is not willing to agree to a reasonable liquidated damage figure, find another contractor. Data security is a complex issue. However, we can enunciate certain principles that can be applied by a small business: Collect the least amount of data needed to serve the customer. Since a large proportion of data theft involves the employees, screen them carefully. In addition, the employees need to be trained to recognize various strategies used by criminals to facilitate data theft. Take security measures in the office; for example use a locked mailbox, lock the office when it is empty even for a short period of time, shred any paper records before disposal, reformat hard drives before donating, selling, or returning a computer etc. Take common sense precautions against cyber attacks. Encrypt the sensitive data, use firewalls, and keep your internet security software updated. Comply with any specific security standards that are applicable to your business. For instance credit card information needs to be secured to a specific standard. Providing security costs time and money. In a competitive world no business can spend more on security than what the market would pay for. Ultimately security is determined by the customers? willingness to pay. While more money can buy more security, one must remember that no security is absolute. Just think about how many times classified information has been stolen from the US government. Eventually there will be a security breach. How do you deal with such a breach? It seems that the best approach is to inform the individuals or businesses whose data have been compromised, notify the law enforcement authorities, and support the affected parties to monitor their credit reports. Security is a multi-faceted problem. The key to success is co-operation between the client, the CPA, and the offshore contractor. No one party can be effective without the others. Financial directory
Subscribe to:
Post Comments (Atom)
-
►
2012
(1)
- ► February 2012 (1)
-
►
2009
(26)
- ► March 2009 (10)
- ► February 2009 (8)
- ► January 2009 (8)
-
▼
2008
(146)
- ► December 2008 (9)
- ► November 2008 (3)
- ► October 2008 (12)
- ► September 2008 (5)
- ► August 2008 (6)
-
▼
April 2008
(88)
- How Expansion Score Can Help You?
- Is it Possible to Overcome Credit Card Debt?
- Compare Mutual Funds with these Key Statistics
- Credit Cards with Tempting Perks
- Terminal Wealth Dispersion, Life Expectancy and In...
- Identity Theft Issue: Company Posing as Another Co...
- A common sense approach to data security as applie...
- Credit Repair Myths and Truth
- Benefit From Business Credit Card Terms
- Turkish Mortgage Update
- Design a Credit Card Deal for Your Needs with Capi...
- New Opportunities in Emerging Countries
- New Year's Investment Resolutions
- How to ride out an economic downturn
- Take a Chance to Build Good Credit History
- Investment Diversification with Mutual Funds
- Loans with No Credit Check - Need of the Time
- Cash Back Credit Cards Are a Good Bet
- Credit card
- Sport is Better With Credit Cards
- Is It Easy to Establish Credit History?
- Store Credit Cards - Are They So Profitable?
- Save Your Time with Instant Approval Credit Cards
- Stock Tips
- Credit Cards Can Help to Decrease Grocery Spending
- Gift Credit Cards - a Universal Present for Everyone
- Credit Cards and Credit History
- Get fast & cheap loans at 0.5% interest rate
- Credit Cards and Savings Plan for Being Well-Educated
- Knowing Some Basics Concerning the Foreign Exchang...
- Where Credit Cards Came from
- Earn Free Hotel Stays with Hotel Rewards Credit Cards
- Florida Mobil Home Mortgage Lenders?
- What Are the Main Credit Card Mistakes?
- Free Online Forex Trading Course
- Is It Easy to Choose the Right Credit Card?
- What is a log book loan?
- A Credit Card Deal with Coffee Flavor
- Secured Loan - How the Recent Credit Crunch has Ef...
- Improving Your Financial Situation With Investment...
- The Importance of Reading Credit Card Terms and Co...
- Investing in the United States and Obtaining a Gre...
- Structured Trade Finance - How It Helps Your Busin...
- Should You Really Worry about Getting Identity The...
- Business Software free of charge - Legally
- The Role of Collateral Managers in Trade Finance
- Importance of Trade Finance & Structured Trade Fin...
- Credit Freeze and Identity Theft
- Restore Your Credit History with Bad Credit Credit...
- Smart Cars Credit Cards
- Credit Cards for Charity
- Balance Transfer Credit Cards Help to Improve Your...
- Six Reasons That Can Stop You From Credit Card App...
- New business linkages in India indicate growing en...
- Make Efforts to Protect Your Identity!
- Ways To Manage Your Credit
- What To Do If You're Having Money Problems
- Ways to Pay Down Your Debt
- Money And Your Family: Good Financial Habits
- Investment Strategies: Saving For College
- Investment Strategies: Buying A Car
- How To Set Up And Stick To A Simple Budget
- How To Choose A Financial Planner
- Five Ways To Keep Good Credit
- Avoid Financial Mistakes in a Divorce
- Too young to have a credit card?
- An example of a letter of credit financing using w...
- Developing Warehouse Receipts in Emerging Market C...
- Credit Card Applications Versus Traditional Loans
- Investment banks
- Credit Card Aiming Environmentally Concerned Custo...
- How You Can Benefit From Rewards Credit Cards
- Factors of High Oil Prices
- The role of commodity brokers and futures exchange...
- Loan for all single parent in USA
- Loan offer to those who need loan
- Strategic application of Offshoring in a CPA Practice
- Automated Trading Systems for Financial Markets a...
- Teenagers - The Latest Victims Of Online Identity ...
- Techniques to Diversify Portfolio
- Understanding Loan Amoritization
- Cheap Car Insurance Companies - Where to Find Them
- How to Control Your Debt
- VectorVest trial for european investors
- Charter Capital Forms
- Phishing Baits - Is Someone Phishing for You?
- Bad Credit Cash Advance
- Small Business Start Up Loan For Women
No comments:
Post a Comment