Marketing Essentials 2012

Chapter 34: Risk Management

eMarketing Feature

Phishing and Identity Theft
Phishing is obtaining personal information from individuals via the Internet of by telephone and using it for illegitimate purposes. Phishing often involves an e-mail sent from what appears to be a legitimate company that requests an individual to update his or her account information. The data collected through phishing is often used for identity theft. Identity theft is stealing a person's personal data such as social security number, telephone, address, credit card number, and other information. The Federal Trade Commission's Web site provides consumers and businesses with suggestions and regulations for identity theft protection and protocol.

Innovate and Create
Part of risk management involves preventing cyber-thieves from gaining access to customers' records. Businesses are required to implement Identity Theft Prevention Programs. The Federal Trade Commission publishes a guideline called "Red Flags Rule" and provides an online template to help businesses comply. Have students visit the FTC's Web site to review the "Red Flags Rule" template. Have students assume they work for an online business that takes phone orders, such as a gift basket company or online florist. Have students work in groups to complete the Red Flags Rule compliance template for a specific online business that takes phone orders.

Glencoe Online Learning CenterMarketing HomeProduct InfoSite MapContact Us

The McGraw-Hill CompaniesGlencoe