Skip top navigation Skip to content

Print   Email  Share

Figure 1 - Identity Theft Risk Analysis Matrix

    Risk of Harm - Data Involved
    Non-Sensitive
PII
DOB w/POB
Medical
SSN Credit Card or
Bank Account
Background or HR File
Likelihood of Unauthorized Access - Controls Involved HIGHER RISK 
No Controls No Letter
No Credit Monitoring
Core Mgmt Team Decision Needed Letter
Offer Credit Monitoring
Letter
Offer Credit Monitoring
Letter
Offer Credit Monitoring
Physical Controls No Letter
No Credit Monitoring
Letter
No Credit Monitoring
Core Mgmt Team Decision Needed Letter
Offer Credit Monitoring
Letter
Offer Credit Monitoring
Password No Letter
No Credit Monitoring
Letter
No Credit Monitoring
Core Mgmt Team Decision Needed Letter
Offer Credit Monitoring
Letter
Offer Credit Monitoring
Moderate Encryption
(non FIPS 140-2)
No Letter
No Credit Monitoring
No Letter
No Credit Monitoring
Core Mgmt Team Decision Needed Letter
Offer Credit Monitoring
Letter
Offer Credit Monitoring
Strong Encryption
(FIPS 140-2)
No Letter
No Credit Monitoring
No Letter
No Credit Monitoring
Letter
No Credit Monitoring
Core Mgmt Team Decision Needed Core Mgmt Team Decision Needed
Multiple Secure Controls No Letter
No Credit Monitoring
No Letter
No Credit Monitoring
No Letter
No Credit Monitoring
Letter
No Credit Monitoring
Core Mgmt Team Decision Needed
LOWER RISK