SlideShare uma empresa Scribd logo
1 de 38
With  Dan Cassin,  CITRMS
[object Object],[object Object],[object Object],[object Object],[object Object],Corporate Counsel, March 30, 2005
[object Object],[object Object],[object Object],[object Object],Corporate Counsel, March 30, 2005
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What we will cover the next few minutes
BLR:  Business and Legal Reports BY: Douglas, Hottle, Meyer, Unkovic & Scott “ A rise in identity theft is presenting businesses with a major headache”,   Employers are being held liable for identity theft (by employees) that occurs in the workplace. Identity Theft is the misuse or fraudulent use of an individual’s personal information.  Unfortunately for employers, personal data such as social security, drivers license and bank account numbers is precisely what is contained in HR files, a goldmine for ID thieves.   9/19/2006
[object Object],[object Object],[object Object]
Drivers  License Medical Info Financial or Credit Identity Theft is not just about Credit Cards! It is a Legal Issue! ID Theft is an international crime and access to an attorney may be critical  Social  Security Character /Criminal Five Common Types  of Identity Theft
Once the credit systems accept bad data it can be next to impossible to clear. USAToday June 5, 2007 Medical identity theft can impair your health and finances… and detecting this isn’t easy… and remedying the damages can be difficult. WSJ Oct 11, 2007 Because it is so overwhelming to correct the victims’ records it is imperative for businesses to protect the data. Where the law  becomes  logical
The Cost to Businesses ,[object Object],[object Object],[object Object],*CIO Magazine,  The Coming Pandemic , Michael Freidenberg, May 15 th , 2006
Why should all Executives/Owners of businesses, corporations, schools, financial institutions, hospitals and governmental bodies be concerned about Identity Theft, Data Security  FACTA-Red Flag Rules , GLB Safeguard Rules, and State Legislation? Answer:  Liability, both civil and criminal. Should I be concerned about ID Theft?
[object Object],[object Object],[object Object],[object Object],Important Legislation Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
Fair and Accurate Credit Transactions Act (FACTA) Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],(New rules are substantive and impose additional new requirements effective January 1, 2008)
[object Object],[object Object],[object Object],[object Object],[object Object],Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You FACTA-Identity Theft Red Flag Rules   (Effective Jan. 1, 2008; Mandatory compliance by Nov. 1, 2008)
[object Object],[object Object],[object Object],[object Object],FACTA-Identity Theft Red Flag Rules   (Effective Jan. 1, 2008; Mandatory compliance by Nov. 1, 2008) Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
[object Object],[object Object],[object Object],[object Object],[object Object],Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You FACTA-Identity Theft Red Flag Rules   (Effective Jan. 1, 2008; Mandatory compliance by Nov. 1, 2008)
If an  Employer  obtains, requests or utilizes  consumer reports or investigative consumer reports  for hiring purposes/background screening,  then the Employer is subject to FCRA requirements. www.ftc.gov/os/statutes/031224fcra.pdf Fair Credit Reporting Act (FCRA) Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Gramm, Leach, Bliley  Safeguard Rules Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
Applies to any Organization Including : ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* The FTC categorizes an impressive list of businesses as FI and these so-called “non-bank” businesses comprise a huge array of firms that may be unaware they are subject to GLB. Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You FACTA-Red Flag Rule & Gramm,  Leach, Bliley Safeguard Rules
[object Object],[object Object],[object Object],[object Object],[object Object],FACTA Red Flag Rules  and   the GLB Safeguard Rules Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
[object Object],[object Object],[object Object],FTC Guide Protecting Personal Information  A Guide For Business
ABA Journal March 2006
[object Object],- “Stolen Lives”, ABA Journal, March 2006
Law Firms Are Trolling for Victims Do you suspect that a large corporation or your employer has released your private information   (through an accident or otherwise)?  If you are one of many thousands whose confidential information was compromised,  you may have a viable class action case against that company. Contact an attorney at the national plaintiffs' law firm of Lieff Cabraser to discuss your   case . Lieff Cabraser defends Americans harmed by corporate wrongdoing.  Instead of losing our identities one by one, we're seeing criminals grabbing them in massive chunks -- literally millions at a time.
Why and How We Help You… ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Affirmative Defense Response System
1.  Mandatory Meeting Letter What We Do
2.  Appoint a    Security Compliance Officer   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What We Do
3.  ID Theft Plan   & Sensitive &   Non Public Information Policy What We Do (First of four pages)
4.  Reduce Company Losses * Subject To Terms And Conditions ,[object Object],[object Object],[object Object],[object Object],[object Object],What We Do Life Events Legal Plan  &  Legal Shield Monitoring Services Restoration Services
If a number of your employees get notified of improper usage of their identities, this may act as an early warning system to your company of a possible internal breach which could further reduce your losses. 5.  Potential Early Warning System What We Do
BLR: “Provides an Affirmative Defense for the company.” 6.  Provide an Affirmative Defense “ One solution that provides an affirmative defense   against potential fines, fees, and lawsuits  is to offer . . .  identity theft protection  as an employee benefit.  An employer can choose whether or not to pay for this benefit .  The key is  to make the protection available, and  have a mandatory employee meeting on identity theft  and  the protection you are making available, similar to what most employers do for health insurance …  Greg Roderick, CEO of Frontier Management, says that his employees "feel like the company's valuing them more, and it's very personal."   Business and Legal Reports, January 19, 2006 What We Do
7 .  Provide Proof You Offered A Mitigation Plan   – Checklist What We Do
8.  Mitigation Planning ,[object Object],[object Object],To potentially protect yourself, you should have all employees sign this document… Be Sure To Check With Your Attorney Before Using A Form Such As This What We Do Use of Confidential Information by Employee
What We Do 8.  Mitigation Planning  Continued –  * FTC – Protecting Personal Information A Guide For Business pg 15 This form or one similar  to it is required by the FTC for all of your employees*
What You Need To Do Next ,[object Object],[object Object],[object Object],[object Object],[object Object],* FTC – Protecting Personal Information A Guide For Business pg 15
What You Need To Do Next ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* FTC – Protecting Personal Information A Guide For Business pg 15
Mike Moore  served as  Attorney General of Mississippi  from 1988 to 2004. Grant Woods  served as  Attorney General of Arizona  from 1991 to 1999. Andrew Miller  served as  Attorney General of Virginia  from 1970 to 1977. Duke Ligon  is Senior VP &  General Counsel for Devon Energy Corporation. The Advisory Council was established to provide quality counsel and advice regarding the marketing to employee groups. Legal Advisory Council
Disclaimer ,[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

I D Theft Employee Presentation2
I D Theft Employee Presentation2I D Theft Employee Presentation2
I D Theft Employee Presentation2Heather Smith
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Servicegorsline
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Legal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionLegal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionDowney Law Group LLC
 
Broker Opportunity: Legal and Identity Theft Solutions as Voluntary Benefits
Broker Opportunity:  Legal and Identity Theft Solutions as Voluntary BenefitsBroker Opportunity:  Legal and Identity Theft Solutions as Voluntary Benefits
Broker Opportunity: Legal and Identity Theft Solutions as Voluntary BenefitsAntonio Muniz Olan
 
Ethics at Sunrise program - Missouri Bar CLE 5-2017
Ethics at Sunrise program - Missouri Bar CLE  5-2017Ethics at Sunrise program - Missouri Bar CLE  5-2017
Ethics at Sunrise program - Missouri Bar CLE 5-2017Downey Law Group LLC
 
Consumer financial protections
Consumer financial protectionsConsumer financial protections
Consumer financial protectionsA.W. Berry
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paperspencerharry
 
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Shawn Tuma
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
Downey Law Group - Legal Ethics and Innovations - May 2017
Downey Law Group - Legal Ethics and Innovations - May 2017Downey Law Group - Legal Ethics and Innovations - May 2017
Downey Law Group - Legal Ethics and Innovations - May 2017Downey Law Group LLC
 
SHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity TheftSHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity TheftShaneSaunders
 

Mais procurados (20)

I D Theft Employee Presentation2
I D Theft Employee Presentation2I D Theft Employee Presentation2
I D Theft Employee Presentation2
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
IDT 2015
IDT 2015IDT 2015
IDT 2015
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Adrs2
Adrs2Adrs2
Adrs2
 
Legal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionLegal Ethics for a Changing Profession
Legal Ethics for a Changing Profession
 
Broker Opportunity: Legal and Identity Theft Solutions as Voluntary Benefits
Broker Opportunity:  Legal and Identity Theft Solutions as Voluntary BenefitsBroker Opportunity:  Legal and Identity Theft Solutions as Voluntary Benefits
Broker Opportunity: Legal and Identity Theft Solutions as Voluntary Benefits
 
Ethics at Sunrise program - Missouri Bar CLE 5-2017
Ethics at Sunrise program - Missouri Bar CLE  5-2017Ethics at Sunrise program - Missouri Bar CLE  5-2017
Ethics at Sunrise program - Missouri Bar CLE 5-2017
 
Consumer financial protections
Consumer financial protectionsConsumer financial protections
Consumer financial protections
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Idt
IdtIdt
Idt
 
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
cis11
cis11cis11
cis11
 
Building a Better Credit Report
Building a Better Credit ReportBuilding a Better Credit Report
Building a Better Credit Report
 
Downey Law Group - Legal Ethics and Innovations - May 2017
Downey Law Group - Legal Ethics and Innovations - May 2017Downey Law Group - Legal Ethics and Innovations - May 2017
Downey Law Group - Legal Ethics and Innovations - May 2017
 
SHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity TheftSHRM: Employers Face Liability for Identity Theft
SHRM: Employers Face Liability for Identity Theft
 

Destaque

Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
Dealership Pres101209
Dealership Pres101209Dealership Pres101209
Dealership Pres101209danc752
 
Tutorial draw and teach with stick figures
Tutorial draw and teach with stick figuresTutorial draw and teach with stick figures
Tutorial draw and teach with stick figuresJaime Rodriguez
 
Anatomy of a Stick Figure
Anatomy of a Stick FigureAnatomy of a Stick Figure
Anatomy of a Stick FigureBetsy Streeter
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSSRachel Andrew
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsShelly Sanchez Terrell
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back KidEthos3
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaChris Lema
 

Destaque (8)

Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Dealership Pres101209
Dealership Pres101209Dealership Pres101209
Dealership Pres101209
 
Tutorial draw and teach with stick figures
Tutorial draw and teach with stick figuresTutorial draw and teach with stick figures
Tutorial draw and teach with stick figures
 
Anatomy of a Stick Figure
Anatomy of a Stick FigureAnatomy of a Stick Figure
Anatomy of a Stick Figure
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSS
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and Adolescents
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back Kid
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris Lema
 

Semelhante a Adrs Flip Chart With Red Flags Rev4

Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From PplSue Tjernlund
 
Businesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And FinesBusinesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And Finesmasive213
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachCBIZ, Inc.
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule GeneralTeo Leonard
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Small Business Advisory: Crowdfunding
Small Business Advisory: CrowdfundingSmall Business Advisory: Crowdfunding
Small Business Advisory: CrowdfundingINInvestWatch
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business PowerpointBucacci Business Solutions
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 

Semelhante a Adrs Flip Chart With Red Flags Rev4 (20)

Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Businesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And FinesBusinesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And Fines
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Employee law module
Employee law moduleEmployee law module
Employee law module
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
databreach whitepaper
databreach whitepaperdatabreach whitepaper
databreach whitepaper
 
IDShield White Paper
IDShield White PaperIDShield White Paper
IDShield White Paper
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
Small Business Advisory: Crowdfunding
Small Business Advisory: CrowdfundingSmall Business Advisory: Crowdfunding
Small Business Advisory: Crowdfunding
 
201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 

Adrs Flip Chart With Red Flags Rev4

  • 1. With Dan Cassin, CITRMS
  • 2.
  • 3.
  • 4.
  • 5. BLR: Business and Legal Reports BY: Douglas, Hottle, Meyer, Unkovic & Scott “ A rise in identity theft is presenting businesses with a major headache”, Employers are being held liable for identity theft (by employees) that occurs in the workplace. Identity Theft is the misuse or fraudulent use of an individual’s personal information. Unfortunately for employers, personal data such as social security, drivers license and bank account numbers is precisely what is contained in HR files, a goldmine for ID thieves. 9/19/2006
  • 6.
  • 7. Drivers License Medical Info Financial or Credit Identity Theft is not just about Credit Cards! It is a Legal Issue! ID Theft is an international crime and access to an attorney may be critical Social Security Character /Criminal Five Common Types of Identity Theft
  • 8. Once the credit systems accept bad data it can be next to impossible to clear. USAToday June 5, 2007 Medical identity theft can impair your health and finances… and detecting this isn’t easy… and remedying the damages can be difficult. WSJ Oct 11, 2007 Because it is so overwhelming to correct the victims’ records it is imperative for businesses to protect the data. Where the law becomes logical
  • 9.
  • 10. Why should all Executives/Owners of businesses, corporations, schools, financial institutions, hospitals and governmental bodies be concerned about Identity Theft, Data Security FACTA-Red Flag Rules , GLB Safeguard Rules, and State Legislation? Answer: Liability, both civil and criminal. Should I be concerned about ID Theft?
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. If an Employer obtains, requests or utilizes consumer reports or investigative consumer reports for hiring purposes/background screening, then the Employer is subject to FCRA requirements. www.ftc.gov/os/statutes/031224fcra.pdf Fair Credit Reporting Act (FCRA) Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You
  • 17.
  • 18.
  • 19.
  • 20.
  • 22.
  • 23. Law Firms Are Trolling for Victims Do you suspect that a large corporation or your employer has released your private information (through an accident or otherwise)? If you are one of many thousands whose confidential information was compromised, you may have a viable class action case against that company. Contact an attorney at the national plaintiffs' law firm of Lieff Cabraser to discuss your case . Lieff Cabraser defends Americans harmed by corporate wrongdoing. Instead of losing our identities one by one, we're seeing criminals grabbing them in massive chunks -- literally millions at a time.
  • 24.
  • 25.
  • 26. 1. Mandatory Meeting Letter What We Do
  • 27.
  • 28. 3. ID Theft Plan & Sensitive & Non Public Information Policy What We Do (First of four pages)
  • 29.
  • 30. If a number of your employees get notified of improper usage of their identities, this may act as an early warning system to your company of a possible internal breach which could further reduce your losses. 5. Potential Early Warning System What We Do
  • 31. BLR: “Provides an Affirmative Defense for the company.” 6. Provide an Affirmative Defense “ One solution that provides an affirmative defense against potential fines, fees, and lawsuits is to offer . . . identity theft protection as an employee benefit. An employer can choose whether or not to pay for this benefit . The key is to make the protection available, and have a mandatory employee meeting on identity theft and the protection you are making available, similar to what most employers do for health insurance … Greg Roderick, CEO of Frontier Management, says that his employees "feel like the company's valuing them more, and it's very personal." Business and Legal Reports, January 19, 2006 What We Do
  • 32. 7 . Provide Proof You Offered A Mitigation Plan – Checklist What We Do
  • 33.
  • 34. What We Do 8. Mitigation Planning Continued – * FTC – Protecting Personal Information A Guide For Business pg 15 This form or one similar to it is required by the FTC for all of your employees*
  • 35.
  • 36.
  • 37. Mike Moore served as Attorney General of Mississippi from 1988 to 2004. Grant Woods served as Attorney General of Arizona from 1991 to 1999. Andrew Miller served as Attorney General of Virginia from 1970 to 1977. Duke Ligon is Senior VP & General Counsel for Devon Energy Corporation. The Advisory Council was established to provide quality counsel and advice regarding the marketing to employee groups. Legal Advisory Council
  • 38.

Notas do Editor

  1. ID Theft is Is now an Epidemic NY Times IDT is Epidemic Aberdeen Group IDT at 300% growth ($) Garner Group IDT increasing at 79% (#) USPS Operation IDT Crisis FTC’s Top Complaint 5 years In A Row USA Today Why Is IDT at Epidemic Proportions? Foundation for Taxpayers & Consumer rights Epidemic of IDT takes Heavy Toll
  2. Employee Confidentiality Document Acts as a Good Faith step in attempting to comply with FACTA, GLB, HIPAA, etc …
  3. This disclaimer is given to protect the instructor and will last about 2 minutes .