SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
MEMORANDUM
To: Law Enforcement Officer
From: Division of Privacy and Identity Protection
The Federal Trade Commission
Re: Importance of Identity Theft Report
The purpose of this memorandum is to explain what an AIdentity Theft Report@ is,
and its importance to identity theft victims in helping them to recover. A police report
that contains specific details of an identity theft is considered an AIdentity Theft Report@
under section 605B of the Fair Credit Reporting Act (FCRA), and it entitles an identity
theft victim to certain important protections that can help him or her recover more
quickly from identity theft.
Specifically, under sections 605B, 615(f) and 623(a)(6) of the FCRA, an Identity
Theft Report can be used to permanently block fraudulent information that results from
identity theft, such as accounts or addresses, from appearing on a victim=s credit report. It
will also make sure these debts do not reappear on the credit reports. Identity Theft
Reports can prevent a company from continuing to collect debts that result from identity
theft, or selling them to others for collection. An Identity Theft Report is also needed to
allow an identity theft victim to place an extended fraud alert on his or her credit report.
A copy of these sections of the FCRA is enclosed.
In order for a police report to be considered an Identity Theft Report, and
therefore entitle an identity theft victim to the protections discussed above, the police
report must contain details about the accounts and inaccurate information that resulted
from the identity theft. We advise victims to bring a printed copy of their ID Theft
Complaint filed with the FTC with them to the police station in order to better assist you
in creating a detailed police report so that these victims can access the important
protections available to them if they have an Identity Theft Report. The victim should
sign the ID Theft Complaint in your presence. If possible, you should attach or
incorporate the ID Theft Complaint into the police report, and sign the “Law
Enforcement Report Information” section of the FTC=s ID Theft Complaint. In addition,
please provide the identity theft victim with a copy of the Identity Theft Report (the
police report with the victim=s ID Theft Complaint attached or incorporated) to permit the
victim to dispute the fraudulent accounts and debts created by the identity thief.
For additional information on Identity Theft Reports or identity theft, please visit
our website at http://www.ftc.gov/bcp/edu/microsites/idtheft/.
Enclosures: FCRA Sections 605B, 615(f), 623(a)(6)
ENCLOSURE:
FCRA 605B (15 U.S.C. § 1681c-2) Block of Information Resulting from Identity
Theft
(a) Block
Except as otherwise provided in this section, a consumer reporting agency shall block the
reporting of any information in the file of a consumer that the consumer identifies as
information that resulted from an alleged identity theft, not later than 4 business days
after the date of receipt by such agency of--
(1) appropriate proof of the identity of the consumer;
(2) a copy of an identity theft report;
(3) the identification of such information by the consumer; and
(4) a statement by the consumer that the information is not information relating to any
transaction by the consumer.
(b) Notification
A consumer reporting agency shall promptly notify the furnisher of information
identified by the consumer under subsection (a) of this section--
(1) that the information may be a result of identity theft;
(2) that an identity theft report has been filed;
(3) that a block has been requested under this section; and
(4) of the effective dates of the block.
(c) Authority to decline or rescind
(1) In general
A consumer reporting agency may decline to block, or may rescind any block, of
information relating to a consumer under this section, if the consumer reporting agency
reasonably determines that--
(A) the information was blocked in error or a block was requested by the consumer in
error;
(B) the information was blocked, or a block was requested by the consumer, on the
basis of a material misrepresentation of fact by the consumer relevant to the request to
block; or
(C) the consumer obtained possession of goods, services, or money as a result of the
blocked transaction or transactions.
(2) Notification to consumer
If a block of information is declined or rescinded under this subsection, the affected
consumer shall be notified promptly, in the same manner as consumers are notified of
the reinsertion of information under section 1681i(a)(5)(B) of this title.
(3) Significance of block
For purposes of this subsection, if a consumer reporting agency rescinds a block, the
presence of information in the file of a consumer prior to the blocking of such
information is not evidence of whether the consumer knew or should have known that
the consumer obtained possession of any goods, services, or money as a result of the
block.
(d) Exception for resellers
(1) No reseller file
This section shall not apply to a consumer reporting agency, if the consumer reporting
agency--
(A) is a reseller;
(B) is not, at the time of the request of the consumer under subsection (a) of this
section, otherwise furnishing or reselling a consumer report concerning the
information identified by the consumer; and
(C) informs the consumer, by any means, that the consumer may report the identity
theft to the Commission to obtain consumer information regarding identity theft.
(2) Reseller with file
The sole obligation of the consumer reporting agency under this section, with regard to
any request of a consumer under this section, shall be to block the consumer report
maintained by the consumer reporting agency from any subsequent use, if--
(A) the consumer, in accordance with the provisions of subsection (a) of this section,
identifies, to a consumer reporting agency, information in the file of the consumer
that resulted from identity theft; and
(B) the consumer reporting agency is a reseller of the identified information.
(3) Notice
In carrying out its obligation under paragraph (2), the reseller shall promptly provide a
notice to the consumer of the decision to block the file. Such notice shall contain the
name, address, and telephone number of each consumer reporting agency from which
the consumer information was obtained for resale.
(e) Exception for verification companies
The provisions of this section do not apply to a check services company, acting as such,
which issues authorizations for the purpose of approving or processing negotiable
instruments, electronic fund transfers, or similar methods of payments, except that,
beginning 4 business days after receipt of information described in paragraphs (1)
through (3) of subsection (a) of this section, a check services company shall not report to
a national consumer reporting agency described in section 1681a(p) of this title, any
information identified in the subject identity theft report as resulting from identity theft.
(f) Access to blocked information by law enforcement agencies
No provision of this section shall be construed as requiring a consumer reporting agency
to prevent a Federal, State, or local law enforcement agency from accessing blocked
information in a consumer file to which the agency could otherwise obtain access under
this title.
ENCLOSURE:
FCRA 615(f) (15 U.S.C. § 1681m(f)) Requirements on Users of Consumer Reports –
Prohibition on Sale or Transfer of Debt Caused by Identity Theft
(f) Prohibition on sale or transfer of debt caused by identity theft
(1) In general
No person shall sell, transfer for consideration, or place for collection a debt that such
person has been notified under section 1681c-2 of this title has resulted from identity
theft.
(2) Applicability
The prohibitions of this subsection shall apply to all persons collecting a debt described
in paragraph (1) after the date of a notification under paragraph (1).
(3) Rule of construction
Nothing in this subsection shall be construed to prohibit--
(A) the repurchase of a debt in any case in which the assignee of the debt requires
such repurchase because the debt has resulted from identity theft;
(B) the securitization of a debt or the pledging of a portfolio of debt as collateral in
connection with a borrowing; or
(C) the transfer of debt as a result of a merger, acquisition, purchase and assumption
transaction, or transfer of substantially all of the assets of an entity.
ENCLOSURE:
FCRA 623(a)(6) (15 U.S.C. § 1681s-2(a)(6)) Responsibilities of Furnishers of
Information to Consumer Reporting Agencies – Duties of Furnishers upon Notice of
Identity Theft-Related Information
(6) Duties of furnishers upon notice of identity theft-related information
(A) Reasonable procedures
A person that furnishes information to any consumer reporting agency shall have in
place reasonable procedures to respond to any notification that it receives from a
consumer reporting agency under section 1681c-2 of this title relating to information
resulting from identity theft, to prevent that person from refurnishing such blocked
information.
(B) Information alleged to result from identity theft
If a consumer submits an identity theft report to a person who furnishes information
to a consumer reporting agency at the address specified by that person for receiving
such reports stating that information maintained by such person that purports to relate
to the consumer resulted from identity theft, the person may not furnish such
information that purports to relate to the consumer to any consumer reporting agency,
unless the person subsequently knows or is informed by the consumer that the
information is correct.

Mais conteúdo relacionado

Semelhante a Division of Privacy and Identity Protection

Investigative Consumer Report Presentation Jun 09 07 Version
Investigative Consumer Report Presentation Jun 09 07 VersionInvestigative Consumer Report Presentation Jun 09 07 Version
Investigative Consumer Report Presentation Jun 09 07 Versionrileyparker
 
1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATIONJoseph Callahan
 
Credit repair letter
Credit repair letterCredit repair letter
Credit repair letterpreetiesmile
 
FDCPA - Fair Debt Collection Practices Act
FDCPA - Fair Debt Collection Practices ActFDCPA - Fair Debt Collection Practices Act
FDCPA - Fair Debt Collection Practices ActYour Collection Rights
 
FDCPA - Fair Debt Collection Practices Act
FDCPA - Fair Debt Collection Practices ActFDCPA - Fair Debt Collection Practices Act
FDCPA - Fair Debt Collection Practices ActYour Collection Rights
 
Explain the terms and conditions of transfer under
Explain the terms and conditions of transfer underExplain the terms and conditions of transfer under
Explain the terms and conditions of transfer underAlina Zulfiqar
 
IIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationIIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationJason Hoeppner
 
Care providers - beware the Duty of Candour
Care providers - beware the Duty of CandourCare providers - beware the Duty of Candour
Care providers - beware the Duty of CandourGiles Gillingham
 
HB 2661 Final Rules & Regulations for Senior Referral Agents
HB 2661 Final Rules & Regulations for Senior Referral AgentsHB 2661 Final Rules & Regulations for Senior Referral Agents
HB 2661 Final Rules & Regulations for Senior Referral AgentsSande George
 
Simplification and Ease of User Data Verification: The Regulatory Framework f...
Simplification and Ease of User Data Verification: The Regulatory Framework f...Simplification and Ease of User Data Verification: The Regulatory Framework f...
Simplification and Ease of User Data Verification: The Regulatory Framework f...AHRP Law Firm
 
Explain the terms and conditions of transfer under
Explain the terms and conditions of transfer underExplain the terms and conditions of transfer under
Explain the terms and conditions of transfer underAlina Zulfiqar
 
Using consumer reports: What employers need to know
Using consumer reports:  What employers need to knowUsing consumer reports:  What employers need to know
Using consumer reports: What employers need to knowFYI Screening
 
William a price liability presentation
William a price liability presentationWilliam a price liability presentation
William a price liability presentationwww.growthlaw.com
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfInternet Law Center
 
Know Your Customer - Tips and Tricks
Know Your Customer - Tips and TricksKnow Your Customer - Tips and Tricks
Know Your Customer - Tips and TricksIdentityMind
 
Banker customer relationship
Banker customer relationshipBanker customer relationship
Banker customer relationshipShruti Singh
 

Semelhante a Division of Privacy and Identity Protection (20)

Investigative Consumer Report Presentation Jun 09 07 Version
Investigative Consumer Report Presentation Jun 09 07 VersionInvestigative Consumer Report Presentation Jun 09 07 Version
Investigative Consumer Report Presentation Jun 09 07 Version
 
1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION
 
Credit repair letter
Credit repair letterCredit repair letter
Credit repair letter
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
FDCPA - Fair Debt Collection Practices Act
FDCPA - Fair Debt Collection Practices ActFDCPA - Fair Debt Collection Practices Act
FDCPA - Fair Debt Collection Practices Act
 
FDCPA - Fair Debt Collection Practices Act
FDCPA - Fair Debt Collection Practices ActFDCPA - Fair Debt Collection Practices Act
FDCPA - Fair Debt Collection Practices Act
 
Training for Bank Employees
Training for Bank EmployeesTraining for Bank Employees
Training for Bank Employees
 
Explain the terms and conditions of transfer under
Explain the terms and conditions of transfer underExplain the terms and conditions of transfer under
Explain the terms and conditions of transfer under
 
IIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationIIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private Information
 
Care providers - beware the Duty of Candour
Care providers - beware the Duty of CandourCare providers - beware the Duty of Candour
Care providers - beware the Duty of Candour
 
HB 2661 Final Rules & Regulations for Senior Referral Agents
HB 2661 Final Rules & Regulations for Senior Referral AgentsHB 2661 Final Rules & Regulations for Senior Referral Agents
HB 2661 Final Rules & Regulations for Senior Referral Agents
 
Simplification and Ease of User Data Verification: The Regulatory Framework f...
Simplification and Ease of User Data Verification: The Regulatory Framework f...Simplification and Ease of User Data Verification: The Regulatory Framework f...
Simplification and Ease of User Data Verification: The Regulatory Framework f...
 
Explain the terms and conditions of transfer under
Explain the terms and conditions of transfer underExplain the terms and conditions of transfer under
Explain the terms and conditions of transfer under
 
Using consumer reports: What employers need to know
Using consumer reports:  What employers need to knowUsing consumer reports:  What employers need to know
Using consumer reports: What employers need to know
 
William a price liability presentation
William a price liability presentationWilliam a price liability presentation
William a price liability presentation
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Cr2 30 interp-notc022210
Cr2 30 interp-notc022210Cr2 30 interp-notc022210
Cr2 30 interp-notc022210
 
Know Your Customer - Tips and Tricks
Know Your Customer - Tips and TricksKnow Your Customer - Tips and Tricks
Know Your Customer - Tips and Tricks
 
Banker customer relationship
Banker customer relationshipBanker customer relationship
Banker customer relationship
 
Money Laundering Paper
Money Laundering Paper Money Laundering Paper
Money Laundering Paper
 

Mais de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mais de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 

Último (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 

Division of Privacy and Identity Protection

  • 1. MEMORANDUM To: Law Enforcement Officer From: Division of Privacy and Identity Protection The Federal Trade Commission Re: Importance of Identity Theft Report The purpose of this memorandum is to explain what an AIdentity Theft Report@ is, and its importance to identity theft victims in helping them to recover. A police report that contains specific details of an identity theft is considered an AIdentity Theft Report@ under section 605B of the Fair Credit Reporting Act (FCRA), and it entitles an identity theft victim to certain important protections that can help him or her recover more quickly from identity theft. Specifically, under sections 605B, 615(f) and 623(a)(6) of the FCRA, an Identity Theft Report can be used to permanently block fraudulent information that results from identity theft, such as accounts or addresses, from appearing on a victim=s credit report. It will also make sure these debts do not reappear on the credit reports. Identity Theft Reports can prevent a company from continuing to collect debts that result from identity theft, or selling them to others for collection. An Identity Theft Report is also needed to allow an identity theft victim to place an extended fraud alert on his or her credit report. A copy of these sections of the FCRA is enclosed. In order for a police report to be considered an Identity Theft Report, and therefore entitle an identity theft victim to the protections discussed above, the police report must contain details about the accounts and inaccurate information that resulted from the identity theft. We advise victims to bring a printed copy of their ID Theft Complaint filed with the FTC with them to the police station in order to better assist you in creating a detailed police report so that these victims can access the important protections available to them if they have an Identity Theft Report. The victim should sign the ID Theft Complaint in your presence. If possible, you should attach or incorporate the ID Theft Complaint into the police report, and sign the “Law Enforcement Report Information” section of the FTC=s ID Theft Complaint. In addition, please provide the identity theft victim with a copy of the Identity Theft Report (the police report with the victim=s ID Theft Complaint attached or incorporated) to permit the victim to dispute the fraudulent accounts and debts created by the identity thief. For additional information on Identity Theft Reports or identity theft, please visit our website at http://www.ftc.gov/bcp/edu/microsites/idtheft/. Enclosures: FCRA Sections 605B, 615(f), 623(a)(6)
  • 2. ENCLOSURE: FCRA 605B (15 U.S.C. § 1681c-2) Block of Information Resulting from Identity Theft (a) Block Except as otherwise provided in this section, a consumer reporting agency shall block the reporting of any information in the file of a consumer that the consumer identifies as information that resulted from an alleged identity theft, not later than 4 business days after the date of receipt by such agency of-- (1) appropriate proof of the identity of the consumer; (2) a copy of an identity theft report; (3) the identification of such information by the consumer; and (4) a statement by the consumer that the information is not information relating to any transaction by the consumer. (b) Notification A consumer reporting agency shall promptly notify the furnisher of information identified by the consumer under subsection (a) of this section-- (1) that the information may be a result of identity theft; (2) that an identity theft report has been filed; (3) that a block has been requested under this section; and (4) of the effective dates of the block. (c) Authority to decline or rescind (1) In general A consumer reporting agency may decline to block, or may rescind any block, of information relating to a consumer under this section, if the consumer reporting agency reasonably determines that-- (A) the information was blocked in error or a block was requested by the consumer in error; (B) the information was blocked, or a block was requested by the consumer, on the basis of a material misrepresentation of fact by the consumer relevant to the request to block; or
  • 3. (C) the consumer obtained possession of goods, services, or money as a result of the blocked transaction or transactions. (2) Notification to consumer If a block of information is declined or rescinded under this subsection, the affected consumer shall be notified promptly, in the same manner as consumers are notified of the reinsertion of information under section 1681i(a)(5)(B) of this title. (3) Significance of block For purposes of this subsection, if a consumer reporting agency rescinds a block, the presence of information in the file of a consumer prior to the blocking of such information is not evidence of whether the consumer knew or should have known that the consumer obtained possession of any goods, services, or money as a result of the block. (d) Exception for resellers (1) No reseller file This section shall not apply to a consumer reporting agency, if the consumer reporting agency-- (A) is a reseller; (B) is not, at the time of the request of the consumer under subsection (a) of this section, otherwise furnishing or reselling a consumer report concerning the information identified by the consumer; and (C) informs the consumer, by any means, that the consumer may report the identity theft to the Commission to obtain consumer information regarding identity theft. (2) Reseller with file The sole obligation of the consumer reporting agency under this section, with regard to any request of a consumer under this section, shall be to block the consumer report maintained by the consumer reporting agency from any subsequent use, if-- (A) the consumer, in accordance with the provisions of subsection (a) of this section, identifies, to a consumer reporting agency, information in the file of the consumer that resulted from identity theft; and (B) the consumer reporting agency is a reseller of the identified information.
  • 4. (3) Notice In carrying out its obligation under paragraph (2), the reseller shall promptly provide a notice to the consumer of the decision to block the file. Such notice shall contain the name, address, and telephone number of each consumer reporting agency from which the consumer information was obtained for resale. (e) Exception for verification companies The provisions of this section do not apply to a check services company, acting as such, which issues authorizations for the purpose of approving or processing negotiable instruments, electronic fund transfers, or similar methods of payments, except that, beginning 4 business days after receipt of information described in paragraphs (1) through (3) of subsection (a) of this section, a check services company shall not report to a national consumer reporting agency described in section 1681a(p) of this title, any information identified in the subject identity theft report as resulting from identity theft. (f) Access to blocked information by law enforcement agencies No provision of this section shall be construed as requiring a consumer reporting agency to prevent a Federal, State, or local law enforcement agency from accessing blocked information in a consumer file to which the agency could otherwise obtain access under this title.
  • 5. ENCLOSURE: FCRA 615(f) (15 U.S.C. § 1681m(f)) Requirements on Users of Consumer Reports – Prohibition on Sale or Transfer of Debt Caused by Identity Theft (f) Prohibition on sale or transfer of debt caused by identity theft (1) In general No person shall sell, transfer for consideration, or place for collection a debt that such person has been notified under section 1681c-2 of this title has resulted from identity theft. (2) Applicability The prohibitions of this subsection shall apply to all persons collecting a debt described in paragraph (1) after the date of a notification under paragraph (1). (3) Rule of construction Nothing in this subsection shall be construed to prohibit-- (A) the repurchase of a debt in any case in which the assignee of the debt requires such repurchase because the debt has resulted from identity theft; (B) the securitization of a debt or the pledging of a portfolio of debt as collateral in connection with a borrowing; or (C) the transfer of debt as a result of a merger, acquisition, purchase and assumption transaction, or transfer of substantially all of the assets of an entity.
  • 6. ENCLOSURE: FCRA 623(a)(6) (15 U.S.C. § 1681s-2(a)(6)) Responsibilities of Furnishers of Information to Consumer Reporting Agencies – Duties of Furnishers upon Notice of Identity Theft-Related Information (6) Duties of furnishers upon notice of identity theft-related information (A) Reasonable procedures A person that furnishes information to any consumer reporting agency shall have in place reasonable procedures to respond to any notification that it receives from a consumer reporting agency under section 1681c-2 of this title relating to information resulting from identity theft, to prevent that person from refurnishing such blocked information. (B) Information alleged to result from identity theft If a consumer submits an identity theft report to a person who furnishes information to a consumer reporting agency at the address specified by that person for receiving such reports stating that information maintained by such person that purports to relate to the consumer resulted from identity theft, the person may not furnish such information that purports to relate to the consumer to any consumer reporting agency, unless the person subsequently knows or is informed by the consumer that the information is correct.