PowerPoint download

637 views
520 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
637
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • In the fall of 2002 Il dept of human services announced a theift of employee record
  • IOWA, KANSAS, KENTUCKY, GEORGIA, NEW JERSEY, UTAH MINNESOTA, OKLAHOMA, TEXAS, SOUTH CAROLINA,
  • PowerPoint download

    1. 1. IDENTITY THEFT BILL COLEMAN ISAC
    2. 2. WHAT IS IDENTITY THEFT? <ul><li>Identity theft involves acquiring key pieces of an individual’s personal information in order to impersonate them. </li></ul><ul><li>This information enables the identity thief to commit numerous forms of fraud against the individual or company </li></ul>
    3. 3. What personal information would be used for identity theft? <ul><li>Name </li></ul><ul><li>Birth-date </li></ul><ul><li>Social Security Number </li></ul><ul><li>Credit Card information </li></ul><ul><li>Other piece of personal information (check stub, receipts, etc.) </li></ul>
    4. 4. How does a thief get personal information? <ul><li>Going through your trash or mail retrieving credit card receipts or other personal information. </li></ul><ul><li>Removing mail from your mailbox, especially financial information (tax records, bank statements, credit card bills). </li></ul>
    5. 5. How does a theft get personal information? <ul><li>Call you on the telephone posing as a solicitor in order to gain personal information. </li></ul><ul><li>Look over your shoulder at an ATM while you are accessing your account to gain your account number, password or pin. </li></ul>
    6. 6. What exactly can they do with personal information? <ul><li>Obtain loans. </li></ul><ul><li>Lease or buy cars. </li></ul><ul><li>Access the persons existing bank account. </li></ul><ul><li>Get Insurance in your name. </li></ul>
    7. 7. How will I know if I am a victim? <ul><li>Your credit card statement show unauthorized changes and/or purchases you did not make. </li></ul><ul><li>You fail to receive bills or credit card statements for charges you have made. </li></ul>
    8. 8. How will I know if I am a victim? <ul><li>You are receiving phone calls from creditors trying to collect debts that you did not make. </li></ul>
    9. 9. What if you find out your identity has been stolen? <ul><li>Report the crime to the local police. </li></ul><ul><li>Contact your credit card issuers, close your existing account and get replacement cards. </li></ul><ul><li>Have a password put on your account. </li></ul>
    10. 10. What if you find out your identity has been stolen? <ul><li>Call the fraud unit of the three credit reporting bureaus and report the theft of your card and/or number. Ask that your account be flagged with a “fraud alert”. </li></ul>
    11. 11. How can I protect myself from identity theft? <ul><li>Do not carry important documents with you unless absolutely necessary. </li></ul><ul><li>Only keep a few credit cards in your wallet or purse when shopping. </li></ul><ul><li>Invest in a shredder and shred all personal informational documents. </li></ul>
    12. 12. Reference information <ul><li>Equifax Credit Bureau, Fraud </li></ul><ul><li>1-800-525-6285 </li></ul><ul><li>Experian Information Solutions </li></ul><ul><li>1-888-397-3742 </li></ul><ul><li>Trans Union Credit Bureau, Fraud </li></ul><ul><li>1-800-680-7289 </li></ul>
    13. 13. Reference information <ul><li>Social Security Administration </li></ul><ul><li>Fraud Hotline </li></ul><ul><li>1-800-269-0271 </li></ul><ul><li>Federal Trade Commission </li></ul><ul><li>1-877-IDTHEFT </li></ul><ul><li>U.S. Postal Service (Local Post Office) </li></ul>
    14. 14. THANK YOU!
    15. 15. Privacy v. Technology (again): Compliance with ADAD Laws Lawrence A. Laskey V.P., Counsel Van Ru Credit Corporation
    16. 16. Only In America <ul><li>We order double cheeseburgers and large fries… with a Diet Coke </li></ul><ul><li>A pizza arrives at your house faster than the ambulance </li></ul><ul><li>Medicine is dispensed in the back of the store… the cigarettes are up front </li></ul>
    17. 17. “I Could Tell You, But Then I’d Have To Shoot You” <ul><li>Legitimate concerns </li></ul><ul><li>Access to Information </li></ul><ul><ul><li>Internet </li></ul></ul><ul><ul><li>Databases </li></ul></ul><ul><li>Disclosure of Information </li></ul><ul><ul><li>Necessary to business purpose </li></ul></ul><ul><ul><li>Related, but not “necessary” </li></ul></ul><ul><ul><li>Other </li></ul></ul>
    18. 18. “Oldies but Goodies” <ul><li>Statutory Requirements </li></ul><ul><ul><li>FERPA, FDCPA, etc. </li></ul></ul><ul><ul><li>The “federal alphabet” rules </li></ul></ul><ul><li>“ Common law” </li></ul><ul><ul><li>Invasion of privacy </li></ul></ul><ul><ul><li>Emotional distress </li></ul></ul><ul><ul><li>Trespass </li></ul></ul>
    19. 19. And, More Recently… <ul><li>GLB </li></ul><ul><li>HIPAA </li></ul><ul><li>Calif. SSN </li></ul><ul><li>Still, workable if </li></ul><ul><ul><li>obtain, use and disclose for proper purpose </li></ul></ul><ul><ul><li>notification/permission </li></ul></ul><ul><li>However, a third concern </li></ul>
    20. 20. The Right To Be Left Alone <ul><li>Addresses </li></ul><ul><ul><li>Telemarketing </li></ul></ul><ul><ul><li>Recorded messages </li></ul></ul><ul><ul><li>Autodialers </li></ul></ul><ul><li>To avoid </li></ul><ul><ul><li>Fraud, misrepresentation </li></ul></ul><ul><ul><li>Abusive calling </li></ul></ul><ul><ul><li>Risk of public safety </li></ul></ul><ul><ul><li>Telecom overload </li></ul></ul><ul><ul><li>Intrusion on “privacy” </li></ul></ul>
    21. 21. Consequences <ul><li>On aversion/collection activity? </li></ul><ul><ul><li>Confusion as to application </li></ul></ul><ul><ul><li>Effectiveness of campaigns </li></ul></ul><ul><ul><li>Staffing patterns </li></ul></ul><ul><ul><li>Hampers ability to utilize technology </li></ul></ul><ul><ul><li>Another plaintiff's “playground” </li></ul></ul><ul><ul><li>Potential increased costs </li></ul></ul>
    22. 22. Federal Law: Telemarketing <ul><li>Telemarketing and Consumer Fraud and Abuse Prevention Act </li></ul><ul><li>FTC Telemarketing Sales rule </li></ul><ul><ul><li>Disclosures/call times </li></ul></ul><ul><ul><li>National “do not call” registry </li></ul></ul><ul><li>The good news: </li></ul><ul><ul><li>Solicitations of “goods or services” </li></ul></ul><ul><ul><li>NOT collection efforts </li></ul></ul>
    23. 23. Federal: Autodialers and Recorded Messages <ul><li>Telephone Consumer Protection Act </li></ul><ul><li>FCC Report and Order </li></ul><ul><ul><li>No autodialer or pre-recorded messaging calls to </li></ul></ul><ul><ul><ul><li>Emergency numbers </li></ul></ul></ul><ul><ul><ul><li>Hospital/nursing home rooms </li></ul></ul></ul><ul><ul><ul><li>Numbers for which recipient is charged </li></ul></ul></ul>
    24. 24. Federal Law: Recorded Messages <ul><li>FCC Report and Order </li></ul><ul><ul><li>Also, separate messaging rules </li></ul></ul><ul><ul><ul><li>Prohibited, unless </li></ul></ul></ul><ul><ul><ul><ul><li>consent </li></ul></ul></ul></ul><ul><ul><ul><ul><li>non-commercial (or is, but no advertisement) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>pre-existing relationship </li></ul></ul></ul></ul><ul><ul><ul><li>Still, caller must </li></ul></ul></ul><ul><ul><ul><ul><li>identify </li></ul></ul></ul></ul><ul><ul><ul><ul><li>maintain “live” response number </li></ul></ul></ul></ul><ul><ul><ul><li>Key: definition of “autodialers” </li></ul></ul></ul>
    25. 25. We’re All Alright! (So Far) <ul><li>Generally, Federal law reflects a workable environment </li></ul><ul><ul><li>Telemarketing laws N/A </li></ul></ul><ul><ul><li>Limited “auto dialer” definition </li></ul></ul><ul><li>However… </li></ul><ul><ul><li>State law is not pre-empted </li></ul></ul><ul><ul><li>States are addressing the area </li></ul></ul><ul><ul><li>Stage is set for further regulation </li></ul></ul>
    26. 26. “Who’s On First?” <ul><li>Some impose no new requirements </li></ul><ul><li>Others apply, with added rules </li></ul><ul><li>… and some don’t really know </li></ul>
    27. 27. Another fine mess… <ul><li>Problem: those that don’t address the issue. </li></ul><ul><li>Concern is telemarketing abuses </li></ul><ul><ul><li>Impact on aversion/collection not considered </li></ul></ul><ul><ul><li>Laws not narrowly drafted </li></ul></ul><ul><ul><li>Application uncertain </li></ul></ul>
    28. 28. Another fine mess… <ul><li>Definitions start with </li></ul><ul><ul><li>Federal “random or sequential” </li></ul></ul><ul><ul><li>Add “ability to store/dial” </li></ul></ul><ul><li>Ill-defined exemptions for “established” relationships </li></ul><ul><li>“ Information solicitation” (?) </li></ul>
    29. 29. Another fine mess… <ul><li>State penalties and enforcement </li></ul><ul><li>FDCPA “bootstrap” potential </li></ul><ul><li>Disclosure conflicts </li></ul>
    30. 30. Impact On What You Do, and How <ul><li>Rules specific to called-in state </li></ul><ul><li>Prohibited numbers </li></ul><ul><li>Call hour limits </li></ul><ul><li>Called party consent </li></ul><ul><li>“ Live” operators </li></ul><ul><li>ANI blocking </li></ul><ul><li>Dialer rates </li></ul>
    31. 31. Increase costs <ul><li>Compliance with multiple laws </li></ul><ul><li>Disconnect requirements </li></ul><ul><li>Line release capabilities/timing </li></ul><ul><li>Call “scrubbing” </li></ul><ul><li>Staffing </li></ul><ul><li>Permits. Etc. </li></ul><ul><li>Lawyers </li></ul>
    32. 32. déjà vu all over again… <ul><li>No calls to emergency etc. numbers (like federal), but also… </li></ul><ul><ul><li>Social service </li></ul></ul><ul><ul><li>Unlisted </li></ul></ul><ul><ul><li>Vacation rentals </li></ul></ul><ul><ul><li>NY “bona fide error” exception </li></ul></ul>
    33. 33. Call…waiting <ul><li>Regulatory administration </li></ul><ul><ul><li>Permits </li></ul></ul><ul><ul><li>Registration </li></ul></ul><ul><ul><li>Telecom consent </li></ul></ul>
    34. 34. “Go West…!” <ul><li>California autodialers </li></ul><ul><ul><li>Operator “available” </li></ul></ul><ul><ul><ul><li>CPUC “acceptable” error rate </li></ul></ul></ul><ul><ul><ul><li>record-keeping </li></ul></ul></ul><ul><ul><li>Application to our activities? </li></ul></ul><ul><ul><ul><li>Telemarketing focus? </li></ul></ul></ul><ul><ul><ul><li>“ Relationship” exception for ADAD? </li></ul></ul></ul><ul><ul><li>Use of recorded message </li></ul></ul><ul><ul><ul><li>“ available”/ response? </li></ul></ul></ul>
    35. 35. “Circle the Wagons (?)” <ul><li>Other “more difficult” requirements: </li></ul><ul><ul><li>Message must identify caller, explain intent of message and obtain consent </li></ul></ul><ul><ul><li>Some require live operator and return number (not the dialer trunk) </li></ul></ul><ul><ul><li>Only collection agencies in Minnesota </li></ul></ul><ul><ul><li>NY recognizes FDCPA disclosure limits </li></ul></ul>
    36. 36. What Can We Do? <ul><li>Be aware of the rules </li></ul><ul><li>Focus on cost effective compliance </li></ul><ul><li>Change/clarify/exempt </li></ul><ul><ul><li>State level </li></ul></ul><ul><ul><li>Federal pre-emption </li></ul></ul>
    37. 37. THANK YOU!
    38. 38. PRIVACY LAWS AND GUARANTORS Pablo S. Salas Litigation Attorney Colorado Student Loan Program YOUR LOGO HERE
    39. 39. “Oldies but Goodies” <ul><li>Privacy Act </li></ul><ul><li>FERPA </li></ul><ul><li>RFPA </li></ul><ul><li>FDCPA </li></ul><ul><li>FCRA </li></ul><ul><li>FTC </li></ul>
    40. 40. The New and Improved Federal and State Law <ul><li>GLB </li></ul><ul><li>Id Theft Assumption and Deterrence Act </li></ul><ul><li>California SSN Law </li></ul><ul><li>California’s proposed Privacy Act </li></ul>
    41. 41. PRIVACY ACT OF 1974 <ul><li>PURPOSE </li></ul><ul><ul><li>To safeguard against invasion of privacy by misuse of records by Federal Agencies </li></ul></ul><ul><li>Permits </li></ul><ul><ul><li>inspection and copying of personal records kept by the Agency </li></ul></ul><ul><ul><li>Right to amend records if inaccurate, untimely.or incomplete </li></ul></ul>
    42. 42. FAMILY EDUCATIONAL RIGHT TO PRIVACY ACT <ul><li>Provides students and parents right to inspect and review educational records </li></ul><ul><ul><li>Applies to educational agency or institution </li></ul></ul><ul><ul><li>Right may not be waived as condition of admission or financial aid </li></ul></ul><ul><ul><li>Right to notice and hearing to challenge contents of records </li></ul></ul>
    43. 43. RIGHT TO FINANCIAL PRIVACY ACT OF 1978 <ul><li>Regulates disclosure of financial information to government agencies by financial institutions </li></ul><ul><li>For law enforcement purposes unless </li></ul><ul><ul><li>consent </li></ul></ul><ul><ul><li>notice provided and </li></ul></ul><ul><ul><li>given opportunity for a hearing </li></ul></ul>
    44. 44. FDCPA OF <ul><li>Purpose </li></ul><ul><ul><li>To prevent abusive, deceptive and unfair debt collection practices </li></ul></ul><ul><li>Provides </li></ul><ul><ul><li>Prohibition of sharing consumer debt information to third parties </li></ul></ul><ul><ul><li>Collection do’s and don’ts </li></ul></ul><ul><ul><li>FTC regulated </li></ul></ul>
    45. 45. FAIR CREDIT REPORTING ACT <ul><li>Purpose </li></ul><ul><ul><li>Protects information collected by consumer reporting agencies </li></ul></ul><ul><li>Requires </li></ul><ul><ul><ul><li>Consumer reporting agencies to develop reasonable measures to store information in a confidential and accurate manner </li></ul></ul></ul>
    46. 46. GRAHM-LEACH BLILEY ACT <ul><li>Requires the FTC, Federal Banking Agencies, National Credit Union Administration, Treasury Department, and SEC to: </li></ul><ul><ul><li>Issue regulations ensuring that “financial institutions” protect the privacy of consumers “nonpublic personal information”. </li></ul></ul>
    47. 47. GRAHM-LEACH BLILEY ACT <ul><li>Requires that they </li></ul><ul><ul><li>Give annual notice to customers of their privacy policies </li></ul></ul><ul><ul><li>Allow customers to “opt out” of information sharing arrangements with third parties. and </li></ul></ul><ul><ul><li>May disclose to their affiliates without permission </li></ul></ul>
    48. 48. GRAHM-LEACH BLILEY ACT <ul><li>May disclose information with affiliates </li></ul><ul><li>Limits the sharing of account information for marketing purposes </li></ul>
    49. 49. ID THEFT ASSUMPTION AND DETERENCE ACT <ul><li>Makes the FTC a central clearinghouse for Id theft complaints </li></ul><ul><li>Requires FTC to </li></ul><ul><ul><li>provide victims with relevant information </li></ul></ul><ul><ul><li>refer complaints to appropriate agencies (i.e., law enforcement) </li></ul></ul>
    50. 50. FEDERAL TRADE COMMISSION ACT (FTC) <ul><li>Purpose: </li></ul><ul><ul><li>Prevent unfair competition methods, and unfair or deceptive acts or practices that may affect consumers </li></ul></ul><ul><li>Regulatory power </li></ul><ul><ul><li>define unfair or deceptive trade practices </li></ul></ul>
    51. 51. FEDERAL TRADE COMMISSION ACT (FTC) <ul><li>Investigative power </li></ul><ul><ul><li>Conducts investigations relating to the organization, business, practices, and management of entities engaged in commerce </li></ul></ul><ul><li>Enforcement Power </li></ul><ul><ul><li>seek monetary and other relief </li></ul></ul>
    52. 52. CALIFORNIA SSN LAWS <ul><li>Prohibits an entity from: </li></ul><ul><ul><li>Publicly post or display an individual’s SSN </li></ul></ul><ul><ul><li>Print an SSN on any card requested for a person to access products or services </li></ul></ul><ul><ul><li>Requiring an SSN over the internet unless secure or encrypted </li></ul></ul>
    53. 53. CALIFORNIA SSN LAW <ul><li>Prohibits </li></ul><ul><ul><li>Requiring an individual to use an SSN to access a web site unless a password or unique identifier is used </li></ul></ul><ul><ul><li>Printing an SSN on any materials that are mailed unless required by state of federal law </li></ul></ul>
    54. 54. CALIFORNIA SSN LAW <ul><li>Exempts </li></ul><ul><ul><li>Applications and forms </li></ul></ul><ul><ul><li>Governmental agencies </li></ul></ul><ul><ul><li>Annual disclosures for noncompliant use if </li></ul></ul><ul><ul><ul><li>Use is continuous </li></ul></ul></ul><ul><ul><ul><li>give annual disclosure to stop use </li></ul></ul></ul><ul><ul><ul><li>Written request to stop is done within 30 days </li></ul></ul></ul>
    55. 55. CALIFORNIA PROPOSED LEGISLATION ON PRIVACY <ul><li>California Financial Information Privacy Act </li></ul><ul><ul><li>Requires financial institutions to provide specified forms to consumers about sharing nonpublic consumer information </li></ul></ul><ul><ul><li>Requires </li></ul></ul><ul><ul><ul><li>Consent before sharing of nonpublic consumer information </li></ul></ul></ul><ul><ul><ul><li>Financial institutions not to deny services or products because they have not consented </li></ul></ul></ul>
    56. 56. THANK YOU! YOUR LOGO HERE

    ×