IDENTITY THEFT   “ The fastest growing white-collar crime in America” According to the FBI Employer Compliance
Royce McCoy ,  CITRMS Identity Theft Risk Management Group, LLC  The Institute of Fraud Risk Management is the nation’s on...
Karen McCoy ,  CITRMS Identity Theft Risk Management Group, LLC  The Institute of Fraud Risk Management is the nation’s on...
<ul><li>The Problem of Identity Theft </li></ul><ul><ul><li>What identity theft is in reality </li></ul></ul><ul><ul><li>L...
<ul><li>Identity Theft is spiraling out of control! </li></ul><ul><ul><li>Over 255 million  American’s Identities have bee...
Drivers  License Medical Financial Identity theft is not   just   about credit cards, it’s a legal issue ! Over 70% of the...
Let’s look at a video clip From CNN showing how Identity Theft affects victims Identity Theft is  in the   News….
 
 
<ul><li>57%  of victims had  NEW ACCOUNTS  opened in their name </li></ul><ul><li>62%   had  warrants  issued for their ar...
Correcting the victims’ records is so overwhelming it is imperative for Employers to protect the data. “ Once the credit s...
“ A rise in identity theft is presenting  employers   with a major headache: They  are being held liable for identity thef...
<ul><li>FACTA  (The Fair and Accurate Credit Transaction Act) </li></ul><ul><li>The “ Red Flag ” rules </li></ul><ul><li>I...
 
Identity Theft Resource Center, of the approximately 44 million Americans who have been the victims of identity theft at s...
<ul><li>An Overview of FACTA: </li></ul><ul><ul><li>FACTA was signed by President Bush on </li></ul></ul><ul><ul><li>Decem...
<ul><li>Employers – including individuals   </li></ul><ul><li>Insurers  </li></ul><ul><li>Lenders </li></ul><ul><li>Mortga...
<ul><li>Civil liability .   An employee could be entitled to recover   actual lossses  sustained if their identity is stol...
…… all businesses must be able to show that they have a security plan in place. In order to comply with FACTA, Betsy Brode...
According to the FTC, a “ reasonable ” plan to safeguard personal information includes: Designate an employee ( or employe...
A sensible and effective program will go a long way towards   reducing the risk of federal government  enforcement ,  even...
New ‘Red Flag’ Requirements for Financial Institutions and Creditors will Help Fight Identity Theft …… requiring financial...
New ‘Red Flag’ Requirements for Financial Institutions and Creditors will Help Fight Identity Theft PG. 2 A creditor is  a...
PG. 3 Federal Trade Commission  June 2008 For The Consumer ftc.gov 1-877-FTC-HELP Complying with the Red Flag Rules The pr...
<ul><li>These rules also provide that covered accounts, creditors and businesses must also ensure their service providers ...
<ul><ul><li>“ Create a culture of security  by </li></ul></ul><ul><ul><li>implementing a regular schedule of </li></ul></u...
&quot;Many businesses don't realize, that even though the FTC isn't enforcing compliance, it doesn't mean those businesses...
<ul><li>With the  workplace being the site of more than half  (52%)  of all identity thefts , HR executives must stop thin...
Risk Management Magazine   January 2007 <ul><li>“ Many of the corporate risks associated with identity theft can be mitiga...
The Cost to Businesses <ul><li>Employees can take up to  600 hours ,  mainly during business hours , to restore their iden...
Law Firms Are Looking for Victims “ Do you suspect that a large corporation or your employer has released your private inf...
Employers must create an  Identity Theft Risk Management Program  to Minimize your Risk
What an Employer must do….. <ul><li>Set up  reasonable steps  to protect non-public information (NPI),personally identifia...
<ul><li>We can help  start the compliance process  for the Employer. We will provide templates for the   appointment  of t...
  Appointment of Security Compliance Officer   <ul><li>February 1, 2008 </li></ul><ul><li>[insert employee designee] </li>...
Announcement of Employee Training
All Employee Training is done by Certified Identity Theft Risk Management Specialist through the Institute of Fraud Risk M...
ID Theft Plan and Sensitive and   Non-Public Information Policy
The purpose behind an Identity Theft Sensitive and Non-Public Information policy is to protect the non-public information ...
Mitigating Damages <ul><li>It makes Employees aware of their  legal responsibilities  to protect NPI </li></ul><ul><li>It ...
Cont’d  –   This form or one similar is  required by the FTC  for all employees* * FTC – Protecting Personal Information A...
* Subject To Terms And Conditions <ul><li>The new Identity Theft laws state employers can be held  liable for actual losse...
* Subject To Terms And Conditions <ul><li>The new Identity Theft laws state employers can be held  liable for actual losse...
Our  Mitigation  Plan  is  provided by two NYSE companies, Kroll Risk Consulting Co. & Pre-Paid Legal Services A  mitigati...
Provides   Benefits for your Employees : <ul><li>CREDIT REPORTS & CREDIT SCORE You   receive an up to date copy of your cr...
Forbes Magazine ranks Kroll as the  world’s leading risk Consulting Company <ul><li>Kroll is the only data security and br...
Access to Legal Counsel provided by Pre-Paid Legal Services, a 36 year old New York Stock Exchange Company, represented by...
Provide Proof a Mitigation Plan   was offered to Your Employees
The Advisory Council was established to provide quality counsel and advice. Legal Advisory Council Duke R. Ligon Advisory ...
<ul><li>Former Attorney General Mississippi </li></ul><ul><li>Former Attorney General Oklahoma </li></ul><ul><li>Former At...
Just like OHSA,  the American Disability Act or HIPAA,  Privacy and Security laws are not optional .  We can assist your c...
Thank You! Identity Theft Risk Management Group, LLC
Upcoming SlideShare
Loading in …5
×

Employer 0409

1,004 views

Published on

How to help your employees and provide a better service.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,004
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • ID Theft is Is now an Epidemic NY Times IDT is Epidemic Aberdeen Group IDT at 300% growth ($) Garner Group IDT increasing at 79% (#) USPS Operation IDT Crisis FTC’s Top Complaint 5 years In A Row USA Today Why Is IDT at Epidemic Proportions? Foundation for Taxpayers &amp; Consumer rights Epidemic of IDT takes Heavy Toll
  • ID Theft is Is now an Epidemic NY Times IDT is Epidemic Aberdeen Group IDT at 300% growth ($) Garner Group IDT increasing at 79% (#) USPS Operation IDT Crisis FTC’s Top Complaint 5 years In A Row USA Today Why Is IDT at Epidemic Proportions? Foundation for Taxpayers &amp; Consumer rights Epidemic of IDT takes Heavy Toll
  • Employee Confidentiality Document Acts as a Good Faith step in attempting to comply with FACTA, GLB, HIPAA, etc …
  • Employer 0409

    1. 1. IDENTITY THEFT “ The fastest growing white-collar crime in America” According to the FBI Employer Compliance
    2. 2. Royce McCoy , CITRMS Identity Theft Risk Management Group, LLC The Institute of Fraud Risk Management is the nation’s only professional certification program ( CITRMS ) specifically developed to train and equip professionals to understand and address Identity Theft and related fraud issues.
    3. 3. Karen McCoy , CITRMS Identity Theft Risk Management Group, LLC The Institute of Fraud Risk Management is the nation’s only professional certification program ( CITRMS ) specifically developed to train and equip professionals to understand and address Identity Theft and related fraud issues.
    4. 4. <ul><li>The Problem of Identity Theft </li></ul><ul><ul><li>What identity theft is in reality </li></ul></ul><ul><ul><li>Laws related to identity theft that affect employers, executives and business owners </li></ul></ul><ul><li>The Answer to Problem </li></ul><ul><ul><li>Implement reasonable steps to create an Affirmative Defense that will lower your risk and minimize your liability. </li></ul></ul>Overview….
    5. 5. <ul><li>Identity Theft is spiraling out of control! </li></ul><ul><ul><li>Over 255 million American’s Identities have been reported lost or stolen since Jan. 2005. – PrivacyRights.org </li></ul></ul><ul><ul><li>Over 400,000 Dead People opened Bank accounts last year – AARP </li></ul></ul><ul><ul><li>The revenue from trafficking financial data has surpassed that of drug trafficking . – Secret Service March 2007 </li></ul></ul><ul><ul><li>Every Three seconds (27,000 times per day) someone becomes a victim of Identity Theft. – USA TODAY </li></ul></ul>
    6. 6. Drivers License Medical Financial Identity theft is not just about credit cards, it’s a legal issue ! Over 70% of the time access to an attorney will be critical to resolve these issues. Social Security Criminal Five Common Types of Identity Theft Less than 28% 10 M sold every 6 weeks WSJ Fastest growing IDT Unofficial National ID Wrongful Arrest
    7. 7. Let’s look at a video clip From CNN showing how Identity Theft affects victims Identity Theft is in the News….
    8. 10. <ul><li>57% of victims had NEW ACCOUNTS opened in their name </li></ul><ul><li>62% had warrants issued for their arrest </li></ul><ul><li>82% found out through an adverse action </li></ul><ul><li>Out of pocket cost averaged $1,865.27 per victim </li></ul><ul><li>Victims spent an average of 157.87 hours trying to clean up the mess.. </li></ul><ul><li>63% could not get their credit reports cleared </li></ul><ul><li>22% have their SSN tied to someone else’s </li></ul><ul><li>19% had their fraud alerts ignored </li></ul>*(Identity Theft Resource Center2007) Latest Facts about Identity Theft*
    9. 11. Correcting the victims’ records is so overwhelming it is imperative for Employers to protect the data. “ Once the credit systems accept bad data it can be next to impossible to clear.” USA Today June 5, 2007 “ Medical identity theft can impair your health and finances… and detecting this isn’t easy… and remedying the damages can be difficult.” Wall Street Journal October 11, 2007 Where the Law Becomes Logical
    10. 12. “ A rise in identity theft is presenting employers with a major headache: They are being held liable for identity theft that occurs in the workplace.” Douglas Hottle, Meyer, Unkovic & Scott, “ Workplace Identity Theft: How to Curb an HR Headache” BLR: Business and Legal Reports , September 19, 2006
    11. 13. <ul><li>FACTA (The Fair and Accurate Credit Transaction Act) </li></ul><ul><li>The “ Red Flag ” rules </li></ul><ul><li>Individual State Laws </li></ul><ul><li>(44 States have adopted their own additional ID Theft Laws) </li></ul>Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You Important Legislation
    12. 15. Identity Theft Resource Center, of the approximately 44 million Americans who have been the victims of identity theft at some point, each spent an average of 600 hours and $1,495 getting their finances straightened out. And, that doesn’t include attorney’s fees. In 2004, identity theft cost financial institutions and businesses an estimated $52.6 billion,
    13. 16. <ul><li>An Overview of FACTA: </li></ul><ul><ul><li>FACTA was signed by President Bush on </li></ul></ul><ul><ul><li>December 4, 2003. </li></ul></ul><ul><ul><li>The provisions of the law have been </li></ul></ul><ul><ul><li>phase in over the past few years , and </li></ul></ul><ul><ul><li>all are now in effect. </li></ul></ul>However, these new provisions also create serious new responsibilities – and potential liabilities – for businesses nationwide. Simply put, if data aiding an identity theft originates from a security breach at your company, you could be sued, fined, or become a defendant in a class-action lawsuit by affected employees whose personal information has somehow gotten out.
    14. 17. <ul><li>Employers – including individuals </li></ul><ul><li>Insurers </li></ul><ul><li>Lenders </li></ul><ul><li>Mortgage brokers </li></ul><ul><li>Landlords </li></ul><ul><li>Automobile dealers </li></ul><ul><li>Attorneys </li></ul><ul><li>Debt collectors </li></ul><ul><li>Private investigators </li></ul><ul><li>Tax preparers </li></ul><ul><li>Financial Advisors and Credit Counseling Svc </li></ul><ul><li>Investment or financial advisory Services </li></ul><ul><li>Financial management and tax planning etc…. </li></ul>This law applies to any business, regardless of size, that collects personal information or consumer reports about customers or employees to make decisions within their business (including names, credit card numbers, birthdates, home addresses and more). Who Does FACTA Affect ?
    15. 18. <ul><li>Civil liability . An employee could be entitled to recover actual lossses sustained if their identity is stolen from an employer . Or, an employer could be liable for statutory damages for up to $1,000 per employee. </li></ul><ul><li>Class action lawsuits . If large numbers of employees are impacted , they may be able to bring class action suits and obtain punitive damages from employers. </li></ul><ul><li>Federal fines . The federal government could fine a covered business up to $2,500 for each violation. </li></ul>Penalties
    16. 19. …… all businesses must be able to show that they have a security plan in place. In order to comply with FACTA, Betsy Broder, the Assistant Director of that FTC division , was quoted in the March 2006 American Bar Association Journal saying that means businesses need to have a written plan describing how customer data will be safeguarded and a staff member or company officer designated to be responsible for implementing that plan . Broder went on to say, “We’re not looking for a perfect system. But we need to see that you’ve taken responsible steps to protect your customers’ information.” Now What? It’s Time to Develop a Plan!
    17. 20. According to the FTC, a “ reasonable ” plan to safeguard personal information includes: Designate an employee ( or employees) to coordinate and be responsible for the security program. … . include employee training …. Continually evaluating and adjusting the security plan….. Create a mitigation plan….. This mitigation plan should kick in when there is a privacy or security breach and there is a need to “ repair it ” immediately in the eyes of customers, government regulators, and management.
    18. 21. A sensible and effective program will go a long way towards reducing the risk of federal government enforcement , even if the security policy should fail in a particular situation and a security breach results.
    19. 22. New ‘Red Flag’ Requirements for Financial Institutions and Creditors will Help Fight Identity Theft …… requiring financial institutions and creditors to develop and implement written identity theft prevention programs , as part of the Fair and Accurate Credit Transactions (FACTA) of 2003 . The programs must be in place by November 1, 2008 , and must provide for the identification, detection, and response to patterns, practices, or specific activities — known as “red flags” — that could indicate identity theft. … a financial institution is defined as a state or national bank , a state or federal savings and loan association, a mutual savings bank, a state or federal credit union , or any other entity that holds a “transaction account” belonging to a consumer. A transaction account is a deposit or other account from which the owner makes payments or transfers. PG. 1 Financial institutions and creditors soon will be required to implement a program to detect, prevent, and mitigate instances of identity theft. Federal Trade Commission - Bureau of Consumer Protection - Division of Consumer & Business Education
    20. 23. New ‘Red Flag’ Requirements for Financial Institutions and Creditors will Help Fight Identity Theft PG. 2 A creditor is any entity that regularly extends, renews, or continues credit ; any entity that regularly arranges for the extension, renewal, or continuation of credit ; or any assignee of an original creditor who is involved in the decision to extend, renew, or continue credit. Creditors include finance companies, automobile dealers, mortgage brokers, utility companies, and telecommunications companies. Where non-profit and government entities “ defer payment” for goods or services, they, too, are to be considered creditors. A covered account is an account used mostly for personal , family , or household purposes , and that involves multiple payments or transactions. A covered account is also an account for which there is a foreseeable risk of identity theft. Federal Trade Commission - Bureau of Consumer Protection - Division of Consumer & Business Education
    21. 24. PG. 3 Federal Trade Commission June 2008 For The Consumer ftc.gov 1-877-FTC-HELP Complying with the Red Flag Rules The program must also describe appropriate responses that would prevent and mitigate the crime….. The program must be managed by the Board of Directors or senior employees … include appropriate staff training , and provide for oversight of any service providers. Under the Red Flags Rules, financial institutions and creditors must develop a written program that identifies and detects the relevant warning signs — or “red flags” — of identity theft. Federal Trade Commission - Bureau of Consumer Protection - Division of Consumer & Business Education
    22. 25. <ul><li>These rules also provide that covered accounts, creditors and businesses must also ensure their service providers and subcontractors comply and have reasonable policies and procedures in place. The rules state: </li></ul><ul><li>Liability follows the data . </li></ul><ul><li>A covered entity cannot escape its obligation to comply by </li></ul><ul><li>outsourcing an activity (payroll, accounting, employee leasing web hosting, </li></ul><ul><li>customer call center etc.). Businesses must exercise appropriate and </li></ul><ul><li>effective oversight of service provider arrangements. </li></ul><ul><li>Service providers and contractors with whom the covered accounts </li></ul><ul><li>exchange PII must comply by implementing reasonable policies and </li></ul><ul><li>procedures designed to detect, prevent and mitigate the risk of </li></ul><ul><li>Identity theft. </li></ul>Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You Red Flag Rules
    23. 26. <ul><ul><li>“ Create a culture of security by </li></ul></ul><ul><ul><li>implementing a regular schedule of </li></ul></ul><ul><ul><li>employee training” (pg 17) </li></ul></ul><ul><ul><li>“ Make sure train ing includes employees </li></ul></ul><ul><ul><li>at satellite offices, temporary help, and </li></ul></ul><ul><ul><li>seasonal workers.” (pg 17) </li></ul></ul><ul><ul><li>“ Ask every employee to sign an agreement </li></ul></ul><ul><ul><li>to follow your company’s confidentiality </li></ul></ul><ul><ul><li>and security standards for handling </li></ul></ul><ul><ul><li>sensitive data” (pg 16) </li></ul></ul>Protecting Personal Information a Guide For Business
    24. 27. &quot;Many businesses don't realize, that even though the FTC isn't enforcing compliance, it doesn't mean those businesses won't be liable if a data breach or loss of information occurs,&quot; (Debra Geister, Director of Fraud Prevention and Compliance Solutions at Lexis-Nexis .) The key issue is that the law was effective January 1, 2008. The enforcement date begins May 1, 2009. Red Flag Rules Red Flag Rules recently became effective in January 2008, and compliance was originally required by November 2008. The FTC’s enforcement of the Rule has been extended to May 1, 2009: Bank Info Security - ID Theft Red Flags Rule: FTC Extension is no 'Break' Enforcement Delayed for FTC-Governed Institutions; Liability is Not November 12, 2008
    25. 28. <ul><li>With the workplace being the site of more than half (52%) of all identity thefts , HR executives must stop thinking about data protection as solely an IT responsibility. More education on appropriate handling and protection of information is necessary , among other efforts. </li></ul><ul><ul><li>“ ID Thefts Prevalent at Work”, Human Resource Executive , April 5, 2007 </li></ul></ul>Identity Theft Prevalent at Work
    26. 29. Risk Management Magazine January 2007 <ul><li>“ Many of the corporate risks associated with identity theft can be mitigated by the development and implementation of sound policies, systems and procedures. Others will ultimately become matters for the courts. Those risks that flow from the affected individual, however, must be managed using available tools and products that both support the individual and protect the employer. In the absence of a solid risk management plan for identity theft, the potential losses are nearly unlimited.” </li></ul>
    27. 30. The Cost to Businesses <ul><li>Employees can take up to 600 hours , mainly during business hours , to restore their identities </li></ul><ul><li>If you experience a security breach, 20 percent of your affected customer base will no longer do business with you, 40 percent will consider ending the relationship, and 5 percent will be hiring lawyers! </li></ul><ul><li>When it comes to cleaning up this mess, Employers spend an average 1,600 work hours per incident at a cost of $40,000 to $92,000 per victim . ( CIO Magazine, The Coming Pandemic, M. Fredenberg, 5/15/06) </li></ul><ul><li>In 2006 Identity Theft cost financial institutions and businesses estimated $61 billion . (Federal Reserve Bank- Atlanta 09/08) </li></ul>
    28. 31. Law Firms Are Looking for Victims “ Do you suspect that a large corporation or your employer has released your private information (through an accident or otherwise)? If you are one of many thousands whose confidential information was compromised, you may have a viable class action case against that company. Contact an attorney at the national plaintiffs' law firm of Lieff Cabraser to discuss your case. Lieff Cabraser defends Americans harmed by corporate wrongdoing.” “ Instead of losing our identities one by one, we're seeing criminals grabbing them in massive chunks -- literally millions at a time.”
    29. 32. Employers must create an Identity Theft Risk Management Program to Minimize your Risk
    30. 33. What an Employer must do….. <ul><li>Set up reasonable steps to protect non-public information (NPI),personally identifiable information (PII). </li></ul><ul><li>Help create a ‘ Culture of Security’ by implementing a regular schedule of employee training. </li></ul><ul><li>Create a potential ‘ Affirmative Defense’ for your company. </li></ul><ul><li>Help protect employees and customers while potentially decreasing your company exposure and liability. </li></ul>
    31. 34. <ul><li>We can help start the compliance process for the Employer. We will provide templates for the appointment of the security officer , the written ID Theft security plan and other documents to help create a potential Affirmative Defense. </li></ul><ul><li>To assist the Employer with compliance issues, we will conduct the training required by law for your employees. We will also explain the different types of ID Theft and show your employees how they can protect themselves if they become a victim and why their and your customers’ personal information must be protected. </li></ul><ul><li>We can provide the services at no direct cost to the Employer. </li></ul>Create an Affirmative Defense
    32. 35. Appointment of Security Compliance Officer <ul><li>February 1, 2008 </li></ul><ul><li>[insert employee designee] </li></ul><ul><li>RE: Appointment of Security Compliance Officer </li></ul><ul><li>Dear [employee]: </li></ul><ul><li>As part of [Company’s] comprehensive information security program, we are pleased to appoint you as Security Officer. As Security Officer you will be responsible to design, implement and monitor a security program to protect the security, confidentiality and integrity of personal information collected from and about our employees, consumers and vendors. </li></ul><ul><li>As Security Officer you will help [Company] identify material internal and external risks to the security of personal information; design and implement reasonable safeguards to control the risks identified in the risk assessment; evaluate and adjust the program in light of testing results; and continuous monitoring of the program and procedures. </li></ul><ul><li>As Security Officer, [Company] will provide you access to training courses and materials on a continuing basis. </li></ul><ul><li>Thank you for your commitment to [Company]. </li></ul><ul><li>Sincerely, </li></ul><ul><li>[Company] </li></ul><ul><li>Chief Executive Officer </li></ul>
    33. 36. Announcement of Employee Training
    34. 37. All Employee Training is done by Certified Identity Theft Risk Management Specialist through the Institute of Fraud Risk Management. www.tifrm.net
    35. 38. ID Theft Plan and Sensitive and Non-Public Information Policy
    36. 39. The purpose behind an Identity Theft Sensitive and Non-Public Information policy is to protect the non-public information (NPI) and Personally Identifiable Information (PII) an employer collects from customers and employees. This Information can be names, addresses, phone numbers, credit card numbers, drivers license numbers, bank account numbers, social security numbers etc. Basically any data that identifies an individual and could be used to steal his or her identity.
    37. 40. Mitigating Damages <ul><li>It makes Employees aware of their legal responsibilities to protect NPI </li></ul><ul><li>It serves as proof that employees have completed the training required by law </li></ul>To potentially protect yourself , you should have all employees sign this document… Be Sure To Check With Your Attorney Before Using A Form Such As This Use of Confidential Information by Employee
    38. 41. Cont’d – This form or one similar is required by the FTC for all employees* * FTC – Protecting Personal Information A Guide For Business pg 15 Use of Confidential Information By Employee I_______________ As an employee of _________________ I do hereby acknowledge that I must comply with a number of state and federal laws which regulate the handling of confidential and personal information regarding both customers/clients of the company and it’s other employees . These laws may include but not limited to FACTA, HIPPA, the Privacy Act, Gramm/Leach/Bliley, ID Theft Laws (where applicable). I understand that I must maintain the confidentiality of ALL documents, credit card Information, and personnel information of any type and that such information may only be used for the intended business purpose. Any other use of said information is strictly prohibited . Additionally, should I misuse or breach and personal information of said clients and or employees, I understand I will be held fully accountable both civilly and criminally, which may include, but no limited to, Federal and State fines, criminal terms, real or implied financial damage incurred by the client, employee or the company. I have received a copy of the company’s Sensitive and Non-Public Information Policy . I understand and will fully comply with its provisions along with all other rules and regulations the company has in place regarding the handling of confidential information so as to protect the privacy of all parties involved . I also acknowledge that I have participated in a company sponsored Privacy and Security Identity Theft Training Program. ________________________________________ __________________ Employee Signature Date ________________________________________ Witness Signature
    39. 42. * Subject To Terms And Conditions <ul><li>The new Identity Theft laws state employers can be held liable for actual losses and punitive damages incurred by affected employees due to identity theft in the workplace . (FACTA December 2003/Texas Business Today Winter 2007) </li></ul><ul><li>An Employer can reduce their liability by making available to employees a personal mitigation plan. Each employees who participates in this plan can help reduce your liability to potential losses related to ID Theft. </li></ul><ul><li>Offering a mitigation plan as a fringe benefit or through payroll deduction is a pro-active step to create an Affirmative Defense , help reduce your risk and mitigate losses. </li></ul>Reduce Company Losses
    40. 43. * Subject To Terms And Conditions <ul><li>The new Identity Theft laws state employers can be held liable for actual losses and punitive damages incurred by affected employees due to identity theft in the workplace . (FACTA December 2003/Texas Business Today Winter 2007) </li></ul><ul><li>An Employer can reduce their liability by making available to employees a personal mitigation plan. Each employees who participates in this plan can help reduce your liability to potential losses related to ID Theft. </li></ul><ul><li>Offering a mitigation plan as a fringe benefit ( Employers may choose to fully or partially fringe this benefit. Full fringe example: $0.15 per hour per employee 40 hour week) or through payroll deduction is a pro-active step to create an Affirmative Defense , help reduce your risk and mitigate losses. </li></ul>Reduce Company Losses
    41. 44. Our Mitigation Plan is provided by two NYSE companies, Kroll Risk Consulting Co. & Pre-Paid Legal Services A mitigation plan that includes Credit Montoritoring , full Restoration and access to Legal Counsel can reduce your risk and exposure to Identity Theft Credit Monitoring Access to Legal Counsel Restoration
    42. 45. Provides Benefits for your Employees : <ul><li>CREDIT REPORTS & CREDIT SCORE You receive an up to date copy of your credit </li></ul><ul><li>report & know how lending institutions view you! </li></ul><ul><li>CREDIT MONITORING You’ll receive prompt notice if any new accounts are opened in your name…or if derogatory notations are added to your credit report ! </li></ul><ul><li>IDENTITY RESTORATION Get the help you need when you need it with a licensed investigator from Kroll Inc., the world’s leading risk consulting company! </li></ul><ul><li>PROACTIVE SEARCHES Local and national databases will be checked for criminal activity in your name, DMV records for Driver’s licenses IDT, SSN records and more…. </li></ul>Identity Theft SHIELD
    43. 46. Forbes Magazine ranks Kroll as the world’s leading risk Consulting Company <ul><li>Kroll is the only data security and breach recovery solution provider to </li></ul><ul><li>employ licensed investigators (many former FBI and CIA agents ) who methodically restore an individual’s identity to pre-theft status . </li></ul>Covers all five area of Identity Theft….. <ul><li>Kroll was founded in 1972. They have over 4,000 employees and offices </li></ul><ul><li>in 25 countries worldwide. They were acquired in 2004 by </li></ul><ul><li>Marsh McLennan Inc., a NYSE listed company. </li></ul>
    44. 47. Access to Legal Counsel provided by Pre-Paid Legal Services, a 36 year old New York Stock Exchange Company, represented by 48 provider laws firms and thousands of referral attorneys throughout North America
    45. 48. Provide Proof a Mitigation Plan was offered to Your Employees
    46. 49. The Advisory Council was established to provide quality counsel and advice. Legal Advisory Council Duke R. Ligon Advisory Council Member Former Senior V.P. & General Counsel Devon Energy Corp Grant Woods Advisory Council Member Former Arizona Attorney General Andrew P. Miller Advisory Council Member Former Virginia Attorney General Mike Moore Advisory Council Member Former Mississippi Attorney General
    47. 50. <ul><li>Former Attorney General Mississippi </li></ul><ul><li>Former Attorney General Oklahoma </li></ul><ul><li>Former Attorney General Arizona </li></ul><ul><li>Former Attorney General Virginia </li></ul><ul><li>Current President & CEO, U.S. Chamber of Commerce </li></ul><ul><li>Current President & CEO, National Black Chamber of Commerce </li></ul><ul><li>Former President of the American Bar Association </li></ul>Public Endorsements
    48. 51. Just like OHSA, the American Disability Act or HIPAA, Privacy and Security laws are not optional . We can assist your company in starting the compliance process and create an affirmative defense before a data breach, loss, or theft affects your employees or customers! Take Charge The next step is to schedule the required employee training and set up the other reasonable steps to help reduce your liability to these Identity Theft Laws. The compliance enforcement date is fast approaching. Who is the individual, at your company, that will coordinate this activity ?
    49. 52. Thank You! Identity Theft Risk Management Group, LLC

    ×