SlideShare a Scribd company logo
1 of 2
Did this investigation violate the Fair Credit Reporting Act? Explain.
ASSIGNMENT1. Lavon Phillips became engaged to marry Sarah Grendahl and moved in with
her. Sarah’s mother, Mary, became suspicious that Phillips was not telling the truth about
his past, particularly about whether he was an attorney and where he had worked. She also
was confused about who his ex-wives and girlfriends were and where they lived. She did
some preliminary investigation herself, but she felt that she was hampered by not being
able to use a computer, so she contacted Kevin Fitzgerald, a family friend who worked for
McDowell, a private investigation agency. She asked Fitzgerald to do a “background check”
on Phillips. Fitzgerald searched public records in Minnesota and Alabama, where Phillips
had lived earlier and discovered one suit against Phillips for delinquent child support in
Alabama, a suit to establish child support for two children in Minnesota, and one
misdemeanor conviction for writing dishonored checks. Fitzgerald then supplied the social
security information to Econ Control (a business which furnishes credit reports, Finder’s
Reports, and credit scoring for credit companies and for private investigators) and asked for
“Finder’s Reports” on Phillips. Fitzgerald testified that he believed that Finder’s Reports
were not consumer reports and therefore they were not subject to the Federal Credit
Reporting Act (FCRA). William Porter, president of Econ Control, stated that he believed a
“Finder’s Report” could be obtained without authorization of the person who was the
subject of the report because the Finder’s Report contained no information on credit history
or creditworthiness. Econ Control then obtained a consumer report from Computer Science
Corporation on Phillips and passed it on to McDowell. Fitzgerald met with Mary Grendahl
and gave her the results of his investigation, including the Finder’s Report. Did this
investigation violate the Fair Credit Reporting Act? Explain.2. In the late 1990s, Ian
Eisenberg and Chris Hebard formed Electronic Publishing Ventures, LLC (EPV) and its four
subsidiaries: Cyberspace.com, LLC; Essex Enterprises, LLC; Surfnet Services, LLC; and
Splashnet.net, LLC. Two offshore entities, French Dreams Investments, N.V. (collectively
EFO and owned by Eisenberg) and Coto Settlement (controlled by Hebard) owned EPV in
equal parts. Between January 1999 and mid-2000, EPV’s four subsidiaries mailed
approximately 4.4 million solicitations offering Internet access to individuals and small
businesses. The solicitations included a check, usually for $3.50, attached to a form
resembling an invoice designed to be detached from the check by tearing at the perforated
line. The check was addressed to the recipient. and the recipient’s phone number appeared
on the “re” line. The back of the check and invoice contained small-print disclosures
revealing that cashing or depositing the check would constitute agreement to pay a monthly
fee for Internet access, but the front of the check and the invoice contained no such
disclosures. The mailing explained in small print that a monthly fee would be billed to the
customer’s local phone bill after the check was cashed or deposited. At least 225,000 small
businesses and individuals cashed or deposited the solicitation checks. The EPV
subsidiaries used a billing aggregation service to place charges for $19.95 or $29.95 a
month on the small businesses’ and individuals’ ordinary telephone bills. Internet usage
records show, however, that less than 1 percent of the 225,000 individuals and businesses
billed for Internet service actually logged on to the service. Eisenberg and Hebard were
aware that the solicitation had misled some consumers. The companies received complaints
from recipients of the solicitations, which indicated that some customers had deposited the
solicitation check without realizing that they had contracted for Internet services. Run
inThe Federal Trade Commission alleges that the solicitations were deceptive in violation of
Section 5 of the Federal Trade Commission Act. Explain whether the FTC is correct.

More Related Content

Similar to Did this investigation violate the Fair Credit Reporting.docx

Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect youIdentity Theft Protection
 
3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...
3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...
3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...databahn
 
Abstract This is a case study analysis of the 2017.docx
Abstract This is a case study analysis of the 2017.docxAbstract This is a case study analysis of the 2017.docx
Abstract This is a case study analysis of the 2017.docxwrite4
 
Review the case you have chosen for your final project. Summarize th.docx
Review the case you have chosen for your final project. Summarize th.docxReview the case you have chosen for your final project. Summarize th.docx
Review the case you have chosen for your final project. Summarize th.docxinfantkimber
 
Chapter 11-2Sources of law. This Chapter discussed a numbe.docx
Chapter 11-2Sources of law. This Chapter discussed a numbe.docxChapter 11-2Sources of law. This Chapter discussed a numbe.docx
Chapter 11-2Sources of law. This Chapter discussed a numbe.docxrusselldayna
 
Data Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdfData Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdfinfo48697
 
Holden Cases Against State Dismissed
Holden Cases Against State DismissedHolden Cases Against State Dismissed
Holden Cases Against State DismissedAbdul-Hakim Shabazz
 
CHAPTER 5 CRIMINAL LAW AND PROCEDURE Nicolai Caymen worked as .docx
CHAPTER 5 CRIMINAL LAW AND PROCEDURE Nicolai Caymen worked as .docxCHAPTER 5 CRIMINAL LAW AND PROCEDURE Nicolai Caymen worked as .docx
CHAPTER 5 CRIMINAL LAW AND PROCEDURE Nicolai Caymen worked as .docxrobertad6
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionBayo Cary
 
Webre Citizen Attacks
Webre Citizen AttacksWebre Citizen Attacks
Webre Citizen Attacksdtmorris
 
As AgreedHello, I have a business law assignment (LPP225) due la.docx
As AgreedHello, I have a business law assignment (LPP225) due la.docxAs AgreedHello, I have a business law assignment (LPP225) due la.docx
As AgreedHello, I have a business law assignment (LPP225) due la.docxmammiesfa
 
Corporate Disclosure From An Investors Perspective 2006
Corporate Disclosure From An Investors Perspective  2006Corporate Disclosure From An Investors Perspective  2006
Corporate Disclosure From An Investors Perspective 2006Reed Kathrein
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
412018 Bookshelf Online Principles of Fraudhttpsonli.docx
412018 Bookshelf Online Principles of Fraudhttpsonli.docx412018 Bookshelf Online Principles of Fraudhttpsonli.docx
412018 Bookshelf Online Principles of Fraudhttpsonli.docxalinainglis
 

Similar to Did this investigation violate the Fair Credit Reporting.docx (18)

Ira Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft PresentationIra Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft Presentation
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...
3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...
3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...
 
Abstract This is a case study analysis of the 2017.docx
Abstract This is a case study analysis of the 2017.docxAbstract This is a case study analysis of the 2017.docx
Abstract This is a case study analysis of the 2017.docx
 
Review the case you have chosen for your final project. Summarize th.docx
Review the case you have chosen for your final project. Summarize th.docxReview the case you have chosen for your final project. Summarize th.docx
Review the case you have chosen for your final project. Summarize th.docx
 
Chapter 11-2Sources of law. This Chapter discussed a numbe.docx
Chapter 11-2Sources of law. This Chapter discussed a numbe.docxChapter 11-2Sources of law. This Chapter discussed a numbe.docx
Chapter 11-2Sources of law. This Chapter discussed a numbe.docx
 
Data Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdfData Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdf
 
Holden Cases Against State Dismissed
Holden Cases Against State DismissedHolden Cases Against State Dismissed
Holden Cases Against State Dismissed
 
CHAPTER 5 CRIMINAL LAW AND PROCEDURE Nicolai Caymen worked as .docx
CHAPTER 5 CRIMINAL LAW AND PROCEDURE Nicolai Caymen worked as .docxCHAPTER 5 CRIMINAL LAW AND PROCEDURE Nicolai Caymen worked as .docx
CHAPTER 5 CRIMINAL LAW AND PROCEDURE Nicolai Caymen worked as .docx
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protection
 
Webre Citizen Attacks
Webre Citizen AttacksWebre Citizen Attacks
Webre Citizen Attacks
 
As AgreedHello, I have a business law assignment (LPP225) due la.docx
As AgreedHello, I have a business law assignment (LPP225) due la.docxAs AgreedHello, I have a business law assignment (LPP225) due la.docx
As AgreedHello, I have a business law assignment (LPP225) due la.docx
 
White Paper 2011 BOC
White Paper 2011 BOCWhite Paper 2011 BOC
White Paper 2011 BOC
 
Corporate Disclosure From An Investors Perspective 2006
Corporate Disclosure From An Investors Perspective  2006Corporate Disclosure From An Investors Perspective  2006
Corporate Disclosure From An Investors Perspective 2006
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
412018 Bookshelf Online Principles of Fraudhttpsonli.docx
412018 Bookshelf Online Principles of Fraudhttpsonli.docx412018 Bookshelf Online Principles of Fraudhttpsonli.docx
412018 Bookshelf Online Principles of Fraudhttpsonli.docx
 

More from 4934bk

You are the information technology manager of an.docx
You are the information technology manager of an.docxYou are the information technology manager of an.docx
You are the information technology manager of an.docx4934bk
 
Your parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docxYour parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docx4934bk
 
Writing in the social sciences.docx
Writing in the social sciences.docxWriting in the social sciences.docx
Writing in the social sciences.docx4934bk
 
to questions.docx
to questions.docxto questions.docx
to questions.docx4934bk
 
Write an essay on the colonial.docx
Write an essay on the colonial.docxWrite an essay on the colonial.docx
Write an essay on the colonial.docx4934bk
 
Write about interactions in the premodern world.docx
Write about interactions in the premodern world.docxWrite about interactions in the premodern world.docx
Write about interactions in the premodern world.docx4934bk
 
Write about Frontline Video or.docx
Write about Frontline Video or.docxWrite about Frontline Video or.docx
Write about Frontline Video or.docx4934bk
 
World War II.docx
World War II.docxWorld War II.docx
World War II.docx4934bk
 
work and Chicano.docx
work and Chicano.docxwork and Chicano.docx
work and Chicano.docx4934bk
 
Write a literary essay based on the.docx
Write a literary essay based on the.docxWrite a literary essay based on the.docx
Write a literary essay based on the.docx4934bk
 
Why are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docxWhy are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docx4934bk
 
Why and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docxWhy and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docx4934bk
 
Why did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docxWhy did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docx4934bk
 
Why and how did the loom large in.docx
Why and how did the loom large in.docxWhy and how did the loom large in.docx
Why and how did the loom large in.docx4934bk
 
What similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docxWhat similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docx4934bk
 
Who invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docxWho invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docx4934bk
 
Which is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docxWhich is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docx4934bk
 
What.docx
What.docxWhat.docx
What.docx4934bk
 
What was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docxWhat was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docx4934bk
 
What stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docxWhat stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docx4934bk
 

More from 4934bk (20)

You are the information technology manager of an.docx
You are the information technology manager of an.docxYou are the information technology manager of an.docx
You are the information technology manager of an.docx
 
Your parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docxYour parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docx
 
Writing in the social sciences.docx
Writing in the social sciences.docxWriting in the social sciences.docx
Writing in the social sciences.docx
 
to questions.docx
to questions.docxto questions.docx
to questions.docx
 
Write an essay on the colonial.docx
Write an essay on the colonial.docxWrite an essay on the colonial.docx
Write an essay on the colonial.docx
 
Write about interactions in the premodern world.docx
Write about interactions in the premodern world.docxWrite about interactions in the premodern world.docx
Write about interactions in the premodern world.docx
 
Write about Frontline Video or.docx
Write about Frontline Video or.docxWrite about Frontline Video or.docx
Write about Frontline Video or.docx
 
World War II.docx
World War II.docxWorld War II.docx
World War II.docx
 
work and Chicano.docx
work and Chicano.docxwork and Chicano.docx
work and Chicano.docx
 
Write a literary essay based on the.docx
Write a literary essay based on the.docxWrite a literary essay based on the.docx
Write a literary essay based on the.docx
 
Why are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docxWhy are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docx
 
Why and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docxWhy and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docx
 
Why did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docxWhy did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docx
 
Why and how did the loom large in.docx
Why and how did the loom large in.docxWhy and how did the loom large in.docx
Why and how did the loom large in.docx
 
What similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docxWhat similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docx
 
Who invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docxWho invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docx
 
Which is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docxWhich is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docx
 
What.docx
What.docxWhat.docx
What.docx
 
What was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docxWhat was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docx
 
What stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docxWhat stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docx
 

Recently uploaded

8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfElizabeth Walsh
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfcupulin
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxCeline George
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsPallavi Parmar
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 

Recently uploaded (20)

8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 

Did this investigation violate the Fair Credit Reporting.docx

  • 1. Did this investigation violate the Fair Credit Reporting Act? Explain. ASSIGNMENT1. Lavon Phillips became engaged to marry Sarah Grendahl and moved in with her. Sarah’s mother, Mary, became suspicious that Phillips was not telling the truth about his past, particularly about whether he was an attorney and where he had worked. She also was confused about who his ex-wives and girlfriends were and where they lived. She did some preliminary investigation herself, but she felt that she was hampered by not being able to use a computer, so she contacted Kevin Fitzgerald, a family friend who worked for McDowell, a private investigation agency. She asked Fitzgerald to do a “background check” on Phillips. Fitzgerald searched public records in Minnesota and Alabama, where Phillips had lived earlier and discovered one suit against Phillips for delinquent child support in Alabama, a suit to establish child support for two children in Minnesota, and one misdemeanor conviction for writing dishonored checks. Fitzgerald then supplied the social security information to Econ Control (a business which furnishes credit reports, Finder’s Reports, and credit scoring for credit companies and for private investigators) and asked for “Finder’s Reports” on Phillips. Fitzgerald testified that he believed that Finder’s Reports were not consumer reports and therefore they were not subject to the Federal Credit Reporting Act (FCRA). William Porter, president of Econ Control, stated that he believed a “Finder’s Report” could be obtained without authorization of the person who was the subject of the report because the Finder’s Report contained no information on credit history or creditworthiness. Econ Control then obtained a consumer report from Computer Science Corporation on Phillips and passed it on to McDowell. Fitzgerald met with Mary Grendahl and gave her the results of his investigation, including the Finder’s Report. Did this investigation violate the Fair Credit Reporting Act? Explain.2. In the late 1990s, Ian Eisenberg and Chris Hebard formed Electronic Publishing Ventures, LLC (EPV) and its four subsidiaries: Cyberspace.com, LLC; Essex Enterprises, LLC; Surfnet Services, LLC; and Splashnet.net, LLC. Two offshore entities, French Dreams Investments, N.V. (collectively EFO and owned by Eisenberg) and Coto Settlement (controlled by Hebard) owned EPV in equal parts. Between January 1999 and mid-2000, EPV’s four subsidiaries mailed approximately 4.4 million solicitations offering Internet access to individuals and small businesses. The solicitations included a check, usually for $3.50, attached to a form resembling an invoice designed to be detached from the check by tearing at the perforated line. The check was addressed to the recipient. and the recipient’s phone number appeared on the “re” line. The back of the check and invoice contained small-print disclosures revealing that cashing or depositing the check would constitute agreement to pay a monthly
  • 2. fee for Internet access, but the front of the check and the invoice contained no such disclosures. The mailing explained in small print that a monthly fee would be billed to the customer’s local phone bill after the check was cashed or deposited. At least 225,000 small businesses and individuals cashed or deposited the solicitation checks. The EPV subsidiaries used a billing aggregation service to place charges for $19.95 or $29.95 a month on the small businesses’ and individuals’ ordinary telephone bills. Internet usage records show, however, that less than 1 percent of the 225,000 individuals and businesses billed for Internet service actually logged on to the service. Eisenberg and Hebard were aware that the solicitation had misled some consumers. The companies received complaints from recipients of the solicitations, which indicated that some customers had deposited the solicitation check without realizing that they had contracted for Internet services. Run inThe Federal Trade Commission alleges that the solicitations were deceptive in violation of Section 5 of the Federal Trade Commission Act. Explain whether the FTC is correct.