SlideShare a Scribd company logo
Affirmative Defense Response System (ADRS) MINIMIZE YOUR RISK
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Todayโ€™s Topics
โ€œ A rise in identity theft is presenting employers with a major headache: They  are being held liable for identity theft that occurs in the workplace.โ€ Douglas Hottle, Meyer, Unkovic & Scott,  โ€œ Workplace Identity Theft: How to Curb an HR Headacheโ€ BLR: Business and Legal Reports , September 19, 2006 Who Is Being Held Responsible
[object Object],[object Object],Identity Theft Prevalent at Work
Drivers  License Medical Financial ,[object Object],[object Object],[object Object],[object Object],Social  Security Character/  Criminal Five Common Types of  Identity Theft
Correcting the victimsโ€™ records is so overwhelming it is imperative for businesses to protect the data. Where the Law Becomes Logical โ€œ Once the credit systems accept bad data it can be next to impossible to clear.โ€   USAToday  June 5, 2007 โ€œ Medical identity theft can impair your health and financesโ€ฆ and detecting this isnโ€™t easyโ€ฆ and remedying the damages can be difficult.โ€   Wall Street Journal   October 11, 2007 TM
The Cost to Businesses ,[object Object],[object Object],[object Object],*CIO Magazine,  The Coming Pandemic , Michael Freidenberg, May 15 th , 2006
Why should all businesses, corporations, schools, financial institutions, hospitals and governmental bodies be concerned about identity theft, FACTA-Red Flag Rules, GLB Safeguard Rules, and state legislation? Answer: Liability, both civil and criminal. Ask Yourself This Question
[object Object],[object Object],[object Object],[object Object],Important Legislation Be Sure To Check With Your Attorney On  How These Laws May Specifically Apply To You
Fair and Accurate Credit  Transactions Act (FACTA) Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You FACTA   Red Flag Rules
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You FACTA   Red Flag Rules
If an employer obtains, requests or utilizes consumer reports or investigative consumer  reports for hiring purposes/background  screening, then the employer is subject to  FCRA requirements. www.ftc.gov/os/statutes/031224fcra.pdf Fair Credit Reporting Act (FCRA) Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Gramm, Leach, Bliley  Safeguard Rules Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
These laws apply to any organization including: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* The FTC categorizes an impressive list of businesses as FI and these so-called โ€œnon-bankโ€ businesses comprise a huge array of firms that may be unaware they are subject to GLB. Be Sure To Check With Your Attorney On  How These Laws May Specifically Apply To You Privacy and Security Laws
[object Object],[object Object],[object Object],[object Object],[object Object],Privacy and Security Laws Be Sure To Check With Your Attorney On  How These Laws May Specifically Apply To You
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Protecting Personal Information  A Guide For Business
[object Object],[object Object],Protecting Personal Information  A Guide For Business
ABA Journal March 2006
[object Object],- โ€œStolen Livesโ€,  ABA Journal , March 2006
Law Firms Are Looking for Victims โ€œ Do you suspect that a large corporation or your employer has released your private information (through an accident or otherwise)? If you are one of many thousands whose confidential information was compromised, you may have a viable class action case against that company. Contact an attorney at the national plaintiffs' law firm of Lieff Cabraser to discuss your case. Lieff Cabraser defends Americans harmed by corporate wrongdoing.โ€  โ€œ Instead of losing our identities one by one, we're seeing criminals grabbing them in massive chunks -- literally millions at a time.โ€
Why and How We Help Youโ€ฆ ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Affirmative Defense Response System
1.  Appointment of Security    Compliance Officer
2.  Sensitive Information Policy    and Program
3. Privacy and Security Letter
4. May Reduce Company Losses * Subject To Terms And Conditions ,[object Object],[object Object],[object Object],[object Object],[object Object],Life Events Legal Plan  &  Legal Shield Monitoring Services Restoration Services
If a number of your employees are notified of improper usage of their identities, this may act as an early warning system to your company of a possible internal breach which could further reduce your losses. 5. Potential Early Warning System
BLR says this โ€œProvides an Affirmative Defense for the company.โ€ 6. May Provide an Affirmative Defense โ€œ One solution that provides an affirmative defense  against potential fines, fees, and lawsuits  is to offer some sort of identity theft protection  as an employee benefit.  An employer can choose whether or not to pay for this benefit .  The key is  to make the protection available, and have an employee meeting on identity theft  and the protection you are making available, similar to what most employers do for health insurance โ€ฆ  Greg Roderick, CEO of Frontier Management, says that his employees "feel like the company's valuing them more, and it's very personal."   Business and Legal Reports  January 19, 2006
7 .  Provide Proof You Offered A Mitigation Plan   to Your Employees  โ€“ Check Off Sheet
8. Mitigating Damages Use of Confidential Information by Employee ,[object Object],[object Object],To potentially protect yourself, you should have all employees sign this documentโ€ฆ Be Sure To Check With Your Attorney Before Using A Form Such As This
8.  Continued  โ€“  This form or one similar to it  is required by the FTC for all employees* * FTC โ€“ Protecting Personal Information A Guide For Business pg 15
Disclaimer ,[object Object],[object Object],[object Object],[object Object]
The Advisory Council was established to provide quality counsel and advice. Legal Advisory Council Duke R. Ligon Advisory Council Member   Former Senior V.P.  & General Counsel  Devon Energy Corp   Grant Woods   Advisory Council Member   Former Arizona Attorney General Andrew P. Miller   Advisory Council Member   Former Virginia Attorney General Mike Moore   Advisory Council Member   Former Mississippi Attorney General
Just like other State and Federal laws, privacy and security laws are not optional.  We can assist your company in starting the compliance process before a data breach, loss, or theft affects your employees or customers! Take Charge We can help provide a solution!  When would you like to schedule your employee training?

More Related Content

What's hot

Broker Opportunity: Legal and Identity Theft Solutions as Voluntary Benefits
Broker Opportunity:  Legal and Identity Theft Solutions as Voluntary BenefitsBroker Opportunity:  Legal and Identity Theft Solutions as Voluntary Benefits
Broker Opportunity: Legal and Identity Theft Solutions as Voluntary Benefits
Antonio Muniz Olan
ย 
The Case for Legal Services and ID Theft Benefits
The Case for Legal Services and ID Theft BenefitsThe Case for Legal Services and ID Theft Benefits
The Case for Legal Services and ID Theft BenefitsYoichi Kato
ย 
SHRMreprintlayout23 (002)
SHRMreprintlayout23 (002)SHRMreprintlayout23 (002)
SHRMreprintlayout23 (002)Eric Oliver
ย 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009canadianlawyer
ย 
HIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsHIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future Expectations
PYA, P.C.
ย 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarks
Matt Siltala
ย 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
ย 
Cost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, CourtneyCost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, Courtneycourtneyquinlan
ย 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
CBIZ, Inc.
ย 
Legal Plans Represent Winning Proposition for Employers & Employees
Legal Plans Represent Winning Proposition for Employers & EmployeesLegal Plans Represent Winning Proposition for Employers & Employees
Legal Plans Represent Winning Proposition for Employers & Employees
Felicia Brady
ย 
Legal plans represent winning proposition
Legal plans represent winning propositionLegal plans represent winning proposition
Legal plans represent winning propositionMichael Schechter
ย 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
Brian Bauer
ย 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
ย 
Legal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionLegal Ethics for a Changing Profession
Legal Ethics for a Changing Profession
Downey Law Group LLC
ย 
Do you have an identity theft protection plan
Do you have an identity theft protection planDo you have an identity theft protection plan
Do you have an identity theft protection plan
Angela Carrier- Founder, Business Leader Forum
ย 
Business Issues 2009rev2
Business Issues 2009rev2Business Issues 2009rev2
Business Issues 2009rev2
Victoria Wors
ย 

What's hot (19)

Broker Opportunity: Legal and Identity Theft Solutions as Voluntary Benefits
Broker Opportunity:  Legal and Identity Theft Solutions as Voluntary BenefitsBroker Opportunity:  Legal and Identity Theft Solutions as Voluntary Benefits
Broker Opportunity: Legal and Identity Theft Solutions as Voluntary Benefits
ย 
The Case for Legal Services and ID Theft Benefits
The Case for Legal Services and ID Theft BenefitsThe Case for Legal Services and ID Theft Benefits
The Case for Legal Services and ID Theft Benefits
ย 
HIPAA Overview
HIPAA OverviewHIPAA Overview
HIPAA Overview
ย 
SHRMreprintlayout23 (002)
SHRMreprintlayout23 (002)SHRMreprintlayout23 (002)
SHRMreprintlayout23 (002)
ย 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
ย 
IDT 2015
IDT 2015IDT 2015
IDT 2015
ย 
HIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsHIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future Expectations
ย 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarks
ย 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
ย 
Cost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, CourtneyCost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, Courtney
ย 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
ย 
Legal Plans Represent Winning Proposition for Employers & Employees
Legal Plans Represent Winning Proposition for Employers & EmployeesLegal Plans Represent Winning Proposition for Employers & Employees
Legal Plans Represent Winning Proposition for Employers & Employees
ย 
Legal plans represent winning proposition
Legal plans represent winning propositionLegal plans represent winning proposition
Legal plans represent winning proposition
ย 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
ย 
Data Breaches
Data BreachesData Breaches
Data Breaches
ย 
Legal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionLegal Ethics for a Changing Profession
Legal Ethics for a Changing Profession
ย 
Do you have an identity theft protection plan
Do you have an identity theft protection planDo you have an identity theft protection plan
Do you have an identity theft protection plan
ย 
Business Issues 2009rev2
Business Issues 2009rev2Business Issues 2009rev2
Business Issues 2009rev2
ย 
cis11
cis11cis11
cis11
ย 

Viewers also liked

Phi Sigma Pi @ UC Berkeley's Turn The Table Career Fair
Phi Sigma Pi @ UC Berkeley's Turn The Table Career FairPhi Sigma Pi @ UC Berkeley's Turn The Table Career Fair
Phi Sigma Pi @ UC Berkeley's Turn The Table Career Fair
juandejoya
ย 
Joist Visual Dictionary 3
Joist Visual Dictionary 3Joist Visual Dictionary 3
Joist Visual Dictionary 3joist
ย 
Bli en Social medieorganisation
Bli en Social medieorganisationBli en Social medieorganisation
Bli en Social medieorganisation
Nordinspire Communication AB
ย 
Supporting personalisation through commissioning
Supporting personalisation through commissioningSupporting personalisation through commissioning
Supporting personalisation through commissioning
Fiona Richmond
ย 
Color
ColorColor
Colorgunstyle
ย 
Supporting efficient commissioning
Supporting efficient commissioningSupporting efficient commissioning
Supporting efficient commissioning
Fiona Richmond
ย 
Circular n 3167_27oct2015_calificacion_ep
Circular n 3167_27oct2015_calificacion_epCircular n 3167_27oct2015_calificacion_ep
Circular n 3167_27oct2015_calificacion_ep
Fernando Illanes Illanes
ย 
Lb Woordenlijst Jodendom
Lb Woordenlijst JodendomLb Woordenlijst Jodendom
Lb Woordenlijst JodendomBenthe
ย 
Aerogear Push Server Intro
Aerogear Push Server IntroAerogear Push Server Intro
Aerogear Push Server Intro
Orson Wang
ย 
Color
ColorColor
Colorgunstyle
ย 
ๅฅ่จบ่ท‘็ซ™็ณป็ตฑ / flow control system for health check
ๅฅ่จบ่ท‘็ซ™็ณป็ตฑ / flow control system for health checkๅฅ่จบ่ท‘็ซ™็ณป็ตฑ / flow control system for health check
ๅฅ่จบ่ท‘็ซ™็ณป็ตฑ / flow control system for health check
Orson Wang
ย 
Xquizzit
XquizzitXquizzit
Xquizzit
Vikrant Khanna
ย 
Open Source, Innovation and the Internet
Open Source, Innovation and the InternetOpen Source, Innovation and the Internet
Open Source, Innovation and the Internet
dagblakstad
ย 
Slide share som marknadsforing
Slide share som marknadsforingSlide share som marknadsforing
Slide share som marknadsforing
Nordinspire Communication AB
ย 
Recycle upcycle
Recycle upcycleRecycle upcycle
Recycle upcycle
Nordinspire Communication AB
ย 

Viewers also liked (18)

Phi Sigma Pi @ UC Berkeley's Turn The Table Career Fair
Phi Sigma Pi @ UC Berkeley's Turn The Table Career FairPhi Sigma Pi @ UC Berkeley's Turn The Table Career Fair
Phi Sigma Pi @ UC Berkeley's Turn The Table Career Fair
ย 
Joist Visual Dictionary 3
Joist Visual Dictionary 3Joist Visual Dictionary 3
Joist Visual Dictionary 3
ย 
Bli en Social medieorganisation
Bli en Social medieorganisationBli en Social medieorganisation
Bli en Social medieorganisation
ย 
Supporting personalisation through commissioning
Supporting personalisation through commissioningSupporting personalisation through commissioning
Supporting personalisation through commissioning
ย 
Color
ColorColor
Color
ย 
Supporting efficient commissioning
Supporting efficient commissioningSupporting efficient commissioning
Supporting efficient commissioning
ย 
Circular n 3167_27oct2015_calificacion_ep
Circular n 3167_27oct2015_calificacion_epCircular n 3167_27oct2015_calificacion_ep
Circular n 3167_27oct2015_calificacion_ep
ย 
Lb Woordenlijst Jodendom
Lb Woordenlijst JodendomLb Woordenlijst Jodendom
Lb Woordenlijst Jodendom
ย 
Aaa
AaaAaa
Aaa
ย 
Aerogear Push Server Intro
Aerogear Push Server IntroAerogear Push Server Intro
Aerogear Push Server Intro
ย 
Color
ColorColor
Color
ย 
ๅฅ่จบ่ท‘็ซ™็ณป็ตฑ / flow control system for health check
ๅฅ่จบ่ท‘็ซ™็ณป็ตฑ / flow control system for health checkๅฅ่จบ่ท‘็ซ™็ณป็ตฑ / flow control system for health check
ๅฅ่จบ่ท‘็ซ™็ณป็ตฑ / flow control system for health check
ย 
Social medieorganisation, delad
Social medieorganisation, deladSocial medieorganisation, delad
Social medieorganisation, delad
ย 
Xquizzit
XquizzitXquizzit
Xquizzit
ย 
Open Source, Innovation and the Internet
Open Source, Innovation and the InternetOpen Source, Innovation and the Internet
Open Source, Innovation and the Internet
ย 
Slide share som marknadsforing
Slide share som marknadsforingSlide share som marknadsforing
Slide share som marknadsforing
ย 
Recycle_Upcycle
Recycle_UpcycleRecycle_Upcycle
Recycle_Upcycle
ย 
Recycle upcycle
Recycle upcycleRecycle upcycle
Recycle upcycle
ย 

Similar to Adrs Flip Chart From Ppl

Businesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And FinesBusinesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And Fines
masive213
ย 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
aiimnevada
ย 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Financial Poise
ย 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Financial Poise
ย 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Financial Poise
ย 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
Lifeline Data Centers
ย 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
Bucacci Business Solutions
ย 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
The Capital Network
ย 
Employee law module
Employee law moduleEmployee law module
Employee law module
Muncie_Library
ย 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
Richard Brzakala
ย 
Six ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguideSix ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguide
BoyarMiller
ย 
Small Biz Presentation 08 09
Small Biz Presentation 08 09Small Biz Presentation 08 09
Small Biz Presentation 08 09
lynnbutler
ย 
Trends 121415 Citizens Bank
Trends 121415 Citizens BankTrends 121415 Citizens Bank
Trends 121415 Citizens BankMichael Ouellet
ย 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to knowFitCEO, Inc. (FCI)
ย 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
IDology, Inc
ย 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
Teo Leonard
ย 
A Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for BusinessA Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for Business
Parsons Behle & Latimer
ย 
Bullet Proof Your Business - SME Asset Protection
Bullet Proof Your Business - SME Asset ProtectionBullet Proof Your Business - SME Asset Protection
Bullet Proof Your Business - SME Asset Protection
Andrew Andreyev
ย 
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
dmenken60
ย 

Similar to Adrs Flip Chart From Ppl (20)

Adrs2
Adrs2Adrs2
Adrs2
ย 
Businesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And FinesBusinesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And Fines
ย 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
ย 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
ย 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
ย 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
ย 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
ย 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
ย 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
ย 
Employee law module
Employee law moduleEmployee law module
Employee law module
ย 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
ย 
Six ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguideSix ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguide
ย 
Small Biz Presentation 08 09
Small Biz Presentation 08 09Small Biz Presentation 08 09
Small Biz Presentation 08 09
ย 
Trends 121415 Citizens Bank
Trends 121415 Citizens BankTrends 121415 Citizens Bank
Trends 121415 Citizens Bank
ย 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to know
ย 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
ย 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
ย 
A Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for BusinessA Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for Business
ย 
Bullet Proof Your Business - SME Asset Protection
Bullet Proof Your Business - SME Asset ProtectionBullet Proof Your Business - SME Asset Protection
Bullet Proof Your Business - SME Asset Protection
ย 
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
ย 

Recently uploaded

LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
ย 
Search Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdf
Search Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdfSearch Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdf
Search Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
ย 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
ย 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
ย 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
ย 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
ย 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
ย 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
ย 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
ย 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
ย 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
ย 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
ย 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
ย 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujaratโ€™s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujaratโ€™s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujaratโ€™s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujaratโ€™s Dholera
Avirahi City Dholera
ย 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
ย 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
ย 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
ย 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
ย 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
ย 

Recently uploaded (20)

LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
ย 
Search Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdf
Search Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdfSearch Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdf
Search Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdf
ย 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
ย 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
ย 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
ย 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
ย 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
ย 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
ย 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
ย 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
ย 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
ย 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
ย 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
ย 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujaratโ€™s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujaratโ€™s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujaratโ€™s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujaratโ€™s Dholera
ย 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
ย 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
ย 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
ย 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
ย 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
ย 

Adrs Flip Chart From Ppl

  • 1. Affirmative Defense Response System (ADRS) MINIMIZE YOUR RISK
  • 2.
  • 3. โ€œ A rise in identity theft is presenting employers with a major headache: They are being held liable for identity theft that occurs in the workplace.โ€ Douglas Hottle, Meyer, Unkovic & Scott, โ€œ Workplace Identity Theft: How to Curb an HR Headacheโ€ BLR: Business and Legal Reports , September 19, 2006 Who Is Being Held Responsible
  • 4.
  • 5.
  • 6. Correcting the victimsโ€™ records is so overwhelming it is imperative for businesses to protect the data. Where the Law Becomes Logical โ€œ Once the credit systems accept bad data it can be next to impossible to clear.โ€ USAToday June 5, 2007 โ€œ Medical identity theft can impair your health and financesโ€ฆ and detecting this isnโ€™t easyโ€ฆ and remedying the damages can be difficult.โ€ Wall Street Journal October 11, 2007 TM
  • 7.
  • 8. Why should all businesses, corporations, schools, financial institutions, hospitals and governmental bodies be concerned about identity theft, FACTA-Red Flag Rules, GLB Safeguard Rules, and state legislation? Answer: Liability, both civil and criminal. Ask Yourself This Question
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. If an employer obtains, requests or utilizes consumer reports or investigative consumer reports for hiring purposes/background screening, then the employer is subject to FCRA requirements. www.ftc.gov/os/statutes/031224fcra.pdf Fair Credit Reporting Act (FCRA) Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20.
  • 21. Law Firms Are Looking for Victims โ€œ Do you suspect that a large corporation or your employer has released your private information (through an accident or otherwise)? If you are one of many thousands whose confidential information was compromised, you may have a viable class action case against that company. Contact an attorney at the national plaintiffs' law firm of Lieff Cabraser to discuss your case. Lieff Cabraser defends Americans harmed by corporate wrongdoing.โ€ โ€œ Instead of losing our identities one by one, we're seeing criminals grabbing them in massive chunks -- literally millions at a time.โ€
  • 22.
  • 23.
  • 24. 1. Appointment of Security Compliance Officer
  • 25. 2. Sensitive Information Policy and Program
  • 26. 3. Privacy and Security Letter
  • 27.
  • 28. If a number of your employees are notified of improper usage of their identities, this may act as an early warning system to your company of a possible internal breach which could further reduce your losses. 5. Potential Early Warning System
  • 29. BLR says this โ€œProvides an Affirmative Defense for the company.โ€ 6. May Provide an Affirmative Defense โ€œ One solution that provides an affirmative defense against potential fines, fees, and lawsuits is to offer some sort of identity theft protection as an employee benefit. An employer can choose whether or not to pay for this benefit . The key is to make the protection available, and have an employee meeting on identity theft and the protection you are making available, similar to what most employers do for health insurance โ€ฆ Greg Roderick, CEO of Frontier Management, says that his employees "feel like the company's valuing them more, and it's very personal." Business and Legal Reports January 19, 2006
  • 30. 7 . Provide Proof You Offered A Mitigation Plan to Your Employees โ€“ Check Off Sheet
  • 31.
  • 32. 8. Continued โ€“ This form or one similar to it is required by the FTC for all employees* * FTC โ€“ Protecting Personal Information A Guide For Business pg 15
  • 33.
  • 34. The Advisory Council was established to provide quality counsel and advice. Legal Advisory Council Duke R. Ligon Advisory Council Member Former Senior V.P. & General Counsel Devon Energy Corp Grant Woods Advisory Council Member Former Arizona Attorney General Andrew P. Miller Advisory Council Member Former Virginia Attorney General Mike Moore Advisory Council Member Former Mississippi Attorney General
  • 35. Just like other State and Federal laws, privacy and security laws are not optional. We can assist your company in starting the compliance process before a data breach, loss, or theft affects your employees or customers! Take Charge We can help provide a solution! When would you like to schedule your employee training?