SlideShare a Scribd company logo
Identity Theft Law Puts Employers at
Increased Risk for Heavy Penalties
An Expert Offers Compliance Advice
“The cost to financial institutions and other businesses was
$67.5 billion in 2007. As consumers, we pay for those losses
with added costs for goods and services.”
–­Royce­McCoy,­
Certified­Identity­Theft­Risk­Management­Specialist™
There­is­no­crime­as­profitable,­with
so­ little­ risk­ of­ being­ caught,­ as
identity­ theft.­Theft­ of­ credit­ card
numbers­and­personal­information
such­as­social­security­numbers,
driver’s­licenses,­and­medical­I.D.
cards­is­common­as­major­targets.
Criminals­who­steal­such­data­can
sell­ it­ countless­ times­ to­ other
crooks,­each­of­whom­can­use­it­to
pilfer­funds­from­bank­accounts,­run
up­credit­card­bills­or­obtain­medical
services.­Clearly,­the­damage­done
to­victims­is­not­just­financial;­it­can
be­ life-threatening­ when­ false
medical­information­winds­up­in­a
victim’s­real­medical­file.
Shockingly,­ the­ risk­ of­ being
prosecuted­ for­ identity­ theft­ is­ a
paltry­ 1­ in­ 700.­ No­ wonder­ it­ is
America’s­fastest­growing­crime.
“The­ cost­ to­ financial­ institutions
and­all­other­businesses,­large­and
small,­ was­ $67.5­ billion­ in­ 2007,”
says­ Royce­ McCoy,­ a­ nationally
recognized­expert­in­identity­theft
and­privacy­issues.­“As­consumers,
we­pay­for­those­losses­with­added
costs­for­goods­and­services.”
The­ Federal­ Trade­ Commission
(FTC)­ enforces­ the­ Fair­ and
Accurate­ Credit­ Transactions­ Act
(FACTA).­ The­ FTC­ has­ levied
severe­ penalties­ against­ com-
panies­ whose­ employees’­ or
customers’­ sensitive­ information
was­lost­or­stolen. FACTA­has­no
statute­of­limitations­and­lawsuits
are­ frequently­ brought­ as­ class
actions­in­which­punitive­damages
are­sought.­­In­addition­to­paying
actual­damages,­many­companies
are­ encouraged,­ by­ identity­ theft
experts­ such­ as­ Mr.­ McCoy,­ to
obtain­identity­monitoring­for­those
whose­ sensitive­ information­ was
compromised.
A­national­shoe­store­chain­lost­the
credit­card­numbers­of­1.4­million
customers.­ A­ major­ health
insurance­ company­ lost­ medical
records­of­365,000­insured.­Even
the­ federal­ government­ is­ not
immune­from­its­own­law.­When­the
Veterans­ Administration­ lost
medical­ records­ of­ 26­ million
individuals,­the­government­had­to
set­ aside­ $20­ million­ to­ settle
possible­claims.
“The­VA­sent­over­26­million­letters
notifying­potential­victims,”­McCoy
says.­“Who­do­you­think­paid­for­all
those­envelopes­and­postage?­The
taxpayers!­But,­in­the­private­sector,
it’s­the­company­that­foots­the­bill.”
McCoy’s Advice
to Companies
McCoy,­a­former­judge­from­East
Texas,­ is­ a­ nationally­ recognized
Certified­ Identity­ Theft­ Risk
Management­Specialist™.­­He­has
consulted­ for­ companies­ through
out­ the­ United­ States­ and
addressed­chambers­of­commerce,
employers­ and­ law­ enforcement
organizations­nationwide.
“As­ technology­ to­ guard­ against
identity­ theft­ becomes­ more
sophisticated,­so­do­the­criminals,”
McCoy­says.
Of­course,­there­also­is­the­human
factor,­in­the­form­of­the­occasional
disgruntled­employee­who­is­willing
to­sell­driver’s­license­information,
social­ security­ numbers,­ medical
I.D.s­and­other­personal­data.
“Every­company­must­now­have­a
compliance­ officer­ to­ deal­ with
these­issues­promptly,­as­required
by­ FACTA,”­ he­ advises.­ “It’s­ also
now­ required­ by­ federal­ law
(FACTA)­to­have­a­written­policy­in
place.­ Employees­ must­ also­ be
properly­trained­in­the­company’s
written­ I.D.­ theft­ policies­ and
procedures.­ It’s­ important­ for
companies­to­continually­evaluate
programs­ and­ create­ mitigation
plans­that­include­credit­monitoring,
restoration­ and­ access­ to­ legal
counsel.­Identity­theft­needs­to­be
dealt­with­aggressively­instead­of
waiting­for­the­financial­nightmare
to­begin.”
­­­Royce McCoy is­ a­ fifth­ gen-
eration­Texan.­He­grew­up­on­the
Texas­Gulf­Coast­and­attended
the­ University­ of­ Houston.­ He
was­ elected­ County­ Judge­ in
November­ 2002­ and­ presided
over­the­County­Court.
He­co-founded­Alliance­USA­in
1993,­in­1995,­he­was­nominated
as­one­of­three­finalists­for­the
prestigious­“Entrepreneur­of­the
Year”­ award­ sponsored­ by­ Inc.
Magazine,­ Merrill­ Lynch­ and
Ernst­&­Young.
Judge­ McCoy­ is­ a­ Certified
Identity­Theft­Risk­Management
Specialist­(CITRMS)­through­the
prestigious­ Institute­ of­ Fraud
Risk­Management­and­speaks­to
groups­across­America­regarding
identity­theft.
judge@USidtSolutions.com
www.USidtSolutions.com
972-548-8550
The 5 Areas of Identity Theft
Driver’s License Criminal Records
Social Security Numbers Financial Records
Medical Record

More Related Content

What's hot

Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
Herring Consulting & Financial Group
 
BMR Advisors | Financial Crimes Compliance Services
BMR Advisors | Financial Crimes Compliance ServicesBMR Advisors | Financial Crimes Compliance Services
BMR Advisors | Financial Crimes Compliance Services
Abhishek Bali
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
legalshieldofficial
 
BMR advisors - Risk & Advisory Services
BMR advisors - Risk & Advisory ServicesBMR advisors - Risk & Advisory Services
BMR advisors - Risk & Advisory Services
Abhishek Bali
 
Group/Employees Benefits Presentation
Group/Employees Benefits  PresentationGroup/Employees Benefits  Presentation
Group/Employees Benefits Presentation
abethune
 
International/Cross Border Legal Malpractice
International/Cross Border Legal MalpracticeInternational/Cross Border Legal Malpractice
International/Cross Border Legal Malpractice
Ethan Burger
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
tommy2tone44
 
Identity Theft and Your company
Identity Theft and Your companyIdentity Theft and Your company
Identity Theft and Your company
guest61ff5a
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
Kelly Giambra
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
poojakalra10
 
fidelity national information 2005 ar
fidelity national information  2005 arfidelity national information  2005 ar
fidelity national information 2005 arfinance48
 
Adrs Presentation Folder 051909
Adrs Presentation Folder 051909Adrs Presentation Folder 051909
Adrs Presentation Folder 051909
julchap
 
Consumer financial protections
Consumer financial protectionsConsumer financial protections
Consumer financial protections
A.W. Berry
 
Tfs
TfsTfs
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
paulgundersen9
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
mullarkea
 
Debt Collection Types
Debt Collection TypesDebt Collection Types
Debt Collection Types
QadeerSeo
 

What's hot (20)

Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
BMR Advisors | Financial Crimes Compliance Services
BMR Advisors | Financial Crimes Compliance ServicesBMR Advisors | Financial Crimes Compliance Services
BMR Advisors | Financial Crimes Compliance Services
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
BMR advisors - Risk & Advisory Services
BMR advisors - Risk & Advisory ServicesBMR advisors - Risk & Advisory Services
BMR advisors - Risk & Advisory Services
 
IDShield
IDShieldIDShield
IDShield
 
Group/Employees Benefits Presentation
Group/Employees Benefits  PresentationGroup/Employees Benefits  Presentation
Group/Employees Benefits Presentation
 
International/Cross Border Legal Malpractice
International/Cross Border Legal MalpracticeInternational/Cross Border Legal Malpractice
International/Cross Border Legal Malpractice
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
Identity Theft and Your company
Identity Theft and Your companyIdentity Theft and Your company
Identity Theft and Your company
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
 
COIN Financial Testimonial
COIN Financial TestimonialCOIN Financial Testimonial
COIN Financial Testimonial
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
fidelity national information 2005 ar
fidelity national information  2005 arfidelity national information  2005 ar
fidelity national information 2005 ar
 
Adrs Presentation Folder 051909
Adrs Presentation Folder 051909Adrs Presentation Folder 051909
Adrs Presentation Folder 051909
 
Consumer financial protections
Consumer financial protectionsConsumer financial protections
Consumer financial protections
 
Tfs
TfsTfs
Tfs
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Debt Collection Types
Debt Collection TypesDebt Collection Types
Debt Collection Types
 

Viewers also liked

Confucius on Corporate Governance - Corality August 2013
Confucius on Corporate Governance - Corality August 2013Confucius on Corporate Governance - Corality August 2013
Confucius on Corporate Governance - Corality August 2013Frank Ashe
 
David Zovak Doctoral Certificate in Strengths
David Zovak Doctoral Certificate in StrengthsDavid Zovak Doctoral Certificate in Strengths
David Zovak Doctoral Certificate in StrengthsDave Zovak
 
filosofando
filosofandofilosofando
filosofando
maysabarreto
 
Fb Desea Mas Amigos Con Interfaz Home
Fb Desea Mas Amigos Con Interfaz Home
Fb Desea Mas Amigos Con Interfaz Home
Fb Desea Mas Amigos Con Interfaz Home
woebegonesinger93
 
New base 718 special 01 november 2015
New base 718 special  01 november 2015New base 718 special  01 november 2015
New base 718 special 01 november 2015
Khaled Al Awadi
 
Best Running Shoes for Women
Best Running Shoes for WomenBest Running Shoes for Women
Best Running Shoes for Women
ShoeReviewed
 
Crucigrama Acentuación de las palabras según...
Crucigrama Acentuación de las palabras según...Crucigrama Acentuación de las palabras según...
Crucigrama Acentuación de las palabras según...
pyanez88
 
Cuestionario cargos políticos. europeace. euroscola
Cuestionario cargos políticos. europeace. euroscolaCuestionario cargos políticos. europeace. euroscola
Cuestionario cargos políticos. europeace. euroscola
europeace
 
2015 Era Vargas
2015  Era Vargas2015  Era Vargas
2015 Era Vargas
MARIANO C7S
 
Jeremy Raider Pictures (dragged) 1
Jeremy Raider Pictures (dragged) 1Jeremy Raider Pictures (dragged) 1
Jeremy Raider Pictures (dragged) 1Jeremy Brigham
 
Pengaruh umur kawin pertama edited
Pengaruh umur kawin pertama editedPengaruh umur kawin pertama edited
Pengaruh umur kawin pertama edited
kerendanker
 
Презентация каталога Фармаси ноябрь 2015
Презентация каталога Фармаси ноябрь 2015Презентация каталога Фармаси ноябрь 2015
Презентация каталога Фармаси ноябрь 2015
Людмила Мельник
 
Kti eva seno safitri
Kti eva seno safitriKti eva seno safitri
Kti eva seno safitri
KTIEVASENOSAFITRI
 
Bub dbm dilg-dswd-napc joint memorandum circular no. 5 dated october 1, 2014
Bub dbm dilg-dswd-napc joint memorandum circular no. 5 dated october 1, 2014Bub dbm dilg-dswd-napc joint memorandum circular no. 5 dated october 1, 2014
Bub dbm dilg-dswd-napc joint memorandum circular no. 5 dated october 1, 2014
Linda Himoldang
 

Viewers also liked (15)

Helo
HeloHelo
Helo
 
Confucius on Corporate Governance - Corality August 2013
Confucius on Corporate Governance - Corality August 2013Confucius on Corporate Governance - Corality August 2013
Confucius on Corporate Governance - Corality August 2013
 
David Zovak Doctoral Certificate in Strengths
David Zovak Doctoral Certificate in StrengthsDavid Zovak Doctoral Certificate in Strengths
David Zovak Doctoral Certificate in Strengths
 
filosofando
filosofandofilosofando
filosofando
 
Fb Desea Mas Amigos Con Interfaz Home
Fb Desea Mas Amigos Con Interfaz Home
Fb Desea Mas Amigos Con Interfaz Home
Fb Desea Mas Amigos Con Interfaz Home
 
New base 718 special 01 november 2015
New base 718 special  01 november 2015New base 718 special  01 november 2015
New base 718 special 01 november 2015
 
Best Running Shoes for Women
Best Running Shoes for WomenBest Running Shoes for Women
Best Running Shoes for Women
 
Crucigrama Acentuación de las palabras según...
Crucigrama Acentuación de las palabras según...Crucigrama Acentuación de las palabras según...
Crucigrama Acentuación de las palabras según...
 
Cuestionario cargos políticos. europeace. euroscola
Cuestionario cargos políticos. europeace. euroscolaCuestionario cargos políticos. europeace. euroscola
Cuestionario cargos políticos. europeace. euroscola
 
2015 Era Vargas
2015  Era Vargas2015  Era Vargas
2015 Era Vargas
 
Jeremy Raider Pictures (dragged) 1
Jeremy Raider Pictures (dragged) 1Jeremy Raider Pictures (dragged) 1
Jeremy Raider Pictures (dragged) 1
 
Pengaruh umur kawin pertama edited
Pengaruh umur kawin pertama editedPengaruh umur kawin pertama edited
Pengaruh umur kawin pertama edited
 
Презентация каталога Фармаси ноябрь 2015
Презентация каталога Фармаси ноябрь 2015Презентация каталога Фармаси ноябрь 2015
Презентация каталога Фармаси ноябрь 2015
 
Kti eva seno safitri
Kti eva seno safitriKti eva seno safitri
Kti eva seno safitri
 
Bub dbm dilg-dswd-napc joint memorandum circular no. 5 dated october 1, 2014
Bub dbm dilg-dswd-napc joint memorandum circular no. 5 dated october 1, 2014Bub dbm dilg-dswd-napc joint memorandum circular no. 5 dated october 1, 2014
Bub dbm dilg-dswd-napc joint memorandum circular no. 5 dated october 1, 2014
 

Similar to Forbes

ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015James Kane
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Identity Theft * Canada
Identity Theft * CanadaIdentity Theft * Canada
Identity Theft * Canada
- Mark - Fullbright
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
marybethwrenn
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
WrennEvents
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
Steve Mitchinson
 
Life Lock Customer Selling
Life Lock Customer SellingLife Lock Customer Selling
Life Lock Customer Selling
Charles Seay
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
Rosetta
 
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
Protected Harbor
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
dkmarshall
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
abethune
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdfHow to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
Bahaa Abdulhadi
 

Similar to Forbes (15)

ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft * Canada
Identity Theft * CanadaIdentity Theft * Canada
Identity Theft * Canada
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
Life Lock Customer Selling
Life Lock Customer SellingLife Lock Customer Selling
Life Lock Customer Selling
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdfHow to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
 

Forbes

  • 1. Identity Theft Law Puts Employers at Increased Risk for Heavy Penalties An Expert Offers Compliance Advice “The cost to financial institutions and other businesses was $67.5 billion in 2007. As consumers, we pay for those losses with added costs for goods and services.” –­Royce­McCoy,­ Certified­Identity­Theft­Risk­Management­Specialist™ There­is­no­crime­as­profitable,­with so­ little­ risk­ of­ being­ caught,­ as identity­ theft.­Theft­ of­ credit­ card numbers­and­personal­information such­as­social­security­numbers, driver’s­licenses,­and­medical­I.D. cards­is­common­as­major­targets. Criminals­who­steal­such­data­can sell­ it­ countless­ times­ to­ other crooks,­each­of­whom­can­use­it­to pilfer­funds­from­bank­accounts,­run up­credit­card­bills­or­obtain­medical services.­Clearly,­the­damage­done to­victims­is­not­just­financial;­it­can be­ life-threatening­ when­ false medical­information­winds­up­in­a victim’s­real­medical­file. Shockingly,­ the­ risk­ of­ being prosecuted­ for­ identity­ theft­ is­ a paltry­ 1­ in­ 700.­ No­ wonder­ it­ is America’s­fastest­growing­crime. “The­ cost­ to­ financial­ institutions and­all­other­businesses,­large­and small,­ was­ $67.5­ billion­ in­ 2007,” says­ Royce­ McCoy,­ a­ nationally recognized­expert­in­identity­theft and­privacy­issues.­“As­consumers, we­pay­for­those­losses­with­added costs­for­goods­and­services.” The­ Federal­ Trade­ Commission (FTC)­ enforces­ the­ Fair­ and Accurate­ Credit­ Transactions­ Act (FACTA).­ The­ FTC­ has­ levied severe­ penalties­ against­ com- panies­ whose­ employees’­ or customers’­ sensitive­ information was­lost­or­stolen. FACTA­has­no statute­of­limitations­and­lawsuits are­ frequently­ brought­ as­ class actions­in­which­punitive­damages are­sought.­­In­addition­to­paying actual­damages,­many­companies are­ encouraged,­ by­ identity­ theft experts­ such­ as­ Mr.­ McCoy,­ to obtain­identity­monitoring­for­those whose­ sensitive­ information­ was compromised. A­national­shoe­store­chain­lost­the credit­card­numbers­of­1.4­million customers.­ A­ major­ health insurance­ company­ lost­ medical records­of­365,000­insured.­Even the­ federal­ government­ is­ not immune­from­its­own­law.­When­the Veterans­ Administration­ lost medical­ records­ of­ 26­ million individuals,­the­government­had­to set­ aside­ $20­ million­ to­ settle possible­claims. “The­VA­sent­over­26­million­letters notifying­potential­victims,”­McCoy says.­“Who­do­you­think­paid­for­all those­envelopes­and­postage?­The taxpayers!­But,­in­the­private­sector, it’s­the­company­that­foots­the­bill.” McCoy’s Advice to Companies McCoy,­a­former­judge­from­East Texas,­ is­ a­ nationally­ recognized Certified­ Identity­ Theft­ Risk Management­Specialist™.­­He­has consulted­ for­ companies­ through out­ the­ United­ States­ and addressed­chambers­of­commerce, employers­ and­ law­ enforcement organizations­nationwide. “As­ technology­ to­ guard­ against identity­ theft­ becomes­ more sophisticated,­so­do­the­criminals,” McCoy­says. Of­course,­there­also­is­the­human factor,­in­the­form­of­the­occasional disgruntled­employee­who­is­willing to­sell­driver’s­license­information, social­ security­ numbers,­ medical I.D.s­and­other­personal­data. “Every­company­must­now­have­a compliance­ officer­ to­ deal­ with these­issues­promptly,­as­required by­ FACTA,”­ he­ advises.­ “It’s­ also now­ required­ by­ federal­ law (FACTA)­to­have­a­written­policy­in place.­ Employees­ must­ also­ be properly­trained­in­the­company’s written­ I.D.­ theft­ policies­ and procedures.­ It’s­ important­ for companies­to­continually­evaluate programs­ and­ create­ mitigation plans­that­include­credit­monitoring, restoration­ and­ access­ to­ legal counsel.­Identity­theft­needs­to­be dealt­with­aggressively­instead­of waiting­for­the­financial­nightmare to­begin.” ­­­Royce McCoy is­ a­ fifth­ gen- eration­Texan.­He­grew­up­on­the Texas­Gulf­Coast­and­attended the­ University­ of­ Houston.­ He was­ elected­ County­ Judge­ in November­ 2002­ and­ presided over­the­County­Court. He­co-founded­Alliance­USA­in 1993,­in­1995,­he­was­nominated as­one­of­three­finalists­for­the prestigious­“Entrepreneur­of­the Year”­ award­ sponsored­ by­ Inc. Magazine,­ Merrill­ Lynch­ and Ernst­&­Young. Judge­ McCoy­ is­ a­ Certified Identity­Theft­Risk­Management Specialist­(CITRMS)­through­the prestigious­ Institute­ of­ Fraud Risk­Management­and­speaks­to groups­across­America­regarding identity­theft. judge@USidtSolutions.com www.USidtSolutions.com 972-548-8550 The 5 Areas of Identity Theft Driver’s License Criminal Records Social Security Numbers Financial Records Medical Record