Federal Trade Commission Protecting Consumer Privacy. J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission

Size: px
Start display at page:

Download "Federal Trade Commission Protecting Consumer Privacy. J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission"

Transcription

1 Federal Trade Commission Protecting Consumer Privacy J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission

2 FTC s Approach to Privacy Consumers are concerned about consequences Focus on misuse of information No distinction between online and offline Benefits of Information Sharing

3 The National Do Not Call Registry Telemarketing Sales Rule Amendments Adopted December 2002 include Do Not Call Giving Consumers a Choice 61 million telephone numbers registered since June 27 Consumers with registered numbers have filed over 300,000 complaints since October 11 Harris Poll found that 92% of the respondents have received fewer calls since registering

4 Enforcing Do Not Call National Consumer Counsel Masqueraded as a nonprofit debt negotiation organization Called consumers who placed their phone numbers on the National Do Not Call Registry

5 Identity Theft Survey Results Released September 2003 The research took place during March and April 2003 Involved a random sample telephone survey of over 4,000 U.S. adults

6 Incidence of Identity Theft, Past Year 1 Federal Trade Commission million victims Victims in Millions million victims (1.5%) million victims 5.2 million victims (2.4%) (4.6%) (0.7%) 0 New Accounts & Other Frauds Other Existing Accounts Existing Credit Card Only Total Victimization 1Source: Identity Theft Survey Report conducted by Synovate for the FTC (March-April 2003). 2Based on the U.S. population age 18 and over ( million) as of July 1, 2002 (Source: Population Division, U.S. Census Bureau; Table NA-EST2002-ASRO-01).

7 How Thief Obtained Victim s Information 1 Federal Trade Commission 75% 50% 49% 25% 23% 13% 14% 0% Theft Transaction Other Don't Know 1Source: Identity Theft Survey Report conducted by Synovate for the FTC (March-April 2003). Percentages based on respondents who indicated they had been the victim of identity theft within the past five years.

8 Cost of Identity Theft in the Last Year 1 Federal Trade Commission September 2003 $50 $47 $47 billion $40 (in billions) $30 $33 $33 billion $20 $14 $14 billion $10 $0 New Accounts & Other Frauds Misuse of Existing Accounts (Credit Card & Non-Credit Card) All Identity Theft 1 Source: Identity Theft Survey Report (Table 2, page 7) conducted by Synovate for the FTC (March-April 2003).

9 Money Victim Paid Out of Pocket 1 Federal Trade Commission 75% 63% Average Per Victim: $500 50% 25% 11% 12% 8% 0% None Less Than $100 $100-$999 $1,000 or More 1Source: Identity Theft Survey Report conducted by Synovate for the FTC (March-April 2003). Percentages and average per victim based on respondents who indicated they had been the victim of identity theft within the past five years.

10 Identity Theft Role of Law Enforcement Civil Actions: phishing cases Criminal Prosecution

11 Identity Theft Other Law Enforcement cases TriWest TCI

12 Legislative Developments FACTA FACTA (Fair and Accurate Credit Transactions Act of 2003) amends the Fair Credit Reporting Act. Creates new rights for consumers in the credit arena, including: Annual free credit reports Streamlined dispute process Expansion of consumers adverse action rights

13 FACTA & IDT Prevention & Victim Assistance Codifies the Fraud Alert Procedure Trade Line Blocking for Credit Reports Credit card truncation on Receipts ID theft red flags for Bank Examinations Require proper disposal of consumer report information

14 Information Security: General Principles Section 5 of the FTC Act: deceptive or unfair practices are illegal Promises to keep consumers information secure must be truthful When security measures inadequate, those promises are deceptive Failure to take reasonable security precautions may also be unfair

15 Security Procedures Must Be Appropriate In The Circumstances Inadvertent release of sensitive personal information due to inadequate security procedures Eli Lilly Our analysis: were there reasonable procedures in light of the sensitivity of the information to prevent such breaches? What constitutes reasonable and appropriate procedures is linked directly to the sensitivity of the information collected by the company

16 Law Violations Without a Known Breach Companies Cannot Simply Wait for a Breach to Occur Must Take Reasonable Steps to Guard Against Reasonably Anticipated Vulnerabilities Breach or No Breach is not Determinative -- Microsoft

17 Assessing Risks and Vulnerabilities Security is a process Information security program assesses reasonable and foreseeable risks and threats Must assess and adjust to new technologies, new threats: Guess.com

18 Creating Vulnerabilities Making sure that you do not create vulnerabilities A system upgrade introduced a security vulnerability that allowed web users to access order history records and to view certain personal information: Tower

19 Notice Case-by-case determination of when appropriate Sensitivity of information breached Other parties besides consumers may best in best position to reduce harm

20 Spam Three-pronged approach Research Targeted Law Enforcement Education

21 Spam Research False Claims in Spam Study April 2003 Two-thirds of spam appears to be deceptive on its face, and likely violates the FTC Act Much of the rest is pornography or offers for illegal products or services Only 16.5% of the spam did not sell an illegitimate product or service.

22 Spam Research: False Claims in Spam Study Most spam is not from large companies Random sample of 114 pieces of spam: None was sent by a Fortune 500 company Only one was sent by a Fortune 1000 company 95% confident that less than 5% of the 11.6 million pieces of spam in our database came from Fortune 1000 companies.

23 Spam Law Enforcement Targeted Law Enforcement 62 cases addressing deceptive spam Our spam database receives over 250,000 pieces of spam daily Challenges presented by enforcement

24 CAN-SPAM Cases Phoenix Avatar, et al. Alleged violations of the FTC Act and of CAN- SPAM Cooperation with DOJ lead to a criminal indictment against all defendants Global Web Promotions, et al. Alleged violations of the FTC Act and of CAN- SPAM Defendants located in Australia and New Zealand

25 CAN-SPAM Rules and Reports Additional rules interpreting certain CAN-Spam provisions Studies Do-Not- Registry Special labeling of sexually explicit spam Labeling of all spam Bounty system to promote enforcement Report to Congress due in 2 years

26 Spam Education Open Relay Project: Our first international effort to identify insecure mail servers Operation Secure Your Server: Worldwide effort to close spammers access to anonymity

27 WHAT CAN I EXPECT FROM THE FTC IN THE COMING YEAR?

28 Top Priorities Do Not Call Enforcement FCRA Information Security Spam

29 Federal Trade Commission For the Consumer FTC-HELP

Regulation P & GLBA Training

Regulation P & GLBA Training Regulation P & GLBA Training Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed

More information

D A T A D I G E S T PUBLIC POLICY INSTITUTE PPI UNSOLICITED COMMERCIAL (SPAM) AND OLDER PERSONS ONLINE

D A T A D I G E S T PUBLIC POLICY INSTITUTE PPI UNSOLICITED COMMERCIAL  (SPAM) AND OLDER PERSONS ONLINE PPI PUBLIC POLICY INSTITUTE UNSOLICITED COMMERCIAL EMAIL (SPAM) AND OLDER PERSONS ONLINE D A T A D I G E S T INTRODUCTION Older Persons Online An increasing number of older persons are online users. In

More information

CAN-SPAM Act of International Association of Privacy Professionals June 2004

CAN-SPAM Act of International Association of Privacy Professionals June 2004 CAN-SPAM Act of 2003 International Association of Privacy Professionals June 2004 Vice President & General Counsel, Digital Impact, Inc. Background; Pre-emption Background Law signed by President Bush

More information

Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust

Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust Jamie Danker Director, Senior Privacy Officer National Protection and Programs Directorate, U.S.

More information

University of North Texas System Administration Identity Theft Prevention Program

University of North Texas System Administration Identity Theft Prevention Program University of North Texas System Administration Identity Theft Prevention Program I. Purpose of the Identity Theft Prevention Program The Federal Trade Commission ( FTC ) requires certain entities, including

More information

Summary Comparison of Current Data Security and Breach Notification Bills

Summary Comparison of Current Data Security and Breach Notification Bills Topic S. 117 (Nelson) S. (Carper/Blunt) H.R. (Blackburn/Welch) Comments Data Security Standards The FTC shall promulgate regulations requiring information security practices that are appropriate to the

More information

Incident Response Guidelines

Incident Response Guidelines New Orleans, La November 17, 2006 LBA 2006 Bank Counsel Conference Data Breaches, FFIEC Requirements and Incident Response Guidelines Remarks by Richard Riese, Director ABA Center for Regulatory Compliance

More information

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your

More information

PRIVACY POLICY Let us summarize this for you...

PRIVACY POLICY Let us summarize this for you... PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase

More information

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

U.S. Private-sector Privacy Certification

U.S. Private-sector Privacy Certification 1 Page 1 of 5 U.S. Private-sector Privacy Certification Outline of the Body of Knowledge for the Certified Information Privacy Professional/United States (CIPP/US ) I. Introduction to the U.S. Privacy

More information

ID Theft and Data Breach Mitigation

ID Theft and Data Breach Mitigation ID Theft and Data Breach Mitigation Jeremy Gilbert, GCFE, GASF, EnCE, CPA 1 Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk 2 Consumer Identity

More information

Why you MUST protect your customer data

Why you MUST protect your customer data Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are

More information

Countering Spam. ITU-T Study Group 17 Geneva, Switzerland 11 October 2005

Countering Spam. ITU-T Study Group 17 Geneva, Switzerland 11 October 2005 Countering Spam ITU-T Study Group 17 Geneva, Switzerland 11 October 2005 Cristina Bueti Strategy and Policy Unit International Telecommunication Union world summit on the information society 1 What is

More information

Individual Privacy: How Laws Impact Researchers, Whether the Laws Apply Or Not Howard Fienberg

Individual Privacy: How Laws Impact Researchers, Whether the Laws Apply Or Not Howard Fienberg Individual Privacy: How Laws Impact Researchers, Whether the Laws Apply Or Not Howard Fienberg Director of Government Affairs, CMOR: Promoting and Advocating Survey Research hfienberg@cmor.org 1111 16

More information

CAN-SPAM ACT RULEMAKING

CAN-SPAM ACT RULEMAKING CAN-SPAM ACT RULEMAKING Rachel E. Matteo-Boehm Piper Rudnick LLP 333 Market Street, Suite 3200 San Francisco, California 94105 415.659.7044 rachel.matteo-boehm@piperrudnick.com 198164v1 CAN-SPAM Act Rulemaking

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

1.2. Survey Information. Company may collect Personal Information from you when you voluntarily complete a Company survey, order form, or a

1.2. Survey Information. Company may collect Personal Information from you when you voluntarily complete a Company survey, order form, or a PRIVACY POLICY This Privacy Policy governs your use of this website and any content, products or services made available from or through this website including any sub domains thereof ("Website"). The

More information

Spree Privacy Policy

Spree Privacy Policy Spree Privacy Policy Effective as at 21 November 2018 Introduction Spree respects your privacy and it is important to us that you have an enjoyable experience buying and selling with us but also that you

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018 ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:

More information

Privacy Dimensions to Canada's Anti-Spam Legislation (CASL)

Privacy Dimensions to Canada's Anti-Spam Legislation (CASL) Privacy Dimensions to Canada's Anti-Spam Legislation (CASL) IAPP Canada Privacy Symposium 2012 May 9 11, 2012 Toronto, Ontario Michael De Santis, Legal Counsel Office of the Privacy Commissioner of Canada

More information

ITU Survey on Anti-Spam Legislation Worldwide

ITU Survey on Anti-Spam Legislation Worldwide ITU Survey on Anti-Spam Legislation Worldwide Cristina Bueti Strategy and Policy Unit International Telecommunication Union WSIS Thematic Meeting on Cybersecurity 28 June 1 July 2005 world summit on the

More information

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act

More information

I. PROPOSED DEFINITION OF PRIMARY PURPOSE IS INCONSISTENT WITH THE STATUTORY LANGUAGE OF THE CAN-SPAM ACT

I. PROPOSED DEFINITION OF PRIMARY PURPOSE IS INCONSISTENT WITH THE STATUTORY LANGUAGE OF THE CAN-SPAM ACT September 13, 2004 Via Electronic Mail Federal Trade Commission Office of the Secretary Room H-159 600 Pennsylvania Avenue, NW Washington, D.C. 20580 Re: CAN-SPAM Act Rulemaking, Project No. R411008 Ladies

More information

H. R To reduce unsolicited commercial electronic mail and to protect children from sexually oriented advertisements.

H. R To reduce unsolicited commercial electronic mail and to protect children from sexually oriented advertisements. I 0TH CONGRESS ST SESSION H. R. To reduce unsolicited commercial electronic mail and to protect children from sexually oriented advertisements. IN THE HOUSE OF REPRESENTATIVES MAY, 00 Ms. LOFGREN (for

More information

Online Survey on Spamming Issues

Online Survey on Spamming Issues Online Survey on Spamming Issues Sept 9th, 2003 Executive Summary 2 a VNU company Insert client logo Executive Summary Incidence of organisations receiving spam is high at 95% Spam is mostly recognised

More information

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

Identity Theft, Fraud & You. PrePare. Protect. Prevent. PrePare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

YADTEL - Privacy Information INFORMATION WE COLLECT

YADTEL - Privacy Information INFORMATION WE COLLECT YADTEL - Privacy Information As a customer of Yadtel, you are entitled to know what we do with personal information about you that we receive. We consider our treatment of such information to be a part

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Jackson Energy Authority 731.422.7500 INTRODUCTION Jackson Energy Authority ( JEA ) has formulated this Acceptable Use Policy ( AUP ), in order to set forth terms regarding the responsible

More information

Security and Privacy-Aware Cyber-Physical Systems: Legal Considerations. Christopher S. Yoo University of Pennsylvania July 12, 2018

Security and Privacy-Aware Cyber-Physical Systems: Legal Considerations. Christopher S. Yoo University of Pennsylvania July 12, 2018 Security and Privacy-Aware Cyber-Physical Systems: Legal Considerations Christopher S. Yoo University of Pennsylvania July 12, 2018 Overview of Research Tort and products liability for CPS Privacy and

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT

Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT The Utility maintains accounts for its customers to pay for utility service where bills are

More information

Protecting Your Business: Best Practices for Implementing a Legally Compliant Cybersecurity Program Trivalent Solutions Expo June 19, 2014

Protecting Your Business: Best Practices for Implementing a Legally Compliant Cybersecurity Program Trivalent Solutions Expo June 19, 2014 Protecting Your Business: Best Practices for Implementing a Legally Compliant Cybersecurity Program Trivalent Solutions Expo June 19, 2014 2014, Mika Meyers Beckett & Jones PLC All Rights Reserved Presented

More information

Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask

Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask Author: Jennifer Babe, LL.M, ICD.D Why Should I Read This Alert? a) despite its name, this Act covers much more

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. HIPAA GENERAL RULE PHI may not be disclosed without patient authorization

More information

Pending U.S. Anti-spam Legislation: A Marketer's Guide

Pending U.S. Anti-spam Legislation: A Marketer's Guide Tactical Guidelines, W. Janowski Research Note 14 August 2003 Pending U.S. Anti-spam Legislation: A Marketer's Guide Nine anti-spam proposals are before the 108th U.S. Congress. Marketers must understand

More information

5LINX ID GUARD Product Overview. Credit/Presenter Goes Here

5LINX ID GUARD Product Overview. Credit/Presenter Goes Here 5LINX ID GUARD Product Overview Credit/Presenter Goes Here Statistics According to the FTC approximately 11 million people were victims of identity theft in 2009. It s estimated that $221 billion a year

More information

Dealing with the Reality of a Privacy Breach: Civil Litigation, Regulatory Response, and Minimizing Your Risks

Dealing with the Reality of a Privacy Breach: Civil Litigation, Regulatory Response, and Minimizing Your Risks Dealing with the Reality of a Privacy Breach: Civil Litigation, Regulatory Response, and Minimizing Your Risks HCAA North Central Regional Annual Conference October 3, 2011 Overview The challenge of protecting

More information

Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect

Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect CLIENT ALERT January 25, 2017 Angelo A. Stio III stioa@pepperlaw.com Sharon R. Klein kleins@pepperlaw.com Christopher P. Soper soperc@pepperlaw.com

More information

NebraskaLink Acceptable Use Policy

NebraskaLink Acceptable Use Policy NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink

More information

Keeping It Under Wraps: Personally Identifiable Information (PII)

Keeping It Under Wraps: Personally Identifiable Information (PII) Keeping It Under Wraps: Personally Identifiable Information (PII) Will Robinson Assistant Vice President Information Security Officer & Data Privacy Officer Federal Reserve Bank of Richmond March 14, 2018

More information

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey CyberMaryland Conference 2017 Bob Andersen, Sr. Manager Federal Sales Engineering robert.andersen@solarwinds.com

More information

Brief to the House of Commons Standing Committee on Industry, Science and Technology on the review of Canada s Anti-Spam Legislation.

Brief to the House of Commons Standing Committee on Industry, Science and Technology on the review of Canada s Anti-Spam Legislation. Brief to the House of Commons Standing Committee on Industry, Science and Technology on the review of Canada s Anti-Spam Legislation October 5, 2017 1. Introduction The Email Sender and Provider Coalition

More information

Data Security: Public Contracts and the Cloud

Data Security: Public Contracts and the Cloud Data Security: Public Contracts and the Cloud July 27, 2012 ABA Public Contract Law Section, State and Local Division Ieuan Mahony Holland & Knight ieuan.mahony@hklaw.com Roadmap Why is security a concern?

More information

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack

More information

Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd

Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Our Commitment Ten Tigers Grain Marketing Pty Ltd and Ten Tigers Pty Ltd are committed to providing you with the highest levels of client service.

More information

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003 THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, 2004 This FAQ is not intended to provide specific advice about individual legal, business, or other questions. It was prepared

More information

THE SMALL BUSINESS FRAUD PREVENTION MANUAL

THE SMALL BUSINESS FRAUD PREVENTION MANUAL THE SMALL BUSINESS FRAUD PREVENTION MANUAL TABLE OF CONTENTS PART 1: INTERNAL FRAUD THREATS I. INTRODUCTION TO EMPLOYEE FRAUD The Shocking Cost of Employee Theft and Fraud... 1 The Cost of Fraud to Small

More information

Guiding principles on the Global Alliance against child sexual abuse online

Guiding principles on the Global Alliance against child sexual abuse online Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child

More information

ADMA Briefing Summary March

ADMA Briefing Summary March ADMA Briefing Summary March 2013 www.adma.com.au Privacy issues are being reviewed globally. In most cases, technological changes are driving the demand for reforms and Australia is no exception. From

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

DEVELOPEO.COM PRIVACY POLICY

DEVELOPEO.COM PRIVACY POLICY DEVELOPEO.COM PRIVACY POLICY Please check and read Developeo.com Privacy Policy to get a clear grasp of how Developeo protects, uses, collects or handles your information in accordance with the website.

More information

The Code has also been developed to demonstrate the industry s commitment to high ethical standards and best practice.

The Code has also been developed to demonstrate the industry s commitment to high ethical standards and best practice. 1 Table of Contents 1 Introduction 3 1.1 Objectives of the Code 3 1.2 About Group Buying 3 2 Definitions 4 3 Compliance with Australian Laws 5 4 Marketing Claims 6 4.1 Misleading and / or deceptive conduct

More information

Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version

Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Date: 18 October 2010 Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Introduction: Below are: 1) suggested amendments to the RAA and; 2) due diligence recommendations

More information

HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011

HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011 HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, 2012 Phyllis F. Granade The Granade Law Firm Atlanta, GA (678) 705 2507 pgranade@granadelaw.com www.granadelaw.com Looking

More information

Coastal Babysitters Privacy Policy

Coastal Babysitters Privacy Policy . Coastal Babysitters Privacy Policy Orly Isa Muscat trading as "Coastal Babysitters" (ABN 66 206 628 086) ("we", "us" or the "Company") is committed to privacy protection. At http://coastalbabysitters.com.au/

More information

Networking & Censorship

Networking & Censorship Networking & Censorship How We Use the Web Shopping Contributing content (wikis, blogs) Promoting business Learning Exploring our roots Exploring virtual worlds Paying taxes Gambling Lots more Online

More information

NYSVMS WEBSITE PRIVACY POLICY

NYSVMS WEBSITE PRIVACY POLICY Your Privacy Rights Effective Date: June 16, 2016 NYSVMS WEBSITE PRIVACY POLICY The New York State Veterinary Medical Society, Inc. and its affiliates ( NYSVMS, we, and us ) recognize the importance of

More information

Bob Gnapp Director Member Training & Network Analysis

Bob Gnapp Director Member Training & Network Analysis Robocalls and Spoofing Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 This presentation may be used by attendees for informational purposes only. No part of this presentation

More information

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2 NWQ Capital Management Pty Ltd Privacy Policy March 2017 Page 1 of 8 Privacy and Spam Policy NWQ Capital Management Pty Ltd s Commitment NWQ Capital Management Pty Ltd (NWQ) is committed to providing you

More information

NASD NOTICE TO MEMBERS 97-58

NASD NOTICE TO MEMBERS 97-58 NASD NOTICE TO MEMBERS 97-58 NASD Regulation Requests Comment On Proposed Interpretive Material 1031 Regarding Cold Calling Activity; Comment Period Expires October 31, 1997 Suggested Routing Senior Management

More information

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017 COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE Presented by Paul R. Hales, J.D. May 8, 2017 1 HIPAA Rules Combat Cyber Crime HIPAA Rules A Blueprint to Combat Cyber Crime 2 HIPAA Rules Combat Cyber Crime

More information

I GOT ROBBED! HOW NYS AND THE US SHOULD PROTECT YOUR DATA ONLINE

I GOT ROBBED! HOW NYS AND THE US SHOULD PROTECT YOUR DATA ONLINE I GOT ROBBED! HOW NYS AND THE US SHOULD PROTECT YOUR DATA ONLINE By Clyde Vanel, NYS Assemblyman, Chair, Subcommittee on Internet & New Technologies HELP, I GOT ROBBED! I felt like screaming that line

More information

Policy recommendations. Technology fraud and online exploitation

Policy recommendations. Technology fraud and online exploitation Policy recommendations Technology fraud and online The opportunity Cloud computing is revolutionizing how people work, learn, interact, and play. Education is just one example as a new generation of cloud-based

More information

Managing Your Affiliates and Partners in the Financial Industry

Managing Your Affiliates and Partners in the Financial Industry Managing Your Affiliates and Partners in the Financial Industry Daniel Morton Product Marketing Manager MarkMonitor Agenda Part 1: A Web of Financial Regulations Overview Regulations Worthy of Focus Examples

More information

Red Flag Regulations

Red Flag Regulations Red Flag Regulations Identity Theft Put In Context Overview of Topics Red Flag Regulations Overview How UM Protects Information What is the Student Workers role in identity theft prevention? What s this

More information

1 of 11 10/1/ :26 AM

1 of 11 10/1/ :26 AM 1 of 11 10/1/2010 12:26 AM About Us Careers Calculators Contact Us Search Home Your Money HQ ID Theft & Fraud FRAUD ALERT E-mail Scams ID Theft and Fraud Avoid Becoming a Victim What To Do If You Are a

More information

CLIENT MEMORANDUM. Federal Trade Commission s Rule for Prerecorded Message Telemarketing Calls

CLIENT MEMORANDUM. Federal Trade Commission s Rule for Prerecorded Message Telemarketing Calls CLIENT MEMORANDUM From: West Corporation Re: New Federal Trade Commission Rule for Prerecorded Message Telemarketing Calls Existing Federal Communication Commission Rule for Prerecorded Message Calls to

More information

( Utility Name ) Identity Theft Prevention Program

( Utility Name ) Identity Theft Prevention Program ***DRAFT*** ( Utility Name ) Identity Theft Prevention Program Implemented as of, 2008 *** This document is intended to give guidance to municipal utilities in their understanding of the FTC Red Flag Rule.

More information

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD IN A DIGITAL WORLD EU SYMPOSIUM 2006 15 June 2006 Maastricht, The Netherlands Cristina Bueti Cristina Bueti Project Officer Strategy and Policy Unit (SPU) International Telecommunication Union www.itu.int/spam

More information

Revision History. Revision # Date Author Sections Altered Rev 1.0 2/15/15 Ben Price New Document

Revision History. Revision # Date Author Sections Altered Rev 1.0 2/15/15 Ben Price New Document Privacy Policy Revision History Revision # Date Author Sections Altered Rev 1.0 2/15/15 Ben Price New Document Rev 1.1 7/24/15 Ben Price Verify Privacy grid requirements are met Rev 1.2 09/01/17 Stephanie

More information

Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation

Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation Booz Allen Hamilton Proprietary 1 Conference Presentation Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation Kris O Neal Dan Steinberg Harvard Privacy Symposium August

More information

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017 This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,

More information

Identity Theft Victim s Complaint and Affidavit

Identity Theft Victim s Complaint and Affidavit Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors

More information

VIEWING AND/OR USE AND/OR COMMUNICATION IS CONSTRUED AS ACCEPTANCE OF THE TERMS OF THIS POLICY

VIEWING AND/OR USE AND/OR COMMUNICATION IS CONSTRUED AS ACCEPTANCE OF THE TERMS OF THIS POLICY PRIVACY POLICY Last Modified: September 11, 2017 PERSONS OR PARTIES COVERED This Privacy Policy is intended to cover all visitors to this website, all subscribers to lists or newsletters associated with

More information

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information

More information

Small Business FRAUD PREVENTION Manual

Small Business FRAUD PREVENTION Manual Small Business FRAUD PREVENTION Manual TABLE OF CONTENTS PREFACE... ix PART 1: INTERNAL FRAUD THREATS I. INTRODUCTION TO EMPLOYEE FRAUD The Shocking Cost of Employee Theft and Fraud... 1 The Cost of Fraud

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

Privacy Policy Wealth Elements Pty Ltd

Privacy Policy Wealth Elements Pty Ltd Page 1 of 6 Privacy Policy Wealth Elements Pty Ltd Our Commitment to you Wealth Elements Pty Ltd is committed to providing you with the highest levels of client service. We recognise that your privacy

More information

US 2013 Consumer Data Privacy Study Mobile Edition

US 2013 Consumer Data Privacy Study Mobile Edition RESEARCH REPORT US 2013 Consumer Data Privacy Study Mobile Edition 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0

More information

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam Frauds & Scams Why is the Internet so attractive to scam artists? Anonymity Low cost Rapid growth Easy to adapt Be Cyber Savvy with C-SAFE 118 2006 Internet Fraud Trends Average Loss Online Auctions 34%

More information

Red Flag Policy and Identity Theft Prevention Program

Red Flag Policy and Identity Theft Prevention Program Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible

More information

Radix Acceptable Use and Anti-Abuse Policy

Radix Acceptable Use and Anti-Abuse Policy Radix Acceptable Use and Anti-Abuse Policy 1. General Provisions 1. Radix FZC and its subsidiaries ( Radix ) arecommitted to the stable and secure operation of its top-level domains ( TLDs ). Abusive use

More information

Data Breach Preparation and Response. April 21, 2017

Data Breach Preparation and Response. April 21, 2017 Data Breach Preparation and Response April 21, 2017 King & Spalding Data, Privacy & Security King & Spalding s 60 plus lawyer Data, Privacy & Security ( DPS ) Practice is best known for: Experienced crisis

More information

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program City of New Haven Identity Theft Prevention Program, October 2008, page City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program Adopted by Resolution of the Mayor and

More information

VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT

VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT 84095-9998 SNOWFLY PRIVACY POLICY This Privacy Policy describes Snowfly s practices regarding the

More information

Countermeasures against Mobile spam

Countermeasures against Mobile spam 8 July, 2004 Countermeasures against Mobile spam ~ Legislation and Self-regulation ~ Toshihiko SHIBUYA, Deputy Director Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry

More information

TABLE OF CONTENTS. Page

TABLE OF CONTENTS. Page TABLE OF CONTENTS Page Policy Statement... 1 What kinds of personal information do we collect?... 1 How do we collect and hold personal information?... 1 How do we hold personal information?... 2 Purposes

More information

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers; 65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment

More information

Midstate Telephone & Midstate Communications. Acceptable Use Policy

Midstate Telephone & Midstate Communications. Acceptable Use Policy Midstate Telephone & Midstate Communications Acceptable Use Policy Introduction Midstate is at all times committed to complying with the laws and regulations governing use of the Internet, e-mail transmission

More information

Magna5 reserves the right to make modifications to this policy at any time.

Magna5 reserves the right to make modifications to this policy at any time. INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy specifies the actions prohibited by Magna5 to users of the Magna5 Network or the networks of third-party providers. Magna5 reserves the right to

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2007 H 1 HOUSE BILL 1699

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2007 H 1 HOUSE BILL 1699 GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 0 H HOUSE BILL Short Title: Option to Stop Junk Mail. (Public) Sponsors: Representatives Fisher; Alexander, Faison, Harrison, and Samuelson. Referred to: Judiciary

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

Data Privacy Breach Policy and Procedure

Data Privacy Breach Policy and Procedure Data Privacy Breach Policy and Procedure Document Information Last revision date: April 16, 2018 Adopted date: Next review: January 1 Annually Overview A privacy breach is an action that results in an

More information

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule Legal Disclaimer: This overview is not intended as legal advice and should not be taken as such. We recommend that you consult legal

More information

PRIVACY STATEMENT OF TIBBAA SMARTCARD

PRIVACY STATEMENT OF TIBBAA SMARTCARD PRIVACY STATEMENT OF TIBBAA SMARTCARD 1. PERSONAL USE OF DATA 2. TS INFORMATION COLLECTED AND USED 3. INFORMATION ACCESSED BY TS FROM THIRD PARTIES 4. INFORMATION COLLECTED ON WEBSITES 5. INFORMATION OF

More information