Federal Trade Commission Protecting Consumer Privacy. J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission
|
|
- Meghan Price
- 5 years ago
- Views:
Transcription
1 Federal Trade Commission Protecting Consumer Privacy J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission
2 FTC s Approach to Privacy Consumers are concerned about consequences Focus on misuse of information No distinction between online and offline Benefits of Information Sharing
3 The National Do Not Call Registry Telemarketing Sales Rule Amendments Adopted December 2002 include Do Not Call Giving Consumers a Choice 61 million telephone numbers registered since June 27 Consumers with registered numbers have filed over 300,000 complaints since October 11 Harris Poll found that 92% of the respondents have received fewer calls since registering
4 Enforcing Do Not Call National Consumer Counsel Masqueraded as a nonprofit debt negotiation organization Called consumers who placed their phone numbers on the National Do Not Call Registry
5 Identity Theft Survey Results Released September 2003 The research took place during March and April 2003 Involved a random sample telephone survey of over 4,000 U.S. adults
6 Incidence of Identity Theft, Past Year 1 Federal Trade Commission million victims Victims in Millions million victims (1.5%) million victims 5.2 million victims (2.4%) (4.6%) (0.7%) 0 New Accounts & Other Frauds Other Existing Accounts Existing Credit Card Only Total Victimization 1Source: Identity Theft Survey Report conducted by Synovate for the FTC (March-April 2003). 2Based on the U.S. population age 18 and over ( million) as of July 1, 2002 (Source: Population Division, U.S. Census Bureau; Table NA-EST2002-ASRO-01).
7 How Thief Obtained Victim s Information 1 Federal Trade Commission 75% 50% 49% 25% 23% 13% 14% 0% Theft Transaction Other Don't Know 1Source: Identity Theft Survey Report conducted by Synovate for the FTC (March-April 2003). Percentages based on respondents who indicated they had been the victim of identity theft within the past five years.
8 Cost of Identity Theft in the Last Year 1 Federal Trade Commission September 2003 $50 $47 $47 billion $40 (in billions) $30 $33 $33 billion $20 $14 $14 billion $10 $0 New Accounts & Other Frauds Misuse of Existing Accounts (Credit Card & Non-Credit Card) All Identity Theft 1 Source: Identity Theft Survey Report (Table 2, page 7) conducted by Synovate for the FTC (March-April 2003).
9 Money Victim Paid Out of Pocket 1 Federal Trade Commission 75% 63% Average Per Victim: $500 50% 25% 11% 12% 8% 0% None Less Than $100 $100-$999 $1,000 or More 1Source: Identity Theft Survey Report conducted by Synovate for the FTC (March-April 2003). Percentages and average per victim based on respondents who indicated they had been the victim of identity theft within the past five years.
10 Identity Theft Role of Law Enforcement Civil Actions: phishing cases Criminal Prosecution
11 Identity Theft Other Law Enforcement cases TriWest TCI
12 Legislative Developments FACTA FACTA (Fair and Accurate Credit Transactions Act of 2003) amends the Fair Credit Reporting Act. Creates new rights for consumers in the credit arena, including: Annual free credit reports Streamlined dispute process Expansion of consumers adverse action rights
13 FACTA & IDT Prevention & Victim Assistance Codifies the Fraud Alert Procedure Trade Line Blocking for Credit Reports Credit card truncation on Receipts ID theft red flags for Bank Examinations Require proper disposal of consumer report information
14 Information Security: General Principles Section 5 of the FTC Act: deceptive or unfair practices are illegal Promises to keep consumers information secure must be truthful When security measures inadequate, those promises are deceptive Failure to take reasonable security precautions may also be unfair
15 Security Procedures Must Be Appropriate In The Circumstances Inadvertent release of sensitive personal information due to inadequate security procedures Eli Lilly Our analysis: were there reasonable procedures in light of the sensitivity of the information to prevent such breaches? What constitutes reasonable and appropriate procedures is linked directly to the sensitivity of the information collected by the company
16 Law Violations Without a Known Breach Companies Cannot Simply Wait for a Breach to Occur Must Take Reasonable Steps to Guard Against Reasonably Anticipated Vulnerabilities Breach or No Breach is not Determinative -- Microsoft
17 Assessing Risks and Vulnerabilities Security is a process Information security program assesses reasonable and foreseeable risks and threats Must assess and adjust to new technologies, new threats: Guess.com
18 Creating Vulnerabilities Making sure that you do not create vulnerabilities A system upgrade introduced a security vulnerability that allowed web users to access order history records and to view certain personal information: Tower
19 Notice Case-by-case determination of when appropriate Sensitivity of information breached Other parties besides consumers may best in best position to reduce harm
20 Spam Three-pronged approach Research Targeted Law Enforcement Education
21 Spam Research False Claims in Spam Study April 2003 Two-thirds of spam appears to be deceptive on its face, and likely violates the FTC Act Much of the rest is pornography or offers for illegal products or services Only 16.5% of the spam did not sell an illegitimate product or service.
22 Spam Research: False Claims in Spam Study Most spam is not from large companies Random sample of 114 pieces of spam: None was sent by a Fortune 500 company Only one was sent by a Fortune 1000 company 95% confident that less than 5% of the 11.6 million pieces of spam in our database came from Fortune 1000 companies.
23 Spam Law Enforcement Targeted Law Enforcement 62 cases addressing deceptive spam Our spam database receives over 250,000 pieces of spam daily Challenges presented by enforcement
24 CAN-SPAM Cases Phoenix Avatar, et al. Alleged violations of the FTC Act and of CAN- SPAM Cooperation with DOJ lead to a criminal indictment against all defendants Global Web Promotions, et al. Alleged violations of the FTC Act and of CAN- SPAM Defendants located in Australia and New Zealand
25 CAN-SPAM Rules and Reports Additional rules interpreting certain CAN-Spam provisions Studies Do-Not- Registry Special labeling of sexually explicit spam Labeling of all spam Bounty system to promote enforcement Report to Congress due in 2 years
26 Spam Education Open Relay Project: Our first international effort to identify insecure mail servers Operation Secure Your Server: Worldwide effort to close spammers access to anonymity
27 WHAT CAN I EXPECT FROM THE FTC IN THE COMING YEAR?
28 Top Priorities Do Not Call Enforcement FCRA Information Security Spam
29 Federal Trade Commission For the Consumer FTC-HELP
Regulation P & GLBA Training
Regulation P & GLBA Training Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed
More informationD A T A D I G E S T PUBLIC POLICY INSTITUTE PPI UNSOLICITED COMMERCIAL (SPAM) AND OLDER PERSONS ONLINE
PPI PUBLIC POLICY INSTITUTE UNSOLICITED COMMERCIAL EMAIL (SPAM) AND OLDER PERSONS ONLINE D A T A D I G E S T INTRODUCTION Older Persons Online An increasing number of older persons are online users. In
More informationCAN-SPAM Act of International Association of Privacy Professionals June 2004
CAN-SPAM Act of 2003 International Association of Privacy Professionals June 2004 Vice President & General Counsel, Digital Impact, Inc. Background; Pre-emption Background Law signed by President Bush
More informationBuilding Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust
Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust Jamie Danker Director, Senior Privacy Officer National Protection and Programs Directorate, U.S.
More informationUniversity of North Texas System Administration Identity Theft Prevention Program
University of North Texas System Administration Identity Theft Prevention Program I. Purpose of the Identity Theft Prevention Program The Federal Trade Commission ( FTC ) requires certain entities, including
More informationSummary Comparison of Current Data Security and Breach Notification Bills
Topic S. 117 (Nelson) S. (Carper/Blunt) H.R. (Blackburn/Welch) Comments Data Security Standards The FTC shall promulgate regulations requiring information security practices that are appropriate to the
More informationIncident Response Guidelines
New Orleans, La November 17, 2006 LBA 2006 Bank Counsel Conference Data Breaches, FFIEC Requirements and Incident Response Guidelines Remarks by Richard Riese, Director ABA Center for Regulatory Compliance
More informationPrivacy Policy... 1 EU-U.S. Privacy Shield Policy... 2
Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your
More informationPRIVACY POLICY Let us summarize this for you...
PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase
More informationOverview Bank IT examination perspective Background information Elements of a sound plan Customer notifications
Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationU.S. Private-sector Privacy Certification
1 Page 1 of 5 U.S. Private-sector Privacy Certification Outline of the Body of Knowledge for the Certified Information Privacy Professional/United States (CIPP/US ) I. Introduction to the U.S. Privacy
More informationID Theft and Data Breach Mitigation
ID Theft and Data Breach Mitigation Jeremy Gilbert, GCFE, GASF, EnCE, CPA 1 Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk 2 Consumer Identity
More informationWhy you MUST protect your customer data
Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are
More informationCountering Spam. ITU-T Study Group 17 Geneva, Switzerland 11 October 2005
Countering Spam ITU-T Study Group 17 Geneva, Switzerland 11 October 2005 Cristina Bueti Strategy and Policy Unit International Telecommunication Union world summit on the information society 1 What is
More informationIndividual Privacy: How Laws Impact Researchers, Whether the Laws Apply Or Not Howard Fienberg
Individual Privacy: How Laws Impact Researchers, Whether the Laws Apply Or Not Howard Fienberg Director of Government Affairs, CMOR: Promoting and Advocating Survey Research hfienberg@cmor.org 1111 16
More informationCAN-SPAM ACT RULEMAKING
CAN-SPAM ACT RULEMAKING Rachel E. Matteo-Boehm Piper Rudnick LLP 333 Market Street, Suite 3200 San Francisco, California 94105 415.659.7044 rachel.matteo-boehm@piperrudnick.com 198164v1 CAN-SPAM Act Rulemaking
More informationPrevention of Identity Theft in Student Financial Transactions AP 5800
Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to
More information1.2. Survey Information. Company may collect Personal Information from you when you voluntarily complete a Company survey, order form, or a
PRIVACY POLICY This Privacy Policy governs your use of this website and any content, products or services made available from or through this website including any sub domains thereof ("Website"). The
More informationSpree Privacy Policy
Spree Privacy Policy Effective as at 21 November 2018 Introduction Spree respects your privacy and it is important to us that you have an enjoyable experience buying and selling with us but also that you
More informationIDENTITY THEFT PREVENTION Policy Statement
Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy
More informationma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018
ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:
More informationPrivacy Dimensions to Canada's Anti-Spam Legislation (CASL)
Privacy Dimensions to Canada's Anti-Spam Legislation (CASL) IAPP Canada Privacy Symposium 2012 May 9 11, 2012 Toronto, Ontario Michael De Santis, Legal Counsel Office of the Privacy Commissioner of Canada
More informationITU Survey on Anti-Spam Legislation Worldwide
ITU Survey on Anti-Spam Legislation Worldwide Cristina Bueti Strategy and Policy Unit International Telecommunication Union WSIS Thematic Meeting on Cybersecurity 28 June 1 July 2005 world summit on the
More informationSTOCKTON UNIVERSITY PROCEDURE DEFINITIONS
STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act
More informationI. PROPOSED DEFINITION OF PRIMARY PURPOSE IS INCONSISTENT WITH THE STATUTORY LANGUAGE OF THE CAN-SPAM ACT
September 13, 2004 Via Electronic Mail Federal Trade Commission Office of the Secretary Room H-159 600 Pennsylvania Avenue, NW Washington, D.C. 20580 Re: CAN-SPAM Act Rulemaking, Project No. R411008 Ladies
More informationH. R To reduce unsolicited commercial electronic mail and to protect children from sexually oriented advertisements.
I 0TH CONGRESS ST SESSION H. R. To reduce unsolicited commercial electronic mail and to protect children from sexually oriented advertisements. IN THE HOUSE OF REPRESENTATIVES MAY, 00 Ms. LOFGREN (for
More informationOnline Survey on Spamming Issues
Online Survey on Spamming Issues Sept 9th, 2003 Executive Summary 2 a VNU company Insert client logo Executive Summary Incidence of organisations receiving spam is high at 95% Spam is mostly recognised
More informationIdentity Theft, Fraud & You. PrePare. Protect. Prevent.
PrePare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer
More informationYADTEL - Privacy Information INFORMATION WE COLLECT
YADTEL - Privacy Information As a customer of Yadtel, you are entitled to know what we do with personal information about you that we receive. We consider our treatment of such information to be a part
More informationRed Flags Program. Purpose
Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University
More informationAcceptable Use Policy
Acceptable Use Policy Jackson Energy Authority 731.422.7500 INTRODUCTION Jackson Energy Authority ( JEA ) has formulated this Acceptable Use Policy ( AUP ), in order to set forth terms regarding the responsible
More informationSecurity and Privacy-Aware Cyber-Physical Systems: Legal Considerations. Christopher S. Yoo University of Pennsylvania July 12, 2018
Security and Privacy-Aware Cyber-Physical Systems: Legal Considerations Christopher S. Yoo University of Pennsylvania July 12, 2018 Overview of Research Tort and products liability for CPS Privacy and
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationPolicy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT
Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT The Utility maintains accounts for its customers to pay for utility service where bills are
More informationProtecting Your Business: Best Practices for Implementing a Legally Compliant Cybersecurity Program Trivalent Solutions Expo June 19, 2014
Protecting Your Business: Best Practices for Implementing a Legally Compliant Cybersecurity Program Trivalent Solutions Expo June 19, 2014 2014, Mika Meyers Beckett & Jones PLC All Rights Reserved Presented
More informationCanada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask
Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask Author: Jennifer Babe, LL.M, ICD.D Why Should I Read This Alert? a) despite its name, this Act covers much more
More informationOnline Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
More informationInside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.
Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. HIPAA GENERAL RULE PHI may not be disclosed without patient authorization
More informationPending U.S. Anti-spam Legislation: A Marketer's Guide
Tactical Guidelines, W. Janowski Research Note 14 August 2003 Pending U.S. Anti-spam Legislation: A Marketer's Guide Nine anti-spam proposals are before the 108th U.S. Congress. Marketers must understand
More information5LINX ID GUARD Product Overview. Credit/Presenter Goes Here
5LINX ID GUARD Product Overview Credit/Presenter Goes Here Statistics According to the FTC approximately 11 million people were victims of identity theft in 2009. It s estimated that $221 billion a year
More informationDealing with the Reality of a Privacy Breach: Civil Litigation, Regulatory Response, and Minimizing Your Risks
Dealing with the Reality of a Privacy Breach: Civil Litigation, Regulatory Response, and Minimizing Your Risks HCAA North Central Regional Annual Conference October 3, 2011 Overview The challenge of protecting
More informationMark Your Calendars: NY Cybersecurity Regulations to Go into Effect
Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect CLIENT ALERT January 25, 2017 Angelo A. Stio III stioa@pepperlaw.com Sharon R. Klein kleins@pepperlaw.com Christopher P. Soper soperc@pepperlaw.com
More informationNebraskaLink Acceptable Use Policy
NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink
More informationKeeping It Under Wraps: Personally Identifiable Information (PII)
Keeping It Under Wraps: Personally Identifiable Information (PII) Will Robinson Assistant Vice President Information Security Officer & Data Privacy Officer Federal Reserve Bank of Richmond March 14, 2018
More informationInsider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey
Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey CyberMaryland Conference 2017 Bob Andersen, Sr. Manager Federal Sales Engineering robert.andersen@solarwinds.com
More informationBrief to the House of Commons Standing Committee on Industry, Science and Technology on the review of Canada s Anti-Spam Legislation.
Brief to the House of Commons Standing Committee on Industry, Science and Technology on the review of Canada s Anti-Spam Legislation October 5, 2017 1. Introduction The Email Sender and Provider Coalition
More informationData Security: Public Contracts and the Cloud
Data Security: Public Contracts and the Cloud July 27, 2012 ABA Public Contract Law Section, State and Local Division Ieuan Mahony Holland & Knight ieuan.mahony@hklaw.com Roadmap Why is security a concern?
More informationDeveloping Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?
Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack
More informationPrivacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd
Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Our Commitment Ten Tigers Grain Marketing Pty Ltd and Ten Tigers Pty Ltd are committed to providing you with the highest levels of client service.
More informationTHE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003
THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, 2004 This FAQ is not intended to provide specific advice about individual legal, business, or other questions. It was prepared
More informationTHE SMALL BUSINESS FRAUD PREVENTION MANUAL
THE SMALL BUSINESS FRAUD PREVENTION MANUAL TABLE OF CONTENTS PART 1: INTERNAL FRAUD THREATS I. INTRODUCTION TO EMPLOYEE FRAUD The Shocking Cost of Employee Theft and Fraud... 1 The Cost of Fraud to Small
More informationGuiding principles on the Global Alliance against child sexual abuse online
Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child
More informationADMA Briefing Summary March
ADMA Briefing Summary March 2013 www.adma.com.au Privacy issues are being reviewed globally. In most cases, technological changes are driving the demand for reforms and Australia is no exception. From
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationDEVELOPEO.COM PRIVACY POLICY
DEVELOPEO.COM PRIVACY POLICY Please check and read Developeo.com Privacy Policy to get a clear grasp of how Developeo protects, uses, collects or handles your information in accordance with the website.
More informationThe Code has also been developed to demonstrate the industry s commitment to high ethical standards and best practice.
1 Table of Contents 1 Introduction 3 1.1 Objectives of the Code 3 1.2 About Group Buying 3 2 Definitions 4 3 Compliance with Australian Laws 5 4 Marketing Claims 6 4.1 Misleading and / or deceptive conduct
More informationLaw Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version
Date: 18 October 2010 Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Introduction: Below are: 1) suggested amendments to the RAA and; 2) due diligence recommendations
More informationHIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011
HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, 2012 Phyllis F. Granade The Granade Law Firm Atlanta, GA (678) 705 2507 pgranade@granadelaw.com www.granadelaw.com Looking
More informationCoastal Babysitters Privacy Policy
. Coastal Babysitters Privacy Policy Orly Isa Muscat trading as "Coastal Babysitters" (ABN 66 206 628 086) ("we", "us" or the "Company") is committed to privacy protection. At http://coastalbabysitters.com.au/
More informationNetworking & Censorship
Networking & Censorship How We Use the Web Shopping Contributing content (wikis, blogs) Promoting business Learning Exploring our roots Exploring virtual worlds Paying taxes Gambling Lots more Online
More informationNYSVMS WEBSITE PRIVACY POLICY
Your Privacy Rights Effective Date: June 16, 2016 NYSVMS WEBSITE PRIVACY POLICY The New York State Veterinary Medical Society, Inc. and its affiliates ( NYSVMS, we, and us ) recognize the importance of
More informationBob Gnapp Director Member Training & Network Analysis
Robocalls and Spoofing Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 This presentation may be used by attendees for informational purposes only. No part of this presentation
More informationNWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2
NWQ Capital Management Pty Ltd Privacy Policy March 2017 Page 1 of 8 Privacy and Spam Policy NWQ Capital Management Pty Ltd s Commitment NWQ Capital Management Pty Ltd (NWQ) is committed to providing you
More informationNASD NOTICE TO MEMBERS 97-58
NASD NOTICE TO MEMBERS 97-58 NASD Regulation Requests Comment On Proposed Interpretive Material 1031 Regarding Cold Calling Activity; Comment Period Expires October 31, 1997 Suggested Routing Senior Management
More informationCOUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017
COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE Presented by Paul R. Hales, J.D. May 8, 2017 1 HIPAA Rules Combat Cyber Crime HIPAA Rules A Blueprint to Combat Cyber Crime 2 HIPAA Rules Combat Cyber Crime
More informationI GOT ROBBED! HOW NYS AND THE US SHOULD PROTECT YOUR DATA ONLINE
I GOT ROBBED! HOW NYS AND THE US SHOULD PROTECT YOUR DATA ONLINE By Clyde Vanel, NYS Assemblyman, Chair, Subcommittee on Internet & New Technologies HELP, I GOT ROBBED! I felt like screaming that line
More informationPolicy recommendations. Technology fraud and online exploitation
Policy recommendations Technology fraud and online The opportunity Cloud computing is revolutionizing how people work, learn, interact, and play. Education is just one example as a new generation of cloud-based
More informationManaging Your Affiliates and Partners in the Financial Industry
Managing Your Affiliates and Partners in the Financial Industry Daniel Morton Product Marketing Manager MarkMonitor Agenda Part 1: A Web of Financial Regulations Overview Regulations Worthy of Focus Examples
More informationRed Flag Regulations
Red Flag Regulations Identity Theft Put In Context Overview of Topics Red Flag Regulations Overview How UM Protects Information What is the Student Workers role in identity theft prevention? What s this
More information1 of 11 10/1/ :26 AM
1 of 11 10/1/2010 12:26 AM About Us Careers Calculators Contact Us Search Home Your Money HQ ID Theft & Fraud FRAUD ALERT E-mail Scams ID Theft and Fraud Avoid Becoming a Victim What To Do If You Are a
More informationCLIENT MEMORANDUM. Federal Trade Commission s Rule for Prerecorded Message Telemarketing Calls
CLIENT MEMORANDUM From: West Corporation Re: New Federal Trade Commission Rule for Prerecorded Message Telemarketing Calls Existing Federal Communication Commission Rule for Prerecorded Message Calls to
More information( Utility Name ) Identity Theft Prevention Program
***DRAFT*** ( Utility Name ) Identity Theft Prevention Program Implemented as of, 2008 *** This document is intended to give guidance to municipal utilities in their understanding of the FTC Red Flag Rule.
More informationCOUNTERING COUNTERING SPAM IN A DIGITAL WORLD
IN A DIGITAL WORLD EU SYMPOSIUM 2006 15 June 2006 Maastricht, The Netherlands Cristina Bueti Cristina Bueti Project Officer Strategy and Policy Unit (SPU) International Telecommunication Union www.itu.int/spam
More informationRevision History. Revision # Date Author Sections Altered Rev 1.0 2/15/15 Ben Price New Document
Privacy Policy Revision History Revision # Date Author Sections Altered Rev 1.0 2/15/15 Ben Price New Document Rev 1.1 7/24/15 Ben Price Verify Privacy grid requirements are met Rev 1.2 09/01/17 Stephanie
More informationIdentity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation
Booz Allen Hamilton Proprietary 1 Conference Presentation Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation Kris O Neal Dan Steinberg Harvard Privacy Symposium August
More informationEDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017
This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,
More informationIdentity Theft Victim s Complaint and Affidavit
Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors
More informationVIEWING AND/OR USE AND/OR COMMUNICATION IS CONSTRUED AS ACCEPTANCE OF THE TERMS OF THIS POLICY
PRIVACY POLICY Last Modified: September 11, 2017 PERSONS OR PARTIES COVERED This Privacy Policy is intended to cover all visitors to this website, all subscribers to lists or newsletters associated with
More informationRe: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog
April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information
More informationSmall Business FRAUD PREVENTION Manual
Small Business FRAUD PREVENTION Manual TABLE OF CONTENTS PREFACE... ix PART 1: INTERNAL FRAUD THREATS I. INTRODUCTION TO EMPLOYEE FRAUD The Shocking Cost of Employee Theft and Fraud... 1 The Cost of Fraud
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationPrivacy Policy Wealth Elements Pty Ltd
Page 1 of 6 Privacy Policy Wealth Elements Pty Ltd Our Commitment to you Wealth Elements Pty Ltd is committed to providing you with the highest levels of client service. We recognise that your privacy
More informationUS 2013 Consumer Data Privacy Study Mobile Edition
RESEARCH REPORT US 2013 Consumer Data Privacy Study Mobile Edition 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
More informationFrauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam
Frauds & Scams Why is the Internet so attractive to scam artists? Anonymity Low cost Rapid growth Easy to adapt Be Cyber Savvy with C-SAFE 118 2006 Internet Fraud Trends Average Loss Online Auctions 34%
More informationRed Flag Policy and Identity Theft Prevention Program
Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible
More informationRadix Acceptable Use and Anti-Abuse Policy
Radix Acceptable Use and Anti-Abuse Policy 1. General Provisions 1. Radix FZC and its subsidiaries ( Radix ) arecommitted to the stable and secure operation of its top-level domains ( TLDs ). Abusive use
More informationData Breach Preparation and Response. April 21, 2017
Data Breach Preparation and Response April 21, 2017 King & Spalding Data, Privacy & Security King & Spalding s 60 plus lawyer Data, Privacy & Security ( DPS ) Practice is best known for: Experienced crisis
More informationCity of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program
City of New Haven Identity Theft Prevention Program, October 2008, page City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program Adopted by Resolution of the Mayor and
More informationVERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT
VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT 84095-9998 SNOWFLY PRIVACY POLICY This Privacy Policy describes Snowfly s practices regarding the
More informationCountermeasures against Mobile spam
8 July, 2004 Countermeasures against Mobile spam ~ Legislation and Self-regulation ~ Toshihiko SHIBUYA, Deputy Director Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry
More informationTABLE OF CONTENTS. Page
TABLE OF CONTENTS Page Policy Statement... 1 What kinds of personal information do we collect?... 1 How do we collect and hold personal information?... 1 How do we hold personal information?... 2 Purposes
More informationXpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;
65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment
More informationMidstate Telephone & Midstate Communications. Acceptable Use Policy
Midstate Telephone & Midstate Communications Acceptable Use Policy Introduction Midstate is at all times committed to complying with the laws and regulations governing use of the Internet, e-mail transmission
More informationMagna5 reserves the right to make modifications to this policy at any time.
INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy specifies the actions prohibited by Magna5 to users of the Magna5 Network or the networks of third-party providers. Magna5 reserves the right to
More informationGENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2007 H 1 HOUSE BILL 1699
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 0 H HOUSE BILL Short Title: Option to Stop Junk Mail. (Public) Sponsors: Representatives Fisher; Alexander, Faison, Harrison, and Samuelson. Referred to: Judiciary
More informationAcceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
More informationData Privacy Breach Policy and Procedure
Data Privacy Breach Policy and Procedure Document Information Last revision date: April 16, 2018 Adopted date: Next review: January 1 Annually Overview A privacy breach is an action that results in an
More informationAn Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule
An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule Legal Disclaimer: This overview is not intended as legal advice and should not be taken as such. We recommend that you consult legal
More informationPRIVACY STATEMENT OF TIBBAA SMARTCARD
PRIVACY STATEMENT OF TIBBAA SMARTCARD 1. PERSONAL USE OF DATA 2. TS INFORMATION COLLECTED AND USED 3. INFORMATION ACCESSED BY TS FROM THIRD PARTIES 4. INFORMATION COLLECTED ON WEBSITES 5. INFORMATION OF
More information