Federal Trade Commission Protecting Consumer Privacy. J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission

Similar documents
Regulation P & GLBA Training

D A T A D I G E S T PUBLIC POLICY INSTITUTE PPI UNSOLICITED COMMERCIAL (SPAM) AND OLDER PERSONS ONLINE

CAN-SPAM Act of International Association of Privacy Professionals June 2004

Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust

University of North Texas System Administration Identity Theft Prevention Program

Summary Comparison of Current Data Security and Breach Notification Bills

Incident Response Guidelines

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2

PRIVACY POLICY Let us summarize this for you...

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

U.S. Private-sector Privacy Certification

ID Theft and Data Breach Mitigation

Why you MUST protect your customer data

Countering Spam. ITU-T Study Group 17 Geneva, Switzerland 11 October 2005

Individual Privacy: How Laws Impact Researchers, Whether the Laws Apply Or Not Howard Fienberg

CAN-SPAM ACT RULEMAKING

Prevention of Identity Theft in Student Financial Transactions AP 5800

1.2. Survey Information. Company may collect Personal Information from you when you voluntarily complete a Company survey, order form, or a

Spree Privacy Policy

IDENTITY THEFT PREVENTION Policy Statement

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

Privacy Dimensions to Canada's Anti-Spam Legislation (CASL)

ITU Survey on Anti-Spam Legislation Worldwide

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

I. PROPOSED DEFINITION OF PRIMARY PURPOSE IS INCONSISTENT WITH THE STATUTORY LANGUAGE OF THE CAN-SPAM ACT

H. R To reduce unsolicited commercial electronic mail and to protect children from sexually oriented advertisements.

Online Survey on Spamming Issues

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

YADTEL - Privacy Information INFORMATION WE COLLECT

Red Flags Program. Purpose

Acceptable Use Policy

Security and Privacy-Aware Cyber-Physical Systems: Legal Considerations. Christopher S. Yoo University of Pennsylvania July 12, 2018

Promoting Global Cybersecurity

Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT

Protecting Your Business: Best Practices for Implementing a Legally Compliant Cybersecurity Program Trivalent Solutions Expo June 19, 2014

Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

Pending U.S. Anti-spam Legislation: A Marketer's Guide

5LINX ID GUARD Product Overview. Credit/Presenter Goes Here

Dealing with the Reality of a Privacy Breach: Civil Litigation, Regulatory Response, and Minimizing Your Risks

Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect

NebraskaLink Acceptable Use Policy

Keeping It Under Wraps: Personally Identifiable Information (PII)

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Brief to the House of Commons Standing Committee on Industry, Science and Technology on the review of Canada s Anti-Spam Legislation.

Data Security: Public Contracts and the Cloud

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003

THE SMALL BUSINESS FRAUD PREVENTION MANUAL

Guiding principles on the Global Alliance against child sexual abuse online

ADMA Briefing Summary March

Legal, Ethical, and Professional Issues in Information Security

DEVELOPEO.COM PRIVACY POLICY

The Code has also been developed to demonstrate the industry s commitment to high ethical standards and best practice.

Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version

HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011

Coastal Babysitters Privacy Policy

Networking & Censorship

NYSVMS WEBSITE PRIVACY POLICY

Bob Gnapp Director Member Training & Network Analysis

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2

NASD NOTICE TO MEMBERS 97-58

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

I GOT ROBBED! HOW NYS AND THE US SHOULD PROTECT YOUR DATA ONLINE

Policy recommendations. Technology fraud and online exploitation

Managing Your Affiliates and Partners in the Financial Industry

Red Flag Regulations

1 of 11 10/1/ :26 AM

CLIENT MEMORANDUM. Federal Trade Commission s Rule for Prerecorded Message Telemarketing Calls

( Utility Name ) Identity Theft Prevention Program

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

Revision History. Revision # Date Author Sections Altered Rev 1.0 2/15/15 Ben Price New Document

Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

Identity Theft Victim s Complaint and Affidavit

VIEWING AND/OR USE AND/OR COMMUNICATION IS CONSTRUED AS ACCEPTANCE OF THE TERMS OF THIS POLICY

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog

Small Business FRAUD PREVENTION Manual

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Privacy Policy Wealth Elements Pty Ltd

US 2013 Consumer Data Privacy Study Mobile Edition

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Red Flag Policy and Identity Theft Prevention Program

Radix Acceptable Use and Anti-Abuse Policy

Data Breach Preparation and Response. April 21, 2017

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program

VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT

Countermeasures against Mobile spam

TABLE OF CONTENTS. Page

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;

Midstate Telephone & Midstate Communications. Acceptable Use Policy

Magna5 reserves the right to make modifications to this policy at any time.

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2007 H 1 HOUSE BILL 1699

Acceptable Use and Publishing Policy

Data Privacy Breach Policy and Procedure

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

PRIVACY STATEMENT OF TIBBAA SMARTCARD

Transcription:

Federal Trade Commission Protecting Consumer Privacy J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission

FTC s Approach to Privacy Consumers are concerned about consequences Focus on misuse of information No distinction between online and offline Benefits of Information Sharing

The National Do Not Call Registry Telemarketing Sales Rule Amendments Adopted December 2002 include Do Not Call Giving Consumers a Choice 61 million telephone numbers registered since June 27 Consumers with registered numbers have filed over 300,000 complaints since October 11 Harris Poll found that 92% of the respondents have received fewer calls since registering

Enforcing Do Not Call National Consumer Counsel Masqueraded as a nonprofit debt negotiation organization Called consumers who placed their phone numbers on the National Do Not Call Registry

Identity Theft Survey Results Released September 2003 The research took place during March and April 2003 Involved a random sample telephone survey of over 4,000 U.S. adults

Incidence of Identity Theft, Past Year 1 Federal Trade Commission 15 9.9 million victims Victims in Millions 10 5 3.2 million victims (1.5%) 2 1.5 million victims 5.2 million victims (2.4%) (4.6%) (0.7%) 0 New Accounts & Other Frauds Other Existing Accounts Existing Credit Card Only Total Victimization 1Source: Identity Theft Survey Report conducted by Synovate for the FTC (March-April 2003). 2Based on the U.S. population age 18 and over (215.47 million) as of July 1, 2002 (Source: Population Division, U.S. Census Bureau; Table NA-EST2002-ASRO-01).

How Thief Obtained Victim s Information 1 Federal Trade Commission 75% 50% 49% 25% 23% 13% 14% 0% Theft Transaction Other Don't Know 1Source: Identity Theft Survey Report conducted by Synovate for the FTC (March-April 2003). Percentages based on respondents who indicated they had been the victim of identity theft within the past five years.

Cost of Identity Theft in the Last Year 1 Federal Trade Commission September 2003 $50 $47 $47 billion $40 (in billions) $30 $33 $33 billion $20 $14 $14 billion $10 $0 New Accounts & Other Frauds Misuse of Existing Accounts (Credit Card & Non-Credit Card) All Identity Theft 1 Source: Identity Theft Survey Report (Table 2, page 7) conducted by Synovate for the FTC (March-April 2003).

Money Victim Paid Out of Pocket 1 Federal Trade Commission 75% 63% Average Per Victim: $500 50% 25% 11% 12% 8% 0% None Less Than $100 $100-$999 $1,000 or More 1Source: Identity Theft Survey Report conducted by Synovate for the FTC (March-April 2003). Percentages and average per victim based on respondents who indicated they had been the victim of identity theft within the past five years.

Identity Theft Role of Law Enforcement Civil Actions: phishing cases Criminal Prosecution

Identity Theft Other Law Enforcement cases TriWest TCI

Legislative Developments FACTA FACTA (Fair and Accurate Credit Transactions Act of 2003) amends the Fair Credit Reporting Act. Creates new rights for consumers in the credit arena, including: Annual free credit reports Streamlined dispute process Expansion of consumers adverse action rights

FACTA & IDT Prevention & Victim Assistance Codifies the Fraud Alert Procedure Trade Line Blocking for Credit Reports Credit card truncation on Receipts ID theft red flags for Bank Examinations Require proper disposal of consumer report information

Information Security: General Principles Section 5 of the FTC Act: deceptive or unfair practices are illegal Promises to keep consumers information secure must be truthful When security measures inadequate, those promises are deceptive Failure to take reasonable security precautions may also be unfair

Security Procedures Must Be Appropriate In The Circumstances Inadvertent release of sensitive personal information due to inadequate security procedures Eli Lilly Our analysis: were there reasonable procedures in light of the sensitivity of the information to prevent such breaches? What constitutes reasonable and appropriate procedures is linked directly to the sensitivity of the information collected by the company

Law Violations Without a Known Breach Companies Cannot Simply Wait for a Breach to Occur Must Take Reasonable Steps to Guard Against Reasonably Anticipated Vulnerabilities Breach or No Breach is not Determinative -- Microsoft

Assessing Risks and Vulnerabilities Security is a process Information security program assesses reasonable and foreseeable risks and threats Must assess and adjust to new technologies, new threats: Guess.com

Creating Vulnerabilities Making sure that you do not create vulnerabilities A system upgrade introduced a security vulnerability that allowed web users to access order history records and to view certain personal information: Tower

Notice Case-by-case determination of when appropriate Sensitivity of information breached Other parties besides consumers may best in best position to reduce harm

Spam Three-pronged approach Research Targeted Law Enforcement Education

Spam Research False Claims in Spam Study April 2003 Two-thirds of spam appears to be deceptive on its face, and likely violates the FTC Act Much of the rest is pornography or offers for illegal products or services Only 16.5% of the spam did not sell an illegitimate product or service.

Spam Research: False Claims in Spam Study Most spam is not from large companies Random sample of 114 pieces of spam: None was sent by a Fortune 500 company Only one was sent by a Fortune 1000 company 95% confident that less than 5% of the 11.6 million pieces of spam in our database came from Fortune 1000 companies.

Spam Law Enforcement Targeted Law Enforcement 62 cases addressing deceptive spam Our spam database receives over 250,000 pieces of spam daily Challenges presented by enforcement

CAN-SPAM Cases Phoenix Avatar, et al. Alleged violations of the FTC Act and of CAN- SPAM Cooperation with DOJ lead to a criminal indictment against all defendants Global Web Promotions, et al. Alleged violations of the FTC Act and of CAN- SPAM Defendants located in Australia and New Zealand

CAN-SPAM Rules and Reports Additional rules interpreting certain CAN-Spam provisions Studies Do-Not-Email Registry Special labeling of sexually explicit spam Labeling of all spam Bounty system to promote enforcement Report to Congress due in 2 years

Spam Education Open Relay Project: Our first international effort to identify insecure mail servers Operation Secure Your Server: Worldwide effort to close spammers access to anonymity

WHAT CAN I EXPECT FROM THE FTC IN THE COMING YEAR?

Top Priorities Do Not Call Enforcement FCRA Information Security Spam

Federal Trade Commission For the Consumer 1-877-FTC-HELP www.ftc.gov