SlideShare una empresa de Scribd logo
1 de 52
IDENTITY THEFT   “ The fastest growing white-collar crime in America” According to the FBI Employer Compliance
Royce McCoy ,  CITRMS Identity Theft Risk Management Group, LLC  The Institute of Fraud Risk Management is the nation’s only professional certification program ( CITRMS ) specifically developed to train and equip professionals to understand and address Identity Theft and related fraud issues.
Karen McCoy ,  CITRMS Identity Theft Risk Management Group, LLC  The Institute of Fraud Risk Management is the nation’s only professional certification program ( CITRMS ) specifically developed to train and equip professionals to understand and address Identity Theft and related fraud issues.
[object Object],[object Object],[object Object],[object Object],[object Object],Overview….
[object Object],[object Object],[object Object],[object Object],[object Object]
Drivers  License Medical Financial Identity theft is not   just   about credit cards, it’s a legal issue ! Over 70% of the time  access to an attorney  will be critical to resolve these issues. Social  Security Criminal Five Common Types of Identity Theft Less than  28% 10 M sold every 6 weeks WSJ Fastest growing IDT Unofficial National ID Wrongful Arrest
Let’s look at a video clip From CNN showing how Identity Theft affects victims Identity Theft is  in the   News….
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],*(Identity Theft Resource Center2007) Latest Facts about Identity Theft*
Correcting the victims’ records is so overwhelming it is imperative for Employers to protect the data. “ Once the credit systems accept bad data it can be next to impossible to clear.”   USA Today June 5, 2007 “ Medical identity theft can impair your health and finances… and detecting this isn’t easy… and remedying the damages can be difficult.”   Wall Street Journal  October 11, 2007 Where the Law Becomes Logical
“ A rise in identity theft is presenting  employers   with a major headache: They  are being held liable for identity theft  that occurs in the workplace.” Douglas Hottle, Meyer, Unkovic & Scott,  “ Workplace Identity Theft: How to Curb an HR Headache” BLR: Business and Legal Reports , September 19, 2006
[object Object],[object Object],[object Object],[object Object],Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You Important Legislation
 
Identity Theft Resource Center, of the approximately 44 million Americans who have been the victims of identity theft at some point, each  spent an average of 600 hours and $1,495 getting their finances straightened out.  And, that doesn’t include attorney’s fees. In 2004, identity theft cost financial institutions and businesses an estimated $52.6 billion,
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],However, these new provisions also create serious  new responsibilities – and potential liabilities – for businesses nationwide.  Simply put, if data aiding an identity theft originates from a security breach at your company, you could be sued, fined, or become a defendant in a  class-action lawsuit  by affected employees whose personal information has somehow gotten out.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],This law applies to any business, regardless of size, that collects personal information or consumer reports about customers  or   employees   to make decisions within their business  (including names, credit card numbers, birthdates, home addresses and more). Who Does FACTA Affect ?
[object Object],[object Object],[object Object],Penalties
…… all businesses must be able to show that they have a security plan in place. In order to comply with FACTA, Betsy Broder, the Assistant Director of that FTC division ,  was quoted in the  March 2006 American Bar Association Journal  saying that means  businesses   need to have a written plan describing how customer data will be safeguarded  and a  staff member or company officer designated to be responsible for implementing that plan .  Broder went on to say,   “We’re not looking for a perfect system.  But we need to see that you’ve taken  responsible steps  to protect your customers’ information.” Now What?  It’s Time to Develop a Plan!
According to the FTC, a “ reasonable ” plan to safeguard personal information includes: Designate an employee ( or employees)  to coordinate and  be   responsible for the security program. … . include  employee training …. Continually evaluating  and adjusting  the security plan….. Create a mitigation plan….. This mitigation plan should  kick in  when there is a privacy or security breach   and there is a need to  “ repair   it ”  immediately in the eyes of customers, government regulators, and management.
A sensible and effective program will go a long way towards   reducing the risk of federal government  enforcement ,  even if the security policy should fail in a particular situation and a security breach results.
New ‘Red Flag’ Requirements for Financial Institutions and Creditors will Help Fight Identity Theft …… requiring financial institutions and creditors to develop and implement written identity theft prevention programs ,  as   part of the  Fair and Accurate Credit Transactions   (FACTA) of 2003 .  The programs must be in place by November 1, 2008 ,  and must provide for the identification, detection, and response to patterns, practices, or specific activities — known as “red flags” — that could indicate identity theft. … a financial institution is defined as a  state or national bank , a  state or federal savings and loan  association, a mutual savings bank, a  state or federal credit union ,  or any other entity that holds a “transaction account” belonging to a consumer.  A  transaction account  is a deposit or other  account from which the owner makes payments   or transfers.  PG. 1 Financial institutions and creditors  soon will be  required to implement a program to detect, prevent, and mitigate instances of identity theft. Federal Trade Commission   -   Bureau of Consumer Protection  -   Division of Consumer & Business Education
New ‘Red Flag’ Requirements for Financial Institutions and Creditors will Help Fight Identity Theft PG. 2 A creditor is  any entity that regularly extends, renews, or continues credit ;  any entity that regularly arranges for the extension, renewal, or continuation of credit ; or any assignee of an original creditor who is involved in the decision to extend, renew, or continue credit. Creditors include  finance companies, automobile dealers, mortgage brokers, utility companies, and telecommunications companies.  Where  non-profit and government entities  “ defer payment”  for goods or services, they, too, are to be considered creditors.  A covered account is  an account used mostly for  personal ,  family , or  household purposes ,  and that involves multiple payments or transactions. A covered account is also an account for which there is a foreseeable risk of identity theft. Federal Trade Commission   -   Bureau of Consumer Protection  -   Division of Consumer & Business Education
PG. 3 Federal Trade Commission  June 2008 For The Consumer ftc.gov 1-877-FTC-HELP Complying with the Red Flag Rules The program must also describe appropriate  responses   that would  prevent   and  mitigate the crime….. The program  must be managed by the Board of Directors or senior employees … include  appropriate  staff training , and  provide for  oversight of any service providers. Under the Red Flags Rules, financial institutions and creditors  must develop a written program  that   identifies and detects the relevant warning signs  —  or “red flags”  — of identity theft. Federal Trade Commission   -   Bureau of Consumer Protection  -   Division of Consumer & Business Education
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You Red Flag Rules
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Protecting Personal Information a Guide For Business
"Many businesses don't realize, that even though the FTC isn't enforcing compliance, it doesn't mean those businesses won't be liable if a data breach or loss of information occurs,"  (Debra Geister, Director of Fraud Prevention and Compliance Solutions at Lexis-Nexis .)  The key issue is that the law was effective January 1, 2008. The enforcement date begins May 1, 2009. Red Flag Rules Red Flag Rules recently became effective in January 2008, and compliance was originally required by November 2008.  The FTC’s enforcement of the Rule has been extended to May 1, 2009: Bank Info Security - ID Theft Red Flags Rule: FTC Extension is no 'Break' Enforcement Delayed for FTC-Governed Institutions; Liability is Not November 12, 2008
[object Object],[object Object],Identity Theft Prevalent at Work
Risk Management Magazine   January 2007 ,[object Object]
The Cost to Businesses ,[object Object],[object Object],[object Object],[object Object]
Law Firms Are Looking for Victims “ Do you suspect that a large corporation or your employer has released your private information (through an accident or otherwise)?  If you are one of many thousands whose confidential information was compromised, you may have a viable class action case against that company.  Contact an attorney at the national plaintiffs' law firm of Lieff Cabraser to discuss your case. Lieff Cabraser defends Americans harmed by corporate wrongdoing.”  “ Instead of losing our identities one by one, we're seeing criminals grabbing them in massive chunks -- literally millions at a time.”
Employers must create an  Identity Theft Risk Management Program  to Minimize your Risk
What an Employer must do….. ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Create an Affirmative Defense
  Appointment of Security Compliance Officer   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Announcement of Employee Training
All Employee Training is done by Certified Identity Theft Risk Management Specialist through the Institute of Fraud Risk Management. www.tifrm.net
ID Theft Plan and Sensitive and   Non-Public Information Policy
The purpose behind an Identity Theft Sensitive and Non-Public Information policy is to protect the non-public information (NPI) and Personally Identifiable Information (PII) an employer collects from customers and employees.   This Information   can be  names, addresses, phone numbers, credit card numbers, drivers license numbers, bank account numbers, social security numbers etc.  Basically  any data that identifies an individual and could be used to steal his or her identity.
Mitigating Damages ,[object Object],[object Object],To potentially  protect yourself , you should have all employees   sign this document… Be Sure To Check With Your Attorney Before Using A Form Such As This Use of Confidential Information by Employee
Cont’d  –   This form or one similar is  required by the FTC  for all employees* * FTC – Protecting Personal Information A Guide For Business pg 15 Use of Confidential Information By Employee I_______________  As an employee of _________________  I do hereby acknowledge that I must comply with a number of state and federal laws which regulate the handling of confidential and personal information regarding both customers/clients of the company and it’s other employees .  These laws may include but not limited to FACTA, HIPPA, the Privacy Act, Gramm/Leach/Bliley, ID Theft Laws (where applicable). I understand that I must maintain the confidentiality of ALL documents, credit card Information, and personnel information of any type and that such information may only be used for the intended business purpose.  Any other use of said information is strictly prohibited . Additionally, should I misuse or breach and personal information of said clients and or employees, I understand I will be held fully accountable both civilly and criminally, which may include, but no limited to,  Federal and State fines, criminal terms, real or implied financial damage incurred by the client, employee or the company. I have received a copy of the company’s Sensitive and Non-Public Information Policy .  I understand and will fully comply with its provisions along with all other rules and regulations the company has in place regarding the handling of confidential information so as to protect the privacy of all parties involved .  I also acknowledge that I have participated in a company sponsored Privacy and Security Identity Theft Training Program.  ________________________________________  __________________ Employee Signature  Date ________________________________________ Witness Signature
* Subject To Terms And Conditions ,[object Object],[object Object],[object Object],Reduce Company Losses
* Subject To Terms And Conditions ,[object Object],[object Object],[object Object],Reduce Company Losses
Our  Mitigation  Plan  is  provided by two NYSE companies, Kroll Risk Consulting Co. & Pre-Paid Legal Services A  mitigation plan that includes  Credit   Montoritoring , full  Restoration  and access to  Legal Counsel  can reduce your risk and exposure to Identity Theft Credit Monitoring Access to  Legal Counsel Restoration
Provides   Benefits for your Employees : ,[object Object],[object Object],[object Object],[object Object],[object Object],Identity  Theft SHIELD
Forbes Magazine ranks Kroll as the  world’s leading risk Consulting Company ,[object Object],[object Object],Covers all five area of Identity Theft….. ,[object Object],[object Object],[object Object]
Access to Legal Counsel provided by Pre-Paid Legal Services, a 36 year old New York Stock Exchange Company, represented by 48 provider laws firms and thousands of referral attorneys throughout North America
Provide Proof a Mitigation Plan   was offered to Your Employees
The Advisory Council was established to provide quality counsel and advice. Legal Advisory Council Duke R. Ligon Advisory Council Member   Former Senior V.P.  & General Counsel  Devon Energy Corp   Grant Woods   Advisory Council Member   Former Arizona Attorney General Andrew P. Miller   Advisory Council Member   Former Virginia Attorney General Mike Moore   Advisory Council Member   Former Mississippi Attorney General
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Public Endorsements
Just like OHSA,  the American Disability Act or HIPAA,  Privacy and Security laws are not optional .  We can assist your company in starting the compliance process and create an  affirmative defense  before a data breach, loss, or theft affects your employees or customers! Take Charge The next step  is to schedule the required employee training and set up the other reasonable steps to help reduce your liability to these Identity Theft Laws. The compliance enforcement date is fast approaching. Who is the individual, at your company, that will coordinate this activity ?
Thank You! Identity Theft Risk Management Group, LLC

Más contenido relacionado

La actualidad más candente

Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Pplsusantj3
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)guest95afa8
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Consumer financial protections
Consumer financial protectionsConsumer financial protections
Consumer financial protectionsA.W. Berry
 
I D Theft Employee Presentation2
I D Theft Employee Presentation2I D Theft Employee Presentation2
I D Theft Employee Presentation2Heather Smith
 
Broker Opportunity: Legal and Identity Theft Solutions as Voluntary Benefits
Broker Opportunity:  Legal and Identity Theft Solutions as Voluntary BenefitsBroker Opportunity:  Legal and Identity Theft Solutions as Voluntary Benefits
Broker Opportunity: Legal and Identity Theft Solutions as Voluntary BenefitsAntonio Muniz Olan
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final projectKelly Giambra
 
Ethics at Sunrise program - Missouri Bar CLE 5-2017
Ethics at Sunrise program - Missouri Bar CLE  5-2017Ethics at Sunrise program - Missouri Bar CLE  5-2017
Ethics at Sunrise program - Missouri Bar CLE 5-2017Downey Law Group LLC
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Servicegorsline
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudGeo Coelho
 
Downey Law Group - Legal Ethics and Innovations - May 2017
Downey Law Group - Legal Ethics and Innovations - May 2017Downey Law Group - Legal Ethics and Innovations - May 2017
Downey Law Group - Legal Ethics and Innovations - May 2017Downey Law Group LLC
 
ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015James Kane
 

La actualidad más candente (19)

Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Consumer financial protections
Consumer financial protectionsConsumer financial protections
Consumer financial protections
 
I D Theft Employee Presentation2
I D Theft Employee Presentation2I D Theft Employee Presentation2
I D Theft Employee Presentation2
 
Broker Opportunity: Legal and Identity Theft Solutions as Voluntary Benefits
Broker Opportunity:  Legal and Identity Theft Solutions as Voluntary BenefitsBroker Opportunity:  Legal and Identity Theft Solutions as Voluntary Benefits
Broker Opportunity: Legal and Identity Theft Solutions as Voluntary Benefits
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
LS IDT 2014
LS IDT 2014LS IDT 2014
LS IDT 2014
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
 
cis11
cis11cis11
cis11
 
Idt
IdtIdt
Idt
 
Ethics at Sunrise program - Missouri Bar CLE 5-2017
Ethics at Sunrise program - Missouri Bar CLE  5-2017Ethics at Sunrise program - Missouri Bar CLE  5-2017
Ethics at Sunrise program - Missouri Bar CLE 5-2017
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 
Forbes
ForbesForbes
Forbes
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Downey Law Group - Legal Ethics and Innovations - May 2017
Downey Law Group - Legal Ethics and Innovations - May 2017Downey Law Group - Legal Ethics and Innovations - May 2017
Downey Law Group - Legal Ethics and Innovations - May 2017
 
ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015
 

Similar a Employer 0409

Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From PplSue Tjernlund
 
Fraud And Abuse In The U.S. Healthcare System
Fraud And Abuse In The U.S. Healthcare SystemFraud And Abuse In The U.S. Healthcare System
Fraud And Abuse In The U.S. Healthcare SystemKendra Cote
 
IBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementIBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementVirginia Fernandez
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachCBIZ, Inc.
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfssuser7464571
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarksMatt Siltala
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
A_Complete_Approach_to_KYC_With_Business_Customer_Intelligence (1)
A_Complete_Approach_to_KYC_With_Business_Customer_Intelligence (1)A_Complete_Approach_to_KYC_With_Business_Customer_Intelligence (1)
A_Complete_Approach_to_KYC_With_Business_Customer_Intelligence (1)Dan Frechtling
 
Discussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docxDiscussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docxcuddietheresa
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106Ted Richmond
 

Similar a Employer 0409 (19)

Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Fraud And Abuse In The U.S. Healthcare System
Fraud And Abuse In The U.S. Healthcare SystemFraud And Abuse In The U.S. Healthcare System
Fraud And Abuse In The U.S. Healthcare System
 
Adrs2
Adrs2Adrs2
Adrs2
 
IBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementIBM Counter Financial Crimes Management
IBM Counter Financial Crimes Management
 
IBM Counter Finalcial Crimes Management
IBM Counter Finalcial Crimes ManagementIBM Counter Finalcial Crimes Management
IBM Counter Finalcial Crimes Management
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Employee law module
Employee law moduleEmployee law module
Employee law module
 
Bank Loans
Bank LoansBank Loans
Bank Loans
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdf
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarks
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
A_Complete_Approach_to_KYC_With_Business_Customer_Intelligence (1)
A_Complete_Approach_to_KYC_With_Business_Customer_Intelligence (1)A_Complete_Approach_to_KYC_With_Business_Customer_Intelligence (1)
A_Complete_Approach_to_KYC_With_Business_Customer_Intelligence (1)
 
Discussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docxDiscussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docx
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 

Employer 0409

  • 1. IDENTITY THEFT “ The fastest growing white-collar crime in America” According to the FBI Employer Compliance
  • 2. Royce McCoy , CITRMS Identity Theft Risk Management Group, LLC The Institute of Fraud Risk Management is the nation’s only professional certification program ( CITRMS ) specifically developed to train and equip professionals to understand and address Identity Theft and related fraud issues.
  • 3. Karen McCoy , CITRMS Identity Theft Risk Management Group, LLC The Institute of Fraud Risk Management is the nation’s only professional certification program ( CITRMS ) specifically developed to train and equip professionals to understand and address Identity Theft and related fraud issues.
  • 4.
  • 5.
  • 6. Drivers License Medical Financial Identity theft is not just about credit cards, it’s a legal issue ! Over 70% of the time access to an attorney will be critical to resolve these issues. Social Security Criminal Five Common Types of Identity Theft Less than 28% 10 M sold every 6 weeks WSJ Fastest growing IDT Unofficial National ID Wrongful Arrest
  • 7. Let’s look at a video clip From CNN showing how Identity Theft affects victims Identity Theft is in the News….
  • 8.  
  • 9.  
  • 10.
  • 11. Correcting the victims’ records is so overwhelming it is imperative for Employers to protect the data. “ Once the credit systems accept bad data it can be next to impossible to clear.” USA Today June 5, 2007 “ Medical identity theft can impair your health and finances… and detecting this isn’t easy… and remedying the damages can be difficult.” Wall Street Journal October 11, 2007 Where the Law Becomes Logical
  • 12. “ A rise in identity theft is presenting employers with a major headache: They are being held liable for identity theft that occurs in the workplace.” Douglas Hottle, Meyer, Unkovic & Scott, “ Workplace Identity Theft: How to Curb an HR Headache” BLR: Business and Legal Reports , September 19, 2006
  • 13.
  • 14.  
  • 15. Identity Theft Resource Center, of the approximately 44 million Americans who have been the victims of identity theft at some point, each spent an average of 600 hours and $1,495 getting their finances straightened out. And, that doesn’t include attorney’s fees. In 2004, identity theft cost financial institutions and businesses an estimated $52.6 billion,
  • 16.
  • 17.
  • 18.
  • 19. …… all businesses must be able to show that they have a security plan in place. In order to comply with FACTA, Betsy Broder, the Assistant Director of that FTC division , was quoted in the March 2006 American Bar Association Journal saying that means businesses need to have a written plan describing how customer data will be safeguarded and a staff member or company officer designated to be responsible for implementing that plan . Broder went on to say, “We’re not looking for a perfect system. But we need to see that you’ve taken responsible steps to protect your customers’ information.” Now What? It’s Time to Develop a Plan!
  • 20. According to the FTC, a “ reasonable ” plan to safeguard personal information includes: Designate an employee ( or employees) to coordinate and be responsible for the security program. … . include employee training …. Continually evaluating and adjusting the security plan….. Create a mitigation plan….. This mitigation plan should kick in when there is a privacy or security breach and there is a need to “ repair it ” immediately in the eyes of customers, government regulators, and management.
  • 21. A sensible and effective program will go a long way towards reducing the risk of federal government enforcement , even if the security policy should fail in a particular situation and a security breach results.
  • 22. New ‘Red Flag’ Requirements for Financial Institutions and Creditors will Help Fight Identity Theft …… requiring financial institutions and creditors to develop and implement written identity theft prevention programs , as part of the Fair and Accurate Credit Transactions (FACTA) of 2003 . The programs must be in place by November 1, 2008 , and must provide for the identification, detection, and response to patterns, practices, or specific activities — known as “red flags” — that could indicate identity theft. … a financial institution is defined as a state or national bank , a state or federal savings and loan association, a mutual savings bank, a state or federal credit union , or any other entity that holds a “transaction account” belonging to a consumer. A transaction account is a deposit or other account from which the owner makes payments or transfers. PG. 1 Financial institutions and creditors soon will be required to implement a program to detect, prevent, and mitigate instances of identity theft. Federal Trade Commission - Bureau of Consumer Protection - Division of Consumer & Business Education
  • 23. New ‘Red Flag’ Requirements for Financial Institutions and Creditors will Help Fight Identity Theft PG. 2 A creditor is any entity that regularly extends, renews, or continues credit ; any entity that regularly arranges for the extension, renewal, or continuation of credit ; or any assignee of an original creditor who is involved in the decision to extend, renew, or continue credit. Creditors include finance companies, automobile dealers, mortgage brokers, utility companies, and telecommunications companies. Where non-profit and government entities “ defer payment” for goods or services, they, too, are to be considered creditors. A covered account is an account used mostly for personal , family , or household purposes , and that involves multiple payments or transactions. A covered account is also an account for which there is a foreseeable risk of identity theft. Federal Trade Commission - Bureau of Consumer Protection - Division of Consumer & Business Education
  • 24. PG. 3 Federal Trade Commission June 2008 For The Consumer ftc.gov 1-877-FTC-HELP Complying with the Red Flag Rules The program must also describe appropriate responses that would prevent and mitigate the crime….. The program must be managed by the Board of Directors or senior employees … include appropriate staff training , and provide for oversight of any service providers. Under the Red Flags Rules, financial institutions and creditors must develop a written program that identifies and detects the relevant warning signs — or “red flags” — of identity theft. Federal Trade Commission - Bureau of Consumer Protection - Division of Consumer & Business Education
  • 25.
  • 26.
  • 27. "Many businesses don't realize, that even though the FTC isn't enforcing compliance, it doesn't mean those businesses won't be liable if a data breach or loss of information occurs," (Debra Geister, Director of Fraud Prevention and Compliance Solutions at Lexis-Nexis .) The key issue is that the law was effective January 1, 2008. The enforcement date begins May 1, 2009. Red Flag Rules Red Flag Rules recently became effective in January 2008, and compliance was originally required by November 2008. The FTC’s enforcement of the Rule has been extended to May 1, 2009: Bank Info Security - ID Theft Red Flags Rule: FTC Extension is no 'Break' Enforcement Delayed for FTC-Governed Institutions; Liability is Not November 12, 2008
  • 28.
  • 29.
  • 30.
  • 31. Law Firms Are Looking for Victims “ Do you suspect that a large corporation or your employer has released your private information (through an accident or otherwise)? If you are one of many thousands whose confidential information was compromised, you may have a viable class action case against that company. Contact an attorney at the national plaintiffs' law firm of Lieff Cabraser to discuss your case. Lieff Cabraser defends Americans harmed by corporate wrongdoing.” “ Instead of losing our identities one by one, we're seeing criminals grabbing them in massive chunks -- literally millions at a time.”
  • 32. Employers must create an Identity Theft Risk Management Program to Minimize your Risk
  • 33.
  • 34.
  • 35.
  • 37. All Employee Training is done by Certified Identity Theft Risk Management Specialist through the Institute of Fraud Risk Management. www.tifrm.net
  • 38. ID Theft Plan and Sensitive and Non-Public Information Policy
  • 39. The purpose behind an Identity Theft Sensitive and Non-Public Information policy is to protect the non-public information (NPI) and Personally Identifiable Information (PII) an employer collects from customers and employees. This Information can be names, addresses, phone numbers, credit card numbers, drivers license numbers, bank account numbers, social security numbers etc. Basically any data that identifies an individual and could be used to steal his or her identity.
  • 40.
  • 41. Cont’d – This form or one similar is required by the FTC for all employees* * FTC – Protecting Personal Information A Guide For Business pg 15 Use of Confidential Information By Employee I_______________ As an employee of _________________ I do hereby acknowledge that I must comply with a number of state and federal laws which regulate the handling of confidential and personal information regarding both customers/clients of the company and it’s other employees . These laws may include but not limited to FACTA, HIPPA, the Privacy Act, Gramm/Leach/Bliley, ID Theft Laws (where applicable). I understand that I must maintain the confidentiality of ALL documents, credit card Information, and personnel information of any type and that such information may only be used for the intended business purpose. Any other use of said information is strictly prohibited . Additionally, should I misuse or breach and personal information of said clients and or employees, I understand I will be held fully accountable both civilly and criminally, which may include, but no limited to, Federal and State fines, criminal terms, real or implied financial damage incurred by the client, employee or the company. I have received a copy of the company’s Sensitive and Non-Public Information Policy . I understand and will fully comply with its provisions along with all other rules and regulations the company has in place regarding the handling of confidential information so as to protect the privacy of all parties involved . I also acknowledge that I have participated in a company sponsored Privacy and Security Identity Theft Training Program. ________________________________________ __________________ Employee Signature Date ________________________________________ Witness Signature
  • 42.
  • 43.
  • 44. Our Mitigation Plan is provided by two NYSE companies, Kroll Risk Consulting Co. & Pre-Paid Legal Services A mitigation plan that includes Credit Montoritoring , full Restoration and access to Legal Counsel can reduce your risk and exposure to Identity Theft Credit Monitoring Access to Legal Counsel Restoration
  • 45.
  • 46.
  • 47. Access to Legal Counsel provided by Pre-Paid Legal Services, a 36 year old New York Stock Exchange Company, represented by 48 provider laws firms and thousands of referral attorneys throughout North America
  • 48. Provide Proof a Mitigation Plan was offered to Your Employees
  • 49. The Advisory Council was established to provide quality counsel and advice. Legal Advisory Council Duke R. Ligon Advisory Council Member Former Senior V.P. & General Counsel Devon Energy Corp Grant Woods Advisory Council Member Former Arizona Attorney General Andrew P. Miller Advisory Council Member Former Virginia Attorney General Mike Moore Advisory Council Member Former Mississippi Attorney General
  • 50.
  • 51. Just like OHSA, the American Disability Act or HIPAA, Privacy and Security laws are not optional . We can assist your company in starting the compliance process and create an affirmative defense before a data breach, loss, or theft affects your employees or customers! Take Charge The next step is to schedule the required employee training and set up the other reasonable steps to help reduce your liability to these Identity Theft Laws. The compliance enforcement date is fast approaching. Who is the individual, at your company, that will coordinate this activity ?
  • 52. Thank You! Identity Theft Risk Management Group, LLC

Notas del editor

  1. ID Theft is Is now an Epidemic NY Times IDT is Epidemic Aberdeen Group IDT at 300% growth ($) Garner Group IDT increasing at 79% (#) USPS Operation IDT Crisis FTC’s Top Complaint 5 years In A Row USA Today Why Is IDT at Epidemic Proportions? Foundation for Taxpayers & Consumer rights Epidemic of IDT takes Heavy Toll
  2. ID Theft is Is now an Epidemic NY Times IDT is Epidemic Aberdeen Group IDT at 300% growth ($) Garner Group IDT increasing at 79% (#) USPS Operation IDT Crisis FTC’s Top Complaint 5 years In A Row USA Today Why Is IDT at Epidemic Proportions? Foundation for Taxpayers & Consumer rights Epidemic of IDT takes Heavy Toll
  3. Employee Confidentiality Document Acts as a Good Faith step in attempting to comply with FACTA, GLB, HIPAA, etc …