SlideShare una empresa de Scribd logo
1 de 31
Not “If” but “When”
WHAT BUSINESSES SHOULD KNOW ABOUT
THE IMPACT OF IDENTITY THEFT ON
CONSUMERS
Paula Pierce
P. Pierce Law, P.C.
www.ppiercelaw.com
512-850-4808
#IDTheft
About the speaker:
Paula Pierce has been assisting identity theft victims since 2005
when President GeorgeW. Bush authorized the U.S. Department of
Justice to fund four organizations to identify strategies for helping
identity theft victims.
HOWTO DO EVERYTHINGWRONG!
A Brief History of Recent Equifax Breaches
• 2016 – Security researcher xOrz reports XSS vulnerability on Equifax’s
main website – exposing customer user names, passwords & data.
9/8/17 – it wasn’t fixed.
• 5/2016 – Information of 430,000 people stolen because of “lax”
security. Court orders Equifax to stop using SSNs/DOBs as PINs to
access PII.
• 1/2017 – PII of undisclosed number of Lifelock customers leaked by
Equifax.
. . . . . . .
• 5/2017 – Equifax reports hack of tax information of an undisclosed
number of individuals from its payroll service. Caused by the failing to
install the same security patch involved in the current breach.
• 9/2017 – Equifax reports compromise of 143,000,000 individuals’ files
including SSNs, DOBs, addresses & DL#s + theft of credit card #s of
209,000 people
• 10/2017 – Equifax adds another 2M victims to the count – 145,500,000
consumers affected. (Doesn’t include the 700k+ Canadians & Britons
whose information was also hacked.)
What Happened?
Failed Security 101: Equifax was running
outdated systems and routinely failed to install
software security patches.
Post Event Failures
• Breach discovered in July and not reported until September.
• Violation of Texas breach notification law:Tex. Bus. &
Comm. Code § 521.053(b).
• Notify persons whose information was compromised “as quickly as
possible.”
• Exception: If law enforcement asks company to delay notification.
• If individual notice is too expensive, can set up a website for
notification.
• 48 states & DC have similar breach notification laws.
. . . . . . .
• Initial consumer site didn’t work.
• Second try – offered 1 year of monitoring – if consumer
waived right to participate in class action suits and agreed
to arbitration.
• Third try – removed class action and arbitration provisions –
requires consumers to enter some of the stolen information
and doesn’t provide anything relevant in return.
• Tells everyone their information “may” have been
impacted.
Not if, but when . . .
• BJS – 17.6 millionAmericans had identities
stolen in 2014
• Up from 9 million in 2010
• FTC –Texans are disproportionately affected
About IDT victims
AND WHY DO THEY ACT CRAZY SOMETIMES?
How do I know if I’m a victim?
• Check your credit reports
• Pay attention to mail from bill collectors
• If you start receiving calls from bill collectors or companies you don’t
do business with
• Check credit card & bank statements every month
• If your bank account is suddenly overdrawn
• If you receive a letter saying a warrant is out for your arrest for a
crime you did not commit
• Fail a criminal background check
• Your license is flagged when you go to renew it
Who are victims?
• All ages; although, statistically age 25-35 are at greatest
risk due to data breach.
• All races, all incomes.
• States along drug & human trafficking routes are
disproportionately affected.
• Elderly disproportionately affected by phishing scams.
• Family violence victims also disproportionately affected.
Why do they yell at my customer
service reps?
• IDT is intimate – it’s one thing to steal your money entirely another to
steal who you are.
• Recovery is stressful. No one is helpful or cooperative.
• It’s the crime that keeps on keeping on. It’s never over.
• Victims of extensive IDT have symptoms of PTSD: sleep disturbance,
eating disorders, clinical depression.
• Marriages break up, relationships suffer, jobs lost
Recovering from ID Theft
WHAT VICTIMS ARE GOING THROUGH
15
3 Steps to Recovery
1. Stop the damage
2. Report the crime
3. Repair accounts & credit
16
Rinse and repeat!
Stop the Damage
• Change account numbers
• If check fraud, ask your bank to put you in the CANS
(Closed Account Notification System)
• Set a fraud alert by calling one of the credit bureaus
• Get a credit freeze if you are not going to use your
credit any time soon
18
Report the Crime
1. Go to www.ftc.gov/idtheft and make a report online,
print it, sign in front of a notary, make lots of copies –
this is now an IDT affidavit
2. Report to your local police – where you live NOT
where the impostor is using your identity
3. Report to other places, e.g., SSA, US Postal
Inspector, IC3, Secret Service, NOT FBI
19
Repair the Damage
If it’s not in writing, it doesn’t count!
• Do everything in writing! And always attach:
• Proof you made a police report
• Copy of your government issued ID
• Copy of the ID theft affidavit (FTC report signed in
front of a notary)
21
Who to write & what to say
• Who to write?
• Credit bureaus
• Businesses that gave credit to impostor
• Collectors who contact you
• What to say:
• Accounts were made by an impostor, demand they be closed
and that your identity be taken off of them
• Tell businesses to send you copies of account documents
• Tell credit bureaus to block impostor accounts from your credit
report
Friendly Tips
• Send correspondence with tracking – fax with confirmation
or CMRRR.
• Keep copies of everything you send and receive in a file,
scanned, in a box – just keep them!
• Keep a record of every phone call – time, date, who you
talked to, and description of the conversation.
• Take care of yourself. ID theft is an intimate crime. Don’t be
surprised if you experience emotional stress and fatigue.
Medical ID Theft/HIPAA Breach
• DON’T MENTION IDTHEFT UNTILYOU HAVEYOUR MEDICAL
RECORDS!
• Order your medical records:
• From your own primary care doctor – this is your baseline
• From places where the impostor was treated
• Compare them
• Write places where impostor was treated and ask that impostor’s
records be de-identified and marked as John/Jane Doe
Criminal ID Theft
• Go to Sheriff’s Department (Airport just south of Koenig)
• Ask for a stolen ID file
• They’ll fingerprint you and make you sign a stolen identity
affidavit
• In the mail you’ll receive a stolen identity letter and PIN
• If you are stopped, tell the officer you have a stolen identity
file and give the officer your PIN
If nothing works – be glad you live in
Texas
• Chapter 521 ofTexas Business and Commerce Code
• Application to be declared a victim of identity theft
• File application, send notice to creditors by certified
mail
• Attend a hearing, tell your story
• If court finds enough evidence, you get a court order
confirming you are a victim.
Tips for Texas Businesses
Responsibilities of a Business to Victims
•Protect customer info
•Know the law: FCRA, FDCPA, 521, HIPAA
•Have a breach notification plan
•Investigate
•Correct information sent to credit bureaus
•Cease all collection efforts against victim
Responsibility of a business after data
breach
• Check your CGL policy for cybersecurity or breach
coverage.
• Get legal help!
• Notify all customers who were affected.
• You are not required to provide credit monitoring. Most
businesses do it as a courtesy.
• Notify credit bureaus if required by law.
Online Businesses
• Tell users what information you collect and how
you’ll use it.
• Have protections so that no personal information is
collected from children.
• Tell users how you’ll protect their information.
• Get a lawyer to review your privacy policies because
these laws change rapidly.
For more information
Paula Pierce
paula@ppiercelaw.com
512-850-4808

Más contenido relacionado

La actualidad más candente

Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
Data theft
Data theftData theft
Data theftLaura
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theftnewsusa01
 
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crBrady Allen
 

La actualidad más candente (20)

Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Data theft
Data theftData theft
Data theft
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Advice iq safeguards against id theft
Advice iq safeguards against id theftAdvice iq safeguards against id theft
Advice iq safeguards against id theft
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
 

Similar a Not "If" but "When"

The Ultimate Financial Fraud Examination & Prevention Checklist
The Ultimate Financial Fraud Examination & Prevention ChecklistThe Ultimate Financial Fraud Examination & Prevention Checklist
The Ultimate Financial Fraud Examination & Prevention ChecklistVeriti Consulting LLC
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
Police Report Vs. Incident Report
Police Report Vs. Incident ReportPolice Report Vs. Incident Report
Police Report Vs. Incident Report- Mark - Fullbright
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
VETLANTA Q2 Summit - June 2015
VETLANTA Q2 Summit - June 2015VETLANTA Q2 Summit - June 2015
VETLANTA Q2 Summit - June 2015Mallory Adams
 
West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedAdam Singer
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theftIsaac Feliciano
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 

Similar a Not "If" but "When" (20)

Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
The Ultimate Financial Fraud Examination & Prevention Checklist
The Ultimate Financial Fraud Examination & Prevention ChecklistThe Ultimate Financial Fraud Examination & Prevention Checklist
The Ultimate Financial Fraud Examination & Prevention Checklist
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
Police Report Vs. Incident Report
Police Report Vs. Incident ReportPolice Report Vs. Incident Report
Police Report Vs. Incident Report
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
VETLANTA Q2 Summit - June 2015
VETLANTA Q2 Summit - June 2015VETLANTA Q2 Summit - June 2015
VETLANTA Q2 Summit - June 2015
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updated
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theft
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 

Más de JoAnna Cheshire

The SharePoint Migration Playbook
The SharePoint Migration PlaybookThe SharePoint Migration Playbook
The SharePoint Migration PlaybookJoAnna Cheshire
 
Introduction to SharePoint Framework
Introduction to SharePoint FrameworkIntroduction to SharePoint Framework
Introduction to SharePoint FrameworkJoAnna Cheshire
 
PowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's GuidePowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's GuideJoAnna Cheshire
 
Artificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs PerspectiveArtificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs PerspectiveJoAnna Cheshire
 
Modernizing Data Management
Modernizing Data Management Modernizing Data Management
Modernizing Data Management JoAnna Cheshire
 
Microsoft and Enterprise Search
Microsoft and Enterprise Search Microsoft and Enterprise Search
Microsoft and Enterprise Search JoAnna Cheshire
 
Introduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groupsIntroduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groupsJoAnna Cheshire
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 
Accelerate your business with flow
Accelerate your business with flowAccelerate your business with flow
Accelerate your business with flowJoAnna Cheshire
 
Building applications for your business using power apps and flow
Building applications for your business using power apps and flowBuilding applications for your business using power apps and flow
Building applications for your business using power apps and flowJoAnna Cheshire
 
The Decomposition Dilemma
The Decomposition DilemmaThe Decomposition Dilemma
The Decomposition DilemmaJoAnna Cheshire
 
Defending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about itDefending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about itJoAnna Cheshire
 
The New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business AdvantageThe New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business AdvantageJoAnna Cheshire
 
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStoreHealthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStoreJoAnna Cheshire
 
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...JoAnna Cheshire
 
Define Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's BrandDefine Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's BrandJoAnna Cheshire
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
A UX first approach to Office 365 migrations
A UX first approach to Office 365 migrationsA UX first approach to Office 365 migrations
A UX first approach to Office 365 migrationsJoAnna Cheshire
 

Más de JoAnna Cheshire (20)

The Future of Work
The Future of WorkThe Future of Work
The Future of Work
 
Catching the Next Train
Catching the Next TrainCatching the Next Train
Catching the Next Train
 
The SharePoint Migration Playbook
The SharePoint Migration PlaybookThe SharePoint Migration Playbook
The SharePoint Migration Playbook
 
Introduction to SharePoint Framework
Introduction to SharePoint FrameworkIntroduction to SharePoint Framework
Introduction to SharePoint Framework
 
PowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's GuidePowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's Guide
 
Artificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs PerspectiveArtificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs Perspective
 
Modernizing Data Management
Modernizing Data Management Modernizing Data Management
Modernizing Data Management
 
Microsoft and Enterprise Search
Microsoft and Enterprise Search Microsoft and Enterprise Search
Microsoft and Enterprise Search
 
Introduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groupsIntroduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groups
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
Accelerate your business with flow
Accelerate your business with flowAccelerate your business with flow
Accelerate your business with flow
 
Building applications for your business using power apps and flow
Building applications for your business using power apps and flowBuilding applications for your business using power apps and flow
Building applications for your business using power apps and flow
 
The Decomposition Dilemma
The Decomposition DilemmaThe Decomposition Dilemma
The Decomposition Dilemma
 
Defending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about itDefending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about it
 
The New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business AdvantageThe New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business Advantage
 
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStoreHealthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
 
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
 
Define Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's BrandDefine Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's Brand
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
A UX first approach to Office 365 migrations
A UX first approach to Office 365 migrationsA UX first approach to Office 365 migrations
A UX first approach to Office 365 migrations
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Not "If" but "When"

  • 1. Not “If” but “When” WHAT BUSINESSES SHOULD KNOW ABOUT THE IMPACT OF IDENTITY THEFT ON CONSUMERS Paula Pierce P. Pierce Law, P.C. www.ppiercelaw.com 512-850-4808 #IDTheft
  • 2. About the speaker: Paula Pierce has been assisting identity theft victims since 2005 when President GeorgeW. Bush authorized the U.S. Department of Justice to fund four organizations to identify strategies for helping identity theft victims.
  • 4. A Brief History of Recent Equifax Breaches • 2016 – Security researcher xOrz reports XSS vulnerability on Equifax’s main website – exposing customer user names, passwords & data. 9/8/17 – it wasn’t fixed. • 5/2016 – Information of 430,000 people stolen because of “lax” security. Court orders Equifax to stop using SSNs/DOBs as PINs to access PII. • 1/2017 – PII of undisclosed number of Lifelock customers leaked by Equifax.
  • 5. . . . . . . . • 5/2017 – Equifax reports hack of tax information of an undisclosed number of individuals from its payroll service. Caused by the failing to install the same security patch involved in the current breach. • 9/2017 – Equifax reports compromise of 143,000,000 individuals’ files including SSNs, DOBs, addresses & DL#s + theft of credit card #s of 209,000 people • 10/2017 – Equifax adds another 2M victims to the count – 145,500,000 consumers affected. (Doesn’t include the 700k+ Canadians & Britons whose information was also hacked.)
  • 6. What Happened? Failed Security 101: Equifax was running outdated systems and routinely failed to install software security patches.
  • 7. Post Event Failures • Breach discovered in July and not reported until September. • Violation of Texas breach notification law:Tex. Bus. & Comm. Code § 521.053(b). • Notify persons whose information was compromised “as quickly as possible.” • Exception: If law enforcement asks company to delay notification. • If individual notice is too expensive, can set up a website for notification. • 48 states & DC have similar breach notification laws.
  • 8. . . . . . . . • Initial consumer site didn’t work. • Second try – offered 1 year of monitoring – if consumer waived right to participate in class action suits and agreed to arbitration. • Third try – removed class action and arbitration provisions – requires consumers to enter some of the stolen information and doesn’t provide anything relevant in return. • Tells everyone their information “may” have been impacted.
  • 9. Not if, but when . . . • BJS – 17.6 millionAmericans had identities stolen in 2014 • Up from 9 million in 2010 • FTC –Texans are disproportionately affected
  • 10.
  • 11. About IDT victims AND WHY DO THEY ACT CRAZY SOMETIMES?
  • 12. How do I know if I’m a victim? • Check your credit reports • Pay attention to mail from bill collectors • If you start receiving calls from bill collectors or companies you don’t do business with • Check credit card & bank statements every month • If your bank account is suddenly overdrawn • If you receive a letter saying a warrant is out for your arrest for a crime you did not commit • Fail a criminal background check • Your license is flagged when you go to renew it
  • 13. Who are victims? • All ages; although, statistically age 25-35 are at greatest risk due to data breach. • All races, all incomes. • States along drug & human trafficking routes are disproportionately affected. • Elderly disproportionately affected by phishing scams. • Family violence victims also disproportionately affected.
  • 14. Why do they yell at my customer service reps? • IDT is intimate – it’s one thing to steal your money entirely another to steal who you are. • Recovery is stressful. No one is helpful or cooperative. • It’s the crime that keeps on keeping on. It’s never over. • Victims of extensive IDT have symptoms of PTSD: sleep disturbance, eating disorders, clinical depression. • Marriages break up, relationships suffer, jobs lost
  • 15. Recovering from ID Theft WHAT VICTIMS ARE GOING THROUGH 15
  • 16. 3 Steps to Recovery 1. Stop the damage 2. Report the crime 3. Repair accounts & credit 16
  • 18. Stop the Damage • Change account numbers • If check fraud, ask your bank to put you in the CANS (Closed Account Notification System) • Set a fraud alert by calling one of the credit bureaus • Get a credit freeze if you are not going to use your credit any time soon 18
  • 19. Report the Crime 1. Go to www.ftc.gov/idtheft and make a report online, print it, sign in front of a notary, make lots of copies – this is now an IDT affidavit 2. Report to your local police – where you live NOT where the impostor is using your identity 3. Report to other places, e.g., SSA, US Postal Inspector, IC3, Secret Service, NOT FBI 19
  • 21. If it’s not in writing, it doesn’t count! • Do everything in writing! And always attach: • Proof you made a police report • Copy of your government issued ID • Copy of the ID theft affidavit (FTC report signed in front of a notary) 21
  • 22. Who to write & what to say • Who to write? • Credit bureaus • Businesses that gave credit to impostor • Collectors who contact you • What to say: • Accounts were made by an impostor, demand they be closed and that your identity be taken off of them • Tell businesses to send you copies of account documents • Tell credit bureaus to block impostor accounts from your credit report
  • 23. Friendly Tips • Send correspondence with tracking – fax with confirmation or CMRRR. • Keep copies of everything you send and receive in a file, scanned, in a box – just keep them! • Keep a record of every phone call – time, date, who you talked to, and description of the conversation. • Take care of yourself. ID theft is an intimate crime. Don’t be surprised if you experience emotional stress and fatigue.
  • 24. Medical ID Theft/HIPAA Breach • DON’T MENTION IDTHEFT UNTILYOU HAVEYOUR MEDICAL RECORDS! • Order your medical records: • From your own primary care doctor – this is your baseline • From places where the impostor was treated • Compare them • Write places where impostor was treated and ask that impostor’s records be de-identified and marked as John/Jane Doe
  • 25. Criminal ID Theft • Go to Sheriff’s Department (Airport just south of Koenig) • Ask for a stolen ID file • They’ll fingerprint you and make you sign a stolen identity affidavit • In the mail you’ll receive a stolen identity letter and PIN • If you are stopped, tell the officer you have a stolen identity file and give the officer your PIN
  • 26. If nothing works – be glad you live in Texas • Chapter 521 ofTexas Business and Commerce Code • Application to be declared a victim of identity theft • File application, send notice to creditors by certified mail • Attend a hearing, tell your story • If court finds enough evidence, you get a court order confirming you are a victim.
  • 27. Tips for Texas Businesses
  • 28. Responsibilities of a Business to Victims •Protect customer info •Know the law: FCRA, FDCPA, 521, HIPAA •Have a breach notification plan •Investigate •Correct information sent to credit bureaus •Cease all collection efforts against victim
  • 29. Responsibility of a business after data breach • Check your CGL policy for cybersecurity or breach coverage. • Get legal help! • Notify all customers who were affected. • You are not required to provide credit monitoring. Most businesses do it as a courtesy. • Notify credit bureaus if required by law.
  • 30. Online Businesses • Tell users what information you collect and how you’ll use it. • Have protections so that no personal information is collected from children. • Tell users how you’ll protect their information. • Get a lawyer to review your privacy policies because these laws change rapidly.
  • 31. For more information Paula Pierce paula@ppiercelaw.com 512-850-4808

Notas del editor

  1. From Justice Department’s national drug threat assessment Note that TX is at intersection of 2 major routes Traditional IDT hotspots: Texas, Florida, Arizona