Why you MUST protect your customer data
|
|
- Alberta Wheeler
- 1 years ago
- Views:
Transcription
1 Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are responsible for compliance with these regulations and those that don t comply may face fines or lawsuits. Who should be concerned about security and privacy? TechAdvisory.org SME Reports sponsored by Customer data is a key currency of today s information-based economy; so regardless of your industry, you probably collect, store and share information about your customers. This data may include Social Security numbers, driver s license numbers, mailing addresses, addresses, telephone numbers, credit card numbers and bank account numbers. If you use any of this type of information, you need to keep reading. As a Microsoft Channel Partner, OnlyLink is reputable provider of Managed Services, Internet Solutions, Website Custom Development, Software Custom Development and How data thieves strike Data thieves use a number of low-tech and high-tech methods to access your data. Here are some of the more common ones. Network Security Services. OnlyLink provides its clients with turnkey IT solutions, advanced infrastructure, and advanced networking, which then frees that company to pursue its core business interests. Through our partnership with Datotel, OnlyLink offers tremendous bandwidth over a secure network. The company also has brought on board a package of security services that include audits, vulnerability assessments and penetration testing. Method Dumpster diving Mailbox theft Employee theft General theft Hacking Phishing Pretexting Description Thieves steal papers with personal information left improperly discarded in your trash. Thieves steal mail left in your unsecured mailbox. Employees steal the personal information of your customers or other employees. Thieves steal wallets, checks, credit cards, or computers. Thieves obtain unauthorized access to your computer network to steal customer information. Thieves try to trick your customers into revealing their personal information by sending s that appear to be from your company and/or creating a fake web site that looks like yours. Thieves make phone calls to your business in a customer s name in an attempt to learn more about the customer. 1
2 Once data thieves have the information they want, they use your customers names to open fraudulent credit card accounts, make purchases without their knowledge, open fraudulent bank accounts, write checks on that account, or even get loans. Security breaches could damage your business The Federal Trade Commission (FTC) recently sued 12 companies it accused of having inadequate data security practices. Even if you don t face legal action, your good reputation could be significantly compromised by data security breaches. Security breaches can erode consumer trust and, ultimately, hurt your bottom line. You can be a target, too Identity thieves want your business information. In fact, they may target small and medium businesses because their data security programs may not be as strong as those of larger companies. They ll take your bank account and credit card numbers, Federal Employer Identification Number, and other federal and state governmental identification numbers. They ll use this information to open credit card accounts in your business name and make purchases without your knowledge, open bank accounts in your business name and write checks on that account, or get a loan in the name of your business. In some cases, they can actually sell your business or property without your knowledge. Small businesses are MORE at risk than large businesses Popular wisdom may hold that large businesses are most at risk for identity theft and fraud but that s not the case. As we ve already shown, data thieves are flexible: They operate using both high-tech and low-tech methods. As a result, security applies to every business that collects and stores customer information. Small businesses are a particularly attractive target because they often don t have the strong data security protections that large businesses do. 2
3 Compliance isn t a choice Regardless of whether you think you re at risk for data theft, you re legally required to take proactive steps to prevent it no matter how small your company is. For example, all small businesses must comply with the Fair Credit Reporting Act (FCRA) when seeking to obtain consumer reports, such as credit reports and employment reports, about potential customers and employees. Other requirements vary by business type. Small financial businesses, for example, must comply with the federal Gramm-Leach-Bliley (GLB) Privacy Rules and Safeguard Rules and companies that need to comply include those that might not necessarily think of themselves as financial, such as automobile dealers, tax planners, and some travel agents. Small health care businesses must follow the privacy requirements of the federal Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and its data security requirements. As a small business owner or manager, it s your responsibility to stay current on privacy and security laws affecting your customers so establish good security and privacy practices now. International policies could affect you More than 50 countries have personal data protection laws that regulate the handling of customer information and even companies with no physical presence abroad have to comply if they engage in international business-to-consumer e-commerce. Firewalls are not enough You might think that the right combination of hardware and software will prevent data security and privacy exposures but technology is just one piece of the security and privacy equation. Consider this scenario from the Better Business Bureau: You ve equipped your computer with the latest network security software. 3
4 But one day a customer calls your business to ask what credit card you have on file for his account. He gives his name and address to an employee who then looks up the information on your computer. Your employee reads the credit card number to the caller. But the caller isn t really a customer; he s a criminal who found the name and address of one of your customers in the trash. Indeed, in small and medium businesses, the greatest data security risk might not be technology, but the uneducated end user. Symantec s SMB Information Protection Survey, which was published in June 2010, reported that 42 percent of small and medium companies have lost proprietary or confidential information and of the companies that lost data, 23 percent blamed insiders inadvertently losing data, while an additional 14 percent blamed broken business process. The point: It s not just about good technology. Effective security and privacy policies and proper employee training are also essential. Creating a security and privacy policy A security and privacy policy tells your customers how you will treat their personal information. In essence, it explains how you will collect it, how you will use it, and how you will keep it secure. Once you have a written policy that accurately describes your intended treatment of customer data, you ll want to communicate it to your customers. For example, you could distribute it on paper by posting it on asign in your office, giving customers a written copy when they complete a transaction with you, or mailing it as part of a promotional piece. Alternately, you could distribute it online by posting it on your web site, and if your customers have agreed to receive notices from you, send it to them via . Communicating your privacy policy to your customers will increase the trust they have in your business because when they know that you plan to use their information carefully, they will be more likely to share it with you. 4
5 Resources to help you write a privacy policy Need help writing an online privacy policy? Consider these two sources of assistance: the Better Business Bureau s Privacy Planner, available at and the Direct Marketing Association privacy policy generator, available at Employee education is paramount Employees who handle customer information should play a significant role in protecting that information: In its 2009 data breach report, Verizon Business found that insider errors were a factor in two-thirds of all breaches it investigated on behalf of clients. Think about all the different ways your business collects, stores, and uses customer information. Now list who handles or has access to the information. Anyone who appears on your list should play a significant role in protecting sensitive information. Conducting background checks can help you assess the character of prospective employees (or current employees, if you didn t do a background check before hiring them). Next, employees should have access only to the information necessary to do their jobs. When you control employees access to information, you significantly reduce the risk of data exposure. Finally, employees with access to information also need to be properly trained to follow your security and privacy policies and practices. Act quickly when a breach occurs If a data security or privacy breach occurs, you ll want to alert appropriate law enforcement officials immediately so they can investigate the incident. This could include local police, state authorities, or even the FBI. 5
6 Additionally, you ll want to alert your credit card processor and your acquiring bank, as well as the three national consumer reporting agencies. Also keep in mind that you may want to or have to alert your customers. Currently, 23 states have laws that require customer notification in the event personal data is lost, stolen or inadvertently disclosed, and these laws may expand to a national level soon. Let us help Is your business and internal IT staff up to the task of helping you prevent data theft? Perhaps not. Trend Micro s 2010 corporate end-user survey reported that 21 percent of small business employees say that their internal IT departments should do a better job at protecting them from potential risks associated with data-stealing malware. You may shy away from security tools and practices because of the perceived cost, but you can prevent many threats easily. Technology available to help you avoid threats includes data-loss protection (DLP) systems and services that stop users from unintentionally disclosing information they should keep confidential, such as monitoring programs. Because we invest in continuous training on the relevant technologies, as well as stay abreast of the business and policy issues we can help you review the available technology and come up with a comprehensive solution that fits your business. Contact us today for more information. OnlyLink Business Solutions Mailing Address 1734 Clarkson Road Suite 300 Chesterfield, MO Phone: Web: 6
Identity Protection Guide. The more you know, the better you can protect yourself.
Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious
Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
Identity Theft & Identity Fraud
Identity Crimes Identity Theft & Identity Fraud Identity theft involves acquiring key pieces of your identifying information without the victim s knowledge. Identity fraud occurs when thieves use the victims
Boynton Beach Chamber Lunch. How to Deter, Defend, and Detect Identity Theft July 11, 2012
Boynton Beach Chamber Lunch How to Deter, Defend, and Detect Identity Theft July 11, 2012 "Identity Theft and Assumption Deterrence Act of 1998" As amended by Public Law 105-318, 112 Stat. 3007 (Oct. 30,
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business An IDology, Inc. Whitepaper No matter how big your company is or what industry you are in, every business typically
SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH...
SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... CONTAINMENT AND CONTROL... INVESTIGATING A SECURITY
When Fraud Comes Knocking
When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
FYI RECORDKEEPING. Identity Theft: Overview and Document Disposal Requirements
FYI 1799 Pennsylvania Street P.O. Box 539 Denver, Colorado 80201.0539 303.839.5177 800.884.1328 www.msec.org Revised: March 2012 RECORDKEEPING Identity Theft: Overview and Document Disposal Requirements
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY
identity theft: How To Safeguard Your Privacy and Keep Your Good Name
identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,
I know what is identity theft but how do I know if mine has been stolen?
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT
Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec
Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics
PROTECTING YOUR IDENTITY:
PROTECTING YOUR IDENTITY: What to Know, What to Do Britt Short 2013 Raymond James & Associates, Inc., member New York Stock Exchange/SIPC. Raymond James is a registered trademark of Raymond James Financial,
Identity Theft. Protecting Your Credit Identity. August 19, 2016 Presented by: Sgt. John Wittkowski
Identity Theft Protecting Your Credit Identity August 19, 2016 Presented by: Sgt. John Wittkowski All costs for this presentation were underwritten by: Pine Rest Christian Mental Health Services Employee
According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection
According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government
Do s & Don ts Reference website. www.farmersidentityshield.com
What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
Preventing Identity Theft National City Bank. How to protect your identity
Preventing Identity Theft National City Bank How to protect your identity Understanding and Preventing Identity Theft Identity Theft is the fastest growing crime in America 500,000 people fall victim to
Minimizing the Risk of Identity Theft. John and Kris Clagett Q4 Wealth Management, Inc.
Minimizing the Risk of Identity Theft John and Kris Clagett Q4 Wealth Management, Inc. Introduction and Agenda What is identity theft? How does it happen? How can you tell if it s happening to you? How
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?
Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat
$22k. Payment Card Data Breaches: What You Need to Know About Your Risk and Liability. First Data Market Insight
Need to Know About Your Risk and Liability Many small merchants are surprised to learn that they can be held liable for tens of thousands of dollars in fines and other expenses when a card data breach
IDENTITY THEFT: MINIMIZING YOUR RISK
IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social
IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT IT S POSSIBLE@ PROTECT YOUR IDENTITY protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IT S POSSIBLE @ What Is Identity Theft? According to the FBI, identity theft is the fastest
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
Privacy Law Basics and Best Practices
Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff sskaff@fbm.com What Is Information Privacy? Your name? Your phone number or home address? Your email address?
Computer Security at Columbia College. Barak Zahavy April 2010
Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a
PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
Understanding our requirements and ensuring compliance
Understanding our requirements and ensuring compliance The FTC = Federal Trade Commission The FTC issued the Red Flag Rule as part of the Fair and Accurate Credit Transaction Act of 2003 (FACT Act), Sections
WHAT IS IDENTITY THEFT?
1 WHAT IS IDENTITY THEFT? IDENTITY THEFT is a serious Crime It disrupts your finances, credit history, reputation and takes money, time and patience to resolve Occurs when someone steals your personal
Identity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
DATA BREACH COVERAGE
THIS ENDORSEMENT MODIFIES THE POLICY. PLEASE READ IT CAREFULLY. INTERLINE CL IL 01 17 12 11 DATA BREACH COVERAGE This endorsement provides additional coverage under the following: COMMERCIAL PROPERTY COVERAGE
04 EMERGING AREAS OF IDENTITY THEFT 06
! 01 WHAT IS IDENTITY THEFT? 02 02 HOW DOES IDENTITY THEFT HAPPEN? 03 03 WHO IS AT RISK FOR IDENTITY THEFT? 04 04 EMERGING AREAS OF IDENTITY THEFT 06 05 VICTIM STORIES 08 06 IF YOUR IDENTITY IS STOLEN
Small Business ID Theft and Data Breach
It is not a matter of if but when an intrusion will be attempted on your business computer system in an effort to steal your customers personal information. John G. Iannarelli Assistant Special Agent in
suntrust.com 800.SUNTRUST
suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally
Identity Theft Awareness: Don t Fall Victim to these Common Scams
Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Pam Townley, AVP / Eastern Zonal Manager AIG Professional Liability Division Jennifer Bolling, Account Executive Gallagher Management Liability Division
Identity Theft: Informational Workshop
Identity Theft: Informational Workshop ~ Prepared By ~ Connecticut Department of Consumer Protection Jerry Farrell, Jr. Commissioner 1 The Department of Consumer Protection Mission The Department of Consumer
Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.
Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause
Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.
Client Resources SAFEGUARDING YOUR IDENTITY Your personal and financial information is precious. Protect it by being savvy about identity theft. EVERYONE IS AT RISK FOR IDENTITY THEFT. It s an unfortunate
Administrative Procedures Memorandum A1452
Page 1 of 11 Date of Issue February 2, 2010 Original Date of Issue Subject References February 2, 2010 PRIVACY BREACH PROTOCOL Policy 2197 Management of Personal Information APM 1450 Management of Personal
Identity Theft and Medical Theft. *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA
1 Identity Theft and Medical Theft *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA *Corresponding Author, 490 Piya Wiconi Road, Kyle-South Dakota (605) 455-6110 csarmiento@olc.edu Introduction
Client Education. Learn About Identity Theft
Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that
IN CASE OF EMERGENCY. A guide for managing a data breach quickly and confidently
IN CASE OF EMERGENCY A guide for managing a data breach quickly and confidently The number of breaches increased 47% in 2008. Source: Identity Theft Resource Center. ITRC Breach Report 2008 Final. January
Identity Theft. Prevention and Recovery Information Kit
Identity Theft Prevention and Recovery Information Kit A step-by-step guide designed to help you protect your identity and recover if you ve been victimized. 800-522-4100 valleynationalbank.com 2012 Valley
UNIT 3 4 Preventing Identity Theft
UNIT 3 4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information
Cyber Security: Emerging Risks and Trends (and what you can do about it)
Cyber Security: Emerging Risks and Trends (and what you can do about it) UVU Business and Economic Forum May 19, 2016 Presented by: Daniel D. Hill, Esq. Christopher Droubay, Esq. Risks and Trends Widely
Citi Identity Theft Solutions
Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and
Introduction 3. What is a Privacy Breach? 3. Authority to Review Privacy Breaches 5. Survey Highlights 6. Survey Results 8
Table of Contents Introduction 3 What is a Privacy Breach? 3 Authority to Review Privacy Breaches 5 Survey Highlights 6 Survey Results 8 Response Rate 8 Personal and Personal Health Information 9 Privacy
Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
Information Security: Gone in 60 Seconds
Information Security: Gone in 60 Seconds Think Fast Identity Theft: The Next Corporate Liability Wave Corporate Counsel, March 30, 2005 Your phone rings. It s Special Agent Bert Ranta. The FBI is investigating
PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro. Presented By Roy Davenport Shred-it North Carolina
PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro Presented By Roy Davenport Shred-it North Carolina Identity Theft in the US: How BIG Is The Problem? FTC Says it is the fastest
Awareness, Deterrence and
Identity Theft Awareness, Deterrence and Recovery Ian Howe Assistant Attorney General Consumer Protection Division Opinions presented are those of the speaker and not an official opinion of the Office
DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH
DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH Andy Watson Grant Thornton LLP. All rights reserved. CYBERSECURITY 2 SURVEY OF CHIEF AUDIT EXECUTIVES (CAEs) GRANT THORNTON'S 2014 CAE SURVEY Data privacy and
Data Privacy and Gramm- Leach-Bliley Act Section 501(b)
Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
At Cambrian, Your Privacy is Our Priority. Regardless of how you deal with us on the phone, online, or in person we have strict security measures
Privacy Policy At Cambrian, Your Privacy is Our Priority At Cambrian Credit Union, we know our members are concerned about the confidentiality and security of their personal information. This Policy ensures
Information to Protect Our Customers From Identity Theft
Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns
DNA of Cybersecurity Risks. Credit Union Executive Leadership Symposium
DNA of Risks Credit Union Executive Leadership Symposium CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited 2016 CUNA Mutual Group, All Rights Reserved. What s in store for
Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS
FACT SHEET LIFELOCK ULTIMATE PLUS Your bank accounts and credit are a gold mine for identity thieves. LifeLock Ultimate Plus service gives you some peace of mind knowing you have LifeLock s most comprehensive
Preventing identity theft
Preventing identity theft About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
Year-end 2015 fraud update: Payment cards, remote banking and cheque
Year-end 2015 fraud update: Payment cards, remote banking and cheque 17 March 2016 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against fraud in the
I dentity theft occurs
1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,
Identity Theft. Presented By: Information Technology. James Blackwood, Michael Fouts, & Tiffany Mixon
Identity Theft Presented By: Information Technology James Blackwood, Michael Fouts, & Tiffany Mixon What is Identity Theft? How can someone steal your identity? Identity theft occurs when someone uses
Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud
Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Marc Standig Enrolled Agent What is tax-related identity theft? Tax-related identity
SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection
SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
IDENTITY THEFT. Hawthorne Police Department
IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification
California s New Hacker Disclosure Law and its Potential Impact on Canadian Businesses
Reprinted from The Lawyers Weekly, August 15, 2003 California s New Hacker Disclosure Law and its Potential Impact on Canadian Businesses Berkley D. Sells Fasken Martineau DuMoulin LLP A California law
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
What is it? How does it occur? How potentially devastating it can be? How do we detect fraud? How can we minimize the risk of being victimized?
IDENTITY THEFT & PREVENTION Bucknell University Department of Public Safety Identity Theft Learning Objectives What is it? How pervasive is it? How does it occur? How potentially devastating it can be?
Cybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
Standard 9: The student will identify and explain consumer fraud and identity theft.
TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial
PCI Compliance: How to ensure customer cardholder data is handled with care
PCI Compliance: How to ensure customer cardholder data is handled with care Choosing a safe payment process for your business Contents Contents 2 Executive Summary 3 PCI compliance and accreditation 4
Identity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
Information as an Asset How to Protect your Data. Citi Public May 15 th, 2013
Information as an Asset How to Protect your Data May 15 th, 2013 Overview Define Information Security Information Security Risks Information Security Reviews 1 Agenda Information security - what is it?
Information copied from Federal Trade Commission Website (www.ftc.gov)
DETER OR MINIMIZE YOUR RISK OF IDENTITY THEFT Information copied from Federal Trade Commission Website (www.ftc.gov) Protect your Social Security number Don't carry your Social Security card in your wallet
Security & Privacy Made Simpler TM
Better Business Bureau Security & Privacy Made Simpler M a n a g e a b l e G u i d e l i n e s t o H e l p Y o u P r o t e c t Y o u r C u s t o m e r s S e c u r i t y & P r i v a c y F r o m I d e n
Identity Theft Security and Compliance: Issues for Business
Identity Theft Security and Compliance: Issues for Business The Facts Six Common Uses for Stolen Information Financial Criminal Medical DMV Social Security Terrorist The Facts A Chronology of Data Breaches
Why Lawyers? Why Now?
TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business
IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.
IDENTITY THEFT IDENTITY THEFT Identity theft is a serious crime with serious costs for victims. ID theft occurs when someone obtains your personal information such as your Social Security Number, credit
Identity Theft Information
Identity Theft Information Houston Police Department Criminal Investigations Command Financial Crimes Unit 713-308-2500 The information contained on this page is intended to assist the citizens of Houston
IDENTITY THEFT PROCEDURES
IDENTITY THEFT PROCEDURES FREQUENTLY ASKED QUESTIONS ABOUT IDENTITY THEFT INCIDENTS AND RED FLAGS Q1: How is a Red Flags incident different from a data security breach? A1: A data security breach is the
Money 101: Budgeting, Credit and ID Theft.
Money 101: Budgeting, Credit and ID Theft. Learn more than what s taught in class Freedom brings greater responsibility Today s decisions regarding money affect your future 1 Good money habits Knowing
Beware! Identity Theft
STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal
Preventing. Identity. Theft. Protecting Your Assets
Preventing Identity Theft Protecting Your Assets 1 What Is Identity Theft? Identity Theft occurs when someone uses your name, address, Social Security number, bank or credit card account number, or other
ARAPAHOE COUNTY SHERIFF S OFFICE TAKE CHARGE: Fighting Back Against Identity Theft
ARAPAHOE COUNTY SHERIFF S OFFICE TAKE CHARGE: Fighting Back Against Identity Theft FEDERAL TRADE COMMISSION January 2012 To The Citizens of Our Community: The victimization that results from the criminal
Avoid completing forms in email messages that ask for personal financial information.
INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...