Legislative & Regulatory Update 2 nd Quarter 2013

Size: px
Start display at page:

Download "Legislative & Regulatory Update 2 nd Quarter 2013"

Transcription

1 Legislative & Regulatory Update 2 nd Quarter 2013 FEDERAL LEGISLATIVE AND REGULATORY ACTIONS Consumer Protection Consumer Financial Protection Bureau : CFPB releases procedural rule on notifying nonbanks of supervision The rule states that CFPB will issue a Notice of Reasonable Cause if it has information about a nonbank entity engaging in conduct that poses risks to consumers. The regulation lays out what the CFPB requires in the notice and the company s response, as well as procedures and timelines that CFPB will use to make a decision on supervision. In addition, the final rule creates a mechanism for nonbanks to file a petition to terminate the CFPB s supervisory authority after two years. Failure to respond to a Notice may result in a default determination that the nonbank entity poses risks to consumers through its products and services, followed by an order subjecting the company to routine CFPB supervision : CFPB releases bulletin on Responsible Business Conduct: Self-Policing, Self-Reporting, Remediation, and Cooperation CFPB Bulletin states that the Bureau considers many factors in the exercise of its enforcement discretion. These include, for example: (1) the nature, extent, and severity of the violations identified; (2) the actual or potential harm from those violations; (3) whether there is a history of past violations; and (4) a party s effectiveness in addressing violations. This guidance is being provided to inform those subject to the Bureau s enforcement authority that in addition to these and other factors, there are activities they can engage in both before and after the conduct in question has occurred that the Bureau may favorably consider in exercising its enforcement discretion. Specifically, a party may proactively self-police for potential violations, promptly self-report to the Bureau when it identifies potential violations, quickly and completely remediate the harm resulting from violations, and affirmatively cooperate with any Bureau investigation above and beyond what is required. If a party meaningfully engages in these activities, which this bulletin refers to collectively as responsible conduct, it may favorably affect the ultimate resolution of a Bureau enforcement investigation : CFPB expands complaint database CFPB announced it is expanding its public Consumer Complaint Database to include complaints about credit reporting and money transfers. Simultaneously, the CFPB announced that complaints in its public database are searchable by state. The CFPB uses complaints it receives to prioritize and prepare for investigations and examinations. The public database now contains complaints about credit cards, mortgages, student loans, bank accounts and services, other consumer loans, credit reporting, and money transfers. Debt collection complaints are due to be added to the database in the near future. The CFPB does not verify the facts alleged in a complaint before making it public (but confirms that the consumer has a commercial relationship with the company). Cybersecurity : Senate Commerce panel unveils draft cybersecurity bill The Senate Commerce, Science and Transportation Committee announced a draft bill aimed at improving the nation's defenses against hackers. The draft, backed by Committee Chairman Rockefeller (D-WV) and ranking member Sen. Thune (R-SD), is an attempt to forge a compromise on cybersecurity 1

2 after repeated attempts to pass legislation failed last year. The draft bill would task the National Institute of Standards and Technology (NIST) with developing voluntary cybersecurity standards and best practices for critical infrastructure, such as banks and power plants. The legislation also aims to improve cybersecurity research, education and public awareness : Sen. Rockefeller sees "real opportunity" of passing cybersecurity bill Senate Commerce Chairman Senator Rockefeller (D-WV) expressed optimism that can pass a cybersecurity bill this session. "For the first time, I think we see a real opportunity of getting a bipartisan cybersecurity bill," Rockefeller said at a confirmation hearing for Commerce Secretary nominee Penny Pritzker. "It will be a miracle if we do it, but as I say, it's the greatest national threat." Rockefeller said he came to this conclusion after having a "very, very good talk with the chairman of the appropriate committee handling cybersecurity in the House," though he did not reveal the name of the lawmaker he spoke with : House Energy and Commerce hearing entitled: Cyber Threats and Security Solutions The hearing focused on steps the federal government and the private sector are taking to bolster the security of our nation s critical infrastructure and mitigate exposure to cyber attacks. Members discussed the president s Executive Order to improve critical infrastructure cybersecurity, including the latest on the order s implementation and the administration s development of a voluntary cybersecurity framework. The committee also examined security solutions to better protect against cyber threats, including enhanced information sharing, public-private partnerships, and greater industry collaboration : House Subcommittee on Communications and Technology hearing entitled: Cybersecurity: An Examination of the Communications Supply Chain The hearing examined how to secure the communications network supply chain, focusing on potential vulnerabilities and the wide-ranging impacts on national security and the economy. Mark Goldstein, Director of Physical Infrastructure Issues at the Government Accountability Office, discussed the magnitude of U.S. communications and technology networks and the vital role these networks play in the safe and secure operation of the country. Government, industry, and the public rely on communications networks to such a great degree that federal policy has included them in a category of national assets deemed critical infrastructure, making their protection a national priority. Many other critical infrastructure sectors such as banking and finance, energy, transportation systems, and water also rely on communications networks to sustain their operation. he stated. Dean Garfield, President and CEO of the Information Technology Industry Council, urged the government to tread lightly, as communications and technology companies have best innovated and responded to threats without government involvement. the communications industry has been consistently cited as one of the leading sectors in cybersecurity. We encourage to continue this light-touch approach when looking at the communications supply chain and enable industry to respond to evolving threats with innovation, flexibility, and the most updated and appropriate global standards and best practices : S.884, the Deter Cyber Theft Act, introduced by Sen. Levin (D-MI) This bill would require the Director of National Intelligence (DNI) to annually report to specified congressional committees on foreign countries that engage in economic and industrial espionage in cyberspace with respect to U.S. trade secrets or proprietary information. It would require each report to identify countries that engage in such espionage as well as countries that engage in the most egregious forms of such espionage. Also, it would direct the President to exclude from entry into the United States any article produced or exported by an entity identified within any such report, as long as the President determines that such exclusion is warranted for the enforcement of intellectual property rights or to protect the integrity of the Department of Defense (DOD) supply chain. 2

3 : H.R. 624, the Cyber Intelligence Sharing and Protection Act (CISPA), passed by House of Representatives CISPA was approved by the full House after the addition of several privacy-protecting amendments. The bill would provide companies liability protection for sharing cyberthreat information with the federal government. Also, it calls on the director of national intelligence to establish procedures allowing elements of the intelligence community to share cyberthreat information with certified U.S. companies. CISPA aims to encourage industry and the government to share information about malicious source code and other cyber threats with each other in real time so firms can thwart cyberattacks. Executive : NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure As part of its efforts to develop a voluntary framework to improve cybersecurity in the nation's critical infrastructure, the National Institute of Standards and Technology (NIST) has posted a draft outline of the document to invite public review and gather comments. The Executive Order calling for NIST to develop the framework directs the agency to collaborate with the public and private sectors : White House threatens veto against CISPA due to privacy concerns The White House threatened to veto H.R. 624, the Cyber Intelligence Sharing and Protection Act (CISPA), citing concerns it lacks vital privacy protections. Among the list of privacy concerns were that the bill does not include a measure that would require companies to take "reasonable steps to remove irrelevant personal information" from cyber threat data prior to sharing it with the government and other peers in the private sector. "Citizens have a right to know that corporations will be held accountable and not granted immunity for failing to safeguard personal information adequately," according to the administration's statement. "Moreover, the administration is confident that such measures can be crafted in a way that is not overly onerous or cost prohibitive on the businesses sending the information." : ETA submits comments to NIST on cybersecurity framework The National Institute of Standards and Technology (NIST) is conducting a comprehensive review to develop a framework to reduce cyber risks to critical infrastructure. The Framework will consist of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks. ETA ACTION: ETA filed comments as part of this review suggesting three existing frameworks for NIST to follow -- Special Publication , the ISO series, and PCI-DSS. Fraud Consumer Financial Protection Bureau : CFPB Files Complaint against Debt-Relief Company; First Time Reliance on Abusive Acts and Practices Prohibition The Bureau filed a complaint in federal district court against American Debt Settlement Solutions, Inc. ( ADSS ), a Florida debt-relief company, and its owner. The complaint alleges that ADSS and its owner violated the Federal Trade Commission s Telemarketing Sales Rule, as well as certain UDAAP provisions of the Dodd-Frank Act. The complaint is significant because it alleges, in part, that ADSS engaged in abusive practices, as defined in the Dodd-Frank Act. This action is the first that relies on this prohibition on abusive acts or practices. Federal Trade Commission : FTC Expands Case and Names Payment Processing Company for Assisting, Facilitating Telemarketing Fraud 3

4 The Commission added eight new defendants to a case the agency brought last year, including a payment processor it alleges assisted in the fraud. The FTC filed an amended complaint against the defendants behind the firm Treasure Your Success (TYS), which allegedly made deceptive cardholder services robocalls, promising to lower consumers credit card rates in exchange for an upfront fee as high as $1, Among the additional defendants named in the complaint is a company called Newtek Merchant Solutions. According to the complaint, Newtek approved TYS for a merchant account without performing customary reviews and despite clear warning signs of fraud. The FTC also claims Newtek continued to process credit card transactions for TYS, despite knowing that it had high charge-back rates, had fraud alerts on its credit reports, and was on MasterCard s fraud monitoring program : FTC Sues Payment Processor for Assisting Credit Card Debt Relief Scam The FTC alleges the payment processor, Independent Resources Network Corp. (IRN), knew, or consciously avoided knowing, key facts about the illegal conduct of a telemarketing scam operated by Innovative Wealth Builders, Inc. (IWB), and chose to continue profiting from processing IWB s credit card transactions. Among the many indicators of illegal conduct that IRN allegedly ignored were IWB s alarmingly high chargebacks rates. According to the FTC s amended complaint, IWB s chargeback rate averaged above 20 percent for several years, and exceeded 40 percent in multiple months. Intellectual Property Executive : White House updates intellectual property strategy The Obama administration released a new strategy to protect ideas and prevent counterfeit goods from spreading online and across the border. The new version of the strategy outlines additional ways to coordinate enforcement, increase outreach and help the private sector collaborate on their own initiatives. The administration has "deliberately taken a non-regulatory approach" to protecting copyright owners of music, movies and other products, stated U.S. Intellectual Property Enforcement Coordinator Victoria Espinel. Internet Gaming : H.R.2666, the Internet Poker Freedom Act of 2013, introduced by Rep. Barton (R-TX) The legislation would require poker websites to be licensed, would require technology to block underage players and would require programs to discourage compulsive gamblers. The bill would still allow states to conduct their own regulation : H.R. 2282, the Internet Gambling Regulation, Enforcement, and Consumer Protection Act of 2013 introduced by Rep. King (R-NY) This bill would require the Treasury Department to create a federal licensing regime for internet gaming businesses and giving states the ability to opt out of it. This proposal would make it a crime to operate an internet gaming facility unless the entity first obtains a license, with exceptions for state-run lotteries, tribal gaming, casinos, and race tracks. The proposal would have no effect on existing federal and state restrictions on sports betting. Mobile Payments : S.1144, the Fair Telephone Billing Act of 2013, introduced by Sen. Rockefeller (D-WV) This bill seeks to prohibit unauthorized third-party charges on telephone bills. This problem, referred to as cramming, first appeared in the 1990s after telephone companies opened their billing platforms to an array of third-party vendors offering a variety of services. An investigation by the Senate Committee on 4

5 Commerce, Science, and Transportation confirmed that cramming is a problem of massive proportions and has affected millions of telephone users, costing them billions of dollars in unauthorized third-party charges over the past decade. The Committee reported that third-party billing through telephone numbers has largely failed to become a reliable method of payment that consumers and businesses can use to conduct legitimate commerce. Telephone companies regularly placed third-party charges on their customers' telephone bills without their customers' authorization. Many companies engaged in third-party billing were illegitimate and created solely to exploit the weaknesses in the third-party billing platforms established by telephone companies : H.R. 1913, the Application Privacy, Protection and Security Act of 2013, introduced by Rep. Johnson This bill would direct mobile device application developers, before the application collects personal data about the user, to notify the user and obtain the user s consent regarding the terms and conditions governing the collection, use, storage, and sharing of such personal data. The bill would also require developers to provide users with a method to withdraw consent and to request that the developer delete personal data or refrain from further data collection and sharing, and take measures to prevent unauthorized access to personal and de-identified data. Federal Communications Commission : FCC Votes to Apply Privacy Rules to Data Collected on Wireless Devices The FCC voted to require wireless carriers to adhere to the agency's Customer Proprietary Network Information rules, which historically have governed only how traditional telephone companies and providers of internet-based phone services treat their customers' personal data. Under a declaratory ruling adopted on a unanimous 3-0 vote, when a wireless carrier collects a customer's personal information, such as a number dialed, the length of a call, and the location of where a call is placed or received, that company may use or disclose it only as permitted by the commission's CPNI rules. The ruling also makes it clear that carriers must take reasonable precautions to prevent unauthorized disclosure of such information, including by third-party marketers. Also, when a wireless carrier collects such information about customers' use of their devices using pre-installed applications, the ruling requires them to protect that information. The ruling only applies to wireless carriers, not operating systems run by companies such as Google or Apple. Commissioner, Ajit Pai stated that there is no mobile device exception to either section 222 or our CPNI rules. If information is covered by the statutory definition of CPNI set forth in section 222(h)(1), then it is CPNI, regardless of whether it is located on a mobile device, Pai said. He also supported the ruling's limited scope, noting that it only applies to information that is both collected by or at the direction of the carrier and may be accessed or controlled by the carrier or its designee : FCC publishes Mobile Wallet Services Protection guide for consumers The FCC outlines safe practices for consumers to follow as they are increasingly using their smartphones, tablets and other mobile devices as "mobile wallets" to pay for goods and services, downloading software that allows them to complete both mobile and in-person transactions. As the use of mobile wallet services increases, consumers need to protect their smartphones, mobile wallet applications, associated data, and mobile wallet services from theft and cyber attacks. Privacy : Senate Commerce Committee holds hearing entitled: A Status Update on the Development of Voluntary Do-Not-Track Standards. 5

6 The hearing examined what steps, if any, industry stakeholders have taken to fulfill their public commitment to honor Do-Not-Track requests from consumers. Senate Commerce Committee Chairman Rockefeller (D-WV) stated, I strongly believe that consumers should be able to manage whether online companies collect their personal information. At a White House event in early 2012, a coalition of Internet companies said they would work together to voluntarily implement a Do Not Track option for users. After more than a year of talks between advertisers, browser makers and other Internet companies, there is no agreement. "Industry made a public commitment to honor Do-Not-Track requests from consumers but has not yet followed through," Rockefeller said. "I plan to find out what is holding up the development of voluntary Do-Not-Track standards that should have been adopted at the end of last year : H.R. 1312, the Geolocational Privacy and Surveillance Act, introduced by Rep. Chaffetz This bill would establish a clear, uniform standard for government access to geolocation data. This would provide prosecutors and law enforcement officers clarity about how much evidence they need to remotely track individuals movements. It would also give private companies clarity about when they can respond to legitimate law enforcement requests, and what obligations they have to protect their customers information. The bill is modeled after federal wiretapping statutes and is based on the view that surreptitiously turning an individual s cell phone into a tracking device without their knowledge has a substantial privacy impact, just like tapping that person s phone or searching that person s house. The bill creates a process whereby government agencies can get a probable cause warrant to obtain geolocation information in the same way that they currently get warrants for wiretaps or other types of electronic surveillance. STATE LEGISLATION AND REGULATION Connecticut : S.B An Act Concerning Alternative Methods for the Collection and Remittal of Sales and Use Taxes, signed into law This bill is intended to enhance collection of the Sales and Use Tax, generating state and municipal revenue gain. The Commissioner of Revenue Services has until October 1, 2013, to study various collection methods and make recommendations on the implementation of alternative methods for collection and remittal of Sales and Use Tax. If those recommendations are approved by the Finance Committee, the bill would take effect January 1, A notable passage for payment processors: Nebraska The commissioner shall consider (1) the amount of sales and use taxes that are annually uncollected or consistently delinquent, (2) the availability and effectiveness of such alternative methods, including any electronic software available for purchase or license to assist in the collection and remittal of said taxes, (3) the advisability of requiring more frequent remittal of said taxes (4) the advisability of instituting a payment system whereby the state may receive payment of said taxes electronically on or about the date of the taxable transaction, from thirdparty processors of consumer credit or debit card payments or electronic funds transfers, (5) whether such methods should be required for all retailers, only for retailers consistently delinquent in remitting said taxes, only for retailers either above or below a specific dollar level of quarterly tax liability, or for some combination thereof, and (6) whether such methods are likely to reduce deficiencies and increase collections and remittals : Nebraska lawmakers to scrutinize credit, debit holds The Legislature's Banking, Commerce and Insurance Committee will conduct a study this summer of the regulations in place for the temporary extra charges that can be applied to credit and debit card 6

7 purchases when the total bill isn't immediately known. The practice is intended to protect merchants from fraud and loss. The committee's findings and recommendations are due before Dec. 31. Sen. John Harms introduced the legislative study after talking with a constituent who worked at a local grocery store. A young couple tried to buy diapers and baby food with a credit card, but was denied because a gas station had placed a $75 hold which pushed their credit to its limit. Groups that represent convenience stores and other businesses have argued that the hold amounts are out of their control, because they contract with credit card processing companies that set the terms of how the technology is used. New York : Information reporting bills pass both chambers A.B.7557 passed the State Assembly on June 12 and companion bill S passed the State Senate and was returned to the Assembly on June 18. The bills would amend state law with regard to information returns relating to payments made in settlement of payment card and third party network transactions. Current law prohibits the Department of Taxation and Finance from redisclosing any information it receives on such an information return. These bills would allow the Department of Taxation and Finance to disclose reporting information only to the Commissioner of Finance of the City of New York, in order to facilitate more accurate and efficient administration of New York City tax laws. 7

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES This special report examines the cyber risk disclosures made by the retail sector of the Fortune 1000.

More information

Minimizing Legal and Compliance Risk for Credit Furnishers

Minimizing Legal and Compliance Risk for Credit Furnishers Minimizing Legal and Compliance Risk for Credit Furnishers Wednesday, November 18, 2015 2:00 p.m. 3:00 p.m. EST Webinar Speakers Jonathan L. Pompan, Esq., Partner and Co-Chair Consumer Financial Protection

More information

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee

More information

Payment Systems: Regulatory Interest in Payment Processors, Faster Payments, and Related Consumer Protections

Payment Systems: Regulatory Interest in Payment Processors, Faster Payments, and Related Consumer Protections July 2015 RPL15-04 Payment Systems: Regulatory Interest in Payment Processors, Faster Payments, and Related Consumer Protections Executive Summary The expansion of the Internet and the growth in electronic

More information

Federal Trade Commission

Federal Trade Commission Federal Trade Commission Consumer Protection Challenges and Priorities for 2014 Jessica Rich 1 Director, Bureau of Consumer Protection, FTC Consumer Federation of America 2014 Consumer Assembly March 21,

More information

Privacy Risks and Public Benefits of Big Data Federal Proposals Regarding Data Security and Privacy Regulation

Privacy Risks and Public Benefits of Big Data Federal Proposals Regarding Data Security and Privacy Regulation Privacy Risks and Public Benefits of Big Data Federal Proposals Regarding Data Security and Privacy Regulation Presented by: Francine E. Friedman (202) 887-4143 ffriedman@akingump.com January 30, 2013

More information

Children s Privacy in the Mobile Data Environment

Children s Privacy in the Mobile Data Environment DataGuidance is the leading global data protection and privacy compliance resource tool, created with a single aim - to make data protection and privacy compliance simpler. It delivers, in one site, legal

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity

More information

114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS

114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS 114 th Congress March, 2015 Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS On January 13, 2015, the Administration wrote a letter to Congress urging

More information

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel todd.bertoson@dentons.com

More information

Government Focus on Cybersecurity Elevates Data Breach Legislation. by Experian Government Relations and Experian Data Breach Resolution

Government Focus on Cybersecurity Elevates Data Breach Legislation. by Experian Government Relations and Experian Data Breach Resolution Government Focus on Cybersecurity Elevates Data Breach Legislation by Experian Government Relations and Experian Data Breach Resolution Will Congress pass data breach legislation in 2015/2016? Recent high-profile

More information

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 Bruce.Heiman@klgates.com (202) 661-3935 Why share information? Prevention

More information

The CFPB focuses on mobile phone carrier payment processing If you think you are not a Financial Services Company You may want to think again

The CFPB focuses on mobile phone carrier payment processing If you think you are not a Financial Services Company You may want to think again www.pwc.com/consumerfinance www.pwcregulatory.com The CFPB focuses on mobile phone carrier payment processing If you think you are not a Financial Services Company You may want to think again January 2015

More information

STATEMENT STUART F. DELERY ASSISTANT ATTORNEY GENERAL CIVIL DIVISION

STATEMENT STUART F. DELERY ASSISTANT ATTORNEY GENERAL CIVIL DIVISION STATEMENT OF STUART F. DELERY ASSISTANT ATTORNEY GENERAL CIVIL DIVISION BEFORE THE SUBCOMMITTEE ON REGULATORY REFORM, COMMERCIAL AND ANTITRUST LAW COMMITTEE ON JUDICIARY U.S. HOUSE OF REPRESENTATIVES FOR

More information

POLICY FRAMEWORK FOR THE REGULATION OF INTERNET GAMBLING

POLICY FRAMEWORK FOR THE REGULATION OF INTERNET GAMBLING POLICY FRAMEWORK FOR THE REGULATION OF INTERNET GAMBLING Adopted by the NCLGS Executive Committee on January 10, 2015. Recognizing both the threats and opportunities posed by new technologies and Internet

More information

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Protecting Personal Consumer Information from Cyber Attacks and Data Breaches.

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Protecting Personal Consumer Information from Cyber Attacks and Data Breaches. PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION on Protecting Personal Consumer Information from Cyber Attacks and Data Breaches Before the COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED

More information

MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM

MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM This Addendum ( Addendum ) to the Citizens State Bank of Paola Online Banking Agreement between you and Citizens State Bank of

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR

CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR July 28, 2015 The Senate is expected to consider the Cybersecurity Information Sharing Act (CISA, S. 754 1 ) on the Senate floor soon. The bill was marked

More information

2014 National Update: Service Contracts Ancillary Products

2014 National Update: Service Contracts Ancillary Products 2014 National Update: Service Contracts Ancillary Products Timothy J. Meenan General Counsel to Service Contract Industry Council Motor Vehicle Ancillary Products Association Meenan PA Managing Shareholder

More information

Data Privacy and Cybersecurity Task Force

Data Privacy and Cybersecurity Task Force Data Privacy and Cybersecurity Task Force key contact Josephine Cicchetti Shareholder T: 202.965.8162 F: 202.965.8104 email We provide clients across industries with comprehensive counsel on complex, evolving,

More information

CYBERSECURITY INFORMATION SHARING BILLS FALL SHORT ON PRIVACY PROTECTIONS

CYBERSECURITY INFORMATION SHARING BILLS FALL SHORT ON PRIVACY PROTECTIONS CYBERSECURITY INFORMATION SHARING BILLS FALL SHORT ON PRIVACY PROTECTIONS April 22, 2015 The Center for Democracy and Technology opposes the two cybersecurity information sharing bills that are coming

More information

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Anatomy of a Hotel Breach

Anatomy of a Hotel Breach Page 1 of 6 Anatomy of a Hotel Breach Written by Sandy B. Garfinkel Monday, 09 June 2014 15:22 Like 0 Tweet 0 0 Data breach incidents have dominated the news in 2014, and they are only becoming more frequent

More information

UNFAIR, DECEPTIVE, OR ABUSIVE ACTS OR PRACTICES (UDAAP)

UNFAIR, DECEPTIVE, OR ABUSIVE ACTS OR PRACTICES (UDAAP) UNFAIR, DECEPTIVE, OR ABUSIVE ACTS OR PRACTICES (UDAAP) EXAMINATION PROCEDURES Examination Objectives To assess the quality of the credit union s compliance risk management systems, including internal

More information

Terms of Service. This online privacy policy applies only to information collected through our website and not to information collected offline.

Terms of Service. This online privacy policy applies only to information collected through our website and not to information collected offline. Terms of Service Privacy Policy Mahavitaran (mahadiscom) respects and protects the privacy of the individuals that access the information and use the services brought through them. Individually identifiable

More information

Regulatory Practice Letter February 2014 RPL 14-05

Regulatory Practice Letter February 2014 RPL 14-05 Regulatory Practice Letter February 2014 RPL 14-05 CFPB Nonbank Supervision of International Money Transfer Providers Proposed Rule Executive Summary The Consumer Financial Protection Bureau (CFPB or Bureau)

More information

DIVISION N CYBERSECURITY ACT OF 2015

DIVISION N CYBERSECURITY ACT OF 2015 H. R. 2029 694 DIVISION N CYBERSECURITY ACT OF 2015 SEC. 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 2015. (b) TABLE OF CONTENTS. The table

More information

TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the

TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the For Release Upon Delivery 10:00 a.m., December 10, 2014 TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY Before the COMMITTEE ON BANKING, HOUSING,

More information

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005

More information

KEY LEGAL ISSUES IN TODAY S MOBILE MARKETING:

KEY LEGAL ISSUES IN TODAY S MOBILE MARKETING: KEY LEGAL ISSUES IN TODAY S MOBILE MARKETING: Emerging Trends in Mobile Technology, Location-Based Services, and Mobile Commerce Mark Bisard, American Express Nate Hole, Loeb & Loeb LLP Brian Nixon, Loeb

More information

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3) DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners

More information

Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am

Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am 1 of 7 5/8/2014 7:34 PM Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am Editor s Note: David A. Katz is a partner at Wachtell, Lipton, Rosen & Katz specializing

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

PRIVACY AND POLICY TERMS FOR PAYLIVE SERVICE & PAYLIVE Inc. (V-3-0-3 10feb15)

PRIVACY AND POLICY TERMS FOR PAYLIVE SERVICE & PAYLIVE Inc. (V-3-0-3 10feb15) CONTENTS 1. PAYLIVE ACCEPTABLE USE POLICY... 2 1.1. Prohibited Activities... 2 1.2. Violations of the Acceptable Use Policy... 2 2. PAYLIVE ELECTRONIC COMMUNICATIONS DELIVERY POLICY... 3 (E-SIGN DISCLOSURE

More information

United States House of Representatives United States House of Representatives. Washington, DC 20515 Washington, DC 20515

United States House of Representatives United States House of Representatives. Washington, DC 20515 Washington, DC 20515 April 17, 2015 The Honorable John Boehner The Honorable Nancy Pelosi Speaker of the House Democratic Leader United States House of Representatives United States House of Representatives H-232, U.S. Capitol

More information

The Dow Chemical Company. statement for the record. David E. Kepler. before

The Dow Chemical Company. statement for the record. David E. Kepler. before The Dow Chemical Company statement for the record of David E. Kepler Chief Sustainability Officer, Chief Information Officer, Business Services and Executive Vice President before The Senate Committee

More information

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 It s a pleasure to be with you back home in Boston. I was here just six weeks ago

More information

Credit Card Agreement and Disclosure Statement

Credit Card Agreement and Disclosure Statement Credit Card Agreement and Disclosure Statement Your Lifetime Financial Partner In this Agreement the words you and your mean each and all of those signing, using or having a credit Card account with Northwest

More information

BIG DATA AND INSURANCE SYMPOSIUM

BIG DATA AND INSURANCE SYMPOSIUM BIG DATA AND INSURANCE SYMPOSIUM ATTORNEY GENERAL GEORGE JEPSEN UNIVERSITY OF CONNECTICUT SCHOOL OF LAW APRIL 3, 2014 (REVISED FOR PUBLICATION) *** This Article reproduces the keynote address delivered

More information

U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE

U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE June 20, 2016 TO: FROM: RE: Members, Committee on Energy and Commerce Committee Majority Staff Full Committee Markup of H.R. 5510, H.R. 5111,

More information

Cyber Legislation & Policy Developments 2014

Cyber Legislation & Policy Developments 2014 Cyber Legislation & Policy Developments 2014 SESSION ID: LAW-Fo2 Michael A. Aisenberg, Esq. Chair, ABA Information Security Committee Policy Task Force ABA Section on Science & Technology Law Principal

More information

CFPB Focus. Five Questions to Ask Before January 10, 2014

CFPB Focus. Five Questions to Ask Before January 10, 2014 Five Questions to Ask Before January 10, 2014 Courtney H. Gilmer, 615.726.5747, cgilmer@bakerdonelson.com 1. Compliance Procedures. Have you updated your written policies and procedures for each of your

More information

Nevada Registered Agents Association

Nevada Registered Agents Association Nevada Registered Agents Association Best Practices Recommendations to Prevent the Exploitation of Nevada Business Entities for Criminal Activities, and for the Protection of the Nevada Registered Agent

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014.

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. The Rohit Group of Companies ( Rohit Group, Company, our, we ) understands

More information

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE This Electronic Fund Transfers Agreement and Disclosure is the contract which covers your and our rights and responsibilities concerning the electronic

More information

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14 www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the

More information

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015 Cybersecurity Best Practices in Mortgage Banking Article by Jim Deitch Cybersecurity Best Practices in Mortgage Banking BY JIM DEITCH Jim Deitch Recent high-profile cyberattacks have clearly demonstrated

More information

To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. BAG15121 Discussion Draft S.L.C. 114TH CONGRESS 1ST SESSION S. XXXX To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

More information

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote

More information

Protecting your privacy

Protecting your privacy Protecting your privacy Table of Contents Answering your questions about privacy Your privacy... 1 Your consent... 1 Answering your questions about privacy... 2 About cookies... 9 Behavioural Advertising/Online

More information

New Federal Regulation of Tax Resolution, Tax Negotiation and Tax Settlement Services: FTC Telemarketing Sales Rule

New Federal Regulation of Tax Resolution, Tax Negotiation and Tax Settlement Services: FTC Telemarketing Sales Rule New Federal Regulation of Tax Resolution, Tax Negotiation and Tax Settlement Services: FTC Telemarketing Sales Rule October 5, 2010, 3:00 4:00 pm ET Jonathan L. Pompan, Esq. Venable LLP, Washington, D.C.

More information

We will not collect, use or disclose your personal information without your consent, except where required or permitted by law.

We will not collect, use or disclose your personal information without your consent, except where required or permitted by law. HSBC Privacy Notice HSBC's Privacy Principles HSBC Bank Canada is a subsidiary of HSBC Holdings plc which, together with its subsidiaries and affiliates, is one of the world s largest banking and financial

More information

DIVISION N CYBERSECURITY ACT OF 2015

DIVISION N CYBERSECURITY ACT OF 2015 U:\0REPT\OMNI\FinalOmni\CPRT--HPRT-RU00-SAHR0-AMNT.xml DIVISION N CYBERSECURITY ACT OF 0 SEC.. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 0.

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

ELECTRONIC FUNDS TRANSFERS AGREEMENT YOUR RIGHTS AND RESPONSIBILITIES

ELECTRONIC FUNDS TRANSFERS AGREEMENT YOUR RIGHTS AND RESPONSIBILITIES ELECTRONIC FUNDS TRANSFERS AGREEMENT YOUR RIGHTS AND RESPONSIBILITIES Indicated below are types of Electronic Funds Transfers we are capable of handling, some of which may not apply to your account. Please

More information

Independent Bank 230 W Main St Ionia, MI 48846 800.300.3193 www.independentbank.com ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE

Independent Bank 230 W Main St Ionia, MI 48846 800.300.3193 www.independentbank.com ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE 230 W Main St Ionia, MI 48846 800.300.3193 www.independentbank.com ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE For purposes of this disclosure and agreement the terms "we", "us" and "our" refer to

More information

Data Privacy & Security in the Cloud: Legal Basics and New Developments

Data Privacy & Security in the Cloud: Legal Basics and New Developments Data Privacy & Security in the Cloud: Legal Basics and New Developments Lawrence R. Freedman Partner, Edwards Wildman Palmer LLP lfreedman@edwardswildman.com (202) 939-7923 1 The Basics Two basic data

More information

Visa Credit Card Cardmember Agreement

Visa Credit Card Cardmember Agreement Visa Credit Card Cardmember Agreement In this Agreement the words You, Your and Yourself mean each and all of those who apply for the card or who sign this Agreement. Card means the Visa Credit Card and

More information

Cybersecurity Primer

Cybersecurity Primer Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers

More information

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE This Electronic Fund Transfers Agreement and Disclosure is the contract which covers your and our rights and responsibilities concerning the electronic

More information

SAMPLE RETURN POLICY

SAMPLE RETURN POLICY DISCLAIMER The sample documents below are provided for general information purposes only. Your use of any of these sample documents is at your own risk, and you should not use any of these sample documents

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2005 H 2 HOUSE BILL 629 Committee Substitute Favorable 5/18/05

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2005 H 2 HOUSE BILL 629 Committee Substitute Favorable 5/18/05 GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 0 H HOUSE BILL Committee Substitute Favorable //0 Short Title: Option to Freeze Credit Report. Sponsors: Referred to: March, 0 (Public) A BILL TO BE ENTITLED

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

FIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL

FIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL FIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL Before the Subcommittee on Financial Institutions and Consumer

More information

Merchant Account Terms of Use

Merchant Account Terms of Use Merchant Account Terms of Use This Merchant Account Terms of Use ("MATOU") governs your use of the Services. Capitalised terms and expressions used in this MATOU shall, unless the context otherwise requires,

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

Important Disclosure Information Travis Credit Union Credit Cards MasterCard or VISA Credit Card R. Interest Rates and Interest Chargestext

Important Disclosure Information Travis Credit Union Credit Cards MasterCard or VISA Credit Card R. Interest Rates and Interest Chargestext Annual Percentage Rate (APR) for purchases* Platinum Rewards VISA 8.99% to 15.99% Important Disclosure Information Travis Credit Union Credit Cards R MasterCard or VISA Credit Card R MasterCard Gold 10.99%

More information

What Lead Generators Need to Know About the Consumer Financial Protection Bureau (CFPB)

What Lead Generators Need to Know About the Consumer Financial Protection Bureau (CFPB) What Lead Generators Need to Know About the Consumer Financial Protection Bureau (CFPB) LeadsCon March 18, 2013 Mirage Hotel & Casino, Las Vegas, NV Jonathan L. Pompan Venable LLP 1 Agenda for Today What

More information

NC General Statutes - Chapter 75 Article 4 1

NC General Statutes - Chapter 75 Article 4 1 Article 4. Telephone Solicitations. 75-100. Findings. The General Assembly finds all of the following: (1) The use of the telephone to market goods and services to the home is now pervasive due to the

More information

Preservation of longstanding, roles and missions of civilian and intelligence agencies

Preservation of longstanding, roles and missions of civilian and intelligence agencies Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto

More information

CREDIT CARD AGREEMENT

CREDIT CARD AGREEMENT CREDIT CARD AGREEMENT (Personal Accounts) By requesting or accepting any Standard MasterCard, Standard Visa, Platinum MasterCard, Platinum Visa, Platinum Rewards MasterCard, or Platinum Rewards Visa account

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,

More information

Selected Text of the Fair Credit Reporting Act (15 U.S.C. 1681 1681v) With a special Focus on the Impact to Mortgage Lenders

Selected Text of the Fair Credit Reporting Act (15 U.S.C. 1681 1681v) With a special Focus on the Impact to Mortgage Lenders Selected Text of the Fair Credit Reporting Act (15 U.S.C. 1681 1681v) as Amended by the Fair and Accurate Credit Transactions Act of 2003 (Public Law No. 108-159) With a special Focus on the Impact to

More information

Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence

Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence December 6, 2012 Michael Greenberger Professor of Law Founder and Director, CHHS Legislative Proposals Maryland

More information

How To Protect Your Cybersecurity From Cyber Incidents

How To Protect Your Cybersecurity From Cyber Incidents SEC ENFORCEMENT The SEC s Two Primary Theories in Cybersecurity Enforcement Actions By Daniel F. Schubert, Jonathan G. Cedarbaum and Leah Schloss WilmerHale Cyber attacks are increasingly common and affect

More information

CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 My name is Jacob Olcott and I am pleased to share some observations on

More information

DEBIT CARD AGREEMENT AND DISCLOSURE

DEBIT CARD AGREEMENT AND DISCLOSURE DEBIT CARD AGREEMENT AND DISCLOSURE This Debit Card Agreement and Disclosure is the contract which covers your and our rights and responsibilities concerning the debit card services offered to you by Front

More information

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE This Electronic Fund Transfers Agreement and Disclosure is the contract which covers your and our rights and responsibilities concerning the electronic

More information

S. ll IN THE SENATE OF THE UNITED STATES A BILL

S. ll IN THE SENATE OF THE UNITED STATES A BILL TH CONGRESS ST SESSION S. ll To codify mechanisms for enabling cybersecurity threat indicator sharing between private and government entities, as well as among private entities, to better protect information

More information

Unfair or Deceptive Acts or Practices by State-Chartered Banks March 11, 2004

Unfair or Deceptive Acts or Practices by State-Chartered Banks March 11, 2004 Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation Unfair or Deceptive Acts or Practices by State-Chartered Banks March 11, 2004 Purpose The Board of Governors of the

More information

Supervisory Highlights

Supervisory Highlights Supervisory Highlights Spring 2014 Table of contents Table of contents... 2 1. Introduction... 3 2. Supervisory observations... 5 2.1 Consumer reporting... 8 2.2 Debt collection... 11 2.3 Short-term, small-dollar

More information

Privacy & Data Security: The Future of the US-EU Safe Harbor

Privacy & Data Security: The Future of the US-EU Safe Harbor Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT

More information

Mobile Banking Services Addendum To the Agreement and Disclosure for 24/7 Online Banking A Service of Pendleton Community Bank, Franklin, WV

Mobile Banking Services Addendum To the Agreement and Disclosure for 24/7 Online Banking A Service of Pendleton Community Bank, Franklin, WV Mobile Banking Services Addendum To the Agreement and Disclosure for 24/7 Online Banking A Service of Pendleton Community Bank, Franklin, WV This is an addendum to the Agreement and Disclosure for 24/7

More information

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014

More information

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE This Electronic Fund Transfers Agreement and Disclosure is the contract which covers your and our rights and responsibilities concerning the electronic

More information

Senate. File No. 757. Approved by the Legislative Commissioner May 3, 2014

Senate. File No. 757. Approved by the Legislative Commissioner May 3, 2014 Senate General Assembly File No. 757 February Session, 2014 (Reprint of File No. 191) Substitute Senate Bill No. 209 As Amended by Senate Amendment Schedule "A" and House Amendment Schedule "A" Approved

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

DEBIT CARD & ELECTRONIC FUNDS TRANSFER DISCLOSURE

DEBIT CARD & ELECTRONIC FUNDS TRANSFER DISCLOSURE DEBIT CARD & ELECTRONIC FUNDS TRANSFER DISCLOSURE The purpose of this Disclosure Statement is to make you aware of your rights and responsibilities when using our Debit Card and Electronic Funds Transfer

More information

Electronic Funds Transfer Disclosures

Electronic Funds Transfer Disclosures Electronic Funds Transfer Disclosures BRIDGEPORT SAGINAW CHESANING FREELAND AUBURN 800-772-8728 www.unitedfinancialcu.org The following disclosures set forth your and our rights and responsibilities concerning

More information

Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce

Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Committee on Energy and Commerce Subcommittee on Communications and Technology U.S. House

More information

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE This Electronic Fund Transfers Agreement and Disclosure is the contract which covers your and our rights and responsibilities concerning the electronic

More information

Current Credit Card Agreements for New Business Accounts

Current Credit Card Agreements for New Business Accounts Current Credit Card Agreements for New Business Accounts For new business accounts opened beginning 12/10/2014, the following Account Opening Disclosures and Credit Card Agreement apply by the credit card

More information

1. About Some of the Words in this Agreement 2. Account and Cards

1. About Some of the Words in this Agreement 2. Account and Cards B M O M A S T E R C A R D * F O R B U S I N E S S A C C O U N T A G R E E M E N T In this Agreement, the Customer means the business shown on a BMO MasterCard for Business application (the Application

More information