LEGISLATIVE AND PUBLIC POLICY ADVISORY

Size: px
Start display at page:

Download "LEGISLATIVE AND PUBLIC POLICY ADVISORY"

Transcription

1 LEGISLATIVE AND PUBLIC POLICY ADVISORY January 10, 2006 Data Security Breach Measures Advance on Federal and State Levels INTRODUCTION Just hours before Congress recessed for the Christmas holiday, the House Energy and Commerce Committee announced that it would not mark up its data security breach bill, H.R. 4127, at full committee, postponing the effort until February 2006 at the earliest. At issue were partisan disagreements focusing on breadth of coverage and methods of enforcement. Specifically, Committee Democrats, led by Ranking Member John Dingell (D-MI), reportedly want to broaden coverage of the data security legislation to include privacy issues, including access and correction of allegedly inaccurate data held by companies about consumers. They also want to remove caps on damages and incorporate state attorneys general more fully into the bill s enforcement structure. Republicans, in contrast, want the bill to be subject to administrative enforcement only, and Chairman Joe Barton (R-TX) has pledged to oppose efforts to expand the bill s coverage into the unrelated subject of privacy. He has promised, instead, to introduce an omnibus privacy bill of his own early in This is the latest twist in a series of legislative reactions to the announcement last spring by Georgia-based ChoicePoint that it had sold information on 145,000 individuals to thieves posing as legitimate customers. Notice of other breaches came quickly thereafter, led by Bank of America, which reported that it lost computer tapes that contain names and personal information pertaining to 1.2 million federal employees. A plethora of bills were soon introduced in the states and in Congress to respond to this perceived problem, and several committees of the House and Senate began to act. Shortly thereafter, even more stunning industry announcements than before were made in June by CitiFinancial and Card System Solutions that they had suffered security breaches potentially compromising the personal information of up to 3.9 million and 40 million consumers, respectively. Such events, which garnered intense national media coverage, helped move some of these newly introduced bills more quickly through Senate committees. For example, a mid-june Senate Commerce Committee hearing, at which Federal Trade Commission (FTC) Chairman Majoras and her four fellow commissioners testified, was soon followed by a July committee markup, which resulted in the first data security bill in Congress, S. 1408, being reported to the floor of its respective chamber. Additionally, 1

2 just days before breaking for the Thanksgiving holiday, the Senate Judiciary Committee reported broad-based data security legislation that would subject businesses to a wide range of new compliance obligations. The Personal Data Privacy and Security Act of 2005, sponsored by Judiciary Chairman Arlen Specter (R-PA) and better known as S. 1789, is significantly broader than a measure reported by the committee earlier this fall, S sponsored by Sen. Jeff Sessions (R-AL). The Specter bill, cosponsored by Senators Pat Leahy (D-VT), Diane Feinstein (D-CA) and Russ Feingold (D-WI), also contains weaker federal preemption, a complicated definition of personal information and language that provides consumer access/opportunity to correct language that is presumed to be inaccurate and that is unrelated to the core issue of data security. This measure is yet another in a growing list of proposals facing federal legislators when they return for the 2006 legislative session. Since late July 2005, two Senate committees and two House committees have been considering or have reported federal legislation aimed at addressing perceived inadequacies in corporate data security procedures. More will soon join the fray. The attention being paid to the issue by legislators represents a public recognition that recent high-profile data security breaches have threatened consumer confidence in the ability of businesses that maintain sensitive personal information pertaining to them to have security adequate to protect them from identity theft. Recent action on S. 1408, S and several other pieces of federal data breach legislation sets the stage for a battle this year, in the midst of an election cycle, over the best approach to address the problem. Further complicating the situation is movement by various states to enact data breach measures. In all, twenty-three states to date have enacted related legislation, and more than 70 bills are pending in 19 states. Absent strong federal preemptive legislation, a resulting patchwork of existing and inconsistent state laws will likely serve only to confuse consumers, burden businesses and, ultimately, adversely affect the economy. This advisory provides an update on the current status of federal and state data breach legislation, outlines the current debate over unresolved issues, and discusses the prospect for Congressional action this year. PROPOSED FEDERAL LEGISLATION Senate Commerce Committee S. 1408, The Identity Theft Protection Act, sponsored by Senator Gordon Smith (R-OR) and cosponsored by Chairman Ted Stevens (R-AK), Co-Chairman Daniel Inouye (D-HI) and Senators Bill Nelson (D-FL), John McCain (R-AZ), Mark Pryor (D-AR) and Hillary Clinton (D-NY) 1 1 All but Sen. Clinton are members of the Senate Commerce Committee. 2

3 As taken up and reported out by the Senate Commerce Committee in July 2005 (the actual Committee Report did not become available until December 8, 2005), S would generally create an affirmative obligation on all businesses nationwide to provide reasonable security for personal information over which they are custodians, and to notify consumers of breaches in security that may pose a reasonable risk of identity theft. The bill would also create other obligations regarding security freezes and Social Security numbers. Specifically, the bill would: preempt state laws requiring entities to maintain information security programs, notify individuals of security breaches regarding sensitive personal information, require security freezes, and prohibit the solicitation or display of Social Security numbers; require that any sensitive personal information that a covered entity sells, maintains, collects, transfers, or disposes of, in any form or format (including paper), be secured (full compliance with the FTC s existing rules on Standards of Safeguarding Customer Information and Disposal of Consumer Report Information and Records would be deemed compliance with this requirement); require notification to consumers, the FTC, the functional regulators of certain industries (i.e., banking, insurance, etc.), and all consumer reporting agencies (if more than 1,000 consumers are affected) whenever a reasonable risk of identity theft exists (as defined in the bill) following the discovery of a breach of security; define reasonable risk of identity theft to mean that the preponderance of the evidence available to the covered entity establishes that identity theft for 1 or more individuals from the breach of security is foreseeable; define sensitive personal information as an individual s name, address, or telephone number, combined with one or more of the following data elements related to that individual: (1) Social Security number, taxpayer identification number, or an employer identification number that is the same or is derived from the Social Security number of that individual, (2) financial account number, or credit card or debit card number (together with any required security code, access code, or password that would permit access to such individual s account), and (3) state driver s license identification number or state resident identification number; empower the FTC to conduct a rulemaking to designate other identifying information as sensitive personal information for purposes of the act; create a safe harbor for compliance with the bill s data security and notification provisions for those entities already obligated under, and in compliance with, 3

4 title V of the Gramm-Leach-Bliley Act (GLB) and section 607(a) of the Fair Credit Reporting Act (FCRA); require private entities to institute security freezes on consumer report information upon the demand of a consumer, regardless of whether such consumer is a victim of, or is at risk of falling victim to, identity theft; prohibit the solicitation, purchase, sale, and display of Social Security numbers (with few exceptions); and authorize the FTC, functional regulators and state attorneys general to enforce the provisions of the act, but prohibit enforcement by private rights of action or class action lawsuits. Senate Judiciary Committee S. 1789, The Personal Data Privacy and Security Act of 2005, sponsored by Chairman Arlen Specter and cosponsored by Ranking Member Patrick Leahy and Senators Dianne Feinstein and Russell Feingold On November 17, 2005, the Senate Judiciary Committee reported S by a vote of 13 to 5. An amendment offered to the bill by Sen. Jeff Sessions that would have narrowed the notification trigger to a significant risk of identity theft standard failed, 9 to 9, with Chairman Specter joining a solid block of Democrats in opposition. Sen. Sessions argued that the underlying bill s broader standard would cause consumers to be bombarded with notices, desensitizing them to the possibility of a real threat if notice of one ever occurred. As reported by the Senate Judiciary Committee, S remains the broadest form of federal data security legislation considered to date and would, among other things: permit potentially inconsistent and/or conflicting state laws regarding data privacy and security obligations by using unclear and atypical legislative preemption language that only prohibits states from requiring covered entities to comply with any requirements with respect to administrative, technical, and physical safeguards for the protection of sensitive personally identifiable information; prohibit any state law from imposing requirements or prohibitions regarding any subject matter relating to individual access to, and correction of, personal electronic records held by data brokers ; preempt only any other provision of federal or state law relating to notification of a security breach (except that a state may require information regarding victim assistance and there is a carve-out for section 507 of GLB); 4

5 require, subject to limited safe harbors for financial and healthcare entities currently in compliance with federal data security regulations, that businesses collecting, accessing, transmitting, using, storing, or disposing of sensitive personally identifiable information in electronic or digital form on 10,000 or more U.S. citizens must provide a data privacy and security program for protecting sensitive personally identifiable information; require, subject to certain exemptions, notification of security breaches upon the discovery of a compromise of the security, confidentiality, or integrity of computerized data through misrepresentation or actions that result in, or there is a reasonable basis to conclude has resulted in, acquisition of or access to sensitive personal information that is unauthorized or in excess of authorization ; create enhanced criminal penalties for identity theft and other violations of the bill, including a felony punishable by fine and up to 5 years in jail for any person who intentionally and willfully conceals the fact of a security breach; define sensitive personally identifiable information as either: (1) a financial account number or credit or debit card number, along with any required security code, access code, or password; or (2) an individual s first and last name or first initial and last name, in combination with any one of the following: a non-truncated Social Security number, driver s license number, passport number, or alien registration number; any two of the following: (a) home address or telephone number; (b) mother s maiden name, if identified as such ; or (c) month, day, and year of birth; unique biometric data such as a finger print, voice print, retina or iris image, or any other unique physical representation ; a unique account identifier, electronic identification number, user name, or routing code along with any required associated security or access code, or password; provide individuals an opportunity to review information maintained by data brokers and permit individuals to correct inaccuracies in that information; provide for an exemption from breach notification requirements in the event a business entity determines, after a risk assessment, that there is no significant risk that the breach will result in harm to the individuals the business entity must notify the U.S. Secret Service (USSS) of this finding, and the USSS must not object in writing to that conclusion within 10 days for the exemption to apply; and 5

6 provide a cap of $250,000 for each violation of data broker access/correction provisions, a cap of $500,000 for each violation of data security obligations, and a cap on aggregate penalties for violations of breach notification requirements of $50,000 per day. S. 1326, Notification of Risk to Personal Data Act, sponsored by Senator Jeff Sessions Previously, on October 20, 2005, the Senate Judiciary Committee reported S. 1326, introduced by Sen. Jeff Sessions, which would require covered entities nationwide to implement and maintain reasonable security and notification procedures and practices appropriate to the size and nature of the entity and the nature of the information it maintains. Patterned in large part after California s 2003 law, Sen. Sessions S would, if enacted in its present form: preempt all state laws that relate in any way to electronic information security standards or security breach notification; tie consumer notification requirements to circumstances when a significant risk of identity theft exists as a result of a security breach; require that computerized data containing sensitive personal information be protected from unauthorized access, destruction, use, modification or disclosure; define sensitive personal information in a manner nearly identical to the California definition specifically, as a first and last name, and address or telephone number, in combination with one or more of the following data elements: a Social Security number, driver s license number, state identification number, financial account number, or credit or debit card number (in combination with any required security code, access code or password); and exempt from coverage encrypted data, truncated data, or otherwise publicly available information from the definition of sensitive personal information. House Energy and Commerce Committee H.R. 4127, Data Accountability and Trust Act or DATA, sponsored by Rep. Cliff Stearns (R-FL) and cosponsored by Reps. Deborah Pryce (R-OH), Fred Upton (R-MI), George Radanovich (R-CA), Charles Bass (R-NH), Mary Bono (R-CA), Mike Ferguson (R-NJ) and Marsha Blackburn (R-TN) 2 2 All but Rep. Pryce are members of the House Energy and Commerce Committee. 6

7 On November 3,2005, the House Energy and Commerce Committee s Subcommittee on Commerce, Trade and Consumer Protection passed H.R. 4127, DATA, by a vote of 13 to 8. Several amendments were offered unsuccessfully by Democratic members to broaden the notification requirements. The bill, as passed by the subcommittee, would cover all entities under the jurisdictional reach of the FTC, which includes nearly all entities except banks, credit unions, thrifts, investment companies, investment advisors, brokers and dealers, insurance companies, and common carriers (including telecommunications companies). As noted earlier, Committee Republicans and Democrats were engaged in detailed negotiations when the Congress recessed for the year. Those negotiations are expected to resume following the House s return in late January. If enacted in its present form, the bill would, among other things: require entities to develop and implement security policies and procedures for the protection of personal information ( information brokers would be required to submit their security policies to the FTC at the time of a breach notification or upon request by the FTC so that the FTC may conduct or require a post-breach audit of such policies); require notification of a breach of security where the unauthorized acquisition of data in electronic form establishes a reasonable basis to conclude that there is a significant risk to an individual, to whom the personal information relates, of being a victim of identify theft, fraud, or other unlawful conduct; define personal information as an individual s first name or initial and last name, or address, or phone number, in combination with any one or more of the following data elements: Social Security number, driver s license number, or other state identification number, or financial account number, credit or debit card number and any required security code, access code or password necessary to permit access to an individual s financial account; require entities notifying consumers of security breaches to provide, at no cost to each notified individual, quarterly consumer credit reports beginning no later than two months following discovery of a breach and continuing for a period of two years; authorize the FTC to enforce the act and conduct rulemakings to promulgate regulations regarding security policies and notification requirements, and to modify the definition of personal information (the act would also prohibit any person other than a state attorney general from bringing a civil action under state law if premised upon the defendant violating any provision of the act); and supersede[] state laws expressly affecting entities covered by H.R until the act sunsets (unless reauthorized) 10 years after its date of enactment. 7

8 House Financial Services Committee H.R. 3997, The Financial Data Protection Act of 2005, sponsored by Rep. Steven LaTourette (R-OH) and cosponsored by Reps. Darlene Hooley (D-OR), Mike Castle (R-DE), Deborah Pryce (R-OH) and Dennis Moore (D-KS) On November 9, 2005, the House Financial Services Committee s Subcommittee on Financial Institutions and Consumer Credit held a hearing on H.R. 3997, a bipartisan bill that had been introduced on October 6, 2005, following lengthy staff negotiations and drafting efforts to synthesize into a unified committee bill the several previously introduced and competing committee members bills on data security. In written testimony provided to the subcommittee on behalf of the National Coalition on E-Commerce and Privacy, Alston & Bird Partner Tom Boyd outlined the key principles for effective data breach legislation, emphasizing, in particular, the importance of federal preemption, a workable notification standard, and a reasonable compliance obligation. A subcommittee markup is expected to take place sometime in early February, and will be chaired by Rep. Spencer Bachus (R-AL). As introduced, H.R would, among other things: create a new section 630 of FCRA that would subject consumer reporting agencies, financial institutions and other businesses assembling or evaluating consumer reports, credit information or other information on consumers for various purposes, to new affirmative obligations to implement and maintain reasonable policies and procedures to protect the security and information of sensitive financial information of consumers against any unauthorized use that is reasonably likely to result in substantial harm or inconvenience to such consumers, and to notify them in the event of a breach of that security; define sensitive financial personal information to include two kinds of information, as follows: (1) sensitive financial account information, meaning a consumer s financial account number, such as a credit or debit card number, in combination with any security code, access code, biometric code, password, or other personal identification information that would allow access to the financial account; (2) sensitive financial identity information, meaning a consumer s first and last name, address, or telephone number, in combination with any of the following social security number, driver s license or equivalent state identification number, or taxpayer identification number; define substantial harm or inconvenience as the material financial loss to, or the imposition of civil or criminal penalties upon, a consumer, or the need for the consumer to expend significant time and effort to correct erroneous information relating to the consumer, including information maintained by consumer reporting agencies, financial institutions, or government entities, in order to avoid material 8

9 financial loss or increased costs or civil or criminal penalties, due to unauthorized use of sensitive financial personal information relating to such consumer; require entities notifying consumers of security breaches to offer a nationwide credit monitoring service to each consumer free of charge and for at least a 6-month period (so long as such service is requested by a consumer within 90 days of being notified of the security breach); create safe harbors for entities covered by, and in compliance with, title V of GLB; and prohibit the imposition of state law requirements or prohibitions on entities covered by H.R with respect to the responsibilities of such entities to comply with the obligations under the act. RECENT ACTION AND TRENDS IN STATE LAW Starting with passage of California s security breach notification legislation in 2002 (which took effect on July 1, 2003), twenty-two other states and one major municipality, New York City have adopted their own legislation on that original theme, sometimes also referring to it as identity theft legislation. Most recently, on December 22, 2005, Pennsylvania enacted the newest state law, S.B. 712, the Breach of Personal Information Notification Act. Previously, on November 17, 2005, Ohio enacted legislation that would require a state agency, an agency of a political subdivision, or a business that owns or licenses computerized data that includes personal information to notify Ohio residents if there is a reasonable belief that their personal information was acquired through an unauthorized breach of a computer system. Additionally, on November 9, 2005, the Wisconsin Senate had approved consumer data breach legislation, sending the measure to the state House for consideration. The Wisconsin measure would require state agencies and entities doing business in the state to notify Wisconsin residents in the event their electronic personal information is breached. Exceptions are provided for certain entities already subject to federal financial and medical privacy laws. Actions taken in 2005 by the various state legislatures varied widely, but certain general trends emerged in the passage of 22 new state security breach laws that raise significant concerns for businesses. First, several of the newer laws create a broader definition of personal information than California, and include notification requirements for either medical information, unique biometric data, electronic signatures, or account numbers regardless of whether they are accompanied by a required password. Second, some state legislation requires notification of security breaches to be made to those other than affected consumers, including consumer reporting agencies and state regulatory authorities. Third, with two exceptions (California and New York), state legislation generally does not preempt local government data security laws or ordinances. As a result, major metropolitan areas and localities (other than in California and New York) are free to follow New York City s example and pass more restrictive laws or ordinances. Finally, several 9

10 states (and at least one municipality) are increasingly using security breach legislation as a vehicle for instituting other data security and privacy measures, including restrictions on the solicitation, display, collection or use of Social Security numbers, and requirements that consumer reporting agencies verify adverse information in consumer reports. This trend toward more burdensome and restrictive state laws should be of immense concern to businesses operating nationally that would have to comply with such varied laws. OUTLOOK FOR 2006 Virtually any business that has custody over sensitive personal information will be covered by the legislation now percolating in the states and in Congress. Many believe that Congress should ultimately pass preemptive legislation that balances the interests of both consumers and industry, in the form of a national, targeted approach aimed squarely at reducing both the amount of, and damaging effects that may result from, future data breaches. It is therefore imperative that any responsible legislation Congress enacts in this area be narrowly targeted at data security and breach notification, and that they include the following four core features: (1) national uniformity; (2) technologyneutral security standards to better safeguard sensitive personal data from unauthorized access (excepting entities, including financial institutions, now covered under existing law); (3) a reasonable notification trigger, following a breach of security, by which business customers, and consumers generally, would be informed when their identities are exposed to a significant risk of identity theft or misuse; and (4) administrative enforcement by which experienced federal agencies, and state attorneys general, can exercise oversight and take action to punish those who fail to live up to their obligations to consumers. Unfortunately, a growing minority of Congressional members favor broad-based legislation that would go well beyond addressing the security of data containing sensitive personal information. These legislators are anxious to impose additional compliance obligations on business well beyond those necessary to address the issues related to inferior data security. Among other proposals, some would redefine data security as a data privacy issue and impose European-style opt-in data handling policies on American industry, without a parallel adjustment in compliance and enforcement policies. Such legislation might also include broadened consumer rights to access and correct personal information pertaining to them that is held by a business, as well as requirements for businesses to obtain a consumer s voluntary, affirmative consent before using personal information, even if acquired from publicly available records. At the outset of the 2006 legislative session, Congress will be holding Judge Samuel Alito s Supreme Court nomination confirmation hearings, which began January 9 in the Senate Judiciary Committee, and, most likely, will also hold hearings on National Security Agency wiretaps. However, key members of both chambers have assured industry that data breach legislation remains an important issue and that efforts to work through existing proposals will resume in early

11 This Legislative and Public Policy Advisory is published by Alston & Bird to provide a summary of significant developments to our clients and friends. It is intended to be informational and does not constitute legal advice regarding any specific situation. The material may also be considered advertising under the applicable court rules. Please contact any of the following attorneys for additional information or guidance: Thomas M. Boyd tboyd@alston.com Paul G. Martino paul.martino@alston.com Kathryn Marks kathryn.marks@alston.com ATLANTA One Atlantic Center 1201 West Peachtree Street Atlanta, GA CHARLOTTE Bank of America Plaza 101 South Tryon Street Suite 4000 Charlotte, NC If you would like to receive future Legislative and Public Policy Advisories electronically, please forward your contact information including address to legislative.advisory@alston.com. Be sure to put subscribe in the subject line. NEW YORK 90 Park Avenue New York, NY RESEARCH TRIANGLE 3201 Beechleaf Court Suite 600 Raleigh, NC WASHINGTON, D.C. 601 Pennsylvania Avenue, N.W. North Building, 10th Floor Washington, D.C Alston & Bird LLP 2005

Data Security. Updated April, 2006. CCIM Institute 430 N. Michigan Avenue Chicago, IL 60611 (312) 321-4460

Data Security. Updated April, 2006. CCIM Institute 430 N. Michigan Avenue Chicago, IL 60611 (312) 321-4460 Data Security Updated April, 2006 CCIM Institute 430 N. Michigan Avenue Chicago, IL 60611 (312) 321-4460 Background As technology has evolved and become vital for businesses, a growing number of public

More information

Privacy Risks and Public Benefits of Big Data Federal Proposals Regarding Data Security and Privacy Regulation

Privacy Risks and Public Benefits of Big Data Federal Proposals Regarding Data Security and Privacy Regulation Privacy Risks and Public Benefits of Big Data Federal Proposals Regarding Data Security and Privacy Regulation Presented by: Francine E. Friedman (202) 887-4143 ffriedman@akingump.com January 30, 2013

More information

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel todd.bertoson@dentons.com

More information

Summary of Social Security Account Number Privacy Legislation Under Active Consideration in House and Senate (as of Sept. 5, 2007)

Summary of Social Security Account Number Privacy Legislation Under Active Consideration in House and Senate (as of Sept. 5, 2007) Summary of Social Security Account Number Privacy Legislation Under Active Consideration in House and Senate (as of Sept. 5, 2007) H.R. 3046, the Social Security Number Privacy and Identity Theft Protection

More information

Tape Vaulting Audit And Encryption Usage Analysis

Tape Vaulting Audit And Encryption Usage Analysis Tape Vaulting Audit And Encryption Usage Analysis Prepared for Public Presentation (includes SB 1386, Gramm Leach Bliley, and Personal Data Protection and Security Act of 2005 Customer Information Protection

More information

When Can We Expect a Federal Data Breach Notification Law?

When Can We Expect a Federal Data Breach Notification Law? When Can We Expect a Federal Data Breach Notification Law? The Trials and Tribulations of Getting a DBN Bill through Congress. Alexi Madon Director of State Government Affairs, Midwest Cybersecurity Overview

More information

Government Focus on Cybersecurity Elevates Data Breach Legislation. by Experian Government Relations and Experian Data Breach Resolution

Government Focus on Cybersecurity Elevates Data Breach Legislation. by Experian Government Relations and Experian Data Breach Resolution Government Focus on Cybersecurity Elevates Data Breach Legislation by Experian Government Relations and Experian Data Breach Resolution Will Congress pass data breach legislation in 2015/2016? Recent high-profile

More information

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum Summary of Privacy and Data Security Bills- 112 th Congress Prepared for September 15, 2011 CT Privacy Forum GEOLOCATION TRACKING The Location Privacy Protection Act of 2011 (S. 1223)- introduced by s

More information

SECTION-BY-SECTION ANALYSIS

SECTION-BY-SECTION ANALYSIS INTRODUCED BY CONGRESSMAN RANDY NEUGEBAUER (R-TX) AND CONGRESSMAN JOHN CARNEY (D-DE) SECTION-BY-SECTION ANALYSIS Section 1: Short Title The Data Security Act of 2015. Section 2: Purposes The purposes of

More information

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally

More information

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt

More information

January 2007. An Overview of U.S. Security Breach Statutes

January 2007. An Overview of U.S. Security Breach Statutes January 2007 An Overview of U.S. Security Breach Statutes An Overview of U.S. Security Breach Statutes Jeffrey M. Rawitz and Ryan E. Brown 1 This Jones Day White Paper summarizes what is generally entailed

More information

1. Entities and Accounts Covered by the New Rules. 1.1. Covered Entities

1. Entities and Accounts Covered by the New Rules. 1.1. Covered Entities CLIENT MEMORANDUM RED FLAG IDENTITY THEFT RULES MAY HAVE YOU SEEING RED: FTC EXTENDS COMPLIANCE DEADLINE BECAUSE MANY COMPANIES DID NOT KNOW THAT THESE RULES APPLY TO THEM When companies outside the financial

More information

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998 INTERNAL REVENUE SERVICE UIL: 9999.92-00 Number: 199911041 Release Date: 3/19/1999 CTMonica January 22, 1999 MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) FROM: Barry J. Finkelstein Assistant

More information

BIG DATA AND INSURANCE SYMPOSIUM

BIG DATA AND INSURANCE SYMPOSIUM BIG DATA AND INSURANCE SYMPOSIUM ATTORNEY GENERAL GEORGE JEPSEN UNIVERSITY OF CONNECTICUT SCHOOL OF LAW APRIL 3, 2014 (REVISED FOR PUBLICATION) *** This Article reproduces the keynote address delivered

More information

CDT ISSUE BRIEF ON FEDERAL DATA BREACH NOTIFICATION LEGISLATION

CDT ISSUE BRIEF ON FEDERAL DATA BREACH NOTIFICATION LEGISLATION CDT ISSUE BRIEF ON FEDERAL DATA BREACH NOTIFICATION LEGISLATION January 27, 2015 A September 2014 Ponemon study found that 60% of U.S. companies have experienced more than one data breach in the past two

More information

S. 1408. [Report No. 109 203] To strengthen data protection and safeguards, require data breach notification, and further prevent identity theft.

S. 1408. [Report No. 109 203] To strengthen data protection and safeguards, require data breach notification, and further prevent identity theft. II TH CONGRESS 1ST SESSION S. 10 Calendar No. 0 [Report No. 0] To strengthen data protection and safeguards, require data breach notification, and further prevent identity theft. IN THE SENATE OF THE UNITED

More information

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly

More information

SUMMARY. 2. Covered information, which is the key term, is very broadly defined and includes the following with respect to an individual:

SUMMARY. 2. Covered information, which is the key term, is very broadly defined and includes the following with respect to an individual: CLIENT MEMORANDUM DRAFT FEDERAL PRIVACY BILL WOULD DRAMATICALLY AFFECT HOW A WIDE RANGE OF COMPANIES COLLECT, USE, AND DISCLOSE CERTAIN INFORMATION ABOUT INDIVIDUALS, BOTH ONLINE AND OFFLINE On May 4,

More information

2015 -- S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D

2015 -- S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D 0 -- S 01 SUBSTITUTE B LC000/SUB B/ S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 0 A N A C T RELATING TO CRIMINAL OFFENSES - IDENTITY THEFT PROTECTION Introduced By: Senators

More information

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations

More information

Pending Federal Initiatives To Further Regulate Data Privacy and Cyber Security

Pending Federal Initiatives To Further Regulate Data Privacy and Cyber Security Pending Federal Initiatives To Further Regulate Data Privacy and Cyber Security As of September 2011 Prepared for The Advanced Cyber Security Center Launch Conference The MITRE Corporation Michele A. Whitham

More information

RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009

RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009 RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009 Current Laws: A person commits the crime of identity fraud if

More information

Responding to New Identity Theft Laws

Responding to New Identity Theft Laws Responding to New Identity Theft Laws March 2011 Privacy Expectations Today, there is increasing recognition that an individual has a legitimate interest in controlling the collection, use and disclosure/dissemination

More information

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg. ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...

More information

2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost

2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost 2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost With passage of HR 2622, the Fair and Accurate Credit Transactions Act, Congress significantly amended the Fair Credit

More information

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the

More information

December 8, Washington, DC 20510. Washington, RE: S. 2736. of 2014. Finance. refunds paid unacceptable. of the. system. 1. disclosure or. the Act.

December 8, Washington, DC 20510. Washington, RE: S. 2736. of 2014. Finance. refunds paid unacceptable. of the. system. 1. disclosure or. the Act. American Institute of CPAs 1455 Pennsylvania Avenue, NW Washington, DC 20004 December 8, 2014 The Honorable Ron Wyden, Chairman Senate Committee on Finance 221 Dirksen Senate Office Building Washington,

More information

HIPAA/HITECH Rules Proposed: Major Changes Looming for Business Associates and Subcontractors

HIPAA/HITECH Rules Proposed: Major Changes Looming for Business Associates and Subcontractors Health Care ADVISORY July 16, 2010 HIPAA/HITECH Rules Proposed: Major Changes Looming for Business Associates and Subcontractors On July 8, 2010, the Office for Civil Rights (OCR) of the Department of

More information

Children s Privacy in the Mobile Data Environment

Children s Privacy in the Mobile Data Environment DataGuidance is the leading global data protection and privacy compliance resource tool, created with a single aim - to make data protection and privacy compliance simpler. It delivers, in one site, legal

More information

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with

More information

California State University, Sacramento INFORMATION SECURITY PROGRAM

California State University, Sacramento INFORMATION SECURITY PROGRAM California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...

More information

WRITTEN TESTIMONY OF JENNIFER BARRETT-GLASGOW GLOBAL PRIVACY OFFICER ACXIOM CORPORATION

WRITTEN TESTIMONY OF JENNIFER BARRETT-GLASGOW GLOBAL PRIVACY OFFICER ACXIOM CORPORATION WRITTEN TESTIMONY OF JENNIFER BARRETT-GLASGOW GLOBAL PRIVACY OFFICER ACXIOM CORPORATION BEFORE THE UNITED STATES HOUSE COMMITTEE ON ENERGY AND COMMERCE SUBCOMMITTEE ON COMMERCE, MANUFACTURING AND TRADE

More information

114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS

114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS 114 th Congress March, 2015 Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS On January 13, 2015, the Administration wrote a letter to Congress urging

More information

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act

HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act International Life Sciences Arbitration Health Industry Alert If you have questions or would like additional information on the material covered in this Alert, please contact the author: Brad M. Rostolsky

More information

Privacy Law Basics and Best Practices

Privacy Law Basics and Best Practices Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff sskaff@fbm.com What Is Information Privacy? Your name? Your phone number or home address? Your email address?

More information

(1) regulate the storage, retention, transmission, and security measures for credit card, debit card, and other payment-related data;

(1) regulate the storage, retention, transmission, and security measures for credit card, debit card, and other payment-related data; Legal Updates & News Legal Updates Pending Changes to California s Data Breach Law: New Burdens for Retailers? September 2007 by Christine E. Lyon, William L. Stern Related Practices: Privacy and Data

More information

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs This presentation is not meant to serve as a substitute for

More information

2005 -- H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D.

2005 -- H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 00 -- H 11 SUBSTITUTE A AS AMENDED LC0/SUB A/ STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 00 A N A C T RELATING TO IDENTITY THEFT PROTECTION Introduced By: Representatives Gemma, Sullivan,

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

Security Breaches Under the NC Identity Theft Protection Act: Basic Information for Local Health Departments

Security Breaches Under the NC Identity Theft Protection Act: Basic Information for Local Health Departments Security Breaches Under the NC Identity Theft Protection Act: Basic Information for Local Health Departments Jill Moore UNC Institute of Government April 2007 In 2005, the N.C. General Assembly passed

More information

Chapter No. 911] PUBLIC ACTS, 2004 1 CHAPTER NO. 911 HOUSE BILL NO. 3403

Chapter No. 911] PUBLIC ACTS, 2004 1 CHAPTER NO. 911 HOUSE BILL NO. 3403 Chapter No. 911] PUBLIC ACTS, 2004 1 CHAPTER NO. 911 HOUSE BILL NO. 3403 By Representatives Hargrove, Curtiss, Todd, Kent, DuBois, McDonald, Bittle, Marrero and Mr. Speaker Naifeh Substituted for: Senate

More information

BUSINESS AND COMMERCE CODE PERSONAL IDENTITY INFORMATION UNAUTHORIZED USE OF IDENTIFYING INFORMATION

BUSINESS AND COMMERCE CODE PERSONAL IDENTITY INFORMATION UNAUTHORIZED USE OF IDENTIFYING INFORMATION BUSINESS AND COMMERCE CODE TITLE 11. PERSONAL IDENTITY INFORMATION SUBTITLE B. IDENTITY THEFT CHAPTER 521. UNAUTHORIZED USE OF IDENTIFYING INFORMATION SUBCHAPTER A. GENERAL PROVISIONS Sec. 521.001.AASHORT

More information

Privacy Policy. February, 2015 Page: 1

Privacy Policy. February, 2015 Page: 1 February, 2015 Page: 1 Revision History Revision # Date Author Sections Altered Approval/Date Rev 1.0 02/15/15 Ben Price New Document Rev 1.1 07/24/15 Ben Price Verify Privacy Grid Requirements are met

More information

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft

More information

MEMORANDUM MEMBERS OF THE SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION

MEMORANDUM MEMBERS OF THE SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION MEMORANDUM TO: FROM: MEMBERS OF THE SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION REPUBLICAN COMMITTEE STAFF DATE: FEBRUARY 3, 2015 RE: SUBCOMMITTEE HEARING ON GETTING IT RIGHT ON DATA SECURITY

More information

NURSING HOME PENALTY CASH FUND

NURSING HOME PENALTY CASH FUND SUNSET REVIEW OF THE NURSING HOME PENALTY CASH FUND Submitted by Colorado Department of Regulatory Agencies June 1992 June 5, 1992 The Honorable Bob Schaffer Joint Sunrise/Sunset Review Committee Chairman

More information

Global Privacy Japan Sets its Rules for Personal Data

Global Privacy Japan Sets its Rules for Personal Data Global Privacy Japan Sets its Rules for Personal Data Global companies must comply with differing privacy rules. The great divide between the EU and the USA is well-known. See Global Privacy Protection

More information

CHAPTER 226. C.56:11-44 Short title. 1. This act shall be known and may be cited as the "Identity Theft Prevention Act."

CHAPTER 226. C.56:11-44 Short title. 1. This act shall be known and may be cited as the Identity Theft Prevention Act. CHAPTER 226 AN ACT concerning identity theft, amending P.L.1997, c.172 and supplementing various parts of the statutory law. BE IT ENACTED by the Senate and General Assembly of the State of New Jersey:

More information

Introduction to The Privacy Act

Introduction to The Privacy Act Introduction to The Privacy Act Defense Privacy and Civil Liberties Office dpclo.defense.gov 1 Introduction The Privacy Act (5 U.S.C. 552a, as amended) can generally be characterized as an omnibus Code

More information

what your business needs to do about the new HIPAA rules

what your business needs to do about the new HIPAA rules what your business needs to do about the new HIPAA rules Whether you are an employer that provides health insurance for your employees, a business in the growing health care industry, or a hospital or

More information

Outsourcing Transactions in the Insurance Industry ADVISORY

Outsourcing Transactions in the Insurance Industry ADVISORY Outsourcing Transactions in the Insurance Industry ADVISORY The insurance industry has long been focused on reducing costs and improving operational efficiencies. With the turbulence in today s insurance

More information

Articles. Three Large States Revise Their Security Breach Notification Laws and Texas Applies Its Law to Residents of Some Other States to Boot

Articles. Three Large States Revise Their Security Breach Notification Laws and Texas Applies Its Law to Residents of Some Other States to Boot Three Large States Revise Their Security Breach Notification Laws and Texas Applies Its Law to Residents of Some Other States to Boot Jeff Dodd IP and Technology Developments - October 2011 October 25,

More information

Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies

Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies The staff of the Board of Governors of the Federal Reserve System (FRB), Federal Deposit Insurance Corporation (FDIC), National

More information

Fair and Accurate Credit Transactions Act of 2003

Fair and Accurate Credit Transactions Act of 2003 Overview of FCRA Legislation Fair and Accurate Credit Transactions Act of 2003 1-800-BANKERS www.aba.com 1120 Connecticut Avenue, NW Washington, DC 20036 1-800-BANKERS www.aba.com World-Class Solutions,

More information

ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, 10304 Complaints (2007) Updated November 30, 2008

ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, 10304 Complaints (2007) Updated November 30, 2008 ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, 10304 Complaints (2007) Updated November 30, 2008 Current Laws: A person commits the offense of identity theft

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA David W. Lincicum (California Bar No. 223566) Burke W. Kappler (D.C. Bar No. 471936) Federal Trade Commission 600 Pennsylvania Avenue, N.W. Mail Stop NJ-8122 Washington, D.C. 20580 dlincicum@ftc.gov bkappler@ftc.gov

More information

Protecting Social Security Numbers

Protecting Social Security Numbers Protecting Social Security Numbers: Federal Legislation in Sight STEVEN C. BENNETT, MAURICIO F. PAEZ, and Gwendolynne Chen Due to an alarming increase in identity theft crimes, a bipartisan bill, Protecting

More information

PLEASE READ. The official text of New Jersey Statutes can be found through the home page of the New Jersey Legislature http://www.njleg.state.nj.

PLEASE READ. The official text of New Jersey Statutes can be found through the home page of the New Jersey Legislature http://www.njleg.state.nj. PLEASE READ The official text of New Jersey Statutes can be found through the home page of the New Jersey Legislature http://www.njleg.state.nj.us/ New Jersey Statutes Annotated (N.J.S.A.), published by

More information

M E M O R A N D U M. Definitions

M E M O R A N D U M. Definitions M E M O R A N D U M DATE: November 10, 2011 TO: FROM: RE: Krevolin & Horst, LLC HIPAA Obligations of Business Associates In connection with the launch of your hosted application service focused on practice

More information

Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00

Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00 Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,

More information

REED SMITH LLP INVESTMENT ADVISER NEWS QUARTERLY UPDATE

REED SMITH LLP INVESTMENT ADVISER NEWS QUARTERLY UPDATE 4th Quarter 2004 REED SMITH LLP INVESTMENT ADVISER NEWS QUARTERLY UPDATE The Investment Adviser News features regulatory and other news items of interest to the investment management industry and investment

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference

More information

The Rosenthal Fair Debt Collection Practices Act California Civil Code 1788 et seq.

The Rosenthal Fair Debt Collection Practices Act California Civil Code 1788 et seq. The Rosenthal Fair Debt Collection Practices Act California Civil Code 1788 et seq. 1788. This title may be cited as the Rosenthal Fair Debt Collection Practices Act. 1788.1 (a) The Legislature makes the

More information

U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE

U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE June 20, 2016 TO: FROM: RE: Members, Committee on Energy and Commerce Committee Majority Staff Full Committee Markup of H.R. 5510, H.R. 5111,

More information

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY Oana Dolea 7 th Annual Leg@l.IT Conference March 26th, 2013 Montreal, Canada INTRODUCTION Mobile e-commerce vs. E-commerce Mobile e-commerce:

More information

[Discussion Draft] [DISCUSSION DRAFT] MARCH 12, 2015. H. R. ll

[Discussion Draft] [DISCUSSION DRAFT] MARCH 12, 2015. H. R. ll TH CONGRESS ST SESSION [DISCUSSION DRAFT] MARCH, H. R. ll To require certain entities who collect and maintain personal information of individuals to secure such information and to provide notice to such

More information

Special Report The HITECH Act

Special Report The HITECH Act Special Report The HITECH Act Privacy and Data Breach Notification Provision An Overview of the HITECH Act On February 17, 2009, President Obama signed into law the $787 billion stimulus package known

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University

More information

GAO FINANCIAL PRIVACY. Status of State Actions on Gramm-Leach- Bliley Act s Privacy Provisions

GAO FINANCIAL PRIVACY. Status of State Actions on Gramm-Leach- Bliley Act s Privacy Provisions GAO United States General Accounting Office Report to the Ranking Minority Member, Committee on Energy and Commerce, House of Representatives April 2002 FINANCIAL PRIVACY Status of State Actions on Gramm-Leach-

More information

The National Security Act of 1947 - A Review

The National Security Act of 1947 - A Review PENDING FEDERAL INITIATIVES TO FURTHER REGULATE DATA PRIVACY AND CYBER SECURITY As of Prepared for the June 14, 2012 ACSC Technical Exchange Meeting Assembled by Colin Zick and Michele Whitham czick@foleyhoag.com

More information

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee

More information

Title V Preventing Fraud and Abuse. Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions

Title V Preventing Fraud and Abuse. Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions Title V Preventing Fraud and Abuse Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions Sec. 501. Health and Human Services Senior Advisor There

More information

Legislative Update. November 2009. Federal. Pending Legislation

Legislative Update. November 2009. Federal. Pending Legislation Legislative Update November 2009 Federal Pending Legislation The Consumer Financial Protection Agency Act On Thursday, October 22 in the U.S. House of Representatives, the Financial Services Committee

More information

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT Office of Employee Benefits Administrative Manual PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT 150 EFFECTIVE DATE: AUGUST 1, 2009 REVISION DATE: PURPOSE: Ensure that the Office of Employee Benefits

More information

Chief Clerk of the Assembly. Secretary of the Senate. Private Secretary of the Governor

Chief Clerk of the Assembly. Secretary of the Senate. Private Secretary of the Governor Assembly Bill No. 22 Passed the Assembly September 8, 2011 Chief Clerk of the Assembly Passed the Senate September 8, 2011 Secretary of the Senate This bill was received by the Governor this day of, 2011,

More information

Michie's Legal Resources. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence Act of 1999. [Acts 1999, ch. 201, 2.

Michie's Legal Resources. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence Act of 1999. [Acts 1999, ch. 201, 2. http://www.michie.com/tennessee/lpext.dll/tncode/12ebe/13cdb/1402c/1402e?f=templates&... Page 1 of 1 47-18-2101. Short title. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence

More information

BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade

BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade Commission, Bureau of Consumer Protection Allison M. Lefrak, Attorney,

More information

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3) DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners

More information

The Importance of Internal Control Over Financial Reporting For Service Provider

The Importance of Internal Control Over Financial Reporting For Service Provider OUTSOURCING ADVISORY May 18, 2004 INTERNAL CONTROL REQUIREMENTS UNDER SARBANES-OXLEY CHALLENGE OUTSOURCING MARKETPLACE INTRODUCTION In July 2002, amid public outcry over corporate accounting scandals and

More information

TOOLBOX. ABA Financial Privacy

TOOLBOX. ABA Financial Privacy ABA Financial Privacy TOOLBOX This tool will help ensure that privacy remains a core value in all corners of your institution. The success of your privacy program depends upon your board s and your management

More information

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January 2015 1

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January 2015 1 Data Breach Response Basic Principles Under U.S. State and Federal Law ABA Litigation Section Core Knowledge January 2015 1 I. Introduction Data breaches have become an unfortunate reality for many of

More information

New Privacy Laws Impacting the Health Care Work Place

New Privacy Laws Impacting the Health Care Work Place New Privacy Laws Impacting the Health Care Work Place Presented by Thomas E. Jeffry, Jr., Esq. Arent Fox LLP Washington, DC New York, NY Los Angeles, CA November 12 & 19, 2009 Overview 1. Overview of California

More information

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Protecting Personal Consumer Information from Cyber Attacks and Data Breaches.

PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Protecting Personal Consumer Information from Cyber Attacks and Data Breaches. PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION on Protecting Personal Consumer Information from Cyber Attacks and Data Breaches Before the COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED

More information

RE: Chairman s Mark of a Bill to Prevent Identity Theft and Tax Refund Fraud

RE: Chairman s Mark of a Bill to Prevent Identity Theft and Tax Refund Fraud American Institute of CPAs 1455 Pennsylvania Avenue, NW Washington, DC 20004 The Honorable Orrin G. Hatch, Chairman Senate Committee on Finance 219 Dirksen Senate Office Building Washington, DC 20510,

More information

Selected Text of the Fair Credit Reporting Act (15 U.S.C. 1681 1681v) With a special Focus on the Impact to Mortgage Lenders

Selected Text of the Fair Credit Reporting Act (15 U.S.C. 1681 1681v) With a special Focus on the Impact to Mortgage Lenders Selected Text of the Fair Credit Reporting Act (15 U.S.C. 1681 1681v) as Amended by the Fair and Accurate Credit Transactions Act of 2003 (Public Law No. 108-159) With a special Focus on the Impact to

More information

FACTA Identity Theft Red Flags Program. www.chs.acfei.com

FACTA Identity Theft Red Flags Program. www.chs.acfei.com 1 FACTA Identity Theft Red Flags Program Module 1 Fair and Accurate Credit Transactions Act Overview Identity thieves use individual s personal identifiable information to open new accounts and misuse

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT is made and entered into as of the day of, 2013 ( Effective Date ), by and between [Physician Practice] on behalf of itself and each of its

More information

City of Hercules Hercules Municipal Utility Identity Theft Prevention Program

City of Hercules Hercules Municipal Utility Identity Theft Prevention Program City of Hercules Hercules Municipal Utility Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate

More information

How To Pass Cybersecurity Legislation

How To Pass Cybersecurity Legislation Privacy & Cybersecurity Update January 14, 2015 Learn More If you have any questions regarding the matters discussed in this memorandum, please contact the attorneys listed on Page 5, or your regular Skadden

More information

Identity Theft Prevention and Security Breach Notification Policy. Purpose:

Identity Theft Prevention and Security Breach Notification Policy. Purpose: Identity Theft Prevention and Security Breach Notification Policy Purpose: Lahey Clinic is committed to protecting the privacy of the Personal Health Information ( PHI ) of our patients and the Personal

More information

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013 Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He

More information

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity

More information

Issue Brief. Arizona State Senate IDENTITY THEFT AND CONSUMER PROTECTION INTRODUCTION IDENTITY THEFT. September 17, 2015.

Issue Brief. Arizona State Senate IDENTITY THEFT AND CONSUMER PROTECTION INTRODUCTION IDENTITY THEFT. September 17, 2015. Arizona State Senate Issue Brief September 17, 2015 Note to Reader: The Senate Research Staff provides nonpartisan, objective legislative research, policy analysis and related assistance to the members

More information

Public Act No. 15-162

Public Act No. 15-162 Public Act No. 15-162 AN ACT CONCERNING A STUDENT LOAN BILL OF RIGHTS. Be it enacted by the Senate and House of Representatives in General Assembly convened: Section 1. (NEW) (Effective October 1, 2015)

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (Hereinafter "Agreement") dated as of, 2013, is made by and between (Hereinafter Covered Entity ) and (Hereinafter Business Associate ). ARTICLE

More information

Legislative Language. Law Enforcement Provisions Related to Computer Security

Legislative Language. Law Enforcement Provisions Related to Computer Security Legislative Language Law Enforcement Provisions Related to Computer Security Part 1: Specific Criminalization of Damaging Critical Infrastructure Computers Title 18, United States Code, is amended to add

More information

0423104 UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION

0423104 UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION 0423104 UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION Commissioners: Deborah Platt Majoras, Chairman Orson Swindle Thomas B. Leary Pamela Jones Harbour Jon Leibowitz ) In the Matter of )

More information

Privacy Issues Airports

Privacy Issues Airports Privacy and Data Breaches A GROWING AIRPORT CONCERN Dominic Nessi Los Angeles World Airports Privacy in General There is none Google and other search engines, cookies Growth of on-line commerce Social

More information