Identity Theft. The Identity Theft Conundrum
|
|
|
- Amos Goodwin
- 10 years ago
- Views:
Transcription
1 Identity Theft The Identity Theft Conundrum Identity theft presents an inherent conundrum: The very attributes of modern commerce that consumers value and expect rapid, easy, 24-hour access to a wide variety of innovative products, services, and information make identity theft easy to perpetrate and difficult to detect. Similarly, the most effective tools for preventing and detecting identity theft often interfere with that speed and convenience. For example, how does a merchant verify that a customer presenting a check or credit card or requesting instant credit is in fact who he claims he is? The only way is to require that the customer provide more information or more forms of identification. Yet few customers are willing to tolerate being asked for a second or third piece of identification when making a simple purchase (privacy advocate Beth Givens testified before Congress in July 2000 that federal law should require credit grantors to verify at least four pieces of information), and few consumers would consider a service convenient or rapid (much less instant ) if they were required to carry a passport or birth certificate to avail themselves of it. The Role of the Government In an effort to deal with the problem of identity theft, Congress and some state legislatures are considering laws that would restrict access to, and the use of, Social Security Numbers and other public records. Proposals for such laws are an ironic and ill-focused response to a growing problem, for at least five reasons. 1. Public records are a powerful tool to fight, not facilitate, identity theft. Two of the major issues concerning identity theft today are how to accurately identify consumers, and how to separate data about one individual from data about another. This is made all the more difficult by the fact that approximately 16 percent of the U.S. population about 42 million Americans changes addresses every year; there are approximately 2.4 million marriages and 1.2 million divorces every years, often resulting not only in changed addresses, but also changed last names; and, as of 1998, there were 6 million vacation or second homes in the United States, many of which were used as temporary or second addresses. Public record information is key to both objectives. It helps businesses verify information needed to identify individuals, such as name, address, telephone number, and the like. And information in public records, such as Social Security Numbers, provide the most reliable, The Coalition for Sensible Public Records Access (CSPRA) is a not-for-profit organization dedicated to preserving responsible access to public record information. CSPRA sponsors research and publications, public fora, legislative briefings, and other activities designed to foster a more thoughtful debate about how such access should be balanced with privacy concerns. Additional information about CSPRA is available at
2 cost-effective way yet developed for ensuring that information about one consumer is not erroneously provided to another consumer or added to another consumer s file. 2 Yet this is precisely what proponents of legislation designed to restrict the use of Social Security Numbers want to stop. They argue that such legislation is necessary to limit the availability of Social Security Numbers in the market and thereby reduce their availability for use in identity theft. It is questionable whether legislation would have that effect, given the widespread availability of Social Security Numbers in hundreds of other government and private settings. But it is certain that such a law would greatly increase the likelihood of identity theft and innocent errors by making it harder to identify specifically a unique individual. Far from invading privacy, Social Security Numbers and other public records are a key to accurately identifying citizens and reducing the prevalence of identity theft. 2. Laws restricting access to, and the use of, public records ignore the most common form of identity theft. Many identity theft laws ignore the fact that identity theft, although often thought of as a crime committed by strangers, is in fact most often perpetrated by friends or business associates. In fact, the Chief Credit Office of Household International, Inc., testified before Congress in 1999 that half of all incidents of identity theft are committed by a family member. Robert Hartle, one of the most well-publicized victims of identity theft and now a leading victim s rights advocate, discovered that his personal information had been taken by the estranged husband of his mother. So while legislatures are focused on new laws protecting consumer identity from theft by strangers, they are doing virtually nothing to deal with the most common form of identity theft that perpetrated by friends and colleagues. 3. The government provides many identity thieves with the tools of their trade. Laws that would restrict access to, or the use of, public record information ignore the most important role that the government plays in facilitating the activity of identity thieves: providing them with fraudulent forms of identification. The government, motivated by a laudable desire to serve citizens, has made it easier than ever to obtain identification documents. Identity thieves take advantage of that new ease and use it to obtain fraudulent identification documents, such as drivers licenses and birth certificates. According to one 2000 survey of identity theft victims, 45 percent of their cases involved fraudulent drivers licenses. Driver s licenses, state identification cards, birth certificates, and other forms of government-issued identification are the tools that the rest of the economy relies on to verify identity. These and other forms of government-issued identification are the keys to unlocking an individual s financial record. 4. Laws restricting public records ignore the other steps that the government should be taking. Laws restricting access to, or the use of, public records not only fail to address the problem of identity theft and, in fact, further exacerbate it they also distract attention from the other steps that the government can and should be taking to deal with this growing problem.
3 3 Virtually all victims of identity theft report that the injury they suffer is greatly exacerbated by the difficulty of working with the police and other government agencies to repair their credit and reputations, and apprehend the perpetrators. One identity theft victim, typical of the stories of many others, told the authors of one survey on identity theft: The police department treated me as if I were the criminal. One victim reported being told by the police that it was not their job. This is the near-universal refrain from identity theft victims And victims find that reports of identity theft made with one law enforcement agency are not shared with others. Similarly, the government has so far done little to respond to the problem of identity thieves who use their false identities when arrested or filing for bankruptcy. The government s inability or unwillingness correct judicial and law enforcement records contributes significantly to the harm experienced by victims of identity theft when they are arrested often repeatedly for crimes they did not commit, or they are denied benefits because of bankruptcies they did not file. These are important areas for the government to address. Ironically, while the government has been slow to respond to the needs of identify theft victims, business has been far more responsive. As a result, one harm that identity theft victims do not suffer is having to pay for the fraudulent charges that identity thieves rack up in their victims names. Those charges are virtually always paid by the merchants from which the goods or services were fraudulently obtained, or the financial institutions that extended credit or whose charge or debit cards were fraudulently used by the identity thieves. 5. Laws closing public records ignores the critical role of the individual. Laws restricting access to, or the use of, public records distract attention not only from the important steps that the government should be taking to combat identity theft, but also from the vital steps that individuals and only individuals must take to protect themselves. Keeping a close watch on account activity; reporting suspicious or unfamiliar transactions promptly; properly destroying commercial solicitations; storing valuable documents securely; protecting account names and passwords; and never disclosing personal information to unknown callers are just a few of the practical steps that consumers can to take to protect themselves against identify theft by both strangers and friends. Recommendations Efforts to restrict the use of Social Security Numbers illustrate the irony that privacy protections, rather than being logically motivated by concerns about identity theft, are often wholly at odds with efforts to prevent identity theft. In reality, identity theft is often greatly facilitated by privacy, and the most effective tools for addressing identity theft involve the disclosure and use of additional personal information Government proposals to deny access to Social Security Numbers and other public records that can be used to authenticate identity turn the government into the unwitting accomplice of identity thieves. We must find better solutions. Frankly, what is needed today are not more laws, but rather better enforcement of existing laws, better education of consumers, more efforts to help identity theft victims recover their good
4 names and credit records, more effective oversight of government-issued identification, and more explicit recognition of the inherent tension between protecting consumer benefits, including privacy, on the one hand, and preventing identity theft on the other. Not all of the government s obligations with regard to identity theft require action: A number require the government to refrain from well-intentioned actions that have the unintended effect of limiting the tools that consumers and businesses use to fight identity theft. Moreover, the government should avoid enacting laws that restrict the availability and use of critical information that helps businesses authenticate the identities of consumers, manage information about them accurately and responsibly, and protect it from unauthorized access or use. Laws prohibiting the use of SSNs for identifying and separating consumer information, that limit the use of fingerprints and other biometric identifiers, or that restrict the ability of retailers to verify the accuracy of consumer information with third parties greatly diminish the ability of businesses to protect consumers from identity theft. Similarly, the government should be careful to avoid imposing overly burdensome restraints on the responsible uses of personal information. Preventing identity theft is a critical objective, but, as we have seen, many tools to achieve that end also interfere with providing the services that consumers expect and demand. The government should be careful to balance any measure designed to protect against identity theft with the other costs it imposes on consumers and businesses. Overly burdensome restraints on the responsible use of personal information may make identity theft more difficult, but they will also make beneficial services impossible, impractical, or unduly expensive. 4
5 5
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM Effective May 1, 2009 Because [FACILITY NAME] offers and maintains covered accounts, as defined by 16 C.F.R. Part 681 (the Regulations ), [FACILITY NAME]
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
Prepared Statement of Professor Fred H. Cate
Committee on Ways and Means Subcommittee on Social Security United States House of Representatives Hearing on ENHANCING SOCIAL SECURITY NUMBER PRIVACY June 15, 2004 Prepared Statement of Professor Fred
Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.
Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints
Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009
Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program
T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E
T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E A I D E N T I T Y T H E F T G U I D E Prepared and distributed as a Public
http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html
Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available
PRIVACY BREACH MANAGEMENT POLICY
PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED: I. Adoption of Identity Theft Prevention Program Doylestown Family Medicine, P.C.
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and
Statement for the Record. On Behalf of the AMERICAN BANKERS ASSOCIATION. Before the. Antitrust Tax Force. Committee on the Judiciary
Statement for the Record On Behalf of the AMERICAN BANKERS ASSOCIATION Before the Antitrust Tax Force Committee on the Judiciary United States House of Representatives May 15, 2008 Statement for the Record
ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.
ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
CALIFORNIA IDENTITY THEFT RANKING BY STATE: Rank 2, 120.1 Complaints Per 100,000 Population, 43,892 Complaints (2007) Updated November 25, 2008
CALIFORNIA IDENTITY THEFT RANKING BY STATE: Rank 2, 120.1 Complaints Per 100,000 Population, 43,892 Complaints (2007) Updated November 25, 2008 Current Laws: A person who, with the intent to defraud, acquires
How child identity theft happens.
How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver
Child Identity Theft Education Kit
Child Identity Theft Education Kit Who s at Risk? Consider a teenager who is about to start college. She has deposited money into a savings account and is ready to move it into a checking account. Much
Identity Theft Packet
BOULDER POLICE DEPARTMENT 1805 33 rd Street Boulder, CO 80301 Identity Theft Packet ** Use this packet when the crime involves the stealing of someone's identity, such as when a victim finds out that someone
ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, 10304 Complaints (2007) Updated November 30, 2008
ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, 10304 Complaints (2007) Updated November 30, 2008 Current Laws: A person commits the offense of identity theft
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA
Taxpayer Guide to Identity Theft Protect yourself By Beatriz Landa-Sanchez, EA What is tax-related identity theft? Tax-related identity theft occurs when someone uses your stolen Social Security number
Privacy and Information Protection Bulletin
Privacy and Information Protection Bulletin March 2005 Fasken Martineau DuMoulin LLP Identity Theft Sara Levine and Joanna Erdman (student-at-law), Toronto Vancouver Calgary Toronto Montréal Québec City
I dentity theft occurs
1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,
Fraud Management in the Credit Card Industry 1
Fraud Management in the Credit Card Industry 1 Peter Burns Anne Stanley April 2002 Summary: On November 16, 2001, the Payment Cards Center of the Federal Reserve Bank of Philadelphia sponsored a workshop
Protection of Privacy
Protection of Privacy Privacy Breach Protocol March 2015 TABLE OF CONTENTS 1. Introduction... 3 2. Privacy Breach Defined... 3 3. Responding to a Privacy Breach... 3 Step 1: Contain the Breach... 3 Step
Identity Theft Victim s Packet
Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso Police Department and obtained a police report number related to your identity
EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);
EXHIBIT A Identity Theft Protection Program Definitions. For purposes of the Policy, the following definitions apply (1); A. City means: the City of Troy, Montana B. Covered Account means: An account that
FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft
FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity
SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:
SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: ISSUED: 11/7/06 REVISED: 3/16/07; 5/6/08 (web reference updates only) Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED
Instructions. STOP: This form is NOT to be used for Credit/or Debit card
Instructions STOP: This form is NOT to be used for Credit/or Debit card charges on you existing account or for TAX ID THEFT. This form is to be used for New Account or Collection Account Fraud (not check
IDENTITY THEFT RESOURCE KIT
IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with
Identity Theft Victim Guide
Becoming the victim of identity theft is an emotionally distressing event in anyone s life. This guide is intended to provide some help by suggesting steps you can take to stop the fraudulent use of your
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: May 2000 LETTER NO.: 00-CU-02 TO: SUBJ: All Credit Unions Identity Theft Prevention The purpose
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY
Wealthfront Brokerage Corporation
Wealthfront Brokerage Corporation Business Continuity Plan Disclosure Wealthfront Brokerage Corporation ( Wealthfront Brokerage ) has developed a Business Continuity Plan on how we will respond to events
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
OREA TENNESSEE SAFEGUARDING SOCIAL SECURITY NUMBERS IN TENNESSEE GOVERNMENT RECORDS. Offices of Research and Education Accountability
OREA TENNESSEE Offices of Research and Education Accountability COMPTROLLER OF THE TREASURY, JOHN G. MORGAN SAFEGUARDING SOCIAL SECURITY NUMBERS IN TENNESSEE GOVERNMENT RECORDS October 2008 John G. Morgan
WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009
WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009 Current Laws: Washington s identity theft law states that no
PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009
PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft
TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS
TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS Joe Juidiciani Daniel Snyder BACKGROUND On September 11, 2001, our nation fell victim to the largest attack on United States soil since the birth of the
IDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)
Pasco County Sheriff's Office Economic Crime Unit. Identity Theft Guide
Pasco County Sheriff's Office Economic Crime Unit Identity Theft Guide This kit was designed to assist you in working through the process of resolving the theft of your personal information and to clear
Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009
Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention
University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule
NUMBER: BUSF 4.12 SECTION: SUBJECT: Finance and Planning University Identity Theft and Detection Program (NEW) DATE: March 3, 2011 Policy for: Procedure for: Authorized by: Issued by: All Campuses and
Identity Theft and Tax Administration
PREPARED STATEMENT OF BETH TUCKER IRS DEPUTY COMMISSIONER FOR OPERATIONS SUPPORT BEFORE SUBCOMMITTEE ON FISCAL RESPONSIBILITY AND ECONOMIC GROWTH SENATE FINANCE COMMITTEE ON IDENTITY THEFT MAY 25, 2011
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY I. POLICY SUMMARY It shall be the policy of Polk County Rural Public Power District (PCRPPD) to take all reasonable steps to identify, detect, and prevent
(1) regulate the storage, retention, transmission, and security measures for credit card, debit card, and other payment-related data;
Legal Updates & News Legal Updates Pending Changes to California s Data Breach Law: New Burdens for Retailers? September 2007 by Christine E. Lyon, William L. Stern Related Practices: Privacy and Data
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.
Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program
