RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009



Similar documents
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009

ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, Complaints (2007) Updated November 30, 2008

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009

MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008

CALIFORNIA IDENTITY THEFT RANKING BY STATE: Rank 2, Complaints Per 100,000 Population, 43,892 Complaints (2007) Updated November 25, 2008

Section Fraud and related activity in connection with identification documents and information

OKLAHOMA LAWS RELATING TO IDENTITY THEFT

Issue Brief. Arizona State Senate IDENTITY THEFT AND CONSUMER PROTECTION INTRODUCTION IDENTITY THEFT. September 17, 2015.

Computer Security (Spyware)

A Bill Regular Session, 2005 HOUSE BILL 2904

Security Breaches Under the NC Identity Theft Protection Act: Basic Information for Local Health Departments

Indiana Social Security Number Disclosure and Security Breach Legislation

2009 CALIFORNIA IDENTITY THEFT MATRIX 1 Some overlooked or underused statutes

REFERENCE ACTION ANALYST STAFF DIRECTOR 1) Public Safety & Domestic Security Policy Committee 10 Y, 0 N, As CS Billmeier Cunningham SUMMARY ANALYSIS

Weber Human Services Identity Theft Prevention Policy

Identity Theft. What it is and How to Protect Yourself

Michie's Legal Resources. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence Act of [Acts 1999, ch. 201, 2.

NC General Statutes - Chapter 75 Article 2A 1

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998

BUSINESS AND COMMERCE CODE PERSONAL IDENTITY INFORMATION UNAUTHORIZED USE OF IDENTIFYING INFORMATION

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

The General Assembly of the Commonwealth of Pennsylvania hereby enacts as follows:

CHAPTER 226. C.56:11-44 Short title. 1. This act shall be known and may be cited as the "Identity Theft Prevention Act."

PLEASE READ. The official text of New Jersey Statutes can be found through the home page of the New Jersey Legislature

SP0346, LD 1029, item 1, 123rd Maine State Legislature An Act To Create the Maine Spyware Prevention Act

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy

Definitions In this chapter, unless the context otherwise requires: 1. "Cancelled or revoked credit card" means a credit card that is no

[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES

H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D.

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

NC General Statutes - Chapter 14 Article 19B 1

HIPAA and Privacy Policy Training

Chapter No. 911] PUBLIC ACTS, CHAPTER NO. 911 HOUSE BILL NO. 3403

IDENTITY THEFT PREVENTION PROGRAM

Identity Theft Prevention Program

Tips To Prepare. Audits/Investigations. For Prosecution

NC s Identity Theft Protection Act

APPENDIX W - REGULATIONS - IDENTITY THEFT CHAPTER 45F. IDENTITY THEFT

January An Overview of U.S. Security Breach Statutes

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2005 SESSION LAW SENATE BILL 1048

Data Security. Updated April, CCIM Institute 430 N. Michigan Avenue Chicago, IL (312)

City of Hercules Hercules Municipal Utility Identity Theft Prevention Program

Identity Theft Prevention Program

New Hampshire Statutes Title 31 Trade and Commerce Chapter 359-B Consumer Credit Reporting

Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008

Client Advisory October Data Security Law MGL Chapter 93H and 201 CMR 17.00

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule

San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX (210) OFFICE (210) FAX

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

Card Account means your Card account that is in relation to your Visa Wallet maintained and operated by Tune Money Sdn Bhd.

IDENTITY THEFT PREVENTION PROGRAM

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009

State Enforcement of Privacy Laws. Phil Ziperman. Mark Pacella. Allen Brandt, CIPP/US, CIPP/E

CITY OF ANDREWS IDENTITY THEFT PREVENTION PROGRAM

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:

CHAPTER 12 IDENTITY PROTECTION AND IDENTITY THEFT PREVENTION POLICIES

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

Central Oregon Community College. Identity Theft Prevention Program

Scope All [Name of Facility] operations

Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended:

Criminal Law Consolidation (Identity Theft) Amendment Act 2003

North Carolina General Statutes Chapter 75 Monopolies, Trusts, and Consumer Protection Article 2A Identity Theft Protection Act

The University of North Carolina at Charlotte Identity Theft Prevention Program

MARSHALL UNIVERSITY BOARD OF GOVERNORS

b. Social Security numbers included in electronic files and databases accessible electronically or via the Internet, and

S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D

Accident Claim Filing Instructions

Appalachian State University Identity Theft Prevention Program Procedures

Wisconsin Privacy Laws

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

SECTION-BY-SECTION ANALYSIS

Prepare for the Worst: Best Practices for Responding to Cybersecurity Breaches Trivalent Solutions Expo June 19, 2014

TITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM

COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

identity Theft Prevention and Identification Requirements For Utility

University of Arkansas at Monticello Identity Theft Prevention Program

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

Corona Police Department

ERRORS & OMISSIONS RENEWAL APPLICATION

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH

(1) regulate the storage, retention, transmission, and security measures for credit card, debit card, and other payment-related data;

Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009

Evolution of HB 300. HIPAA passed in 1996 Originally, HIPAA only directly impacted certain covered entities :

Identity Theft Prevention Program

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM

Transcription:

RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009 Current Laws: A person commits the crime of identity fraud if he knowingly: Produces an identification document or a false identification document without lawful authority; Transfers an identification document or a false identification document knowing that the document was stolen or produced without lawful authority; Possesses with intent to use unlawfully or transfer unlawfully five or more identification documents (other than those issued lawfully for the use of the possessor) or false identification documents; Possesses an identification document (other than one issued lawfully for the use of the possessor) or a false identification document, or financial information with the intent that the document or financial information be used to defraud the United States, the State of Rhode Island, any political subdivision of it or any public or private entity; Transfers or possesses a document-making implement with the intent that the documentmaking implement will be used in the production of a false identification document or another document-making implement which will be so used; Possesses a false identification document that is or appears to be a genuine identification document of the United States, the State of Rhode Island or any political subdivision of it or any public or private entity which is stolen or produced without lawful authority knowing that the document was stolen or produced without such authority; or Transfers or uses with intent to defraud, without lawful authority, a means of identification or financial information of another person living or dead, with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of federal, state or local law. Means of identification means any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual, including any: Name, Social Security number, date of birth, official state or government issued driver s license or identification number, alien registration number, government passport number, employer or taxpayer identification number; Unique biometric data, such as fingerprint, voice print, retina or iris image, or other unique physical representation; Unique electronic identification number, address, or routing code; or Telecommunication identifying information or access device. Financial information means any of the following information identifiable to an individual that concerns the amount and/or condition of an individual s assets, liabilities or credit: account numbers and balances; transactional information concerning any account; or codes, passwords, Rhode Island - 1

Social Security numbers, tax identification numbers, driver s license numbers or any other information held for the purpose of account access or transaction initiation. These provisions do not apply to a person under 21 who misrepresents or misstates his age through the presentation of any document in order to enter any premises licensed for the retail sale of alcoholic beverages for the purpose of purchasing or attempting to purchase alcoholic beverages. Violations are a felony, punishable by up to three years in prison and/or a fine up to $5000 for a first conviction. Second convictions are punishable by three to five years in prison and/or a fine up to $10,000; and third or subsequent convictions will result in five to ten years in prison and/or a fine up to $15,000. Statute: 11-49.1: http://www.rilin.state.ri.us/statutes/title11/11-49.1/index.htm Payment Cards: A person is guilty of obtaining a credit card through fraudulent means if he: Takes a credit card from the person, possession, custody, or control of another without the cardholder s consent, or who, with knowledge that it has been so taken, receives the credit card with intent to use, sell, or transfer it to a person other than the issuer or the cardholder; Receives a credit card that he knows to have been lost, mislaid, or delivered under a mistake as to the identity or address of the cardholder and who retains possession with intent to use, sell, or transfer it to a person other than the issuer or the cardholder; If not the issuer, sells a credit card, or buys a credit card from a person other than the issuer; If not the authorized cardholder, signs a credit card with the intent to defraud the issuer or a person or organization providing money, goods, services, or anything else of value; or Receives two or more credit cards issued in the name or names of different cardholders, which he has reason to know were taken or retained under circumstances that constitute credit card theft. Violations are punishable by up to one year in jail and/or a fine up to $1000, with the exception of receiving two or more credit cards issued in the name of different cardholders, which is punishable by up to three years in prison and/or a fine up to $3000. Statute: 11-49-3: http://www.rilin.state.ri.us/statutes/title11/11-49/11-49-3.htm A person is guilty of fraudulent use of a credit card if he: With intent to defraud the issuer or a person or organization providing money, goods, services, or anything else of value or any other person, uses, for the purpose of obtaining money, goods, services, or anything else of value, a credit card obtained or retained fraudulently or a credit card which he or she knows is forged, expired, or revoked. Obtains money, goods, services, or anything else of value by representing, without the consent of the cardholder, that he or she is the holder of a specified card or by representing that he or she is the holder of a card and the card has not in fact been issued. If the value of all moneys, goods, services, and other things of value obtained does not exceed $100 in any six month period, it is punishable by up to one year in prison and/or a fine up to $1000. If the value exceeds $100 in any six-month period, it is punishable by up to three years in prison and/or a fine up to $3000. Rhode Island - 2

Statute: 11-49-4: http://www.rilin.state.ri.us/statutes/title11/11-49/11-49-4.htm It is unlawful to make or cause to be made, either directly or indirectly, any false statement as to a material fact in writing, knowing it to be false and with intent that it be relied on respecting his or her identity or that of any other person, firm, or corporation or his or her financial condition or that of any other person, firm, or corporation, for the purpose of procuring the issuance of a credit card. Violations are punishable by up to one year in jail and/or a fine up to $1000. Statute: 11-49-2: http://www.rilin.state.ri.us/statutes/title11/11-49/11-49-2.htm Social Security Numbers: State law places limits on the use and dissemination of Social Security numbers (SSNs). The law will not permit a person, business, or state or local agency to: Intentionally communicate or otherwise make available to the general public an individual s Social Security number; Print an individual s SSN on any card required for the individual to access products or services provided by the person or entity; Require an individual to transmit his or her SSN over the Internet, unless the connection is secure or the Social Security number is encrypted; Require an individual to use his or her SSN to access an Internet Website, unless a password or unique personal identification number or other authentication device is also required; and Print an individual s SSN on any materials that are mailed to the individual, unless state or federal law requires the SSN to be on the document to be mailed. Social Security numbers may be included in applications and forms sent by mail, including documents sent as part of an application or enrollment purpose; to establish, amend, or terminate an account, contract, or policy; or to confirm the accuracy of the SSN. A SSN that is permitted to be mailed may not be printed, in whole or in part, on a postcard or other mailer not requiring an envelope, or visible on the envelope or without the envelope having been opened. The provisions do not apply to documents that are recorded or required to be open to the public. Violations are punishable by a civil fine of up to $3,000. A person who knowingly violates the provisions is guilty of a misdemeanor, punishable by up to thirty days in prison and/or a fine up to $5,000. Statute: 6-48-8: http://www.rilin.state.ri.us/statutes/title6/6-48/6-48-8.htm Spyware: It is unlawful for a person who is not an owner or operator to transmit computer software to the owner or operator s computer with actual knowledge or with conscious avoidance of actual knowledge and to use the software to do any of the following: Modify, through intentionally deceptive means, settings that control any of the following: a computer s home page, the default search engine, or the owner s list of bookmarks. Collect, through intentionally deceptive means, personally identifiable information, either through the use of a keystroke-logging function that records all keystrokes made by an owner or operator and transfers that information from the computer to another person or in a manner that correlates such information with data respecting all or substantially all of the websites visited by an owner or operator, other than websites operated by the person collecting such information; or by extracting information from the owner or operator s hard drive. Prevent, through intentionally deceptive means, an owner or operator's reasonable efforts to block the installation or execution of, or to disable, computer software by causing the Rhode Island - 3

software that the owner or operator has properly removed or disabled automatically to reinstall or reactivate on the computer; Intentionally misrepresent that the computer software will be uninstalled or disabled by an owner or operator's action; Through intentionally deceptive means, remove, disable, or render inoperative security, antispyware, or antivirus computer software installed on the computer; Modify any of the settings related to the computer's access to, or use of, the Internet, including settings that protect information about the owner or operator in order to steal the owner or operator's personally identifiable information; and security settings. Statute: 11-52.2: http://www.rilin.state.ri.us/statutes/title11/11-52.2/index.htm Victim Assistance: Security Breach: State law requires any state agency or business that owns, maintains, or licenses computerized data that includes personal information to disclose any breach of the security of the system that poses a significant risk of identity theft to any Rhode Island resident whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. A security breach occurs upon unauthorized acquisition of unencrypted computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the state agency or person. Notice must be made without unreasonable delay, consistent with the needs of law enforcement and with any measures necessary to determine the scope of the breach and to restore the reasonable integrity of the data system. Notification of a breach is not required if, after an appropriate investigation or after consultation with relevant federal, state, or local law enforcement agencies, a determination is made that the breach has not and will not likely result in a significant risk of identity theft to the individuals whose personal information has been acquired. Personal information is defined as an individual s first name or first initial and last name in combination with any one or more of the following data elements, when either the name and data elements are not encrypted: Social Security number; driver s license number or Rhode Island Identification Card number; or an account number, or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual s financial account. It does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Notification can be provided by mail or e-mail. If the cost of providing regular notice would exceed $25,000, the amount of people to be notified exceeds 50,000, or the business or agency does not have sufficient contact information to provide written or electronic notice, substitute notice may be provided. When substitute notice is used, it must consist of all of the following, as applicable: e-mail notice, conspicuous posting on the business s or agency s web site, and notification to major statewide media. Statute: 11-49.2: http://www.rilin.state.ri.us/statutes/title11/11-49.2/index.htm Rhode Island - 4

Credit Freeze: All Rhode Island consumers are allowed to place security freezes on their consumer credit reports to prevent new accounts from being opened in their names. Such a freeze enables the consumer to prevent anyone from looking at his/her credit file for the purpose of granting credit unless the consumer chooses to allow a particular business look at the information. To request a freeze, a consumer must request one in writing by certified mail. Consumer reporting agencies may charge a fee of $10 to place or temporarily lift a security freeze. However, victims of identity theft with a valid police report or investigative complaint and people 65 years of age or older may not be charged. The reporting agency must place the freeze within five business days after receiving the request, and within ten days, must send a written confirmation of the freeze and provide the consumer with a unique personal identification number or password to be used by the consumer when providing authorization for the release of his credit for a specific party or period of time. Requests for a temporary unlocking of the freeze must be completed within three business days. Statute: 6-48-1 through 7: http://www.rilin.state.ri.us/statutes/title6/6-48/index.htm How to Place a Security Freeze in Rhode Island: http://www.consumersunion.org/pdf/security/securityri.pdf State Resources: State Police, Identity Theft (http://www.risp.ri.gov/idtheft/) The document directs victims to: Report the crime to their state or local police department. A request should be made for license and registration checks in order to identify possible unlawful activity. Victims should provide all information which may reveal the manner in which the identity was unlawfully obtained and describe any known fraudulent activity. Legislation: 2006: Passage of HB 7148 will allow Rhode Island consumers to place security freezes on their consumer credit reports to prevent identity thieves from opening new accounts in their names. Such a freeze enables the consumer to prevent anyone from looking at his/her credit file for the purpose of granting credit unless the consumer chooses to allow a particular business look at the information. In addition, the bill increases protections of Social Security numbers (SSNs). Businesses and state and local government agencies are prohibited from posting SSNs or displaying them in public. The bill also targets the use of Social Security numbers on the Internet. Web sites are banned from requiring SSNs to be used to gain access unless it is in combination with a password and the number is encrypted. Rhode Island - 5

HB 6811 targets the use of spyware, software that surreptitiously monitors a computer user s actions. The bill makes it illegal for anyone to transmit software to another computer without the owner s knowledge or to falsely entice someone to download software. It prohibits an unauthorized person from installing software that would take control of a computer s computer, modify its security settings, collect the user s personal identification information, interfere with its removal, or otherwise deceive the authorized user. 2005: HB 6191 requires state government agencies and any company that lawfully collects and maintains computerized records containing consumer s personal information to notify affected consumers in the event that personal data is compromised in a security breach. 2003: H 5871 / S 0663 include the use of financial information with intent to defraud another person or with intent to commit any violation of federal, state or local law as a felony under the impersonation and identity fraud act. It makes it a felony to use financial information, such as account numbers, transactional data concerning any account, codes, passwords, Social Security numbers, tax identification numbers, and driver s license numbers, with the intent to defraud another person or commit any violation of law. Rhode Island - 6