Helping you protect your customers against fraud Division of Finance and Corporate Securities.

Slides:



Advertisements
Similar presentations
Presented (insert date) By (insert organizations name)
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Identity Theft A CyberAngels Quick Tutorial A CyberAngels Quick Tutorial Adapted from the Federal Trade Commission Website Press the Next Button to Continue.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Springfield Technical Community College Security Awareness Training.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Data Privacy and Security: Overview and Update Beth Cate Associate University Counsel.
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
Data Classification & Privacy Inventory Workshop
1 Information and Systems Security/Compliance Security Day The Information and Systems Security/Compliance Program Dave Kovarik.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Clean Up © 2011.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Electronic Records Management: What Management Needs to Know May 2009.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Florida Information Protection Act of 2014 (FIPA).
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Preventing a Sensitive Data Loss: Laptops Marc Scarborough.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Presented By Plano Police Department Crime Prevention Unit.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Identity Theft One of America's fastest growing crimes.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Identity Theft Project By: Timmy Townsend And Eric Fields.
1 Identity Theft Prevention and the Red Flag Rules.
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Status of identity and privacy related AZ Legislative bills April 20, 2006 Mike Keeling ATIC, Chair.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Identity Theft How bad people get good credit. Lindsey Bertugli.
Lesson 10A: The Three D’s of Identify Theft
IDENTITY THEFT.
Florida Information Protection Act of 2014 (FIPA)
Responding to a Data Breach 360° of IT Compliance
Florida Information Protection Act of 2014 (FIPA)
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Protecting Your Credit Identity
National HIPAA Audioconferences
Identity Theft: What if You Are a Victim?
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Helping you protect your customers against fraud Division of Finance and Corporate Securities

2 Identity theft is prolific in the U.S. and in Oregon. It can strike anyone, anywhere. Individuals Businesses and Organizations Government Agencies It has become the number one crime in the U.S. Oregon ranked #13 in identity theft crime.

3 The Cost of Identity Theft National business price tag: $48 billion Consumer price tag: $5 billion Other tolls: time, credibility, emotional

4 ID Theft Prevention — Prepare and Plan The 2007 Oregon Identity Theft Protection Act Social Security numbers Data breach notification Safe-keeping of sensitive information Security freeze option

5 Definitions “ Security Breach ” Inadvertant release or the theft of personal information in computerized format “ Personal Identifying Information ” Someone’s name in combination with one or any of these: Social Security number Driver license number or Oregon identification card number Passport number Financial account number, credit or debit number along with required security code, access code or password

6 Protecting Social Security Numbers Effective October 1 To prevent the theft of SSN:  No posting or displaying (ex: Web site)  No printing on materials sent through the mail if not requested unless redacted  No printing a consumer's SSN on a card used by the consumer that is required to access products or services *Exceptions: Records required by state or federal law and others

7 When sensitive data is stolen Effective October 1 If computerized personal identifying information you own or maintain is stolen you must send your customers notification. When What How

8 When As soon as possible Delay if action by law enforcement

9 What Describe what happened Explain type of information that was stolen Provide contact information Add information for national credit reporting agencies Give advice in reporting suspected identity theft to law enforcement and the Federal Trade Commission

10 How Notify credit reporting agencies Exception: Use statewide major television and newspaper and your Web site if: Cost of notification > more than $250,000 Number of individuals > more than 350,000 Gramm-Leach-Bliley Act Note – Follow Oregon law for your employees

11 How to Protect Customer Data Effective January 1, 2008 To safeguard information you own you must develop, implement and maintain reasonable safeguards including proper disposal.

12 Easy and Sensible Steps Assess Take inventory

13 Easy and Sensible Steps Simplest protection Encrypt Protect

14 Easy and Sensible Steps Reduce What kind of personal information do you really need?

15 Easy and Sensible Steps What ’ s personal identifying information? Security program practices and procedures Train

16 Easy and Sensible Steps Test Investigate Have a security plan Detect

17 Easy and Sensible Steps Use your retention schedule Make the information unreadable — hard copy or electronic New recycling law Destroy

18 Gramm-Leach-Bliley Act Health Insurance Portability and Accountability Act (HIPAA) Follow Oregon ’ s law for your employees

19 Requirements for Protecting Data

20 Prevention Tool for Consumers: Security Freeze Effective October 1 All Oregonians can place a freeze Contact Experian, TransUnion, Equifax $10 fee for each freeze Exception to fee — ID theft victims “ Thawing ” the freeze Careful consideration: do you need new credit?

21 Security Freeze Procedures

22 More Information: Click on Identity Theft (503) (866) Federal Trade Commission Search for Identity Theft