Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.

Slides:



Advertisements
Similar presentations
Secure IT 2005 Panel Discussion Felecia Vlahos, SDSU Sally Brainerd, UCSD Brooke Banks, CSU Chico.
Advertisements

Identity Theft If you are a victim of identity theft, take the following four steps as soon as possible!
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
IAPP Seminar, June 11, CA Privacy Law: Resources & Protections Dana F. Winterrowd, Staff Counsel California Department of Consumer Affairs.
Springfield Technical Community College Security Awareness Training.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
Protecting Personal Information Guidance for Business.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
A Summary of CS for House Bill 65 (Jud) – A Presentation to the HCCA Alaska Local Annual Conference Joan Wilson Asst Attorney General State of Alaska
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Presented by: Roberta Ward CDHS Privacy Officer Phone: (916)
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
The Identity Theft Protection Act of 2005 Kim D’Arruda Roy Cooper Attorney General.
Consumer Privacy & Protection Joanna Acocella May 22, 2007.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
1 IDENTITY THEFT Marcia L. DePaula, Esquire. 2 3 IDENTITY THEFT A fraud committed or attempted using the identifying information of another person without.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Responding to a Data Security Breach
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
An Act Relative to Security Freezes and Notification of Data Breaches Chapter 82 of the Acts of 2007 Massachusetts Digital Government Summit Securing Private.
Data Classification & Privacy Inventory Workshop
1 Protecting Privacy Challenges for Higher Education Educause Western Regional Conference - April 26, 2006.
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Employment Screening: CORI and Private Background Checks Presented by the Massachusetts Law Reform Institute 99 Chauncy St., Suite 500, Boston, MA
Federal Credit Laws. What are the key laws about credit and borrowers that protect consumers? Several federal laws protect consumers when they apply for.
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Clean Up © 2011.
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
House Committee on Business and Industry House Bill Implementation of Closed Account Notification System Texas Department of Banking April 22, 2008.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
2015 ANNUAL TRAINING By: Denise Goff
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Florida Information Protection Act of 2014 (FIPA).
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Breach vs. Security Incident A security incident is an actual or suspected occurrence of: Damage, destruction, unauthorized access or disclosure of.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Oregon Consumer Identity Theft Protection Act Communications Forum Theresa Masse, Chief Information Security Officer Department of Administrative Services.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
HOW TO RESPOND TO A DATA BREACH: IT’S NOT JUST ABOUT HIPAA ANYMORE The Thirteenth National HIPAA Summit  September 26, 2006 Renee H. Martin, JD, RN, MSN.
Protecting Your Assets By Preventing Identity Theft 1.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
1 Identity Theft Prevention and the Red Flag Rules.
Treat it like it’s yours: best practices for handling student transcript data Bob Hughes Application Support Manager North Orange County CCD CCCTran Steering.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Status of identity and privacy related AZ Legislative bills April 20, 2006 Mike Keeling ATIC, Chair.
IDENTITY THEFT Allyson W. Haynes Assistant Professor of Law Charleston School of Law.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Protecting Your Assets By Preventing Identity Theft
Privacy and the Law.
Protection of CONSUMER information
Protecting Personal Information Guidance for Business.
Protecting Your Credit
Identity Theft Prevention Program Training
National HIPAA Audioconferences
Presentation transcript:

Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection

2 Outline of Presentation Office of Privacy Protection CA Law on Notification of Security Breach (SB 1386) CA ID Theft Laws and FACTA

3 Office of Privacy Protection Mission Promote and protect the privacy interests of individuals in a manner consistent with the California Constitution. Identify consumer privacy problems and facilitate development of fair information practices.

4 Office of Privacy Protection Functions Offer assistance to consumers Provide information & education Coordinate with law enforcement Recommend best practices to protect individual privacy

5 Why People Contact OPP

6 The CA Constitution & Federal Preemption California Constitution, Article 3, § 3.5: An administrative agency…has no power… (c) To declare a statute unenforceable, or to refuse to enforce a statute on the basis that federal law or federal regulations prohibit the enforcement of such statute unless an appellate court has made a determination that the enforcement of such statute is prohibited by federal law or federal regulations.

7 CA Identity Theft & Data Protection Laws in FACTA Blocking of ID theft info in credit files CA Civil Code §§ (k), , , (b) — FCRA § 605B Victim access to documents on fraudulent accounts CA Penal Code § — FCRA § 609(e) Credit card number truncation CA Civil Code § — FCRA § 605(g) Destruction of customer records CA Civil Code § — FCRA § 628

8 CA Identity Theft Laws Not in FACTA Right of victim to get police report CA Penal Code § Rights of “criminal ID theft” victim CA Penal Code §§ Right of victim to bring action vs. claimant CA Civil Code § Right of victim to 12 free credit reports in year CA Civil Code § (b) Right to freeze credit files CA Civil Code § et seq. Burden of proof on debt collector in ID theft CA Civil Code §

9 CA Data Protection Laws Not in FACTA Ban on public display of SSNs CA Civil Code § et seq. Ban on recording personal info on credit card transactions CA Civil Code § Ban on recording credit card # on checks CA Civil Code § 1725 Limits on use of personal info swiped from DL CA Civil Code § Secure mailing of “convenience checks” CA Financial Code § 22342(d) Requirement to notify of security breach CA Civil Code §§ , et seq.

10 Contacts on ID Theft & Security Breaches thru 4/14/04

11 CA Notice of Security Breach Law Applies to person, company, state agency Must notify people “in the most expedient time possible and without unreasonable delay” if personal information is acquired by unauthorized person Civil Code §§ , &

12 Notice of Security Breach Law Applies to unencrypted, computerized data including personal info Personal info defined: First name or initial and last name, plus SSN, DL#, or financial account number and any PW. Time allowed for internal analysis to determine scope, and law enforcement investigation

13 Notice of Security Breach Law Notice may be: Written, or Electronic, or Substitute if >$250,000 or >500,000 people Substitute notice must be all of: when agency has addresses Web site posting Major statewide media

14 The Notification Test 1. Was there a "breach of the security" of the data as defined? 2. Does the data include “personal information" as defined? 3. Does that "personal information" relate to a California resident? 4. Was the "personal information" unencrypted? 5. Was the "personal information" acquired, or reasonably believed to have been acquired, by an unauthorized person?

15 Examples of Incidents Hacking into server containing file w/ names & SSNs Stolen computers w/ names & SSNs Documents containing names & SSNs mailed to wrong people Server hijacked for use as relay to download music or to send spam (server has files with names, SSNs, etc.)

16 Best Practices Document “Recommended Practices on Notification of Security Breach Involving Personal Information” Protection & Prevention Preparation for Notification Notification (with sample letters) Available on Web site on Recommended Practices page

CFP, April 23, 2004 Contact Information Joanne McNabb, Chief 400 R Street, Suite 3080 Sacramento, CA