1 Information and Systems Security/Compliance Security Day - 2005 The Information and Systems Security/Compliance Program Dave Kovarik.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Chapter 27 Your Credit and the Law pp Learning Objectives 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Presented By Drexel and FMFCU.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Paychecks and Tax Forms. Where Does My Money Go? Almost 31% of an individual’s paycheck is deducted  Taxes are the largest expense most individuals will.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
CONSUMER CREDIT LEGISLATION Carl Johnson Financial Literacy Jenks High School.
Chapter 9-Section 3 Consumer Protection Laws. Consumer Credit  Credit Denial  If denied credit there could be something in your credit file preventing.
Basic Banking Services - Activity 1
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
1 Those Darned Cards!. 2 Chapter 6 – Credit Cards Extremely important but deceptively expensive Revolving – borrow, repay then reborrow Minimum repayment.
Lesson 9-3 Consumer Protection Laws LEARNING GOALS -LIST AND EXPLAIN CONSUMER PROTECTION LAWS THAT ARE RELATED TO CREDIT -DISCUSS THE PROCESSES OF USING.
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
Job Placement Tests The Self Directed Search er-aptitude-test.php
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
2015 ANNUAL TRAINING By: Denise Goff
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Identity Theft.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
Kelly Herd Rebecca Hofeling IDENTITY THEFT AND PROTECTION Communication 2500.
By: Taylor Budwash.. o Identity Theft is the unorganized gain and use of a true person’s identity and personal information for unlawful purpose.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
To Your Credit. To Your Credit 2 Welcome Agenda Ground Rules Introductions.
Back to Table of Contents pp Chapter 27 Your Credit and the Law.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Credit In your opinion, do consumers spend more per month on average when they use a credit card or cash?
G1 © Family Economics & Financial Education – Revised March 2008 – Paychecks and Taxes Unit – Understanding Your Paycheck Funded by a grant from.
Identity Theft How it happens and how to avoid it.
Chapter 27 Your Credit and the Law pp Learning Targets 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal laws.
Presented By Plano Police Department Crime Prevention Unit.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Identity Theft Project By: Timmy Townsend And Eric Fields.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
UNDERSTANDING CREDIT LAWS CONSUMER CREDIT LEGISLATION.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Analyzing Credit and Debt  When you use credit responsibly it can be very convenient because you can use it to buy things now and pay for them later by.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
Status of identity and privacy related AZ Legislative bills April 20, 2006 Mike Keeling ATIC, Chair.
Freedom Independence Transition
Advanced Income Tax Law
Own Your Identity.
When you get caught for Identity Theft
Own Your Identity.
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Tax Crime and Compliance Issues
Protecting Yourself from Fraud including Identity Theft
Freedom Independence Transition
Protecting Yourself from Fraud including Identity Theft
Identity Theft and Credit Safety
Presentation transcript:

1 Information and Systems Security/Compliance Security Day The Information and Systems Security/Compliance Program Dave Kovarik

2 Information and Systems Security/Compliance Privacy and Consumer Protection Legislation... Your Tax Dollars at Work

3 Information and Systems Security/Compliance The Problem Identity theft has become the fastest growing crime in the country. According to the Federal Trade Commission, last year alone identity theft and consumer fraud cost Americans nearly $550 million, a $12 million increase from On average, victims will spend an average of 600 hours and $1500 repairing their credit.

4 Information and Systems Security/Compliance Percentage of Identity Thefts by Victim’s Age

5 Information and Systems Security/Compliance Senate Bill 123  Requires the Illinois Department of Natural Resources (DNR) to phase in new Conservation ID (CID) numbers to replace Social Security numbers on hunting and fishing licenses as applicants renew  Effective January 01, 2006

6 Information and Systems Security/Compliance House Bill 1058  Allows victims of identity theft to request a freeze on their credit report reporting agency must act on request within 5 days  Prevents the release of the report to any party without their consent.  Effective January 01, 2006

7 Information and Systems Security/Compliance House Bill 1633  The Breach Notification Act  Requires quick notification of consumers in the state if their personal information is compromised due to a breach in security  Effective January 01, 2006

8 Information and Systems Security/Compliance Senate Bill 1799  Requires the Department of Revenue to notify a taxpayer directly if they suspect another person has used their Social Security number to register a business or pay taxes and fees.  The law is effective immediately.

9 Information and Systems Security/Compliance House Bill 2696  Prohibits businesses from denying a person credit or utility services, or from increasing a person’s credit limits based solely on their status as an identity theft victim.  This law is effective immediately.

10 Information and Systems Security/Compliance House Bill 2697  Unauthorized copying and transmitting of any financial transaction devices including credit & debit cards, or other devices used to make a payment, get cash, or make a deposit, a Class A misdemeanor.  This law is effective immediately.

11 Information and Systems Security/Compliance House Bill 2699  Increases the penalties by one felony class for identity theft and aggravated identity theft crimes.  Increases the penalties against those persons who steal the identities of more than three victims.  This law is effective immediately.

12 Information and Systems Security/Compliance Summary

13 Information and Systems Security/Compliance Questions? Answers! Thank you! Office: (847)