Targeted Data  Integrated Solutions  Modeling & Analytics Equifax intelligence ® Data Security & Privacy DMNYC Luncheon, May 11, 2006 Chris Lynde – SVP.

Slides:



Advertisements
Similar presentations
Red Flag Rules: What they are? & What you need to do
Advertisements

My Name is Todd Davis My Social Security # is
NACARA Annual Conference Industry Perspectives Panel September 29,2014 Boise, Idaho Andy Madden Director State Government Affairs ACA International.
IAPP Global Privacy Summit, 3/8/12 1. Joanne McNabb, CIPP/US/G/IT Chief California Office of Privacy Protection Lisa Sotto Partner & Head, Privacy & Information.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
1 WHAT IT MEANS FOR YOU? April Health Access is the leading voice for health care consumers in California. Founded in 1987, Health Access is the.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
How Data Brokers Should Handle the privacy of Personal Information Luai E Hasnawi.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
© Chery F. Kendrick & Kendrick Technical Services.
Dionne Hill‎ Scott Schomaker Sungkuk Ji ChoicePoint Case Analysis April 20, 2012.
Center for Risk Management of Engineering Systems University of Virginia Linking the Economics of Cyber Security and Corporate Reputation Barry Horowitz.
Information Security Policies Larry Conrad September 29, 2009.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
1 Information and Systems Security/Compliance Security Day The Information and Systems Security/Compliance Program Dave Kovarik.
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Laws and Agencies that Provide Financial Safeguards Consumer Protection.
Electronic Transaction Use & Risk of Identity Theft.
Information Security in 2015 What to Expect Presented by: Noor Aarohi Senior Risk and Compliance Analyst GW Division of Information Technology 1.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Clean Up © 2011.
Privacy and Security of Personal Information Emily Hackett, Executive Director Voice: Cell:
Identity Theft Insurance Charles P. Orlowicz November CAS Annual Meeting – Session CS04 A division of the property and casualty subsidiaries.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
The Institutionalization of Business Ethics
HIPAA PRIVACY AND SECURITY AWARENESS.
 18 members  Created in 1816, one of the oldest  Relates to criminal law, human rights, immigration law, intellectual property rights, antitrust law.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Track II: Introduction and Overview of Financial Services and Information Technology Privacy Policy: Synthesizing Financial Services Industry Privacy David.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
1 Healthcare Privacy and Security: Concepts and Challenges Dixie B. Baker, Ph.D. Chair, HIMSS Privacy and Security Advocacy Task Force.
1 of 19 Development of Industry Standards Energy Regulatory Partnership Program Abuja, Nigeria July 14-18, 2008 Ikechukwu N. Nwabueze, Ph.D. Director,
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
House Financial Institutions Committee Legislative Briefing Texas Department of Banking Testimony of: Randall S. James – Commissioner February 12, 2007.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
The U.S. Securities and Exchange Commission (SEC).
© 2008, Consumer Data Industry Association Congressional Privacy Policy Panel Stuart K. Pratt.
Lesson 9 Introduction of Consumer and Legal Awareness.
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
The Protection of Personal Information Bill 13 February
Protecting Yourself from Fraud including Identity Theft Advanced Level.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Building on Our Core Values Building on Our Core Values © 2003 by the AICPA The Sarbanes-Oxley Act.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Chapter 3: IRS and FTC Data Security Rules
Cyber Issues Facing Medical Practice Managers
Data Breach Overview Mike Schenk, VP Research and Policy Analysis
By Joseph Carnevale, CIP Partner & Director of Sales
Identity Theft Prevention Program Training
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
Getting the Green Light on the Red Flags Rule
Is someone pretending to be you?
Presentation transcript:

Targeted Data  Integrated Solutions  Modeling & Analytics Equifax intelligence ® Data Security & Privacy DMNYC Luncheon, May 11, 2006 Chris Lynde – SVP DMS Sales What You Need to Know Your Worst Nightmare Data contained in this presentation provided by FTC, DMA, Forrester, CMO Magazine and Internet Alliance

Targeted Data  Integrated Solutions  Modeling & Analytics Equifax intelligence ® A Chronology of Data Breaches  Prior to CA’s required breach notification act, which went into effect July 1, 2003, there have been public reports of 97 breaches of consumer data –Regulated financial banking records –Non-regulated customer name and address records –Pre & post graduate educational records –Children’s services records –Federal deposit insurance records –Commercial insurance records –Retail sales transaction records –Travel transaction records –Utilities, Telco, Cable records –Wire transfer records –US Department of Defense records –World Economic Forum attendee records And this is just what was reported! Slide 1

Targeted Data  Integrated Solutions  Modeling & Analytics Equifax intelligence ® Database Security Breaches Post 2/15/05 According to the Privacy Rights organizations…There have been 157 Breaches affecting nearly 55M individuals in the U.S. since the 2/15/05 watershed “best practice” announcement: from ChoicePoint that pro- actively disclosed the affected individuals, in effect adopting California’s law requiring notification on a national level.  There were over 9 million victims of identity theft last year - and the average victim spent 28 hours and $5,686 to resolve their case. (Javelin Strategy & Research, 2005)  One out of every four American families are affected by identity theft. (Fraud Resource Group 2005)  $50B+ nation-wide problem! Slide 2

Targeted Data  Integrated Solutions  Modeling & Analytics Equifax intelligence ® Recent Increase in Privacy Initiatives  Security breach continues to be the #1 Internet and Info industry issue in the United States  Media reports concerning theft of consumer data have brought consumer information privacy to the forefront of the congressional agenda  166 bills introduced in 38 states – 23 have passed data breach notification legislation.  Expect state-by-state expansion on the restrictions imposed by the California Notification Law  Expect to move downstream to unregulated data – name, address, city, state, zip  Expect more notification bills in the states – federal law is being debated by congress.  Expect enforcement of DMA’s new authentication rule adopted 2/1/2006  FTC will continue to test the boundaries of its enforcement powers in the privacy and protection arena What to expect… Slide 3

Targeted Data  Integrated Solutions  Modeling & Analytics Equifax intelligence ® The legislative Landscape  FTC reported in February 2005 that identity theft accounted for a staggering 39% of all fraud complaints nationwide  Major new consumer data security legislation is in the making  Senate legislation has already been introduced that would appropriate $60 million in funding to create a national identity theft center under the oversight of the FTC  More drastic measures are unlikely, but still on the table.  Marketers who think the new laws will affect only data brokers and criminals are sadly mistaken.  Other regulations are possible: at a recent House Committee of Financial Services hearing, lawmakers were actively contemplating expanding Gramm-Leach-Bliley to all industries that touch consumer financial information, including any firm that accepts payment by credit card.  A North Dakota law, enacted in June of 2005, states that companies that conduct business in the state must disclose the theft of any customer information —including name, address, and telephone number. Slide 4

Targeted Data  Integrated Solutions  Modeling & Analytics Equifax intelligence ®  Forrester believes that most consumer firms are operating in blissful ignorance of the laws that will soon land on their doorstep. But just as Sarbanes-Oxley rocked the world of the CFO, CMOs at consumer marketing organizations have no choice but to:  Take notice  Participate in creating federal regulation  Tighten up data security infrastructure and processes  Create notification policies  Review data sharing policies Wake up – A freight Train is Heading our Way What Proposed Data Laws Will Mean for Marketers Slide 5

Targeted Data  Integrated Solutions  Modeling & Analytics Equifax intelligence ® Costs to Companies Under Attack  It’s not just the financial implication – it’s your reputation and the industry as a whole!  A look at just a few of the recent headlines making the news $15M Record Fine for Data Breach - ChoicePoint Case Spotlighted ID Theft MasterCard: 40M Credit Card Accounts Exposed FTC settles with CardSystems over data breach – Company must adopt security measures, undergo audits LexisNexis Data Breach Bigger Than Estimated 310,000 Consumers May Be Affected Microsoft Settles FTC Charges Alleging False Security and Privacy Promises Ralph Lauren, HSBC in data breach debacle California reports massive data breach Slide 6 Paris Hilton’s cell phone hacked WANT TO STAY OUT OF THE SPOTLIGHT?

Targeted Data  Integrated Solutions  Modeling & Analytics Equifax intelligence ® Become Good Stewards of Consumer Data  Commit to and implement industry best practices –Know how your data/lists are used –Employ physical, administrative and technical safeguards –Encrypt all data transmissions and use secure physical transport –Seed all files and audit usage  Make your voices heard and support DMA lobbying efforts  Write your congressmen, senators and postal representatives – reinforce the integrity of our industry and let them know what you’re doing to protect the consumer  Understand the shifting landscape and support innovative ideas required to drive continued growth and performance  Always look after the best interest of our clients and their customers  Become good consumer advocates and champions of consumer data  Always provide consumer access to privacy policies and opt-outs What You Can Do… Slide 7

Targeted Data  Integrated Solutions  Modeling & Analytics Equifax intelligence ® Ethical Issues and the Future of our Industry  It’s up to us to re-build consumer trust –Our industry is under attack – need to unite and take a leading stance –Be proactive, not reactive –Encourage all list owners, marketers, brokers and managers to join Equifax in following industry best practices Infrastructure Security Data Encryption & Armed Delivery Identity Theft Monitoring Services Consumer Notification Services Slide 8

Targeted Data  Integrated Solutions  Modeling & Analytics Equifax intelligence ® Targeted DataIntegrated SolutionsMarketing & Analytics  Equifax Intelligence Thank You!