Track II: Introduction and Overview of Financial Services and Information Technology Privacy Policy: Synthesizing Financial Services Industry Privacy David.

Slides:



Advertisements
Similar presentations
The Future of Internet Banking By Michael Skiscim.
Advertisements

Why the Financial Privacy Law is Better than People Think Professor Peter P. Swire Ohio State University University of Minnesota Symposium February 9,
The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [1] What is privacy? [2] What law regulates privacy?
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Red Flag Rules: What they are? & What you need to do
My Name is Todd Davis My Social Security # is
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
© 2004 Property Casualty Insurers Association of America The Alphabet of Federal Legislation Kathleen Jensen Property and Casualty Insurers Association.
The New Rules of F&I with Peter Jones The New Rules of F&I What are the Rules? Red Flag Rule Graham / Leach / Bliley Act Privacy Notice Safeguard Rule.
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Cleanup © 2012.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
Local Commerce in Social Networks in Mexico and its Regulations.
About ONLINE Industry leader for more than 50 years Headquartered in North Carolina Originally a small merchant credit bureau In 1997, focus shifted from.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
Information Security Policies Larry Conrad September 29, 2009.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Chapter Six Market Structures: Why market competition affects you every time you shop!
In the Belly of the Breach: What Every In-House Counsel Needs to Know about Data Breach Response ACC International Legal Affairs Committee Legal Quick.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
Chapter 15 Conflicts of Interest in the Financial Industry.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Becoming A Customer SICOR Securities, Inc.. How? In order to establish the client (customer) relationship between yourself, as a registered representative.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Wireless Access Code: July 21, 2002  General medical ID theft education is lacking – over 1.4 million fraud victims in  Fraud can.
The New Science of Food: Facing Up to Our Biotechnology Choices Prepared by Mark Edelman, Iowa State University David Patton, Ohio State University A Farm.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Panel Discussion on Identity Theft and PII Facilitated by Barry West, CIO Department of Commerce –Panelists: Kenneth Mortensen, DOJ Marc Groman, FTC Hillary.
FIRMA April 2010 DATA BREACHES & PRIVACY Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
© 2008, Consumer Data Industry Association Congressional Privacy Policy Panel Stuart K. Pratt.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
RISK ASSESSMENTS. WHY PERFORM A RISK ASSESSMENT  Fulfills Requirements  Empowers management to make informed strategic decisions  Identifies areas.
An overview of OECD Strategies for Improving Regulatory Performance Regulatory Reform and Building Governance Capacities – New Delhi 3 December 2009 Mr.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Lowell Randel Global Cold Chain Alliance/ International Institute of Ammonia Refrigeration.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
Conflicts of Interest in the Financial Industry
Consumer Economics Chapter 11
Bob Siegel President Privacy Ref, Inc.
Cyber Issues Facing Medical Practice Managers
Who Uses Encryption? Module 7 Section 3.
DATA BREACHES & PRIVACY Christine M
Data Breach Overview Mike Schenk, VP Research and Policy Analysis
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
Modern Economies In this lesson, students will identify characteristics of modern economies. Students will be able to define and/or identify the following.
Protecting Yourself from Fraud including Identity Theft
Getting the Green Light on the Red Flags Rule
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

Track II: Introduction and Overview of Financial Services and Information Technology Privacy Policy: Synthesizing Financial Services Industry Privacy David Medine

WilmerHale Time for Financial Services Privacy 2.0?  Next year marks end of the first decade following enactment of the Gramm Leach Bliley Financial Privacy Act  This decade has been marked by:  Lengthy privacy policies that few read and even fewer exercise the choices offered  An increasing number of reported security breaches – Which cause great concern but often no direct harm

WilmerHale Time for Financial Services Privacy 2.0?  The first decade has been marked by:  Heightened concerns about identity theft – New accounts fraudulently opened by ID thieves – Existing accounts hijacked – Medical identity theft

WilmerHale Time for Financial Services Privacy 2.0?  This might be a good time to:  Assess what is working – and what is not  Think about ways to prevent problems rather than deal with their aftermath  Here are some thoughts and proposals regarding:  Privacy policies  ID theft  Security breaches

WilmerHale Privacy Policies  Undecipherable privacy notices:  Rarely read  Almost never used by consumers as the basis for choosing or rejecting a financial institution  Few consumers exercise opt out or opt in rights – Burden is on consumer to exercise these choices  Pending solution – Federal agencies’ proposed model privacy notices Simpler, easier to read disclosures

WilmerHale Privacy Policies  Will the proposed model privacy notices work?  Some consumers use food labels to decide what to buy – Are consumers more likely to use these simpler privacy notices as a basis of choosing financial institutions? – In a supermarket, it is easy to compare food offerings were are next to each other – Many consumers get a privacy notice after they have already finished shopping Should notices be made available earlier? Online?

WilmerHale Privacy Policies  Model notices will not make the opt out process easier for consumers  Is choice working effectively when only 3-5% of consumers ever opt out? – Is the cost worth it? – Would more consumers opt out if the process was easier? – Or, do consumers see the benefits of information use and sharing? – Should these questions be answered before requiring an opt out process?

WilmerHale Privacy Policies  Alternatives:  Is there an effective “market” for privacy? – Is there evidence there is transparency and efficient choice?  If there is no effective market, should the government step in and impose norms instead of requiring notice and choice?  Or, does the system work because choices exist -- even if they are rarely exercised?

WilmerHale ID Theft  ID Theft  A very real problem affecting millions of Americans – Can be a nightmare to undo  Huge resources are being devoted to: – Red Flags Rule compliance – Flagging credit files – Freezing credit files

WilmerHale ID Theft  ID Theft can take place so easily because:  We “are” a few bits of information in the eyes of credit grantors – Name, DOB, SSN  If we moved to more reliable means of identification and authentication, depending on the circumstances: – There would be far less need to guard and restrict access to certain types of personal information As it would be of little or no value to potential ID thieves

WilmerHale ID Theft  Alternatives include:  Biometrics  Digital Signatures  Two-Factor Authentication  ?? New Developments  Establish a government/industry project to solve this identification/authentication problem in the next 2-3 years?  Offer a $50 million prize to develop a better system?

WilmerHale Security Breaches  Reactions now include:  Notification of affected individuals  Offers of credit monitoring services  Problem:  Difficult for notice recipients to evaluate how to respond when few details are provided: – What information was compromised? – Who is suspected of taking it?

WilmerHale Security Breaches  There is typically:  a low incidence of resulting ID theft  great concern and some efforts made on the belief ID theft is likely to occur  Reactions:  Consumers who receive notice often cancel accounts and refuse to do business with company providing notice – Yet, that company may have had strong better than average protections in place, but a bad employee – No tools are provided to potential future customers to evaluate company’s security measures

WilmerHale Security Breaches  A similar approach in the environmental area has proven very effective in reducing environmental hazards  Government enforcement cannot monitor every potential polluter  Notice requirements make this far less necessary  Professor Deirdre Mulligan, Boalt Hall Law School, has suggested environmental-law type disclosures in this context.

WilmerHale Security Breaches  In order to create incentives to adopt security measures and increase the impact of market forces:  Require public posting of breaches, along with company explanations  Notifications to regulators

WilmerHale Security Breaches  Potential customers could then evaluate a company’s security incidents before deciding to do business  Companies could offer explanations about what happened or what they have done to prevent future incidents

WilmerHale David Medine (202)