NYSAIS | Webinar | May 11, 2011 Electronic Signatures and Red Flag Rules Presented by: Donald J. Mosher Partner Schulte Roth & Zabel LLP 212.756.2187

Slides:



Advertisements
Similar presentations
Part IV Statutes of Frauds. R2 § 110. Classes of Contracts Covered (1) The following classes of contracts [may not be enforced] unless there is a written.
Advertisements

Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
ISA Implementation Support Module Prepared by IAASB Staff October 2010 Written Representations.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
The Advisers Act Custody Rule
Unlawful Internet Gambling Enforcement Act Final Rule Joseph Baressi June 3, 2009.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
© 2003 Rule 1.9. Duties to Former Clients (a) A lawyer who has formerly represented a client in a matter shall not thereafter represent another person.
18- 1 © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 18 Integrated Audits of Internal Control (For Public Companies Under Sarbanes-Oxley.
1 IT Security-related Legislation Judy Borreson Caruso CUMREC 2004 May 18, 2004 Copyright Judy Borreson Caruso, This work is the intellectual property.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
ISA Implementation Support Module Prepared by IAASB Staff October 2010 Materiality, Misstatements and Reporting – Part III.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
The E-Signatures Act and eConsent Karin Fuog Nelnet Policy Services November 6, 2006.
ESIGN 101 Ken Moyle Margo Tank David Whitaker Chief Legal Officer
International Auditing and Assurance Standards Board Communicating Deficiencies in Internal Control to Those Charged with Governance and Management ISA.
Four tips to mitigate Mobile fraud in the future.
Legislation, Regulation, Guidelines
Office of the General Counsel1 COPYRIGHT and the TEACH Act The Technology, Education, and Copyright Harmonization Act Copyright © 2007 Villanova University.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Circulation of authentic instruments under Regulation 650/2012 speaker – Ivaylo Ivanov – Bulgarian Notary Chamber.
COPYRIGHT GRANTS AND THE E-SIGN ACT Jeanne M. Hamburg Norris, McLaughlin & Marcus, P.A. 875 Third Avenue New York, New York (212)
Compliance and Regulation for Mobile Solutions Amanda J. Smith Messick & Lauer, P.C. May 16, 2013.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
FAIR CREDIT REPORTING ACT.  Serves the following principal purposes:  To regulate the consumer-reporting industry.  To prohibit unfair actions from.
2015 ANNUAL TRAINING By: Denise Goff
HIPAA PRIVACY AND SECURITY AWARENESS.
PwC Internal Control Reports: Facts, Myths and Best Practices FIRMA National Risk Management Training Conference – San Francisco, CA Wednesday March 31,
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
International Auditing and Assurance Standards Board Communication with Those Charged with Governance ISA Implementation Support Module Prepared by IAASB.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Online banking security best practices Access via ‘transaction devices’
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Final UNDERSTANDING CONFIDENTIALITY Training Overview by Jolynn Rogers.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Proposal Insert Subtitle Here Strictly Private and Confidential Draft December 8, 2014 Risk Management guidance box Guidance when using Smart Transaction.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
© Grant Thornton LLP. All rights reserved Meeting with Management and Those Charged with Governance Communications Related to the Audit of Delphi.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
& UETAESIGN COMPLIANCE. CHANGING LANDSCAPE As contract management transitions into a paperless world, documents must remain compliant with government.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Open your browser on your cell phone
HIPAA CONFIDENTIALITY
Red Flags Rule An Introduction County College of Morris
Current Privacy Issues That May Affect Your Credit Union
Legislation, Regulation, Guidelines
Identity Theft Prevention Program Training
FERPA For New Faculty Lawrence F. Glick Sr. Associate General Counsel
The Health Insurance Portability and Accountability Act
ACI – 17th National Forum on Prepaid Card Compliance
Getting the Green Light on the Red Flags Rule
Presentation transcript:

NYSAIS | Webinar | May 11, 2011 Electronic Signatures and Red Flag Rules Presented by: Donald J. Mosher Partner Schulte Roth & Zabel LLP Jessica Sklute Special Counsel Schulte Roth & Zabel LLP

Electronic Signatures and Red Flag Rules | 1 Disclaimer This information and any presentation accompanying it (the "Content") has been prepared by Schulte Roth & Zabel LLP (“SRZ”) for general informational purposes only. It is not intended as and should not be regarded or relied upon as legal advice or opinion, or as a substitute for the advice of counsel. You should not rely on, take any action or fail to take any action based upon the Content. As between SRZ and you, SRZ at all times owns and retains all right, title and interest in and to the Content. You may only use and copy the Content, or portions of the Content, for your personal, non- commercial use, provided that you place all copyright and any other notices applicable to such Content in a form and place that you believe complies with the requirements of the United States' Copyright and all other applicable law. Except as granted in the foregoing limited license with respect to the Content, you may not otherwise use, make available or disclose the Content, or portions of the Content, or mention SRZ in connection with the Content, or portions of the Content, in any review, report, public announcement, transmission, presentation, distribution, republication or other similar communication, whether in whole or in part, without the express prior written consent of SRZ in each instance. This information or your use or reliance upon the Content does not establish a lawyer-client relationship between you and SRZ. If you would like more information or specific advice of matters of interest to you please contact us directly. © 2011 Schulte Roth & Zabel LLP. All Rights Reserved.

Electronic Signatures and Red Flag Rules | 2 Overview Electronic Signatures –E-Sign Act and New York’s Electronic Signatures and Records Act Requirements Practical Considerations Red Flags Rule –Background and Scope –Requirements –Practice Points

Electronic Signatures and Red Flag Rules | 3 E-Sign Act - Generally Key Provisions –an electronic signature or record may not be denied legal effect solely because it is in electronic format –electronic records “Electronic Signature” –(1) sound, symbol or process, (2) attached to or logically associated with an electronic record, and (3) made with the intent to sign the electronic record –Examples “In writing” –If information is required to be “in writing,” then consumer protection provisions apply

Electronic Signatures and Red Flag Rules | 4 E-Sign Act – Consumer Protection Provisions Consumer protection provisions include: –consent; statement of hardware and software requirements –right to receive non-electronic form, scope of consent, ability to withdraw consent (and consequences), how to update contact information, how to receive paper copy –demonstrate access to electronic records

Electronic Signatures and Red Flag Rules | 5 E-Sign Act – Practical Considerations Applicability –Online student enrollment, financial information, permission slips –Payment Transactions Additional considerations, e.g., include ACH Rules and “similarly authenticated” standard Service Providers –Products and services being used –Representations

Electronic Signatures and Red Flag Rules | 6 New York’s Electronic Signatures and Records Act (ESRA) ESRA –validity of electronic signatures and records –“electronic signature” E-Sign and Preemption –E-Sign versus ESRA –not settled Practical Consideration –whether E-Sign’s consumer protection provisions apply

Electronic Signatures and Red Flag Rules | 7 Red Flags Rule - Scope Background Scope –“financial institutions” and “creditors” that maintain “covered accounts” –Applicability to schools FTC’s FAQs Red Flag Program Clarification Act of 2010 Enforcement –compliance risk

Electronic Signatures and Red Flag Rules | 8 Red Flags Rule - Requirements Identity Theft Prevention Program –written and board-approved –detect, prevent, mitigate identity theft –Program requirements Identify Red Flags Develop Policies and Procedures to detect Red Flags Prevent and mitigate identity theft update program periodically –Implementation of program, training employees, oversight of service providers

Electronic Signatures and Red Flag Rules | 9 Red Flags Rule – Practical Considerations Do-It-Yourself Prevention Program (for low risk organizations) –Evaluate whether organization is at low risk We know parents, students, employees personally –Designing Program Identify red flags – notice from customer Detect red flags – whose attention? Respond to red flags – confirm claim Administering Program – Who approved program? Who will administer program? –Training –Service Providers

Electronic Signatures and Red Flag Rules | 10 THANK YOU! Questions and Answers