Protecting Personal Information Guidance for Business.

Slides:



Advertisements
Similar presentations
University of Minnesota
Advertisements

Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Springfield Technical Community College Security Awareness Training.
Gramm-Leach-Bliley Act for Financial Aid Val Meyers Associate Director Michigan State University.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Identity Theft Prevention Program Fighting Fraud at The University of Montana Red Flags Rules.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Discover Ways To Protect Yourself From Identity Theft.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
© Chery F. Kendrick & Kendrick Technical Services.
Red Flags Compliance How It Has Changed Customer Policies & Procedures Teresa Corlew, Vice President Customer Care Nashville Electric Service September.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
10 Essential Security Measures PA Turnpike Commission.
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
Protecting Sensitive Information PA Turnpike Commission.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Practical Information Management
General Awareness Training
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
FTC: Anatomy of a Data Security/Privacy Investigation and the Future of Privacy John Jay College of Criminal Justice Center for Cybercrime Studies November.
R ed F lag R ule Training for the Veterinary Industry © Chery F. Kendrick & Kendrick Technical Services.
Chapter 9-Section 1 Resolving Credit Problems. Disputing Charges—Credit Card Statement  Disputing Charges—the process of informing a credit card company.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Identity Theft Project Erin L. Caraway Jacob Locke.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Information Security Office Protecting Privacy in the New Millennium © Copyright Melissa Guenther, LLC. All rights reserved. Kelley Bogart – Information.
© Copyright 2010 Hemenway & Barnes LLP H&B
Identity Theft By: Tiffany Goode and Jessica Jackson.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Personal data protection in research projects
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade Commission,
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Security & Cyber Threats Armando D’Accordo CMIT Solutions.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Protecting Your Assets By Preventing Identity Theft
Attention Identity theft Definition
Protection of CONSUMER information
Chapter 3: IRS and FTC Data Security Rules
Protecting Personal Information Guidance for Business.
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
UCA Gramm-Leach Bliley Act (GLBA) Safeguards Rule Compliance Training Effective June 12, 2018 Adapted from materials published by the Federal Trade Commission.
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Protecting Personal Information Guidance for Business

Why is information security important to your business?  According to Information Week, the amount of data captured and stored by businesses doubles every months.  Failure to protect sensitive data can lead to identity theft or other harm to consumers — and also can harm your company. The views expressed don't reflect the official position of the FTC.

Why is information security important to your business?  Existing laws require many businesses to: ● Implement measures that are reasonable and appropriate under the circumstances to protect sensitive consumer information. ● Notify consumers if there's a data breach. ● Protected information includes, for example, Social Security numbers, account information, and information derived from credit reports.

Legal Standards  Laws governing data security: ● Federal Trade Commission Act (FTC Act) ● Fair Credit Reporting Act (FCRA) ● Gramm-Leach-Bliley Act (GLBA) ● FTC Disposal Rule ● Other federal laws (HIPAA, DPPA, FERPA) ● State laws

ftc.gov/infosecurity

Legal Standards  The FTC Act prohibits unfair or deceptive practices. To comply, you should: ● Handle consumer information in a way that's consistent with your promises. ● Avoid practices that create an unreasonable risk of harm to consumer data.

Legal Standards  The Fair Credit Reporting Act requires consumer reporting agencies to "know their customers" and use "reasonable procedures" to allow access to consumer reports only to legitimate users.

Legal Standards  The Gramm-Leach-Bliley Safeguards Rule requires "financial institutions" to provide reasonable safeguards for customer data.  CAUTION! The definition of "financial institution" is broad. ● It includes, for example, auto dealers and courier services.

Legal Standards  The Disposal Rule requires anyone who obtains a consumer report to use "reasonable" measures when disposing of it.

Law Enforcement  Information Security: Major FTC law enforcement priority.

1.Take stock. 2.Scale down. 3.Lock it. 4.Pitch it. 5.Plan ahead. From "Protecting PERSONAL INFORMATION: A Guide for Business" Five Key Principles

 Check files and computers for: ● What information you have; and ● Where it’s stored. Don’t forget portable devices and offsite locations.  Trace the flow of data from entry to disposal. At every stage, determine who has access — and who should have access. 1) Take Stock. Know what you have and who has access to it.

2) Scale down. Keep only what you need for your business and streamline storage.  Collect only what you need and keep it only for the time you need it.  Scale down what you store on devices connected to the Internet.  Slip Showing? For receipts you give to customers, properly truncate credit card number and delete the expiration date.

2)Scale down. Limit your use of Social Security numbers.  Social Security numbers can be used by identity thieves to commit fraud.  Don’t collect Social Security numbers out of habit or convenience. Only collect them when needed, such as to report wages to the government or to seek a credit report.

3) Lock it. Protect the information you keep. TRAINING & OVERSIGHT  Train your employees and oversee contractors and service providers.  Use good hiring procedures and build information security training into orientation.  Get handouts, tutorials, quizzes, and tips at

COMPUTER SECURITY 3) Lock it. Protect the information you keep.  Effective security covers data on your network and all devices, including laptops and PDAs.  Remember the basics: firewalls, strong passwords, antivirus software.  Check vendors and expert websites like for alerts and updates.  Work with your Tech Team to detect unauthorized entry into your system.

PHYSICAL SECURITY 3) Lock it. Protect the information you keep.  Lock offices, store rooms, desks and drawers and train employees to keep them that way.  Limit access to areas and databases with sensitive files.  Secure data that’s shipped or stored offsite.

4) Pitch it. Properly dispose of what you no longer need.  Shred, burn, or pulverize paper records you don’t need.  Use wipe utility programs on computers and portable storage devices.  Place shredders around the office.  If you use credit reports, you may be subject to the FTC’s Disposal Rule.

5) Plan ahead. Create a plan to respond to security incidents and be ready to help consumers.  Put together a “What if?” plan to detect and respond to a security incident.  Designate a senior staff member to coordinate your response.  Investigate right away and preserve evidence, such as computer logs.  Take steps to close off vulnerabilities, e.g., disconnect compromised computers from the Internet.  Consider whom to notify if a breach occurs.

 If sensitive personal information is compromised, consumers may be at risk of identity theft.  Plan to notify, as appropriate, law enforcement, other businesses and consumers. Remember: state law may require notice to consumers.  Visit ftc.gov/infosecurity. 5) Plan ahead. Know whom to notify and when.

 Under the FCRA, a business must: ● Provide consumers with certain information about a fraud; and ● Verify the identity of any applicants who have fraud alerts on their credit report files.  Under the FCRA, under certain conditions, a business may not: ● Sell or collect on a fraudulent debt. ● Report a fraudulent debt to the credit bureaus. Help consumers. Be ready to assist consumers who are victims of fraud.

 Give victims information about how to recover from identity theft and refer them to FTC for more help: or 877-ID-THEFT.  Give them information on the documents you will require from them to resolve fraudulent debts.  Give them closure letters absolving them of fraudulent debts once an incident is resolved. More help for consumers We also suggest that you:

For More Information  ftc.gov/infosecurity  ftc.gov/idtheft  ftc.gov/privacy  idtheft.gov