I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.

Slides:



Advertisements
Similar presentations
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
Advertisements

HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
Protecting Personal Information Guidance for Business.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
A Summary of CS for House Bill 65 (Jud) – A Presentation to the HCCA Alaska Local Annual Conference Joan Wilson Asst Attorney General State of Alaska
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Presented By Drexel and FMFCU.
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
Consumer Privacy & Protection Joanna Acocella May 22, 2007.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
SC Identity Theft Act and Red Flag Rules Stephanie O’Cain, CPA Municipal Association of SC October 6, 2009.
Identity Theft & Data Security Concerns Are You Meeting Your Obligations to Protect Customer Information? Finance & Administration Roundtable February.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up © 2009.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
An Act Relative to Security Freezes and Notification of Data Breaches Chapter 82 of the Acts of 2007 Massachusetts Digital Government Summit Securing Private.
1 Information and Systems Security/Compliance Security Day The Information and Systems Security/Compliance Program Dave Kovarik.
What You Need to Know Customer Service 1 08/09/2012.
Employment Screening: CORI and Private Background Checks Presented by the Massachusetts Law Reform Institute 99 Chauncy St., Suite 500, Boston, MA
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Clean Up © 2011.
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Florida Information Protection Act of 2014 (FIPA).
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Identity Theft Project Erin L. Caraway Jacob Locke.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
© Copyright 2010 Hemenway & Barnes LLP H&B
Protecting Yourself from Fraud including Identity Theft Advanced Level.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Presented By Plano Police Department Crime Prevention Unit.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Chapter 3 What You Need to Know about Your Credit Report Identity Theft.
1 Identity Theft Prevention and the Red Flag Rules.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Jeff loses his identity! Lesson 5: Identity Theft.
Status of identity and privacy related AZ Legislative bills April 20, 2006 Mike Keeling ATIC, Chair.
Identity Theft How bad people get good credit. Lindsey Bertugli.
What You Need to Know about Your Credit Report
Protection of CONSUMER information
What you need to know about your credit report
Florida Information Protection Act of 2014 (FIPA)
Florida Information Protection Act of 2014 (FIPA)
When you get caught for Identity Theft
Protecting Your Credit
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law

Found in Alaska Statutes at AS Purpose is to provide notice of security breaches involving personal information, encourage businesses and government to stop using SSN’s, and provides other measures to help prevent identity theft. Purpose is to provide notice of security breaches involving personal information, encourage businesses and government to stop using SSN’s, and provides other measures to help prevent identity theft.

What is Identity Theft? Not Credit Card Fraud Not Credit Card Fraud Prosecuted criminally under Alaska Statute as “Criminal Impersonation.” Prosecuted criminally under Alaska Statute as “Criminal Impersonation.” Essentially involves someone pretending to be you and using your credit to open accounts. Essentially involves someone pretending to be you and using your credit to open accounts. Difficult to undo. Difficult to undo.

Main Requirements of the new Law: Notify consumers if there is unauthorized access to personal information. Notify consumers if there is unauthorized access to personal information. Restriction on use, request, collection, disclosure, sale/lease/loan of SSN’s. Restriction on use, request, collection, disclosure, sale/lease/loan of SSN’s. Allows consumers to place a security freeze on your credit report. Allows consumers to place a security freeze on your credit report. Allows consumers to petition the court for a declaration of factual innocence if you are the victim of identity theft. Allows consumers to petition the court for a declaration of factual innocence if you are the victim of identity theft. Requires disposal of personal information when no longer needed. Requires disposal of personal information when no longer needed.

Breach Notification Breach means unauthorized access of personal information Breach means unauthorized access of personal information Personal Information means last name + first name or initial AND one of the following: Personal Information means last name + first name or initial AND one of the following: –SSN –Drivers license# or State I.D# –Account #, Credit card# or Debit Card#, unless the account can only be accessed with a PIN. If a PIN is required, then the PIN must also have been accessed –Passwords, PIN’s, or other access codes for financial accounts.

After notice is given, no further requirement. The statute does not require a business or government agency to take any measures to protect personal information. Only requirement is to give notice if a breach occurs. The statute does not require a business or government agency to take any measures to protect personal information. Only requirement is to give notice if a breach occurs.

Exemptions If, after investigation and written notice to AG, you determine there is not a reasonable likelihood of harm to the consumer, then don’t need to give notice. Must document this determination in writing and keep for 5 years. If, after investigation and written notice to AG, you determine there is not a reasonable likelihood of harm to the consumer, then don’t need to give notice. Must document this determination in writing and keep for 5 years. Can also delay notice if law enforcement tells you not to give notice. Can also delay notice if law enforcement tells you not to give notice.

If notice is required, and not given: Penalties: $500 for each person who is not notified, capped at $50,000 Penalties: $500 for each person who is not notified, capped at $50,000 Damages: Actual economic harm only (probably attorneys fees and costs too) Damages: Actual economic harm only (probably attorneys fees and costs too)

What should you do if you get a notice that your personal information has been compromised? Get copies of your three credit reports at Get copies of your three credit reports at Monitor your accounts – close accounts that have been compromised (or you don’t recognize) Monitor your accounts – close accounts that have been compromised (or you don’t recognize) Consider a fraud alert on your credit reports Consider a fraud alert on your credit reports Consider a security freeze Consider a security freeze Monitoring services may help Monitoring services may help Get educated – go to and review I.D. Theft information Get educated – go to and review I.D. Theft informationwww.ftc.gov

Security Freeze Allows you to place a security freeze on your credit report. Allows you to place a security freeze on your credit report. Will lock everyone out of your credit file, including yourself. Will lock everyone out of your credit file, including yourself. Will not prevent you from using existing credit cards. Will not prevent you from using existing credit cards. Must place freeze at each of the three credit reporting bureaus: TransUnion, Equifax, Experian. Must place freeze at each of the three credit reporting bureaus: TransUnion, Equifax, Experian. Can only charge you $5 to place a freeze, and $2 to access your file once a freeze is in place. Can only charge you $5 to place a freeze, and $2 to access your file once a freeze is in place. Be cautious. Very severe measure for most people. Be cautious. Very severe measure for most people.

SSN’s Main rule – can’t use, request, collect, disclose, sell, lease, loan. Main rule – can’t use, request, collect, disclose, sell, lease, loan. Each of these is treated slightly differently. Each of these is treated slightly differently.

Use of SSN Can’t: Can’t: –Intentionally communicate or make an SSN available to the public. –Print a SSN on a card required for the person to access products or services. –Require a person to transmit a SSN over the internet unless it is a secure connection or is encrypted. –Require a SSN to access a website unless a password or PIN is also required. –Print a SSN on material that is mailed. Exceptions: If you are in government and (1) authorized by law to do any of the above, or (2) necessary to perform your duties as provided by law.

Request and Collection of SSN Can’t request or collect a SSN unless: Can’t request or collect a SSN unless: –Authorized by law. –In government and (1) authorized by law, or (2) necessary to perform your duties as provided by law. –Regulated by Gramm-Leach-Bliley Act or Fair Credit Reporting Act. –Background check. –Fraud prevention. –Medical treatment. –Law enforcement or other government purpose. –Individual’s employment. –Age verification. –For identity verification if the request/collection has no independent economic value and is incidental to a larger transaction. –If you are an insurer regulated by AS 21. –If you are a hospital corporation regulated by AS 21.87

Sale, Lease, Loan, Trade, or Rental of SSN’s Can’t do it, unless: Can’t do it, unless: –Authorized by law. –Regulated by Gramm-Leach-Bliley Act or Fair Credit Reporting Act. –Part of a credit report requested by the individual and the individual provided the SSN as part of the request. Knowing violation of this section is a class A misdemeanor.

Disclosure of a SSN Can’t disclose a SSN to a third party unless: Can’t disclose a SSN to a third party unless: –Authorized by law. –In government and (1) authorized by law, or (2) necessary to perform your duties as provided by law. –Regulated by Gramm-Leach-Bliley Act or Fair Credit Reporting Act. –Part of a credit report requested by the individual and the individual provided the SSN as part of the request. –Background check. –Fraud prevention. –Medical treatment. –Law enforcement or other government purpose. –Individual’s employment. –Identity verification

Penalties and Damages for Violating SSN Provisions Up to $3,000 maximum penalty for a “knowing violation.” Up to $3,000 maximum penalty for a “knowing violation.” Damages - Actual economic harm, court costs, attorneys fees. Damages - Actual economic harm, court costs, attorneys fees.

Disposal of Records Containing Personal Information “Personal Information” for purposes of disposal is broader that for a security breach notification. Includes account numbers w/o names. “Personal Information” for purposes of disposal is broader that for a security breach notification. Includes account numbers w/o names. Statute requires that you take “reasonable measures to protect against unauthorized disclosure” when disposing of records. Statute requires that you take “reasonable measures to protect against unauthorized disclosure” when disposing of records. To comply with this, you can hire a third party that is in the business of record destruction, then once you relinquish control, you are off the hook To comply with this, you can hire a third party that is in the business of record destruction, then once you relinquish control, you are off the hook Must also have written policies and procedures for adequate destruction of records that are “consistent with” the statute. This means your policy should require burning, pulverizing, shredding, erasing, etc. all personal information so it cannot be read or reconstructed. Must also have written policies and procedures for adequate destruction of records that are “consistent with” the statute. This means your policy should require burning, pulverizing, shredding, erasing, etc. all personal information so it cannot be read or reconstructed.

Factual Declaration of Innocence After Identity Theft Victims of I.D. theft can petition the Alaska Superior Court for a determination that the victim is factually innocent of a crime if: Victims of I.D. theft can petition the Alaska Superior Court for a determination that the victim is factually innocent of a crime if: –The perpetrator was arrested, cited, or convicted of the crime; and –A criminal complaint was filed against the perpetrator; and –The victim’s identity was mistakenly associated with a record of conviction for a crime.