Protecting Your Organization Identity Theft and Data Breach.

Slides:



Advertisements
Similar presentations
Compliance with Federal Trade Commission’s “Red Flag Rule”
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Red Flag Rules: What they are? & What you need to do
1 Experian Data Breach Resolution 101 Confidential & Proprietary Experian Data Breach Solution.
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Social media threats. Warning! May contain mild peril.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Data Classification & Privacy Inventory Workshop
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
© Chery F. Kendrick & Kendrick Technical Services.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
2015 ANNUAL TRAINING By: Denise Goff
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
New EU General Data Protection Regulation Conference 2016 Managing a Data Breach Prevention-Detection-Mitigation By Gerard Joyce Dun Laoghaire Feb 24 th.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Data Security Survival Skills for 21 st Century Evaluators Teresa Doksum & Sean Owen October 17, 2013.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
TYLER GROUP
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
Combating Identity Fraud In A Virtual World
Identity Theft and Fraud
Protecting Your Identity:
Information Security Awareness
Tax Identity Theft Presenter Date
When you get caught for Identity Theft
Cybersecurity Awareness
Information Security Session October 24, 2005
Cyber Issues Facing Medical Practice Managers
Protecting Your Credit
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
Company Name | Phone Number | Website | Address
Protecting Yourself from Fraud including Identity Theft
Sam elkholy Director, systems engineering
Presentation transcript:

Protecting Your Organization Identity Theft and Data Breach

What is business identity theft?

Consequences Financial loss Damaged credit Damaged name/reputation Closure of business

Vulnerabilities Phishing & Spoofing –employees –customers Internet profiling –state filing –website –social media –credit report Account hijacking –Social media –financial

Warning Signs Statement discrepancy Notifications Collection calls Customer complaints (unknown)

Reducing the Risk Monitoring –State filing –Financial –Credit report –IP –Google alerts Online accounts –Financial –Social media

Laws Florida HB 157 –Business identity theft a crime –Restoration rights –Strengthen charges –False public record = criminal charge –Medical ID theft = felony

What is a data breach?

Consequences Customer churn Fines and penalties Class action lawsuit Tarnished reputation

Vulnerabilities Employees Partners Clients/Customers Technology

Warning Signs Malware Client notification Theft Hijacked

Reducing the Risk Risk assessment –Data matrix –Data life cycle –Laws & compliance Policies & Procedures Employee Training Repeat

Review Business Identity Theft –HB 157 –Monitor –Employee training Data Breach –Employees weakest link –Risk assessment –Policies & procedures –Employee training –Continuous

Resources Kerskie Group, Inc (239) ** me to request a copy of the data privacy steps Hodges University (new) –Identity Theft Research & Education Center