SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Business Profit Center – Protecting   PII
Affirmative Defense Response System SM Why should all businesses, corporations, schools, financial institutions and hospitals be concerned about Identity Theft, FACTA, HIPAA, and GLB? Answer: Liability, both civil and criminal.
Drivers  License Medical Financial Identity Theft is not just about Credit Cards! ID Theft is an international crime and access to an attorney may be critical  Social  Security Character/  Criminal Five Common Types of  Identity Theft
What is Identity Theft? Your Name 1000’s of aggregators Fingerprints and DNA FBI, State, and Local DBS Insurance Claims C.L.U.E. DBS, etc Military Record DOD DBS Criminal History NCIC DBS Real Estate Deeds Clerks of Court DBS Legal History State and Federal Court DBS Credit History Credit Repositories’ DBS Birth Certificate Choice Point DBS, State, etc Phone Number and Tracking Info 1000’s of aggregators Social Security Number SSA DBS Address 1000’s of DBS Why You Are At Risk Driver’s License # & Record  DMV DBS Medical Records MIB DBS, etc Car Registration & Info DMV, Local Treasurer, On Star, etc The Databased You
Take Charge: Fighting Back Against Identity Theft Order the Federal Trade Commission’s free report! Phone:  877.IDTHEFT Web:   http://www.consumer.gov/idtheft When you read this, it will become crystal clear why it is good for the company and the employee to have an ID Theft service that offers legal access, monitoring, and restoration versus resolution or reimbursement.
The Cost to Businesses ,[object Object],[object Object],[object Object],*CIO Magazine,  The Coming Pandemic , Michael Freidenberg, May 15 th , 2006
[object Object],[object Object],[object Object],[object Object],Important Legislation Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Fair and Accurate Credit  Transactions Act (FACTA) Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
HIPAA Security Rule ,[object Object],[object Object],[object Object],[object Object],[object Object],Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Gramm, Leach, Bliley  Safeguard Rule Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
Gramm, Leach, Bliley  Safeguard Rule Any Organization Includes: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],*The FTC categorizes an impressive list of businesses as FI and these so-called “non-bank” businesses comprise a huge array of firms that may be unaware they are subject to GLB. Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
[object Object],[object Object],[object Object],[object Object],[object Object],Safeguard and Security Rules   Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
Appointment of Security  Compliance Officer   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sensitive  and Non Public  Information Policy  (First of four pages)
ABA Journal March 2006
- “Stolen Lives”, ABA Journal, March 2006
[object Object],[object Object],[object Object],[object Object]
Restoration Services The Best Answer … Monitoring Services Life Events Legal Plan &  Legal Shield
The Best Answer Pre-Paid Legal Services, Inc. is the only company with a suite of services: Life Events Legal Plan, Legal Shield and the Identity Theft Shield which provide help in every phase of  Identity Theft  – before, during, and after the crime occurs. The Affirmative Defense Response System SM  was developed to provide businesses and their employees a way to minimize their risk in regard to Identity Theft.
[object Object],[object Object],Why and How We Help You… * Subject To Terms And Conditions
[object Object],Why and How We Help You… The plan has Full Restoration*, which means the majority of the time in restoring an employee’s identity is covered by the membership and not done on company time and/or company expense.  Also, use of our Life Events Legal Plan provides help* that address related issues. * Subject To Terms And Conditions
[object Object],If a number of your employees get notified of improper usage of their identities, this may act as an early warning system to your company of a possible internal breach. Why and How We Help You…
[object Object],Why and How We Help You… “ One solution that provides an affirmative defense against potential fines, fees, and lawsuits is to offer some sort of identity theft protection as an employee benefit.  An employer can choose whether or not to pay for this benefit .   The key is to make the protection available, and have a mandatory employee meeting on identity theft  and the protection you are making available, similar to what most employers do for health insurance …  Greg Roderick, CEO of Frontier Management, says that his employees "feel like the company's valuing them more, and it's very personal."  Business and Legal Reports, January 19, 2006
 
[object Object],Why and How We Help You… ,[object Object],[object Object],To potentially protect yourself, you could have all employees sign this document… Be Sure To Check With Your Attorney Before Using A Form Such As This Use of Confidential Information by Employee
 
[object Object],According to Betsy Broder of the FTC,  “We will act against businesses that fail to protect their data …  She understands that most small businesses cannot be expected to hire a full time privacy specialists but adds that  all businesses must be able to show they have a security plan in place .  “We’re not looking for a perfect system .. But we need to see that you’ve taken reasonable steps to protect your customers’ information”. ABA Journal, March 2006 – “Stolen Lives” Employee Confidentiality  Document Be Sure To Check With Your Attorney Before Using A Form Such As This
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Corporate Board Member  July/August 2006
Disclaimer ,[object Object],[object Object],Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
Left in the trash were documents including customers' names, addresses, Social Security numbers, credit card numbers, prescriptions and doctors   The Texas Attorney's General has been busy chasing violators of identity theft protections lately
Business Profit Center – Protecting   PII
Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Legal plans represent winning proposition
Legal plans represent winning propositionLegal plans represent winning proposition
Legal plans represent winning proposition
Michael Schechter
 
ids_comparisons_head_to_head
ids_comparisons_head_to_headids_comparisons_head_to_head
ids_comparisons_head_to_head
Terry Kohler
 
The Red Flags Rule
The Red Flags RuleThe Red Flags Rule
The Red Flags Rule
mlhommedieu
 

Was ist angesagt? (18)

Key Insights from the 2019 Legal Trends Report
Key Insights from the 2019 Legal Trends ReportKey Insights from the 2019 Legal Trends Report
Key Insights from the 2019 Legal Trends Report
 
How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?
 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
 
Canada Expanded Group Plan
Canada Expanded Group PlanCanada Expanded Group Plan
Canada Expanded Group Plan
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
Investigating Rapid Programs In Legal Background Check
Investigating Rapid Programs In Legal Background CheckInvestigating Rapid Programs In Legal Background Check
Investigating Rapid Programs In Legal Background Check
 
ABOUT US
ABOUT USABOUT US
ABOUT US
 
Legal plans represent winning proposition
Legal plans represent winning propositionLegal plans represent winning proposition
Legal plans represent winning proposition
 
Legal Plans Represent Winning Proposition for Employers & Employees
Legal Plans Represent Winning Proposition for Employers & EmployeesLegal Plans Represent Winning Proposition for Employers & Employees
Legal Plans Represent Winning Proposition for Employers & Employees
 
Checking Out Simple Legal Background Check Programs
Checking Out Simple Legal Background Check ProgramsChecking Out Simple Legal Background Check Programs
Checking Out Simple Legal Background Check Programs
 
ids_comparisons_head_to_head
ids_comparisons_head_to_headids_comparisons_head_to_head
ids_comparisons_head_to_head
 
16grp Nols
16grp Nols16grp Nols
16grp Nols
 
IDShield_Comparisons
IDShield_ComparisonsIDShield_Comparisons
IDShield_Comparisons
 
26exp Group
26exp Group26exp Group
26exp Group
 
The Red Flags Rule
The Red Flags RuleThe Red Flags Rule
The Red Flags Rule
 
slideshow
slideshowslideshow
slideshow
 
Aopha Slides(8 21)
Aopha Slides(8 21)Aopha Slides(8 21)
Aopha Slides(8 21)
 
Data Protection & Privacy in Malaysian Total Hospital Information System
Data Protection & Privacy in Malaysian Total Hospital Information SystemData Protection & Privacy in Malaysian Total Hospital Information System
Data Protection & Privacy in Malaysian Total Hospital Information System
 

Ähnlich wie Adrs2

Ähnlich wie Adrs2 (20)

I D Theft Employee Presentation2
I D Theft Employee Presentation2I D Theft Employee Presentation2
I D Theft Employee Presentation2
 
Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse System
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
 
Businesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And FinesBusinesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And Fines
 
IDT 2015
IDT 2015IDT 2015
IDT 2015
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
Small Biz Presentation 08 09
Small Biz Presentation 08 09Small Biz Presentation 08 09
Small Biz Presentation 08 09
 
Harvard Risk Management Corporation: 2014 Benefits Presentation
Harvard Risk Management Corporation: 2014 Benefits PresentationHarvard Risk Management Corporation: 2014 Benefits Presentation
Harvard Risk Management Corporation: 2014 Benefits Presentation
 
Employer 0409
Employer 0409Employer 0409
Employer 0409
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Bullet Proof Your Business - SME Asset Protection
Bullet Proof Your Business - SME Asset ProtectionBullet Proof Your Business - SME Asset Protection
Bullet Proof Your Business - SME Asset Protection
 
Legal Documents Needed to Apply Business Insurance Coverage
Legal Documents Needed to Apply Business Insurance CoverageLegal Documents Needed to Apply Business Insurance Coverage
Legal Documents Needed to Apply Business Insurance Coverage
 
Selecting Successful Solutions Of Legal Background Check
Selecting Successful Solutions Of Legal Background CheckSelecting Successful Solutions Of Legal Background Check
Selecting Successful Solutions Of Legal Background Check
 
Idt.John F
Idt.John FIdt.John F
Idt.John F
 
Employee law module
Employee law moduleEmployee law module
Employee law module
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
 

Adrs2

  • 1. Business Profit Center – Protecting PII
  • 2. Affirmative Defense Response System SM Why should all businesses, corporations, schools, financial institutions and hospitals be concerned about Identity Theft, FACTA, HIPAA, and GLB? Answer: Liability, both civil and criminal.
  • 3. Drivers License Medical Financial Identity Theft is not just about Credit Cards! ID Theft is an international crime and access to an attorney may be critical Social Security Character/ Criminal Five Common Types of Identity Theft
  • 4. What is Identity Theft? Your Name 1000’s of aggregators Fingerprints and DNA FBI, State, and Local DBS Insurance Claims C.L.U.E. DBS, etc Military Record DOD DBS Criminal History NCIC DBS Real Estate Deeds Clerks of Court DBS Legal History State and Federal Court DBS Credit History Credit Repositories’ DBS Birth Certificate Choice Point DBS, State, etc Phone Number and Tracking Info 1000’s of aggregators Social Security Number SSA DBS Address 1000’s of DBS Why You Are At Risk Driver’s License # & Record DMV DBS Medical Records MIB DBS, etc Car Registration & Info DMV, Local Treasurer, On Star, etc The Databased You
  • 5. Take Charge: Fighting Back Against Identity Theft Order the Federal Trade Commission’s free report! Phone: 877.IDTHEFT Web: http://www.consumer.gov/idtheft When you read this, it will become crystal clear why it is good for the company and the employee to have an ID Theft service that offers legal access, monitoring, and restoration versus resolution or reimbursement.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Sensitive and Non Public Information Policy (First of four pages)
  • 16. - “Stolen Lives”, ABA Journal, March 2006
  • 17.
  • 18. Restoration Services The Best Answer … Monitoring Services Life Events Legal Plan & Legal Shield
  • 19. The Best Answer Pre-Paid Legal Services, Inc. is the only company with a suite of services: Life Events Legal Plan, Legal Shield and the Identity Theft Shield which provide help in every phase of Identity Theft – before, during, and after the crime occurs. The Affirmative Defense Response System SM was developed to provide businesses and their employees a way to minimize their risk in regard to Identity Theft.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.  
  • 25.
  • 26.  
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Corporate Board Member July/August 2006
  • 32.
  • 33. Left in the trash were documents including customers' names, addresses, Social Security numbers, credit card numbers, prescriptions and doctors The Texas Attorney's General has been busy chasing violators of identity theft protections lately
  • 34. Business Profit Center – Protecting PII
  • 35.
  • 36.

Hinweis der Redaktion

  1. This disclaimer is given to protect the instructor and will last about 2 minutes .