SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Not “If” but “When”
WHAT BUSINESSES SHOULD KNOW ABOUT
THE IMPACT OF IDENTITY THEFT ON
CONSUMERS
Paula Pierce
P. Pierce Law, P.C.
www.ppiercelaw.com
512-850-4808
#IDTheft
About the speaker:
Paula Pierce has been assisting identity theft victims since 2005
when President GeorgeW. Bush authorized the U.S. Department of
Justice to fund four organizations to identify strategies for helping
identity theft victims.
HOWTO DO EVERYTHINGWRONG!
A Brief History of Recent Equifax Breaches
• 2016 – Security researcher xOrz reports XSS vulnerability on Equifax’s
main website – exposing customer user names, passwords & data.
9/8/17 – it wasn’t fixed.
• 5/2016 – Information of 430,000 people stolen because of “lax”
security. Court orders Equifax to stop using SSNs/DOBs as PINs to
access PII.
• 1/2017 – PII of undisclosed number of Lifelock customers leaked by
Equifax.
. . . . . . .
• 5/2017 – Equifax reports hack of tax information of an undisclosed
number of individuals from its payroll service. Caused by the failing to
install the same security patch involved in the current breach.
• 9/2017 – Equifax reports compromise of 143,000,000 individuals’ files
including SSNs, DOBs, addresses & DL#s + theft of credit card #s of
209,000 people
• 10/2017 – Equifax adds another 2M victims to the count – 145,500,000
consumers affected. (Doesn’t include the 700k+ Canadians & Britons
whose information was also hacked.)
What Happened?
Failed Security 101: Equifax was running
outdated systems and routinely failed to install
software security patches.
Post Event Failures
• Breach discovered in July and not reported until September.
• Violation of Texas breach notification law:Tex. Bus. &
Comm. Code § 521.053(b).
• Notify persons whose information was compromised “as quickly as
possible.”
• Exception: If law enforcement asks company to delay notification.
• If individual notice is too expensive, can set up a website for
notification.
• 48 states & DC have similar breach notification laws.
. . . . . . .
• Initial consumer site didn’t work.
• Second try – offered 1 year of monitoring – if consumer
waived right to participate in class action suits and agreed
to arbitration.
• Third try – removed class action and arbitration provisions –
requires consumers to enter some of the stolen information
and doesn’t provide anything relevant in return.
• Tells everyone their information “may” have been
impacted.
Not if, but when . . .
• BJS – 17.6 millionAmericans had identities
stolen in 2014
• Up from 9 million in 2010
• FTC –Texans are disproportionately affected
About IDT victims
AND WHY DO THEY ACT CRAZY SOMETIMES?
How do I know if I’m a victim?
• Check your credit reports
• Pay attention to mail from bill collectors
• If you start receiving calls from bill collectors or companies you don’t
do business with
• Check credit card & bank statements every month
• If your bank account is suddenly overdrawn
• If you receive a letter saying a warrant is out for your arrest for a
crime you did not commit
• Fail a criminal background check
• Your license is flagged when you go to renew it
Who are victims?
• All ages; although, statistically age 25-35 are at greatest
risk due to data breach.
• All races, all incomes.
• States along drug & human trafficking routes are
disproportionately affected.
• Elderly disproportionately affected by phishing scams.
• Family violence victims also disproportionately affected.
Why do they yell at my customer
service reps?
• IDT is intimate – it’s one thing to steal your money entirely another to
steal who you are.
• Recovery is stressful. No one is helpful or cooperative.
• It’s the crime that keeps on keeping on. It’s never over.
• Victims of extensive IDT have symptoms of PTSD: sleep disturbance,
eating disorders, clinical depression.
• Marriages break up, relationships suffer, jobs lost
Recovering from ID Theft
WHAT VICTIMS ARE GOING THROUGH
15
3 Steps to Recovery
1. Stop the damage
2. Report the crime
3. Repair accounts & credit
16
Rinse and repeat!
Stop the Damage
• Change account numbers
• If check fraud, ask your bank to put you in the CANS
(Closed Account Notification System)
• Set a fraud alert by calling one of the credit bureaus
• Get a credit freeze if you are not going to use your
credit any time soon
18
Report the Crime
1. Go to www.ftc.gov/idtheft and make a report online,
print it, sign in front of a notary, make lots of copies –
this is now an IDT affidavit
2. Report to your local police – where you live NOT
where the impostor is using your identity
3. Report to other places, e.g., SSA, US Postal
Inspector, IC3, Secret Service, NOT FBI
19
Repair the Damage
If it’s not in writing, it doesn’t count!
• Do everything in writing! And always attach:
• Proof you made a police report
• Copy of your government issued ID
• Copy of the ID theft affidavit (FTC report signed in
front of a notary)
21
Who to write & what to say
• Who to write?
• Credit bureaus
• Businesses that gave credit to impostor
• Collectors who contact you
• What to say:
• Accounts were made by an impostor, demand they be closed
and that your identity be taken off of them
• Tell businesses to send you copies of account documents
• Tell credit bureaus to block impostor accounts from your credit
report
Friendly Tips
• Send correspondence with tracking – fax with confirmation
or CMRRR.
• Keep copies of everything you send and receive in a file,
scanned, in a box – just keep them!
• Keep a record of every phone call – time, date, who you
talked to, and description of the conversation.
• Take care of yourself. ID theft is an intimate crime. Don’t be
surprised if you experience emotional stress and fatigue.
Medical ID Theft/HIPAA Breach
• DON’T MENTION IDTHEFT UNTILYOU HAVEYOUR MEDICAL
RECORDS!
• Order your medical records:
• From your own primary care doctor – this is your baseline
• From places where the impostor was treated
• Compare them
• Write places where impostor was treated and ask that impostor’s
records be de-identified and marked as John/Jane Doe
Criminal ID Theft
• Go to Sheriff’s Department (Airport just south of Koenig)
• Ask for a stolen ID file
• They’ll fingerprint you and make you sign a stolen identity
affidavit
• In the mail you’ll receive a stolen identity letter and PIN
• If you are stopped, tell the officer you have a stolen identity
file and give the officer your PIN
If nothing works – be glad you live in
Texas
• Chapter 521 ofTexas Business and Commerce Code
• Application to be declared a victim of identity theft
• File application, send notice to creditors by certified
mail
• Attend a hearing, tell your story
• If court finds enough evidence, you get a court order
confirming you are a victim.
Tips for Texas Businesses
Responsibilities of a Business to Victims
•Protect customer info
•Know the law: FCRA, FDCPA, 521, HIPAA
•Have a breach notification plan
•Investigate
•Correct information sent to credit bureaus
•Cease all collection efforts against victim
Responsibility of a business after data
breach
• Check your CGL policy for cybersecurity or breach
coverage.
• Get legal help!
• Notify all customers who were affected.
• You are not required to provide credit monitoring. Most
businesses do it as a courtesy.
• Notify credit bureaus if required by law.
Online Businesses
• Tell users what information you collect and how
you’ll use it.
• Have protections so that no personal information is
collected from children.
• Tell users how you’ll protect their information.
• Get a lawyer to review your privacy policies because
these laws change rapidly.
For more information
Paula Pierce
paula@ppiercelaw.com
512-850-4808

Weitere ähnliche Inhalte

Was ist angesagt?

Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
Lisa Sosebee
 
Data theft
Data theftData theft
Data theft
Laura
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
Matt Smith
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Randall Chesnutt
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
Matt Smith
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
vcrisafulli
 

Was ist angesagt? (20)

Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Data theft
Data theftData theft
Data theft
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Advice iq safeguards against id theft
Advice iq safeguards against id theftAdvice iq safeguards against id theft
Advice iq safeguards against id theft
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
 

Ähnlich wie Not "If" but "When"

FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
tomciolkosz
 
West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updated
Adam Singer
 

Ähnlich wie Not "If" but "When" (20)

Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
The Ultimate Financial Fraud Examination & Prevention Checklist
The Ultimate Financial Fraud Examination & Prevention ChecklistThe Ultimate Financial Fraud Examination & Prevention Checklist
The Ultimate Financial Fraud Examination & Prevention Checklist
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
Police Report Vs. Incident Report
Police Report Vs. Incident ReportPolice Report Vs. Incident Report
Police Report Vs. Incident Report
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
VETLANTA Q2 Summit - June 2015
VETLANTA Q2 Summit - June 2015VETLANTA Q2 Summit - June 2015
VETLANTA Q2 Summit - June 2015
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updated
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theft
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 

Mehr von JoAnna Cheshire

Mehr von JoAnna Cheshire (20)

The Future of Work
The Future of WorkThe Future of Work
The Future of Work
 
Catching the Next Train
Catching the Next TrainCatching the Next Train
Catching the Next Train
 
The SharePoint Migration Playbook
The SharePoint Migration PlaybookThe SharePoint Migration Playbook
The SharePoint Migration Playbook
 
Introduction to SharePoint Framework
Introduction to SharePoint FrameworkIntroduction to SharePoint Framework
Introduction to SharePoint Framework
 
PowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's GuidePowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's Guide
 
Artificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs PerspectiveArtificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs Perspective
 
Modernizing Data Management
Modernizing Data Management Modernizing Data Management
Modernizing Data Management
 
Microsoft and Enterprise Search
Microsoft and Enterprise Search Microsoft and Enterprise Search
Microsoft and Enterprise Search
 
Introduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groupsIntroduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groups
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
Accelerate your business with flow
Accelerate your business with flowAccelerate your business with flow
Accelerate your business with flow
 
Building applications for your business using power apps and flow
Building applications for your business using power apps and flowBuilding applications for your business using power apps and flow
Building applications for your business using power apps and flow
 
The Decomposition Dilemma
The Decomposition DilemmaThe Decomposition Dilemma
The Decomposition Dilemma
 
Defending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about itDefending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about it
 
The New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business AdvantageThe New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business Advantage
 
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStoreHealthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
 
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
 
Define Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's BrandDefine Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's Brand
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
A UX first approach to Office 365 migrations
A UX first approach to Office 365 migrationsA UX first approach to Office 365 migrations
A UX first approach to Office 365 migrations
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Not "If" but "When"

  • 1. Not “If” but “When” WHAT BUSINESSES SHOULD KNOW ABOUT THE IMPACT OF IDENTITY THEFT ON CONSUMERS Paula Pierce P. Pierce Law, P.C. www.ppiercelaw.com 512-850-4808 #IDTheft
  • 2. About the speaker: Paula Pierce has been assisting identity theft victims since 2005 when President GeorgeW. Bush authorized the U.S. Department of Justice to fund four organizations to identify strategies for helping identity theft victims.
  • 4. A Brief History of Recent Equifax Breaches • 2016 – Security researcher xOrz reports XSS vulnerability on Equifax’s main website – exposing customer user names, passwords & data. 9/8/17 – it wasn’t fixed. • 5/2016 – Information of 430,000 people stolen because of “lax” security. Court orders Equifax to stop using SSNs/DOBs as PINs to access PII. • 1/2017 – PII of undisclosed number of Lifelock customers leaked by Equifax.
  • 5. . . . . . . . • 5/2017 – Equifax reports hack of tax information of an undisclosed number of individuals from its payroll service. Caused by the failing to install the same security patch involved in the current breach. • 9/2017 – Equifax reports compromise of 143,000,000 individuals’ files including SSNs, DOBs, addresses & DL#s + theft of credit card #s of 209,000 people • 10/2017 – Equifax adds another 2M victims to the count – 145,500,000 consumers affected. (Doesn’t include the 700k+ Canadians & Britons whose information was also hacked.)
  • 6. What Happened? Failed Security 101: Equifax was running outdated systems and routinely failed to install software security patches.
  • 7. Post Event Failures • Breach discovered in July and not reported until September. • Violation of Texas breach notification law:Tex. Bus. & Comm. Code § 521.053(b). • Notify persons whose information was compromised “as quickly as possible.” • Exception: If law enforcement asks company to delay notification. • If individual notice is too expensive, can set up a website for notification. • 48 states & DC have similar breach notification laws.
  • 8. . . . . . . . • Initial consumer site didn’t work. • Second try – offered 1 year of monitoring – if consumer waived right to participate in class action suits and agreed to arbitration. • Third try – removed class action and arbitration provisions – requires consumers to enter some of the stolen information and doesn’t provide anything relevant in return. • Tells everyone their information “may” have been impacted.
  • 9. Not if, but when . . . • BJS – 17.6 millionAmericans had identities stolen in 2014 • Up from 9 million in 2010 • FTC –Texans are disproportionately affected
  • 10.
  • 11. About IDT victims AND WHY DO THEY ACT CRAZY SOMETIMES?
  • 12. How do I know if I’m a victim? • Check your credit reports • Pay attention to mail from bill collectors • If you start receiving calls from bill collectors or companies you don’t do business with • Check credit card & bank statements every month • If your bank account is suddenly overdrawn • If you receive a letter saying a warrant is out for your arrest for a crime you did not commit • Fail a criminal background check • Your license is flagged when you go to renew it
  • 13. Who are victims? • All ages; although, statistically age 25-35 are at greatest risk due to data breach. • All races, all incomes. • States along drug & human trafficking routes are disproportionately affected. • Elderly disproportionately affected by phishing scams. • Family violence victims also disproportionately affected.
  • 14. Why do they yell at my customer service reps? • IDT is intimate – it’s one thing to steal your money entirely another to steal who you are. • Recovery is stressful. No one is helpful or cooperative. • It’s the crime that keeps on keeping on. It’s never over. • Victims of extensive IDT have symptoms of PTSD: sleep disturbance, eating disorders, clinical depression. • Marriages break up, relationships suffer, jobs lost
  • 15. Recovering from ID Theft WHAT VICTIMS ARE GOING THROUGH 15
  • 16. 3 Steps to Recovery 1. Stop the damage 2. Report the crime 3. Repair accounts & credit 16
  • 18. Stop the Damage • Change account numbers • If check fraud, ask your bank to put you in the CANS (Closed Account Notification System) • Set a fraud alert by calling one of the credit bureaus • Get a credit freeze if you are not going to use your credit any time soon 18
  • 19. Report the Crime 1. Go to www.ftc.gov/idtheft and make a report online, print it, sign in front of a notary, make lots of copies – this is now an IDT affidavit 2. Report to your local police – where you live NOT where the impostor is using your identity 3. Report to other places, e.g., SSA, US Postal Inspector, IC3, Secret Service, NOT FBI 19
  • 21. If it’s not in writing, it doesn’t count! • Do everything in writing! And always attach: • Proof you made a police report • Copy of your government issued ID • Copy of the ID theft affidavit (FTC report signed in front of a notary) 21
  • 22. Who to write & what to say • Who to write? • Credit bureaus • Businesses that gave credit to impostor • Collectors who contact you • What to say: • Accounts were made by an impostor, demand they be closed and that your identity be taken off of them • Tell businesses to send you copies of account documents • Tell credit bureaus to block impostor accounts from your credit report
  • 23. Friendly Tips • Send correspondence with tracking – fax with confirmation or CMRRR. • Keep copies of everything you send and receive in a file, scanned, in a box – just keep them! • Keep a record of every phone call – time, date, who you talked to, and description of the conversation. • Take care of yourself. ID theft is an intimate crime. Don’t be surprised if you experience emotional stress and fatigue.
  • 24. Medical ID Theft/HIPAA Breach • DON’T MENTION IDTHEFT UNTILYOU HAVEYOUR MEDICAL RECORDS! • Order your medical records: • From your own primary care doctor – this is your baseline • From places where the impostor was treated • Compare them • Write places where impostor was treated and ask that impostor’s records be de-identified and marked as John/Jane Doe
  • 25. Criminal ID Theft • Go to Sheriff’s Department (Airport just south of Koenig) • Ask for a stolen ID file • They’ll fingerprint you and make you sign a stolen identity affidavit • In the mail you’ll receive a stolen identity letter and PIN • If you are stopped, tell the officer you have a stolen identity file and give the officer your PIN
  • 26. If nothing works – be glad you live in Texas • Chapter 521 ofTexas Business and Commerce Code • Application to be declared a victim of identity theft • File application, send notice to creditors by certified mail • Attend a hearing, tell your story • If court finds enough evidence, you get a court order confirming you are a victim.
  • 27. Tips for Texas Businesses
  • 28. Responsibilities of a Business to Victims •Protect customer info •Know the law: FCRA, FDCPA, 521, HIPAA •Have a breach notification plan •Investigate •Correct information sent to credit bureaus •Cease all collection efforts against victim
  • 29. Responsibility of a business after data breach • Check your CGL policy for cybersecurity or breach coverage. • Get legal help! • Notify all customers who were affected. • You are not required to provide credit monitoring. Most businesses do it as a courtesy. • Notify credit bureaus if required by law.
  • 30. Online Businesses • Tell users what information you collect and how you’ll use it. • Have protections so that no personal information is collected from children. • Tell users how you’ll protect their information. • Get a lawyer to review your privacy policies because these laws change rapidly.
  • 31. For more information Paula Pierce paula@ppiercelaw.com 512-850-4808

Hinweis der Redaktion

  1. From Justice Department’s national drug threat assessment Note that TX is at intersection of 2 major routes Traditional IDT hotspots: Texas, Florida, Arizona