SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
Protect Your
Phone Records

Consumer Action Protect Your Phone Records
Purpose of the Training

• What private, personal information can
•
•
•

be found in your phone records
How to keep your personal information
safe so you won’t be victimized
Become familiar with laws that protect
the privacy of your phone records
What to do if your phone records are
accessed without your permission

Consumer Action Protect Your Phone Records
Objectives

• You will learn
 Why someone would try to access
your phone records
 Who would try to access your phone
records
 How predators, crooks and loved
ones may access private information
 How to protect yourself from
becoming a victim
Consumer Action Protect Your Phone Records
About Phone Records

• Phone records are an important source
of valuable information
 Someone may try to access this
information without your consent for
identity theft or other harmful purposes

• Various laws and protections are in
place to keep your phone records
private
 But you must take an active role in
protecting your personal data
Consumer Action Protect Your Phone Records
Phone Record Information

• Your landline phone records contain
 Billing address and/or home address
 Long distance or local telephone numbers
dialed from your phone
 Calls billed to a calling card or credit card
 Numbers from which collect calls were
accepted
 Dates and lengths of calls outside your
calling area.

Consumer Action Protect Your Phone Records
Phone Record Information

• Your cellular phone records contain
 The phone calls made or received by you
and other family plan members

• Your online phone account records
may contain
 Contact information you provided, such as
address, home or office phone numbers
 Bank or credit information, such as credit
or debit card numbers and bank account
numbers
Consumer Action Protect Your Phone Records
Phone Record Information

• Your phone company may also
keep
 Birthdate
 Social Security number
 All telephone and Internet services to
which you subscribe
 Information about your cell phone
that could be used to track the
location of the person who has it
Consumer Action Protect Your Phone Records
Who Wants Phone Records?

• Many people may want your phone
records including








Con artists and identity thieves
Data brokers / salespeople
Ex-spouses or former partners
Someone who wants to sue you
Stalkers
Investigators, spies, bail bondsmen
Criminals for retaliation purposes

Consumer Action Protect Your Phone Records
Uses for Your Phone Records

• How could someone use the
information from your phone records?
 Wife going through a divorce uses her
husband’s phone records to argue that he
was playing around with other women
 Jealous employee obtains a co-worker’s
phone records and finds that he frequently
calls an AIDS support group. He spreads
rumors that the co-worker has AIDS.

• Other examples?
Consumer Action Protect Your Phone Records
Access to Phone Records

• Some ways to access phone
records
 Pretexting (pretending to be the
account holder or someone else)
 Reading another person’s bills
 Accessing phone accounts online

Consumer Action Protect Your Phone Records
Pretexting

• Pretexting is using false pretenses
to obtain someone else’s personal
information
 Impersonating the victim or spouse
 Telling lies
 Conning a company employee or
other individual

Consumer Action Protect Your Phone Records
Pretexting

• Pretexters obtain your information via
 You and your neighbors, family, co-workers
• For example, “phone surveys” that ask for
information such as the family pet’s name, a
common password on accounts

 Public records
•
•
•
•

home purchases
bankruptcy
business start up
marital status

Consumer Action Protect Your Phone Records
Pretexting

• Pretexting is illegal
 There are laws in place to protect
victims of pretexting

• Exceptions
 Law enforcement
• agencies such as police or the FBI, can
lawfully obtain your phone records

 Phone companies
• turn over customer phone records if
compelled by a subpoena or a court
order
Consumer Action Protect Your Phone Records
Laws Against Pretexting

• 1999 — Gramm-Leach-Bliley Act
 Prohibits pretexting to obtain financial
records

• 2006 — Telephone Records and Privacy
Protection Act
 Makes the use of pretexting to buy, sell or
obtain phone records a federal crime

• 2007 — The Federal Communications
Commission
 Requires phone companies to use stringent
authentication measures to protect phone
records
Consumer Action Protect Your Phone Records
If Your Records Are Breached

• Phone companies are required to
notify customers
 Timing of the notification depends on
the circumstances of the breach and
the instructions of law enforcement

Consumer Action Protect Your Phone Records
Protecting Your Phone Records

• Ways to keep your phone records
private






Get an non-published number
Set up strong passwords
Limit the information you share
Inquire about information needed
Enlist family members not to divulge
information
 Keep phone bills and other paperwork
containing personal information under lock
and key
Consumer Action Protect Your Phone Records
Protecting Your Phone Records

• New FCC security measures
effective at the end of 2007
• All phone companies must
 Require passwords for account info
• Some exceptions to passwording apply

 Notification on password changes
 Customer consent before releasing
data
 Notification if confidentiality of
records is breached
Consumer Action Protect Your Phone Records
Protecting Your Phone Records

• Ask your phone company to
 Deactivate the online access feature
if you don’t manage your account
online
 If it’s possible to remove call details
from your phone bills

Consumer Action Protect Your Phone Records
Phone Company Responsibility

• Phone companies must
 Keep records of whether customers
grant permission to use their account
information for marketing
 Keep records of all breaches in
which customer information is
disclosed to third parties
 Train employees in the appropriate
use of customer information
continued…
Consumer Action Protect Your Phone Records
Phone Company Responsibility
…continued

 Uphold marketing privacy standards
 Release annual certificates that its
procedures comply with FCC rules
 Inform the FCC of any legal actions
taken against data brokers
 Provide a summary of the complaints
about unauthorized disclosure of
customer information
Consumer Action Protect Your Phone Records
CPNI

• Customer proprietary network
information includes





services you subscribe to
whom you call
when you call
how long your calls are, etc

• Generally, the use of CPNI without
customer permission is prohibited
 opt out / opt in
Consumer Action Protect Your Phone Records
CPNI, Sales and Marketing

• Your phone company can use your
information without your permission to
 Offer you enhanced services of the same
type you subscribe to
 Use customer information for creating
directories.

• Phone companies are prohibited from
using CPNI to lure back customers who
have switched to another service
provider

Consumer Action Protect Your Phone Records
If You Become a Victim

• If you believe your phone records
have been stolen
 Report to your phone company
 Close account and open new account
 Set up passwords to prevent
unauthorized access
 File an incident report with police

Consumer Action Protect Your Phone Records
Protecting Your Phone Records

• Complain to the FCC
 Email
• fccinfo@fcc.gov

 Online
• www.fcc.gov/cgb/complaints.html

 Mail
• FCC - Consumer Complaints
• 445 12th Street SW
• Washington, DC 20554
Consumer Action Protect Your Phone Records
For More Information Contact

• Complain to the Federal Trade
Commission (FTC)
 Phone
• 877-382-4357

 Web site
• www.ftc.gov

 Mail
• Consumer Response Center
• 600 Pennsylvania Ave., NW
• Washington, DC 20580

Consumer Action Protect Your Phone Records
Protect Your Phone Records is a joint
educational partnership brought to you by
Consumer Action, the National Consumers
League (NCL) and Verizon
For more information:
Consumer Action: 415-777-9648
Web site: www.consumer-action.org
Email: outreach@consumer-action.org

Consumer Action Protect Your Phone Records

Weitere ähnliche Inhalte

Ă„hnlich wie Protect Phone Records

Social media (american marketing association november 15, 2011)(wo images)
Social media (american marketing association november 15, 2011)(wo images) Social media (american marketing association november 15, 2011)(wo images)
Social media (american marketing association november 15, 2011)(wo images) jhreescnm
 
Cutting Edge TCPA Solutions
Cutting Edge TCPA SolutionsCutting Edge TCPA Solutions
Cutting Edge TCPA SolutionsRyan Thurman
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptxraminder12_kaur
 
TCPA Compliance Webinar Series | Connect First
TCPA Compliance Webinar Series | Connect FirstTCPA Compliance Webinar Series | Connect First
TCPA Compliance Webinar Series | Connect FirstConnect First
 
Reasons for joining a reverse phone lookup site
Reasons for joining a reverse phone lookup siteReasons for joining a reverse phone lookup site
Reasons for joining a reverse phone lookup siteuphonic
 
Stolen and Lost Wireless Devices
Stolen and Lost Wireless DevicesStolen and Lost Wireless Devices
Stolen and Lost Wireless Devices- Mark - Fullbright
 
Telephone Consumer Protection Act (“TCPA”) The Basics, Recent Regulatory Cha...
Telephone Consumer Protection Act (“TCPA”)The Basics, Recent Regulatory Cha...Telephone Consumer Protection Act (“TCPA”)The Basics, Recent Regulatory Cha...
Telephone Consumer Protection Act (“TCPA”) The Basics, Recent Regulatory Cha...Kaufman & Canoles
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.jatharrison
 
Supplies telemarketingfraudv2
Supplies telemarketingfraudv2Supplies telemarketingfraudv2
Supplies telemarketingfraudv2Auza khan
 
Telephone Communication.pptx
Telephone Communication.pptxTelephone Communication.pptx
Telephone Communication.pptxFahadFazal7
 
Legislation That Internet Marketers Need to Know
Legislation That Internet Marketers Need to KnowLegislation That Internet Marketers Need to Know
Legislation That Internet Marketers Need to KnowKaley Perkins, MA
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Quarles & Brady
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinWhitmeyerTuffin
 
pp_101_notes_eng.pdf
pp_101_notes_eng.pdfpp_101_notes_eng.pdf
pp_101_notes_eng.pdfAbel Mutize
 

Ă„hnlich wie Protect Phone Records (20)

Social media (american marketing association november 15, 2011)(wo images)
Social media (american marketing association november 15, 2011)(wo images) Social media (american marketing association november 15, 2011)(wo images)
Social media (american marketing association november 15, 2011)(wo images)
 
Cutting Edge TCPA Solutions
Cutting Edge TCPA SolutionsCutting Edge TCPA Solutions
Cutting Edge TCPA Solutions
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
TCPA Compliance Webinar Series | Connect First
TCPA Compliance Webinar Series | Connect FirstTCPA Compliance Webinar Series | Connect First
TCPA Compliance Webinar Series | Connect First
 
Reasons for joining a reverse phone lookup site
Reasons for joining a reverse phone lookup siteReasons for joining a reverse phone lookup site
Reasons for joining a reverse phone lookup site
 
Stolen and Lost Wireless Devices
Stolen and Lost Wireless DevicesStolen and Lost Wireless Devices
Stolen and Lost Wireless Devices
 
Telephone Consumer Protection Act (“TCPA”) The Basics, Recent Regulatory Cha...
Telephone Consumer Protection Act (“TCPA”)The Basics, Recent Regulatory Cha...Telephone Consumer Protection Act (“TCPA”)The Basics, Recent Regulatory Cha...
Telephone Consumer Protection Act (“TCPA”) The Basics, Recent Regulatory Cha...
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
 
Trade secret litigation
Trade secret litigationTrade secret litigation
Trade secret litigation
 
Supplies telemarketingfraudv2
Supplies telemarketingfraudv2Supplies telemarketingfraudv2
Supplies telemarketingfraudv2
 
Telephone Communication.pptx
Telephone Communication.pptxTelephone Communication.pptx
Telephone Communication.pptx
 
Legislation That Internet Marketers Need to Know
Legislation That Internet Marketers Need to KnowLegislation That Internet Marketers Need to Know
Legislation That Internet Marketers Need to Know
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
 
Staying Secure Electronically
Staying Secure ElectronicallyStaying Secure Electronically
Staying Secure Electronically
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
pp_101_notes_eng.pdf
pp_101_notes_eng.pdfpp_101_notes_eng.pdf
pp_101_notes_eng.pdf
 
Trade Secrets Law
Trade Secrets LawTrade Secrets Law
Trade Secrets Law
 
COPPA for Newbies
COPPA for NewbiesCOPPA for Newbies
COPPA for Newbies
 

Mehr von - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report- Mark - Fullbright
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

KĂĽrzlich hochgeladen

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

KĂĽrzlich hochgeladen (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Protect Phone Records

  • 1. Protect Your Phone Records Consumer Action Protect Your Phone Records
  • 2. Purpose of the Training • What private, personal information can • • • be found in your phone records How to keep your personal information safe so you won’t be victimized Become familiar with laws that protect the privacy of your phone records What to do if your phone records are accessed without your permission Consumer Action Protect Your Phone Records
  • 3. Objectives • You will learn  Why someone would try to access your phone records  Who would try to access your phone records  How predators, crooks and loved ones may access private information  How to protect yourself from becoming a victim Consumer Action Protect Your Phone Records
  • 4. About Phone Records • Phone records are an important source of valuable information  Someone may try to access this information without your consent for identity theft or other harmful purposes • Various laws and protections are in place to keep your phone records private  But you must take an active role in protecting your personal data Consumer Action Protect Your Phone Records
  • 5. Phone Record Information • Your landline phone records contain  Billing address and/or home address  Long distance or local telephone numbers dialed from your phone  Calls billed to a calling card or credit card  Numbers from which collect calls were accepted  Dates and lengths of calls outside your calling area. Consumer Action Protect Your Phone Records
  • 6. Phone Record Information • Your cellular phone records contain  The phone calls made or received by you and other family plan members • Your online phone account records may contain  Contact information you provided, such as address, home or office phone numbers  Bank or credit information, such as credit or debit card numbers and bank account numbers Consumer Action Protect Your Phone Records
  • 7. Phone Record Information • Your phone company may also keep  Birthdate  Social Security number  All telephone and Internet services to which you subscribe  Information about your cell phone that could be used to track the location of the person who has it Consumer Action Protect Your Phone Records
  • 8. Who Wants Phone Records? • Many people may want your phone records including        Con artists and identity thieves Data brokers / salespeople Ex-spouses or former partners Someone who wants to sue you Stalkers Investigators, spies, bail bondsmen Criminals for retaliation purposes Consumer Action Protect Your Phone Records
  • 9. Uses for Your Phone Records • How could someone use the information from your phone records?  Wife going through a divorce uses her husband’s phone records to argue that he was playing around with other women  Jealous employee obtains a co-worker’s phone records and finds that he frequently calls an AIDS support group. He spreads rumors that the co-worker has AIDS. • Other examples? Consumer Action Protect Your Phone Records
  • 10. Access to Phone Records • Some ways to access phone records  Pretexting (pretending to be the account holder or someone else)  Reading another person’s bills  Accessing phone accounts online Consumer Action Protect Your Phone Records
  • 11. Pretexting • Pretexting is using false pretenses to obtain someone else’s personal information  Impersonating the victim or spouse  Telling lies  Conning a company employee or other individual Consumer Action Protect Your Phone Records
  • 12. Pretexting • Pretexters obtain your information via  You and your neighbors, family, co-workers • For example, “phone surveys” that ask for information such as the family pet’s name, a common password on accounts  Public records • • • • home purchases bankruptcy business start up marital status Consumer Action Protect Your Phone Records
  • 13. Pretexting • Pretexting is illegal  There are laws in place to protect victims of pretexting • Exceptions  Law enforcement • agencies such as police or the FBI, can lawfully obtain your phone records  Phone companies • turn over customer phone records if compelled by a subpoena or a court order Consumer Action Protect Your Phone Records
  • 14. Laws Against Pretexting • 1999 — Gramm-Leach-Bliley Act  Prohibits pretexting to obtain financial records • 2006 — Telephone Records and Privacy Protection Act  Makes the use of pretexting to buy, sell or obtain phone records a federal crime • 2007 — The Federal Communications Commission  Requires phone companies to use stringent authentication measures to protect phone records Consumer Action Protect Your Phone Records
  • 15. If Your Records Are Breached • Phone companies are required to notify customers  Timing of the notification depends on the circumstances of the breach and the instructions of law enforcement Consumer Action Protect Your Phone Records
  • 16. Protecting Your Phone Records • Ways to keep your phone records private      Get an non-published number Set up strong passwords Limit the information you share Inquire about information needed Enlist family members not to divulge information  Keep phone bills and other paperwork containing personal information under lock and key Consumer Action Protect Your Phone Records
  • 17. Protecting Your Phone Records • New FCC security measures effective at the end of 2007 • All phone companies must  Require passwords for account info • Some exceptions to passwording apply  Notification on password changes  Customer consent before releasing data  Notification if confidentiality of records is breached Consumer Action Protect Your Phone Records
  • 18. Protecting Your Phone Records • Ask your phone company to  Deactivate the online access feature if you don’t manage your account online  If it’s possible to remove call details from your phone bills Consumer Action Protect Your Phone Records
  • 19. Phone Company Responsibility • Phone companies must  Keep records of whether customers grant permission to use their account information for marketing  Keep records of all breaches in which customer information is disclosed to third parties  Train employees in the appropriate use of customer information continued… Consumer Action Protect Your Phone Records
  • 20. Phone Company Responsibility …continued  Uphold marketing privacy standards  Release annual certificates that its procedures comply with FCC rules  Inform the FCC of any legal actions taken against data brokers  Provide a summary of the complaints about unauthorized disclosure of customer information Consumer Action Protect Your Phone Records
  • 21. CPNI • Customer proprietary network information includes     services you subscribe to whom you call when you call how long your calls are, etc • Generally, the use of CPNI without customer permission is prohibited  opt out / opt in Consumer Action Protect Your Phone Records
  • 22. CPNI, Sales and Marketing • Your phone company can use your information without your permission to  Offer you enhanced services of the same type you subscribe to  Use customer information for creating directories. • Phone companies are prohibited from using CPNI to lure back customers who have switched to another service provider Consumer Action Protect Your Phone Records
  • 23. If You Become a Victim • If you believe your phone records have been stolen  Report to your phone company  Close account and open new account  Set up passwords to prevent unauthorized access  File an incident report with police Consumer Action Protect Your Phone Records
  • 24. Protecting Your Phone Records • Complain to the FCC  Email • fccinfo@fcc.gov  Online • www.fcc.gov/cgb/complaints.html  Mail • FCC - Consumer Complaints • 445 12th Street SW • Washington, DC 20554 Consumer Action Protect Your Phone Records
  • 25. For More Information Contact • Complain to the Federal Trade Commission (FTC)  Phone • 877-382-4357  Web site • www.ftc.gov  Mail • Consumer Response Center • 600 Pennsylvania Ave., NW • Washington, DC 20580 Consumer Action Protect Your Phone Records
  • 26. Protect Your Phone Records is a joint educational partnership brought to you by Consumer Action, the National Consumers League (NCL) and Verizon For more information: Consumer Action: 415-777-9648 Web site: www.consumer-action.org Email: outreach@consumer-action.org Consumer Action Protect Your Phone Records