SlideShare a Scribd company logo
Not “If” but “When”
WHAT BUSINESSES SHOULD KNOW ABOUT
THE IMPACT OF IDENTITY THEFT ON
CONSUMERS
Paula Pierce
P. Pierce Law, P.C.
www.ppiercelaw.com
512-850-4808
#IDTheft
About the speaker:
Paula Pierce has been assisting identity theft victims since 2005
when President GeorgeW. Bush authorized the U.S. Department of
Justice to fund four organizations to identify strategies for helping
identity theft victims.
HOWTO DO EVERYTHINGWRONG!
A Brief History of Recent Equifax Breaches
• 2016 – Security researcher xOrz reports XSS vulnerability on Equifax’s
main website – exposing customer user names, passwords & data.
9/8/17 – it wasn’t fixed.
• 5/2016 – Information of 430,000 people stolen because of “lax”
security. Court orders Equifax to stop using SSNs/DOBs as PINs to
access PII.
• 1/2017 – PII of undisclosed number of Lifelock customers leaked by
Equifax.
. . . . . . .
• 5/2017 – Equifax reports hack of tax information of an undisclosed
number of individuals from its payroll service. Caused by the failing to
install the same security patch involved in the current breach.
• 9/2017 – Equifax reports compromise of 143,000,000 individuals’ files
including SSNs, DOBs, addresses & DL#s + theft of credit card #s of
209,000 people
• 10/2017 – Equifax adds another 2M victims to the count – 145,500,000
consumers affected. (Doesn’t include the 700k+ Canadians & Britons
whose information was also hacked.)
What Happened?
Failed Security 101: Equifax was running
outdated systems and routinely failed to install
software security patches.
Post Event Failures
• Breach discovered in July and not reported until September.
• Violation of Texas breach notification law:Tex. Bus. &
Comm. Code § 521.053(b).
• Notify persons whose information was compromised “as quickly as
possible.”
• Exception: If law enforcement asks company to delay notification.
• If individual notice is too expensive, can set up a website for
notification.
• 48 states & DC have similar breach notification laws.
. . . . . . .
• Initial consumer site didn’t work.
• Second try – offered 1 year of monitoring – if consumer
waived right to participate in class action suits and agreed
to arbitration.
• Third try – removed class action and arbitration provisions –
requires consumers to enter some of the stolen information
and doesn’t provide anything relevant in return.
• Tells everyone their information “may” have been
impacted.
Not if, but when . . .
• BJS – 17.6 millionAmericans had identities
stolen in 2014
• Up from 9 million in 2010
• FTC –Texans are disproportionately affected
Not "If" but "When"
About IDT victims
AND WHY DO THEY ACT CRAZY SOMETIMES?
How do I know if I’m a victim?
• Check your credit reports
• Pay attention to mail from bill collectors
• If you start receiving calls from bill collectors or companies you don’t
do business with
• Check credit card & bank statements every month
• If your bank account is suddenly overdrawn
• If you receive a letter saying a warrant is out for your arrest for a
crime you did not commit
• Fail a criminal background check
• Your license is flagged when you go to renew it
Who are victims?
• All ages; although, statistically age 25-35 are at greatest
risk due to data breach.
• All races, all incomes.
• States along drug & human trafficking routes are
disproportionately affected.
• Elderly disproportionately affected by phishing scams.
• Family violence victims also disproportionately affected.
Why do they yell at my customer
service reps?
• IDT is intimate – it’s one thing to steal your money entirely another to
steal who you are.
• Recovery is stressful. No one is helpful or cooperative.
• It’s the crime that keeps on keeping on. It’s never over.
• Victims of extensive IDT have symptoms of PTSD: sleep disturbance,
eating disorders, clinical depression.
• Marriages break up, relationships suffer, jobs lost
Recovering from ID Theft
WHAT VICTIMS ARE GOING THROUGH
15
3 Steps to Recovery
1. Stop the damage
2. Report the crime
3. Repair accounts & credit
16
Rinse and repeat!
Stop the Damage
• Change account numbers
• If check fraud, ask your bank to put you in the CANS
(Closed Account Notification System)
• Set a fraud alert by calling one of the credit bureaus
• Get a credit freeze if you are not going to use your
credit any time soon
18
Report the Crime
1. Go to www.ftc.gov/idtheft and make a report online,
print it, sign in front of a notary, make lots of copies –
this is now an IDT affidavit
2. Report to your local police – where you live NOT
where the impostor is using your identity
3. Report to other places, e.g., SSA, US Postal
Inspector, IC3, Secret Service, NOT FBI
19
Repair the Damage
If it’s not in writing, it doesn’t count!
• Do everything in writing! And always attach:
• Proof you made a police report
• Copy of your government issued ID
• Copy of the ID theft affidavit (FTC report signed in
front of a notary)
21
Who to write & what to say
• Who to write?
• Credit bureaus
• Businesses that gave credit to impostor
• Collectors who contact you
• What to say:
• Accounts were made by an impostor, demand they be closed
and that your identity be taken off of them
• Tell businesses to send you copies of account documents
• Tell credit bureaus to block impostor accounts from your credit
report
Friendly Tips
• Send correspondence with tracking – fax with confirmation
or CMRRR.
• Keep copies of everything you send and receive in a file,
scanned, in a box – just keep them!
• Keep a record of every phone call – time, date, who you
talked to, and description of the conversation.
• Take care of yourself. ID theft is an intimate crime. Don’t be
surprised if you experience emotional stress and fatigue.
Medical ID Theft/HIPAA Breach
• DON’T MENTION IDTHEFT UNTILYOU HAVEYOUR MEDICAL
RECORDS!
• Order your medical records:
• From your own primary care doctor – this is your baseline
• From places where the impostor was treated
• Compare them
• Write places where impostor was treated and ask that impostor’s
records be de-identified and marked as John/Jane Doe
Criminal ID Theft
• Go to Sheriff’s Department (Airport just south of Koenig)
• Ask for a stolen ID file
• They’ll fingerprint you and make you sign a stolen identity
affidavit
• In the mail you’ll receive a stolen identity letter and PIN
• If you are stopped, tell the officer you have a stolen identity
file and give the officer your PIN
If nothing works – be glad you live in
Texas
• Chapter 521 ofTexas Business and Commerce Code
• Application to be declared a victim of identity theft
• File application, send notice to creditors by certified
mail
• Attend a hearing, tell your story
• If court finds enough evidence, you get a court order
confirming you are a victim.
Tips for Texas Businesses
Responsibilities of a Business to Victims
•Protect customer info
•Know the law: FCRA, FDCPA, 521, HIPAA
•Have a breach notification plan
•Investigate
•Correct information sent to credit bureaus
•Cease all collection efforts against victim
Responsibility of a business after data
breach
• Check your CGL policy for cybersecurity or breach
coverage.
• Get legal help!
• Notify all customers who were affected.
• You are not required to provide credit monitoring. Most
businesses do it as a courtesy.
• Notify credit bureaus if required by law.
Online Businesses
• Tell users what information you collect and how
you’ll use it.
• Have protections so that no personal information is
collected from children.
• Tell users how you’ll protect their information.
• Get a lawyer to review your privacy policies because
these laws change rapidly.
For more information
Paula Pierce
paula@ppiercelaw.com
512-850-4808

More Related Content

PPT
Identity theft
PDF
Identity Theft Checklist
PPTX
Identity Theft Presentation
PPTX
Identity theft ppt
PPT
Identity Theft: How to Avoid It
PPTX
Identity Theft: Fallout, Investigation, and Prevention
PPTX
Social networking and identity theft
PPT
Indentify Theft Slide Show
Identity theft
Identity Theft Checklist
Identity Theft Presentation
Identity theft ppt
Identity Theft: How to Avoid It
Identity Theft: Fallout, Investigation, and Prevention
Social networking and identity theft
Indentify Theft Slide Show

What's hot (20)

PDF
Identity Theft: The Other You
PPT
Identity theft power_point
PPT
Identity Theft: How to Reduce Your Risk
PPT
Id Theft Presentation
PPTX
How to Prevent Identity Theft and Fraud
PPTX
Data theft
PPT
Identity Theft nigerian fraud cyberbullying
PDF
How to Protect Yourself From Identity Theft
PPTX
Identity Theft and How to Prevent Them in the Digital Age
KEY
Identity theft
PDF
Information Compromise and the Risk of Identity Theft Guidance for your Business
PPT
Identity Theft Presentation
PDF
Identity Theft ppt
PPT
Identity Theft nigerian fraud cross border fraud
PPTX
Consumer Protection: Identity Theft
PPTX
ASIS Phoenix February Presentation
PDF
Identity Theft Awareness 101 - Basics
PDF
Advice iq safeguards against id theft
PDF
7 Tips For Preventing Identity Theft
PDF
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Identity Theft: The Other You
Identity theft power_point
Identity Theft: How to Reduce Your Risk
Id Theft Presentation
How to Prevent Identity Theft and Fraud
Data theft
Identity Theft nigerian fraud cyberbullying
How to Protect Yourself From Identity Theft
Identity Theft and How to Prevent Them in the Digital Age
Identity theft
Information Compromise and the Risk of Identity Theft Guidance for your Business
Identity Theft Presentation
Identity Theft ppt
Identity Theft nigerian fraud cross border fraud
Consumer Protection: Identity Theft
ASIS Phoenix February Presentation
Identity Theft Awareness 101 - Basics
Advice iq safeguards against id theft
7 Tips For Preventing Identity Theft
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Ad

Similar to Not "If" but "When" (20)

PDF
IdentIty Theft - ConsumerCents
PPTX
Identity Theft.pptx
PPTX
Senior Audience Presentation
PPT
RDrew Identity Theft -- What to Do
PPT
Identity Theft Prevention
PDF
Protect Your Identity
PPT
Identity theft- Horowitz Law
PDF
Taking Charge: What to Do If Your Identity Is Stolen
PDF
1. cyber crime series - identity theft
PDF
Identity theft fraud laws how the legal system can protect you
PPT
Identity Theft It's Devasting Impact
PPT
How To Protect Yourself From Identity Theft
PDF
DONCEAP - May - About Identity Theft
PPT
Ppl World Atl June 2007 Training
PPTX
How to protect yourself from identity theft
PDF
Identity Theft
PPTX
Identity Theft Prevention
PDF
PPTX
PPT
Risk Managers Presentation
IdentIty Theft - ConsumerCents
Identity Theft.pptx
Senior Audience Presentation
RDrew Identity Theft -- What to Do
Identity Theft Prevention
Protect Your Identity
Identity theft- Horowitz Law
Taking Charge: What to Do If Your Identity Is Stolen
1. cyber crime series - identity theft
Identity theft fraud laws how the legal system can protect you
Identity Theft It's Devasting Impact
How To Protect Yourself From Identity Theft
DONCEAP - May - About Identity Theft
Ppl World Atl June 2007 Training
How to protect yourself from identity theft
Identity Theft
Identity Theft Prevention
Risk Managers Presentation
Ad

More from JoAnna Cheshire (20)

PDF
The Future of Work
PDF
Catching the Next Train
PPTX
The SharePoint Migration Playbook
PDF
Introduction to SharePoint Framework
PPTX
PowerShell + SharePoint Online - An Admin's Guide
PDF
Artificial Intelligence & Machine Learning - A CIOs Perspective
PDF
Modernizing Data Management
PPTX
Microsoft and Enterprise Search
PPTX
Introduction to Microsoft Teams and Office 365 groups
PDF
Cybersecurity crisis management a prep guide
PPTX
Accelerate your business with flow
PPTX
Building applications for your business using power apps and flow
PPTX
The Decomposition Dilemma
PDF
Defending against Ransomware and what you can do about it
PDF
The New Convergence of Data; the Next Strategic Business Advantage
PDF
Healthcare - An Identity Thief's SuperStore
PDF
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
PPT
Define Yourself! Crafting a Wonder Woman's Brand
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
A UX first approach to Office 365 migrations
The Future of Work
Catching the Next Train
The SharePoint Migration Playbook
Introduction to SharePoint Framework
PowerShell + SharePoint Online - An Admin's Guide
Artificial Intelligence & Machine Learning - A CIOs Perspective
Modernizing Data Management
Microsoft and Enterprise Search
Introduction to Microsoft Teams and Office 365 groups
Cybersecurity crisis management a prep guide
Accelerate your business with flow
Building applications for your business using power apps and flow
The Decomposition Dilemma
Defending against Ransomware and what you can do about it
The New Convergence of Data; the Next Strategic Business Advantage
Healthcare - An Identity Thief's SuperStore
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Define Yourself! Crafting a Wonder Woman's Brand
Today's Cyber Challenges: Methodology to Secure Your Business
A UX first approach to Office 365 migrations

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Cloud computing and distributed systems.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation theory and applications.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Weekly Chronicles - August'25 Week I
MIND Revenue Release Quarter 2 2025 Press Release
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Review of recent advances in non-invasive hemoglobin estimation
Building Integrated photovoltaic BIPV_UPV.pdf
Cloud computing and distributed systems.
Digital-Transformation-Roadmap-for-Companies.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
sap open course for s4hana steps from ECC to s4
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
Encapsulation theory and applications.pdf

Not "If" but "When"

  • 1. Not “If” but “When” WHAT BUSINESSES SHOULD KNOW ABOUT THE IMPACT OF IDENTITY THEFT ON CONSUMERS Paula Pierce P. Pierce Law, P.C. www.ppiercelaw.com 512-850-4808 #IDTheft
  • 2. About the speaker: Paula Pierce has been assisting identity theft victims since 2005 when President GeorgeW. Bush authorized the U.S. Department of Justice to fund four organizations to identify strategies for helping identity theft victims.
  • 4. A Brief History of Recent Equifax Breaches • 2016 – Security researcher xOrz reports XSS vulnerability on Equifax’s main website – exposing customer user names, passwords & data. 9/8/17 – it wasn’t fixed. • 5/2016 – Information of 430,000 people stolen because of “lax” security. Court orders Equifax to stop using SSNs/DOBs as PINs to access PII. • 1/2017 – PII of undisclosed number of Lifelock customers leaked by Equifax.
  • 5. . . . . . . . • 5/2017 – Equifax reports hack of tax information of an undisclosed number of individuals from its payroll service. Caused by the failing to install the same security patch involved in the current breach. • 9/2017 – Equifax reports compromise of 143,000,000 individuals’ files including SSNs, DOBs, addresses & DL#s + theft of credit card #s of 209,000 people • 10/2017 – Equifax adds another 2M victims to the count – 145,500,000 consumers affected. (Doesn’t include the 700k+ Canadians & Britons whose information was also hacked.)
  • 6. What Happened? Failed Security 101: Equifax was running outdated systems and routinely failed to install software security patches.
  • 7. Post Event Failures • Breach discovered in July and not reported until September. • Violation of Texas breach notification law:Tex. Bus. & Comm. Code § 521.053(b). • Notify persons whose information was compromised “as quickly as possible.” • Exception: If law enforcement asks company to delay notification. • If individual notice is too expensive, can set up a website for notification. • 48 states & DC have similar breach notification laws.
  • 8. . . . . . . . • Initial consumer site didn’t work. • Second try – offered 1 year of monitoring – if consumer waived right to participate in class action suits and agreed to arbitration. • Third try – removed class action and arbitration provisions – requires consumers to enter some of the stolen information and doesn’t provide anything relevant in return. • Tells everyone their information “may” have been impacted.
  • 9. Not if, but when . . . • BJS – 17.6 millionAmericans had identities stolen in 2014 • Up from 9 million in 2010 • FTC –Texans are disproportionately affected
  • 11. About IDT victims AND WHY DO THEY ACT CRAZY SOMETIMES?
  • 12. How do I know if I’m a victim? • Check your credit reports • Pay attention to mail from bill collectors • If you start receiving calls from bill collectors or companies you don’t do business with • Check credit card & bank statements every month • If your bank account is suddenly overdrawn • If you receive a letter saying a warrant is out for your arrest for a crime you did not commit • Fail a criminal background check • Your license is flagged when you go to renew it
  • 13. Who are victims? • All ages; although, statistically age 25-35 are at greatest risk due to data breach. • All races, all incomes. • States along drug & human trafficking routes are disproportionately affected. • Elderly disproportionately affected by phishing scams. • Family violence victims also disproportionately affected.
  • 14. Why do they yell at my customer service reps? • IDT is intimate – it’s one thing to steal your money entirely another to steal who you are. • Recovery is stressful. No one is helpful or cooperative. • It’s the crime that keeps on keeping on. It’s never over. • Victims of extensive IDT have symptoms of PTSD: sleep disturbance, eating disorders, clinical depression. • Marriages break up, relationships suffer, jobs lost
  • 15. Recovering from ID Theft WHAT VICTIMS ARE GOING THROUGH 15
  • 16. 3 Steps to Recovery 1. Stop the damage 2. Report the crime 3. Repair accounts & credit 16
  • 18. Stop the Damage • Change account numbers • If check fraud, ask your bank to put you in the CANS (Closed Account Notification System) • Set a fraud alert by calling one of the credit bureaus • Get a credit freeze if you are not going to use your credit any time soon 18
  • 19. Report the Crime 1. Go to www.ftc.gov/idtheft and make a report online, print it, sign in front of a notary, make lots of copies – this is now an IDT affidavit 2. Report to your local police – where you live NOT where the impostor is using your identity 3. Report to other places, e.g., SSA, US Postal Inspector, IC3, Secret Service, NOT FBI 19
  • 21. If it’s not in writing, it doesn’t count! • Do everything in writing! And always attach: • Proof you made a police report • Copy of your government issued ID • Copy of the ID theft affidavit (FTC report signed in front of a notary) 21
  • 22. Who to write & what to say • Who to write? • Credit bureaus • Businesses that gave credit to impostor • Collectors who contact you • What to say: • Accounts were made by an impostor, demand they be closed and that your identity be taken off of them • Tell businesses to send you copies of account documents • Tell credit bureaus to block impostor accounts from your credit report
  • 23. Friendly Tips • Send correspondence with tracking – fax with confirmation or CMRRR. • Keep copies of everything you send and receive in a file, scanned, in a box – just keep them! • Keep a record of every phone call – time, date, who you talked to, and description of the conversation. • Take care of yourself. ID theft is an intimate crime. Don’t be surprised if you experience emotional stress and fatigue.
  • 24. Medical ID Theft/HIPAA Breach • DON’T MENTION IDTHEFT UNTILYOU HAVEYOUR MEDICAL RECORDS! • Order your medical records: • From your own primary care doctor – this is your baseline • From places where the impostor was treated • Compare them • Write places where impostor was treated and ask that impostor’s records be de-identified and marked as John/Jane Doe
  • 25. Criminal ID Theft • Go to Sheriff’s Department (Airport just south of Koenig) • Ask for a stolen ID file • They’ll fingerprint you and make you sign a stolen identity affidavit • In the mail you’ll receive a stolen identity letter and PIN • If you are stopped, tell the officer you have a stolen identity file and give the officer your PIN
  • 26. If nothing works – be glad you live in Texas • Chapter 521 ofTexas Business and Commerce Code • Application to be declared a victim of identity theft • File application, send notice to creditors by certified mail • Attend a hearing, tell your story • If court finds enough evidence, you get a court order confirming you are a victim.
  • 27. Tips for Texas Businesses
  • 28. Responsibilities of a Business to Victims •Protect customer info •Know the law: FCRA, FDCPA, 521, HIPAA •Have a breach notification plan •Investigate •Correct information sent to credit bureaus •Cease all collection efforts against victim
  • 29. Responsibility of a business after data breach • Check your CGL policy for cybersecurity or breach coverage. • Get legal help! • Notify all customers who were affected. • You are not required to provide credit monitoring. Most businesses do it as a courtesy. • Notify credit bureaus if required by law.
  • 30. Online Businesses • Tell users what information you collect and how you’ll use it. • Have protections so that no personal information is collected from children. • Tell users how you’ll protect their information. • Get a lawyer to review your privacy policies because these laws change rapidly.
  • 31. For more information Paula Pierce paula@ppiercelaw.com 512-850-4808

Editor's Notes

  • #11: From Justice Department’s national drug threat assessment Note that TX is at intersection of 2 major routes Traditional IDT hotspots: Texas, Florida, Arizona