Identity Theft, Privacy, & Security
Microsites
- Fighting Back Against Identity Theft
This website is a one-stop national resource to learn about the crime of identity theft. It provides detailed information to help you deter, detect, and defend against identity theft.
- Protecting Personal Information: A Guide for Business
Offers tips for business on creating and implementing a plan for safeguarding personal information.
Facts For Business
- Businesses Must Provide Victims and Law Enforcement with Transaction Records Relating to Identity Theft
[PDF]
Explains Section 609(e) of the FCRA: the rights of identity theft victims and the responsibilities of covered businesses. Businesses must provide victims and law enforcement with transaction records relating to identity theft. 8.5"x11", 2 pages.
- Consumer Reports: What Insurers Need to Know [PDF]
Outlines compliance requirements for insurers who use consumer reports to underwrite insurance policies and to screen high-risk applicants. 8.5"x11", 4 pages.
- Financial Institutions and Customer Information: Complying with the Safeguards Rule
[PDF]
Tips for business on complying with the FTC's Safeguards Rule, which requires financial institutions to protect the consumer information they collect. 8.5"x11", 5 pages.
- The FTC's Privacy Rule and Auto Dealers: FAQs [PDF]
Guide to help auto dealers comply with the Gramm-Leach-Bliley Act and the FTC Privacy Rule. 8.5"x 11", 6 pages.
- Getting Noticed: Writing Effective Financial Privacy Notices
[PDF]
How to develop an effective privacy notice: invite consumer feedback; use plain-language; include easy-to-read messages and attractive graphics. 8.5"x11", 2 pages, color.
- How to Comply with the Children's Online Privacy Protection Rule
[PDF]
Compliance tips for website operators. 8.5"x11", 20 pages, color.
- How To Comply with the Privacy of Consumer Financial Information Rule of the Gramm-Leach-Bliley Act
[PDF]
Explains the requirements of the Gramm-Leach-Bliley Act which limits how financial institutions may disclose a consumer's nonpublic personal information. 8.5"x 11", 19 pages.
- In Brief: The Financial Privacy Requirements of the Gramm-Leach-Bliley Act
[PDF]
Explains requirements that companies give consumers privacy notices that explain the institutions' information-sharing practice and consumers' right to limit some sharing. 8.5"x 11", 4 pages.
- Info Compromise and Risk of IDTheft: Guidance for Your Business
[PDF]
Steps you should take and whom should you contact if your customers' personal information is compromised. 8.5"x11", 4 pages.
- Protecting Personal Information: A Guide for Business [PDF]
Practical tips for business on creating and implementing a plan for safeguarding personal information. 5.75"x8.75", 24 pages, color.
- Security Check: Reducing Risks to your Computer Systems
[PDF]
Explains the federal requirement that businesses have a security plan to safeguard customer's personal information. 8.5"x 11", 2 pages.
- Using Consumer Reports: What Employers Need to Know
[PDF]
Outlines compliance requirements when you hire new employees, and when you evaluate employees for promotion, reassignment, and retention. 8.5"x11", 4 pages.
- You, Your Privacy Policy and COPPA - How to Comply with the Children’s Online Privacy Protection Act
[PDF]
Explains the components of a COPPA-compliant privacy policy, offers Qs & As, and features a Compliance Checklist. 8.5"x11", 24 pages, color.
Business Alerts
- Disposing of Consumer Report Information? New Rule Tells How
[PDF]
- New ‘Red Flag’ Requirements for Financial Institutions and Creditors Will Help Fight Identity Theft [PDF]
Learn about regulations (the Red Flags Rules) requiring financial institutions and creditors to develop and implement written identity theft prevention programs. 8.5"x11", 2 pages.
- Safeguarding Customers' Personal Information: A Requirement for Financial Institutions [PDF]
- Slip Showing? Federal Law Requires All Businesses to Truncate Credit Card Information on Receipts [PDF]
Articles For Business
- Protecting Personal Information: Five Steps for Business
Basic principles for securing sensitive customer and employee data
- Take Stock: Conducting a Data Security Audit in Your Office
How a CSI-style information investigation is the first step toward a safer, more secure business
- Scale Down: Why Less is More When Securing Sensitive Information
Tips for trapping the "office packrat" and streamlining your data stream
- Lock It: Protecting Your Office from Info Thieves
Practical guidance on safeguarding your workplace against data theft
- Pitch It: Give Personal Info the Shred Carpet Treatment
How-to steps for maintaining the security of discarded data
- The Lowdown on Laptops: Data Security for the Road Warrior
Keeping data safe at home while spanning the globe
- Privacy Policies: Say What You Mean and Mean What You Say
Tips on making your privacy policy clear, concise, and compliant with the law