A Legal Guide to PRIVACY AND DATA SECURITY 2024

effectiveness of certain training programs or the individual employee’s ability to follow the procedures and protocols in place for handling sensitive data. Experienced Privacy Professionals. It would be wise for a business to develop relationships with professionals who have experience handling data privacy and security issues including legal counsel, data privacy and security professionals, public relations, and technology/computer forensics consultants. It will be of some comfort for a business to know they have taken appropriate actions before, during, and after the security incident or data breach. Steps to Take in Event of Identity Theft “Identity theft” and “identity fraud” refer to all types of crime in which someone wrongfully obtains and uses another individual’s personal data in some way that involves fraud or deception, typically for economic gain. Under the Identity Theft and Assumption Deterrence Act, the Federal Trade Commission (FTC) is responsible for receiving and processing complaints from people who believe they may be victims of identity theft, providing informational materials to those people, and referring those complaints to appropriate entities, including the major credit reporting agencies and law enforcement agencies. The following is a list of online resources to consider in the event you become a victim of identity theft: • Identity Theft • A publication created by the FTC, available at Identity Theft - A Recovery Plan, walks the victim through immediate steps and then provides resources for more specific issues such as student loans or bankruptcy filings in a victim’s name.

174

Made with FlippingBook - Online Brochure Maker