Consumer Finance Monitor Podcast Episode: Responding to Direct and Indirect Identity Theft Disputes Under the FCRA: What Are The Differences?
Torres Talks Trade Podcast Episode 9 on U.S. Customs and Border Protection's Global Business Identifier program
Phishing: Cybersecurity’s Biggest Threat
Digging Deeper, Episode 1: The Con Queen of Hollywood
Preserving Black History in Bucks County, PA, with Recorder of Deeds Robin Robinson: On Record PR
What is Consumer Fraud and What Deceptions are Employed?
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
In order to provide an overview for busy in-house counsel and compliance professionals, we summarize below some of the most important U.S. Securities and Exchange Commission (SEC) enforcement developments from the past month,...more
SCCE’s Compliance & Ethics Institute is the primary educational and networking event for compliance and ethics professionals worldwide. Leading industry professionals cover real‑world compliance issues, emerging trends, and...more
Key Takeaways: ..According to FINRA, the number of reported instances involving broker-dealer fraudulent account takeovers (ATO) and related theft is on the rise. ..As set forth in recently released FINRA Regulatory...more
On September 15, 2020, the SEC’s Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert highlighting the recent uptick in “credential stuffing” cyber-attacks against SEC-registered investment advisors...more
Not to say, I told you so, but around the same time that the Capital One data breach occurred, I was reminding clients that nearly half of all significant data breaches or cyber-incidents occur because of internal actors. ...more
Life under a rock has its benefits - you probably don't get many houseguests, and you're never sunburned. But there are some drawbacks, too. The main one is that you definitely don't know what's been going on out here in the...more
Purpose - Distributed ledger technology (“DLT”), including the use of blockchain technology, has been touted as a way to create and validate digital identities that serve many of the same purposes that physical forms of...more
New law will require consumer breach notice within 90 days, identity theft protection for consumers,“kill switch” for smartphones, and implementation of data security programs for certain health providers, state agencies and...more
As a reminder, the Identity Theft Red Flags Rules jointly adopted by the SEC and CFTC, which took effect on May 20, 2013, have an upcoming compliance date of November 20, 2013. Under these rules, certain SEC and...more
Regulation S-ID - On April 10, 2013, the Securities and Exchange Commission (SEC) and the Commodity Futures Trading Commission (CFTC) jointly adopted identity theft red flags rules (the Rules) and corresponding...more
On Wednesday, April 10, 2013, the Commodity Futures Trading Commission (the "CFTC") and the Securities and Exchange Commission (the "SEC") jointly issued final rules and guidelines that will require certain regulated entities...more
It has been several years since the Federal Trade Commission’s Red Flag Rule took effect; and the banking regulators have had the Red Flag Interagency Guidance in place since 2007. Finally, entities regulated by the...more