Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: ID Theft

Frank Asks FTC and Credit Bureaus to Respond to Consumer Complaints

Press release: “Congressman Barney Frank yesterday wrote to the Chairman of the Federal Trade Commission (FTC) and representatives of the credit reporting industry asking that they look into the numerous complaints from consumers about access to credit reports and fraud alerts.” [text of letter is included in this release] Continue Reading

New on LLRX.com

Identity Theft: A Bibliography of Federal, State, Consumer and News Resources – Revised and Updated, by Sabrina I. Pacifici & Catherine Guthrie Small Content, Long Tails, and Big Ideas in Law Libraries, by Jason Eisenman E-Discovery Update – by Fios Inc.: The Myth of Search, by Conrad J. Jacoby CongressLine, by GalleryWatch.com: Congressional Intent, by… Continue Reading

Recommendations for Identity Theft Related Data Breach Notification

Follow-up to September 19, 2006 posting, President’s Identity Theft Task Force Announces Interim Recommendations, today OMB issued a memorandum of Recommendations for Identity Theft Related Data Breach Notification, from Clay Johnson, Deputy Director for Management. “We…recommend that each agency identify in advance a core management group that will be convened upon the identification of a… Continue Reading

Researchers Announce "Phoolproof Phishing Prevention"

Press release: Carnegie Mellon CyLab researchers create new system to address phishing fraud [ZDNet] Phoolproof Phishing Prevention – Bryan Parno, Cynthia Kuo, Adrian Perrig: “Phishing attacks exploit a user’s inability to distinguish legitimate websites from spoofed websites. Unfortunately, humans are ill-suited for performing the security checks necessary for secure site identification. Phoolproof Phishing Prevention uses… Continue Reading

New National Survey on Enterprise Data Security Risks

Ponemon Institute Releases National Survey on Confidential Data at Risk “Stored data presents unique challenges for enterprise security, and the U.S. Survey: Confidential Data at Risk is a first-of-its-kind study on the topic. Derived from a national sampling of nearly 500 experienced information security practitioners, the survey reveals a number of key findings, including: 81… Continue Reading

FDIC Issues New Consumer Phishing Alert

Consumer Alert: New Phishing Attack Claims to be FDIC “The FDIC is aware of a phishing e-mail that has the appearance of being sent from the FDIC. The name “Federal Deposit Insurance Corporation” appears on the “From” line and the subject is, “IMPORTANT: Notification of Federal Deposit Insurance Corporation.” This e-mail claims that the FDIC… Continue Reading

Group Requests FTC Investigation of AOL Privacy Breach

Follow up to August 9, 2006 posting, AOL Data Breach Causes Privacy Group to File Complaint With FTC, news today “the Electronic Frontier Foundation (EFF)…asked the Federal Trade Commission (FTC) to investigate America Online (AOL) and require changes in its privacy practices, after the company recently released search history logs that exposed the private lives… Continue Reading

StopBadware.org Begins Issuing Warnings to Google Users

StopBadware.org Blog: “We’re entering a new phase here at StopBadware.org. Google—which is one of our partners—will present people with a warning before they visit websites that have been reported to StopBadware.org as sites that distribute badware. These warnings currently link to a general page on StopBadware.org, but as we finish researching sites, we’ll replace the… Continue Reading

Small Business Information Security Act of 2006

Press release: “Senator Olympia J. Snowe (R-ME), Chair of the Senate Committee on Small Business and Entrepreneurship, today introduced the “Small Business Information Security Act of 2006,” (S. 3786) legislation that will create the “Small Business Information Security Task Force” within the Small Business Administration to help small businesses both understand the information security challenges… Continue Reading