<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:thr="http://purl.org/syndication/thread/1.0">
    <title>Bank Lawyer&#39;s Blog</title>
    <link rel="self" type="application/atom+xml" href="http://www.banklawyersblog.com/3_bank_lawyers/atom.xml" />
    <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/" />
    <id>tag:typepad.com,2003:weblog-29532</id>
    <updated>2013-05-12T21:47:00-05:00</updated>
    <subtitle>Commentary on Banking Law</subtitle>
    <generator uri="http://www.typepad.com/">TypePad</generator>
    <entry>
        <title>Camden Fine Fires Off A Fine Salvo</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2013/05/camden-fine-fires-off-a-fine-salvo.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2013/05/camden-fine-fires-off-a-fine-salvo.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef017eeb0ecbde970d</id>
        <published>2013-05-12T21:47:00-05:00</published>
        <updated>2013-05-12T21:47:00-05:00</updated>
        <summary>In recent opinion piece for Bloomberg News, ICBA CEO Camden Fine was in fine fettle, ranting about his favorite topic: new regulatory burdens are strangling community while the largest banks are doing just fine, thank you very much. Among his...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Accounting/Auditing" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Banking Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Capital" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="CFPB" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Commercial Lending" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Deposits" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Ethics" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Federal Legislation" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Lending" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Life (In General)" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Mortgage Banking" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Privacy" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Reporting" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p>
<a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef01901c111b9c970b-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Cam Fine (2)" class="asset  asset-image at-xid-6a00d8341c652b53ef01901c111b9c970b" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef01901c111b9c970b-120wi" style="margin: 0px 5px 5px 0px;" title="Cam Fine (2)" /></a>In&#0160; recent opinion piece for Bloomberg News, ICBA CEO Camden Fine was in fine fettle, ranting about his favorite topic: new regulatory burdens are strangling community while the largest banks are doing just fine, thank you very much. Among his salient points are the following:</p>
<blockquote>
<p><strong><em>The megabanks are benefiting from what <a href="http://www.bloomberg.com/news/2013-02-20/why-should-taxpayers-give-big-banks-83-billion-a-year-.html" rel="external" title="Open Web Site">Bloomberg View</a>
calculated is an $83 billion annual taxpayer subsidy, the value
of implicit guarantees by the <a href="http://topics.bloomberg.com/u.s.-treasury/">U.S. Treasury</a>. Bloomberg View was
correct to characterize the too-big-to-fail subsidy as “a major
driver of the largest banks’ profits.” </em></strong></p>
<p><strong><em>Perversely, Federal Deposit Insurance Corp. <a href="http://www2.fdic.gov/qbp/2012dec/qbpall.html" rel="external" title="Open Web Site">data</a> show that
large banks have both the lowest credit quality and the lowest
cost of funds in the industry. Community banks rank the highest
in both categories even though they have had to compete for
years against the megabanks’ access to cheaper money in pricing
loans. In addition, community banks must compete against the big
lenders’ lower comparative costs in handling regulatory
paperwork.</em></strong> </p>
</blockquote>
<p>While Cam complains that this is &quot;morally wrong,&quot; I suspect that in a nation overrun with Pontius Pilates who sneer in the throes of their born-again relativism &quot;What is &#39;truth&#39;?,&quot; appealing to &quot;morality&quot; as a behavior influencer will have as much impact on Congress as a stern talking to by Pope Francis would have on Charlie Sheen. More effective on the morally challenged is likely to be his economic arguments.</p>
<blockquote>
<p><strong><em>Community banks should be putting their capital to work in the small towns, rural communities and middle-class urban enclaves
they know well. Instead, they are focusing too many of their
precious human resources on onerous paperwork and time-consuming
compliance measures. 
</em></strong></p>
<p><strong><em>Community banks are the source of almost 60 percent of all
small-business loans of less than $1 million, as well as
mortgage and consumer loans tailored to the needs of their local
communities. Large banking organizations with more than $50
billion in assets hold almost 40 percent of outstanding small
loans to businesses, according to the Federal Reserve, but loans
to small businesses aren’t a significant portion of large-bank
lending. Small-business loans represent less than 5 percent of
the large banks’ total domestic lending.</em></strong></p>
</blockquote>
<p>Cam outlines five specific steps Congress and the federal regulators could take to help community banks (and credit unions, for that matter, although Cam would choke on his own tongue before admitting it)<strong><em>. </em></strong>They include:</p>
<ul>
<li>Easing up on some of the more onerous residential mortgage lending and servicing rules.</li>
<li>Eliminating the requirement that community banks report on every new small business loan application.</li>
<li>Requiring a cost-benefit analysis for all new regulations and prohibiting the issuance of any regulation where the cost exceeds the benefit.</li>
<li>Raising the threshold to $350 million in assets for the requirement for an audit of a bank&#39;s internal controls.</li>
<li>Eliminating the annual requirement for sending no-change privacy policies.</li>
</ul>
<p>These are all helpful suggestions, but&#0160; I&#39;m frankly surprised that he didn&#39;t also call for the carpet bombing of CFPB&#39;s D.C. headquarters and insist that Jamie Dimon&#39;s king-size bed be short-sheeted. Oh well, the year is not even half over. There&#39;s still time to get down to the really important stuff.</p></div>
</content>


    </entry>
    <entry>
        <title>One More Black Eye For Payday Lenders</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2012/09/one-more-black-eye-for-payday-lenders.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2012/09/one-more-black-eye-for-payday-lenders.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef017744cd1082970d</id>
        <published>2012-09-17T22:53:00-05:00</published>
        <updated>2012-09-17T22:53:00-05:00</updated>
        <summary>Brian Krebs posted a provocative entry today on his blog concerning a potential link between a web site that sells personal information on Americans and that may be obtaining much of its information &quot;from a network of hacked or complicit...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Banking Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Crime" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Lending" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Life (In General)" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Privacy" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p>
<a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef017d3c1da604970c-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Personal data" class="asset  asset-image at-xid-6a00d8341c652b53ef017d3c1da604970c" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef017d3c1da604970c-120wi" style="margin: 0px 5px 5px 0px;" title="Personal data" /></a>Brian Krebs posted <a href="http://krebsonsecurity.com/2012/09/id-theft-service-tied-to-payday-loan-sites/" target="_self">a provocative entry today</a> on his blog concerning a potential link between a web site that sells personal information on Americans and that may be obtaining much of its information &quot;from a network of hacked or complicit payday loan sites.&quot; Just what the payday lending business needed, more bad publicity.</p>
<blockquote>
<p><em><strong>Users can search for an individual’s information by name, city and 
state (for .3 credits per search), and from there it costs 2.7 credits 
per SSN or DOB record (between $1.61 to $2.24 per record, depending on 
the volume of credits purchased). This portion of the service is 
remarkably similar to <a href="http://krebsonsecurity.com/2011/11/how-much-is-your-identity-worth/" target="_blank" title="How Much is Your Identity Worth?">an underground site I profiled last year</a> which sold the same type of information, even offering a reseller plan.</strong></em></p>
<p><em><strong>What sets this service apart is the addition of more than 330,000 
records (plus more being added each day) that appear to be connected to a
 satellite of Web sites that negotiate with a variety of lenders to 
offer payday loans.</strong></em></p>
</blockquote>
<p>Krebs has done some decent detective work, which is way more effort than slackers like the author of this blog would ever undertake, unless someone was paying me to do it, of course. He talked to a number of people whose personal information is being sold, and located one who gave him the name of the payday lending &quot;referral&quot; site she used. Krebs has reached out to that site but, to no one&#39;s surprise, he&#39;s heard nothing in response but the sound of crickets chirping. Anyone interested in that name should read Krebs&#39; blog post.</p>
<p>Krebs also discusses potential criminal liability for selling someone else&#39;s social security number without their consent. Any payday lending sites that are engaged in such activities probably understand that they&#39;re skating on thin ice and simply don&#39;t care. It may also be the case that the payday lending site information systems have been hacked.</p>
<p>Krebs&#39; last piece of advice to individuals is likely sound, but also likely to cause heartburn to banks.</p>
<blockquote>
<p><strong><em>The next time you call your bank or interact with a company that asks 
you to authenticate yourself by reciting some or all of your Social 
Security number, birth date, mother’s maiden name — or any other 
personal information that you may assume is private — remember that 
services like this exist. Whenever possible, I think it’s an excellent 
idea to insist that these entities authenticate you using alternative 
questions and answers that are truly private to you and to you alone.</em></strong></p>
</blockquote>
<p>The potential problem I see with that approach is that it might be difficult to automate a process to obtain truly unique questions and answers on a person-by-person basis. I&#39;m by no means technologically sophisticated enough to know if that&#39;s the case, but I suspect it would be more costly to program a process in which truly unique questions were created by the user as opposed to a relatively small menu of standard questions (mother&#39;s maiden name; first job, name of best friend, etc.). Nevertheless, the continued activities of those who push the envelope of what&#39;s legally permissible continues to create headaches for the law abiding.</p></div>
</content>


    </entry>
    <entry>
        <title>CFPB Solicits Undercover Brothers (And Sisters)</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2012/08/cfpb-solicits-undercover-brothers-and-sisters.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2012/08/cfpb-solicits-undercover-brothers-and-sisters.html" thr:count="0" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef016769516b1d970b</id>
        <published>2012-08-16T21:51:00-05:00</published>
        <updated>2012-08-16T23:06:42-05:00</updated>
        <summary>Not content with exercising its virtually unchecked &quot;right&quot; to probe into every nook and cranny of a financial institution&#39;s affairs (including those protected by attorney-client privilege) in the bright light of day, a recent article in The Washington Times disclosed...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="CFPB" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Compliance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Privacy" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p><a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef016769516995970b-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Spy" class="asset  asset-image at-xid-6a00d8341c652b53ef016769516995970b" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef016769516995970b-120wi" style="margin: 0px 5px 5px 0px;" title="Spy" /></a>Not content with exercising its virtually unchecked &quot;right&quot; to probe into every nook and cranny of a financial institution&#39;s affairs (including those <a href="http://www.banklawyersblog.com/3_bank_lawyers/2012/04/american-bar-association-to-cfpb-thats-not-legally-sound.html" target="_self">protected by attorney-client privilege</a>) in the bright light of day, <a href="http://www.washingtontimes.com/news/2012/aug/12/consumer-bureau-seeks-sleuths-for-bad-bankers/" target="_self">a recent article in <em>The Washington Times</em></a> disclosed that our favorite federal watchdog is recruiting operatives &quot;to go undercover to pursue cases against banks, credit card companies and other financial companies.&quot;</p>
<blockquote>
<p><strong><em>“As needed,” one recent recruitment ad stated to potential  investigators, “establish and conduct surveillance activity to develop  both intelligence and evidence to further investigations. Utilize  surveillance activities to identify subjects, their activities and their  associates, corroborate source information and collect evidence.” </em></strong></p>
</blockquote>
<p>In keeping with its consistent pattern of paying its minions above market wages, annual salaries for the spies will range from $98,000 to $149,000. Surely, that&#39;s not too much to pay folks who will be putting their lives on the line 24/7/365 in situations where, if their cover&#39;s blown, an angry teller could stuff an exploding die pack down the front of their boxers or briefs.</p>
<blockquote>
<p><strong><em>The recruitment effort also makes clear that while working under  enforcement lawyers, investigators would be assigned to “delicate  matters, issues and investigative problems for which there are few, if  any, established criteria.”</em></strong></p>
</blockquote>
<p>&quot;Delicate matters.&quot; As delicate as ferreting out the exact percentage of Cherokee DNA in Liz Warren&#39;s personal genome? As delicate as building switchbacks up Joe Biden&#39;s backside to delicately remove his head? As delicate as Leonard Nemoy&#39;s task in his episode &quot;In Search Of: Maxine Water&#39;s IQ&quot;?</p>
<p>Perhaps not THAT delicate, but still...</p>
<p>And how are we, the average citizen, who might unknowingly befriend such a sleuth and find ourselves caught between our personal concupiscence and our tattered sense of right and wrong in a trap sprung on us by a mole who betrays our trust and, like <a href="http://www.urbandictionary.com/define.php?term=pod%20person" target="_self">a Pod Person</a>, screams our guilt to a crowd of brain-eating CFPB zombies, to be assured that we won&#39;t be &quot;entrapped&quot; or otherwise have our rights abused by these agents of the <span style="text-decoration: line-through;">KGB</span> CFPB?&#0160; The CFPB responds soothingly: &quot;Trust Us.&quot;</p>
<blockquote>
<p><strong><em>“Investigative work conducted by our staff will be covered by Consumer Financial Protection Bureau policies to ensure all practices comply with applicable laws and  regulations and protect individuals’ privacy rights,” said bureau  spokeswoman Moira Vahey. </em></strong></p>
</blockquote>
<p>Yes, you heard her correctly: she&#39;s saying &quot;No worries, mate! We&#39;ll police ourselves.&quot;</p>
<p>One is reminded of Otter&#39;s famous line to Flounder in the movie &quot;Animal House,&quot; after the frat brothers had wrecked Flounder&#39;s brother&#39;s Caddy: &quot;You F***ed up! You trusted us!&quot;</p>
<blockquote>
<p><strong><em>A similar plan at the Department of Health and Human Services was  scrapped last year after some members of Congress complained that it  amounted to spying. Health officials wanted to send “mystery shoppers”  into doctors’ offices to gauge Medicaid and Medicare patients’ access to  primary care physicians.</em></strong></p>
</blockquote>
<p>Thus, there&#39;s hope that in an election year, the CFPB&#39;s plan will generate enough publicly partisan sniping to at least delay the start of &quot;Operation Recess Richie On The Down-low&quot; until a new Congress can clip the wings (and tail, wings and beak) of the CFPB. Then again, the article notes that the FTC last year approved an operation that sent undercover adolescents into their local Game Stop or Best Buy <em>sans adults</em> to try to purchase &quot;M&quot;-rated video games, so there is precedent for this sort of high-level espionage operation.</p>
<p>Because this involves a left-wing operation by The Leviathan, the usual suspects who customarily scream publicly about any government interference in our lives (like <a href="http://www.firstamendmentcenter.org/mosque-spying-case-against-fbi-dismissed" target="_self">spying on potentail al-Quaeda members</a> or using the words <a href="http://www.aclu.org/content/aclu-urges-supreme-court-uphold-ruling-removing-phrase-under-god-pledge-allegiance-recited-p" target="_self">&quot;under God&quot; in the Pledge of Allegiance</a>) are not-so-strangely slient.</p>
<blockquote>
<p><strong><em>The American Civil Liberties Union (ACLU), which has criticized many  federal government surveillance activities, declined to comment on the consumer bureau recruitment ad. </em></strong></p>
</blockquote>
<p><em>CFPB delenda est!</em></p></div>
</content>


    </entry>
    <entry>
        <title>A Fig Leaf For Online Exposure</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2012/04/a-fig-leaf-for-online-exposure.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2012/04/a-fig-leaf-for-online-exposure.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef016303efd4f2970d</id>
        <published>2012-04-10T21:32:00-05:00</published>
        <updated>2012-04-10T21:32:00-05:00</updated>
        <summary>Although I rarely do book reviews, I actually asked to review “Protecting Your Internet Identity: Are You Naked Online?” I know and admire one of the co-authors, Theresa Payton, the former (and first female) White House Chief Information Officer, and...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Blogging" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Consumer Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Crime" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Marketing" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Privacy" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p><em> <a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef016303efd498970d-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Privacy-card" class="asset  asset-image at-xid-6a00d8341c652b53ef016303efd498970d" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef016303efd498970d-120wi" style="margin: 0px 5px 5px 0px;" title="Privacy-card" /></a>Although I rarely do book reviews, I actually asked to review “<a href="http://www.amazon.com/Protecting-Your-Internet-Identity-Online/dp/1442212195/ref=ntt_at_ep_dpt_1/178-3058976-9945709" target="_self">Protecting Your Internet Identity: Are You Naked Online?</a>” I know and admire one of the co-authors, Theresa Payton, the former (and first female) White House Chief Information Officer, and when I discovered she, and co-author Ted Claypoole, had written a practical book of advice for their “Moms, Grandmoms, Friends, and kids,” concerning how the privacy of their personal information is at risk and how to protect it, I requested an advance copy, and Theresa was kind enough to provide one.</em></p>
<p>Authors Theresa Payton and Ted Claypoole begin their book “<a href="http://www.amazon.com/Protecting-Your-Internet-Identity-Online/dp/1442212195/ref=ntt_at_ep_dpt_1/178-3058976-9945709" target="_self">Protecting Your Internet Identity: Are You Naked Online?</a>” by making the assumption that most of us don’t wish to live our lives as Madonna does, where nothing that isn’t exposed to public glare has meaning. For most of the rest of us, I think it’s fair to assume that there exists much information that we believe is “none of your damn business.” That being the case, it’s imperative that each of us understands that the Internet poses serious risks of exposure and unauthorized use of our “private information,” and further understands how best to protect our privacy while using a medium that makes it difficult to counter the authors’ contention that “we are all entertainers and publishers now.”</p>
<p>Starting at the end, in the last chapter of the book the authors assure readers that their intent is not to scare but to inform, not to deter people from participating in online activity, but to give them the knowledge and the tools to do so safely, or at least as safely as can be done in a world where, to me, the crooks always seem to just one step ahead of the good guys. While the book is chock-full of real-life examples of bad things happening to good people on the internet, the goal is not merely to sensationalize but to teach valuable lessons about how to do things right. From well-known privacy disasters like the notorious Washingtonienne blog to privacy thieves preying on soldiers serving in war zones, the examples lead to lessons, and valuable lessons they are. While those of us who’ve spent considerable time in this area may think that the authors’ intent to inform their grandparents might make the book’s content too basic, I found its breadth and depth not only a useful synthesis of the subject matter, but I discovered nuggets of gold that I’d previously overlooked in the twenty years I’ve spent panning this stream.</p>
<p>Starting with a good basic overview of how you expose your own private information while participating on online activities, the authors also show you how others, from businesses, governments, friends, employers, co-workers, and those friendly social media forums like Facebook, extract, use, and sometimes expose your private information, and how crooks and plain old stalkers gain access to and use your private information to commit crimes. Again, the real-life examples are followed by lessons, and the authors frequently provide useful checklists that readers can use to protect their privacy in various settings, including an entire chapter that is essentially a thorough “self-assessment checklist” that allows an individual to determine all of the different ways he or she is revealing his or her personal information online. Many of those ways will engender “uh-oh” revelatory moments from many readers. They follow with a chapter that, while not exactly a twelve-step program for internet privacy dunces, sets out a useful program for “repairing the damage” caused by intentional or inadvertent “oversharing.”</p>
<p>The chapter on behavioral targeting touches on a sore point with me. Relatives and friends with whom I connect on Facebook are constantly bombarding me with inducements to participate in some activity that involves downloading software or otherwise permitting access to my information and/or activities in a way that will allow a third party marketing outfit to track my behavior online. I intend to encourage each of them to buy this book and read this chapter so that they’ll NEVER again bug me with such requests. Yes, I know, that&#39;s wishful thinking.</p>
<p>Discussions of identity theft and defamation offer practical advice in a form that avoids the bane of a lawyer’s existence: “legal mumbo jumbo.” Identity theft is discussed in terms of how to prevent it and what to do if you’re a victim of it. Once again, the authors offer checklists that should prove to be valuable resources to non-lawyers and lawyers alike. The discussion of defamation gives a layperson useful guidance in an area of the law that, based upon some of the email I receive, is woefully misunderstood by even highly educated people.</p>
<p>The authors devote two very readable chapters on what amounts to “branding” and marketing yourself online. While that might sound as if it&#39;s a bit off topic, it actually presents a nice change of pace from the previous chapters’ focus on the bad things that can happen to good people online. Assuming you’ve been paying attention to the initial chapters of the book and “play wisely,” the authors offer useful advice on how to enhance, rather than merely protect, your “online persona.”</p>
<p>If the authors are correct in their contention that “we’re all entertainers and publishers now,” this book will be a valuable, practical resource for all of us soft-shoe hoofers who dance through cyberspace and want to do it safely.</p></div>
</content>


    </entry>
    <entry>
        <title>The Unpopularity of Sunlight Among Vampires</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2012/03/the-unpopularity-of-sunlight-among-vampires.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2012/03/the-unpopularity-of-sunlight-among-vampires.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef0163025eb333970d</id>
        <published>2012-03-04T21:36:00-06:00</published>
        <updated>2012-03-04T21:36:00-06:00</updated>
        <summary>I took some heat--some of it good natured and some of it not--from those corners of the universe where criticism of bureaucratic failings is accorded the same respect as Torquemada accorded the average heretic, about my recent expressions of amusement...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Conservatorship/Receivership" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FDIC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Life (In General)" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Litigation" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="OCC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="OTS" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Politics" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Practice of Law" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Privacy" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p><a href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef0163025eb2fd970d-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Secret Society" class="asset  asset-image at-xid-6a00d8341c652b53ef0163025eb2fd970d" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef0163025eb2fd970d-120wi" style="margin: 0px 5px 5px 0px;" title="Secret Society" /></a>I took some heat--some of it good natured and some of it not--from those corners of the universe where criticism of bureaucratic failings is accorded the same respect as Torquemada accorded the average heretic, about <a href="http://www.banklawyersblog.com/3_bank_lawyers/2012/02/bank-western-still-standing.html" target="_self">my recent expressions of amusement</a> regarding the fears of federal bank regulators that their deliberations regarding the take down of United Western Bank in Denver might see the light of day. My critics were fond of pointing to the admonitions of federal appellate courts that such deliberations need secrecy because otherwise bureaucrats wouldn&#39;t speak to one another. And that result would be a <em>problem</em>?</p>
<p>As someone who spends his professional life conducting privileged conversations, I understand that a certain amount of back-and-forth between regulators ought to be accorded confidentiality. I especially understand that need when the subject is sports or sex. However, when the content of the conversations is the very basis of a decision to close down a bank, wipe out the owners (and likely many unsecured creditors other than insured depositors), and, in most cases, throw a number of people out of work, I think the need for secrecy is outweighed by the rights of those legitimately challenging the regulator&#39;s decision. To continue to fight tooth-and-nail to prevent release of such deliberations smacks of the well-founded nervousness of someone with something to hide.</p>
<p>On a broader plain, I think secrecy within bureaucracies is dangerous. In his short work &quot;<a href="http://www.amazon.com/All-Things-Considered-G-Chesterton/dp/1463726716/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1330802532&amp;sr=1-1" target="_self">All Things Considered</a>,&quot; that brilliant apostle of common sense, G.K. Chesterton, put the case much better than I could ever hope to.</p>
<blockquote>
<p><em><strong>Society is becoming a secret society. The modern tyrant is evil because of his elusiveness. He is more nameless than his slave. He is not more of a bully than the tyrants of the past; but he is more of a coward...The elaborate machinery which was once used to make men responsible is now used solely in order to shift the responsibility. People talk about the pride of tyrants; but we in this age are not suffering from the pride of tyrants. We are suffering from the shyness of tyrants; from the shrinking modesty of tyrants. Therefore we must not encourage leader-writers to be shy; we must not inflame their already exaggerated modesty. Rather we must attempt to lure them to be vain and ostentatious; so that through ostentation they may at last find their way to honesty.</strong></em></p>
</blockquote>
<p>Chesterton published that book in 1908. He&#39;d expressed the hope that the dangers he discussed would be fleeting ones, and that &quot;if all goes well this book will be unintelligible gibberish&quot; to future generations. I don&#39;t things have gone that well because his observations seem more intelligible and applicable today than they might have been over a century ago.</p>
<p>My default position is that transparency trumps secrecy, especially where we&#39;re talking about a challenge to governmental action that has serious consequences and for which the legal remedies available to the &quot;injured&quot; are limited. Apparently, that position makes me an unpopular person in some quarters. I can live with that.</p></div>
</content>


    </entry>
    <entry>
        <title>One Woman&#39;s James Bond Is Another Woman&#39;s Trojan Horse</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2011/08/one-womans-james-bond-is-another-womans-trojan-horse.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2011/08/one-womans-james-bond-is-another-womans-trojan-horse.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef014e8a4d5b6c970d</id>
        <published>2011-08-01T21:58:00-05:00</published>
        <updated>2011-08-01T21:58:00-05:00</updated>
        <summary>In what might have seemed like a good idea after she downed her third scotch-and-soda, Tanya Blackwell, a foreclosure defense attorney, got a job at GMAC’s Ally Financial and, according to allegations by Ally, proceeded to grab all the confidential...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Employment" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Ethics" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FTC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Litigation" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Practice of Law" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Privacy" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p><a href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef0153905a0d10970b-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Cat-traitor" class="asset  asset-image at-xid-6a00d8341c652b53ef0153905a0d10970b" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef0153905a0d10970b-120wi" style="margin: 0px 5px 5px 0px;" title="Cat-traitor" /></a> In what might have seemed like a good idea after she downed her third scotch-and-soda, Tanya Blackwell, a foreclosure defense attorney, <a href="http://www.bizjournals.com/philadelphia/blog/jeff-blumenthal/2011/07/gmac-foreclosure-agent-moonlighted-as.html">got a job at GMAC’s Ally Financial</a> and, according to allegations by Ally, proceeded to grab all the confidential information of Ally’s she could lay her hands on and shoot it out the door to third parties, presumably to aid the employee’s law firm and others in fighting residential loan foreclosures commenced by Ally against delinquent borrowers. Those activities not only got her fired, they got her sued. <a href="http://www.bizjournals.com/philadelphia/blog/jeff-blumenthal/2011/07/prelim-injunction-in-ally-suit-against.html">Last Friday afternoon</a>, Ally and the defendant stipulated to a preliminary injunction pursuant to which “Blackwell is forbidden from ‘using, disclosing, disseminating or transmitting’ any of Ally’s proprietary information or destroying any information that would apply to this case,” and “she must also within 48 hours return any proprietary information to Ally and give her former employer all of her email passwords for accounts that contain information related to Ally.”</p>
<p>I may be wrong, but I don’t think this will turn out well for Ms. Blackwell. Her sanctions may not end with an adverse judgment or settlement in the civil litigation filed by Ally. I wouldn’t be surprised to see further repercussions.</p>
<p>&#0160;As for Ally Financial, I guess it doesn’t use a social media review procedure as part of its pre-hiring due diligence process. I understand that some employment law attorneys have advised their clients not to review social media sites like Facebook, Twitter or MySpace for fear that the employer will uncover such impermissible information as race, age, or sex and be sued if it decides not to hire the prospective employee. I respectfully disagree with that approach, and believe that those risks can be managed. In fact, I think the weightier argument is that the employer may be deemed negligent if it doesn’t review social media sites.</p>
<p>Look at the case of Ms. Blackwell and Ally. <a href="http://www.facebook.com/pages/Philly-Foreclosure-Defense-Law-Office-of-Tanya-L-Blackwell/133917990020329">Ms. Blackwell’s Facebook page</a> makes it very clear that she’s all about representing the borrower against the lender. Is that someone a mortgage lender would think is a perfect fit for its in-house legal staff?</p>
<p>There have been <a href="http://www.news-press.com/article/20110731/BUSINESS/110730012/Digital-dilemma-Firms-check-out-employees-more-via-online-posts">a number of articles</a> recently that profile social media “scouring” and the third party vendors who provide this service. As one employment law attorney opines, you’re probably better off using a professional who can filter out the impermissible information and only pass along the squeaky clean stuff to you.</p>
<blockquote>
<p><em><strong>“It’s probably safer to work with a company to do the checks because that is what they are in the business of doing,” Potter said. “They understand the rules.”</strong></em></p>
</blockquote>
<p>Whether you hire a third party or &quot;roll your own,&quot; to me, there’s more risk in not doing a social media check that there is in doing one.</p></div>
</content>


    </entry>
    <entry>
        <title>2011: The Year of the Fish?</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2011/01/2011-the-year-of-the-fish.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2011/01/2011-the-year-of-the-fish.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef0147e1b7f3a7970b</id>
        <published>2011-01-18T21:30:00-06:00</published>
        <updated>2011-01-18T21:30:00-06:00</updated>
        <summary>According to The Fraud Blog&#39;s Tracy Kitten, bank security personnel are gearing up for a year in which they expect a lot more bad guys will &quot;go phising&quot; (and &quot;vishing&quot;). Like most fraud, phishing attacks are increasing in number and...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Crime" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Electronic Banking" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Privacy" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p><a href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef0148c7c11ae2970c-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Phising" class="asset  asset-image at-xid-6a00d8341c652b53ef0148c7c11ae2970c" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef0148c7c11ae2970c-120wi" style="margin: 0px 5px 5px 0px;" title="Phising" /></a> According to The Fraud Blog&#39;s <a href="http://blogs.bankinfosecurity.com/posts.php?postID=855&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+BankinfosecuritycomBlogsRssSyndication+%28BankInfoSecurity.com+Blogs+RSS+Syndication%29&amp;utm_content=Google+Feedfetcher" target="_self">Tracy Kitten</a>, bank security personnel are gearing up for a year in which they expect a lot more bad guys will &quot;go phising&quot; (and &quot;vishing&quot;).</p>
<blockquote>
<p><em><strong>Like most fraud, phishing attacks are increasing in number and  sophistication. Banks know these are a problem, but fighting back is  becoming increasingly difficult.</strong></em></p>
<p><em><strong>[...]</strong></em></p>
<p><em><strong>About half of the respondents to our <a href="http://www.bankinfosecurity.com/articles.php?art_id=3206">Faces of Fraud Survey</a> say phishing and vishing are major concerns. Interestingly, only 20  percent say they feel prepped to fight and prevent those attacks against  their customers and brands.</strong></em></p>
</blockquote>
<p>We&#39;ve <a href="http://www.banklawyersblog.com/3_bank_lawyers/2008/01/bank-customers.html" target="_self">discussed &quot;phishing&quot; on this blog</a> many times, as well as &quot;vishing.&quot; Vishing is phishing using a telephone rather than e-mail. Like many phishing attacks (particularly &quot;spear-phishing&quot;), the fraudster callers use various guises to appear to be legitimate representatives of some business (even the intended victim&#39;s bank) who have a &quot;need to know&quot; your personal information. Apparently, they&#39;re successful often enough to keep them coming back for more.</p>
<p>Among the causes of concern, according to an ISACA survey cited by Ms. Kitten, is the increased use of mobile channels to access online banking. Another heightened risk is the increased use of social networks, where &quot;phishers&quot; love to troll. Using a mobile device to access a social network, then clicking all the links that catch your eye, is the equivalent of Lady Gaga wearing her meat dress on a stroll through the Lion enclosure of the Bronx Zoo. Yet, you can bet your bottom dollar that plenty of pinheads are doing just that, even as we speak.</p>
<blockquote>
<p><em><strong>The riskiest online behaviors: Clicking on an e-mail loop to access a  shopping site, which 52 percent of ISACA survey respondents admit to  doing; and mixing personal networking with business. </strong></em></p>
<p><em><strong>Fifty-two percent admit to using a work computer or smart phone to access <a href="http://www.bankinfosecurity.com/category.php?catID=288">social networking</a> sites for personal use. &quot;It is kind of the flip of using personal stuff  for business and then using business stuff for personal -- clicking on  links.&quot; </strong></em></p>
<p><em><strong>Here&#39;s more: Results from another recent survey, this one from  the Anti-Phishing Working Group, reveal that 54 percent of household and  business PCs are infected with some kind of malware, most likely from  users clicking on links and accessing sites that make them vulnerable.</strong></em></p>
</blockquote>
<p>Tracy says that banks shouldn&#39;t blame it all on the consumer. For one thing, the ploys are becoming increasingly sophisticated, so much so that she almost fell for one herself. Moreover, the number of attacks has been increasing by leaps and bounds.</p>
<blockquote>
<p><em><strong>According to another study, this one released in October by Symantec,  the number of phishing attacks launched on consumers has jumped from one  or two a week in 2005 to more than 70 per day.</strong></em></p>
</blockquote>
<p>Educating consumers goes only so far, contends Ms. Kitten.She thinks financial institutions ought to be investing heavily in technology that doesn&#39;t &quot;allow those phishy e-mails through in the first place.&quot;</p>
<blockquote>
<p><em><strong>From what security experts in the field tell me, technology exists that  could virtually eliminate this kind of fraud. But banks and credit  unions are not investing in the right solutions. They depend too much on  anti-virus software, which is insufficient.</strong></em></p>
</blockquote>
<p>I&#39;m interested in hearing what sort of technology solutions a bank would implement that would prevent a customer from receiving a phishing e-mail. I&#39;m also interested in hearing what such technology might cost the average community bank. With all the Dodd-Frank costs and expenses that are being heaped on banks in the name of &quot;reform,&quot; spending more money to protect customers from being victimized by they&#39;re own gullibility and risky behavior is a proposal that might not make it out of the starting gate at many institutions.</p></div>
</content>


    </entry>
    <entry>
        <title>The Home Stretch</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2010/12/the-home-stretch.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2010/12/the-home-stretch.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef0147e04cf1d8970b</id>
        <published>2010-12-01T21:34:00-06:00</published>
        <updated>2010-12-01T21:34:00-06:00</updated>
        <summary>Yesterday, WilmerHale put out one of those short client alerts that doesn&#39;t bore bankers with its excruciating in-depth analysis of some esoteric nuance of Dodd-Frank. Instead, it basically points out to bankers who&#39;ve been living in caves or strung out...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Compliance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Consumer Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FCRA" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Federal Legislation" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FFIEC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FRB" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FTC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Lending" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Life (In General)" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Litigation" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Privacy" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p><a href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef013489a93dde970c-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Deadlines" class="asset  asset-image at-xid-6a00d8341c652b53ef013489a93dde970c" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef013489a93dde970c-120wi" style="margin: 0px 5px 5px 0px;" title="Deadlines" /></a> Yesterday, WilmerHale put out one of those <a href="http://www.wilmerhale.com/publications/whPubsDetail.aspx?publication=9668" target="_self">short client alerts</a> that doesn&#39;t bore bankers with its excruciating in-depth analysis of some esoteric nuance of Dodd-Frank. Instead, it basically points out to bankers who&#39;ve been living in caves or strung out on a drug of their choice that they&#39;ve got one month to wake up and smell the deadlines. Three deadlines, to be precise.</p>
<p>First, December 31, 2010 is the red letter day when the FTC will FINALLY (and they mean it this time) start enforcing their Red Flags Rule. If you don&#39;t what a &quot;red flag&quot; is by know, pray to the deity of your choice, because you&#39;ll need his, her, or its help.</p>
<p>Second, January 1, 2011 marks the day that banks must use the model privacy notice form if they want to have the benefit of the GLBA &quot;safe harbor.&quot; Again, if any banker doesn&#39;t know what I&#39;m talking about, grab your closest bank regulatory lawyer and ask him about civil money penalties.</p>
<p>Finally, January 1, 2011 is also the day that the FRB/FTC joint rules governing the risk-based pricing notice mandated by the FACT Act will go into effect. The rules set forth what types of information the notices must contain and what alternative information or exceptions might apply.</p>
<p>These deadlines have been approaching for some time now, and you&#39;d think every affected financial institution would have been prepared for them by this point, so that a Chinese fire drill could be avoided during a month when vast quantities of eggnog should be consumed and mistletoe should be hung at completely inappropriate places throughout the office. But <a href="http://www.banklawyersblog.com/3_bank_lawyers/2006/11/a_peaceful_easy.html" target="_self">as we saw four years ago</a> when the multi-factor authentication &quot;guidance&quot; deadlines approached, then passed, with some bankers taking an &quot;ignorance-is-bliss&quot; or &quot;What, me worry?&quot; attitude toward the whole affair, I&#39;m sure they&#39;ll be a few bankers who&#39;ve patterned their professional careers after John Belusi&#39;s character in Animal House, and have spent the last several years smashing beer cans against their foreheads instead of worrying about these petty deadlines.</p>
<p>WilmerHale offers these slackers a helping hand.</p>
<blockquote>
<p><em><strong>If you have questions about compliance requirements for the FTC&#39;s Red  Flags Rule, use of model privacy notices or compliance with GLBA privacy  rules, or proper implementation of the FACT Act risk-based pricing  rule, please do not hesitate to contact us.</strong></em></p>
</blockquote>
<p>Or wait, and then hire them later to defend you against regulatory enforcement actions. You can pay them now, or pay them later.</p></div>
</content>


    </entry>
    <entry>
        <title>Fax Machines: A Source of Civil Money Penalties?</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2010/09/fax-machines-a-source-of-civil-money-penalties.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2010/09/fax-machines-a-source-of-civil-money-penalties.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef013487c526f8970c</id>
        <published>2010-09-27T21:46:00-05:00</published>
        <updated>2010-09-27T21:46:00-05:00</updated>
        <summary>Linda McGlasson at The Agency Insider blog had a smart post last week on the recent FDIC guidance on the information security risks of printers, copiers, and fax machines. It&#39;s not about the copies that are made or printed or...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Banking Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Compliance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FDIC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FFIEC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Privacy" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p>Linda McGlasson at The Agency Insider blog had <a href="http://blogs.bankinfosecurity.com/posts.php?postID=716">a smart post last week</a> on the recent <a href="http://www.fdic.gov/news/news/financial/2010/fil10056.pdf">FDIC guidance</a> on the information security risks of printers, copiers, and fax machines.</p>

<blockquote><p><em><strong>It&#39;s not about the copies that are made or printed or sent by these machines, (although they can be considered a breach threat too if they 
fall into the wrong hands) but rather the stored data that poses a 
problem. 

</strong></em></p>

<p><em><strong>Consider: If you&#39;re at an institution that has done any upgrade to 
its copiers and printers within the last five years, then your current 
machines most likely are housing the hidden threat underneath the 
plastic cover -- a hard drive that copies and keeps records of every 
single copy made on the copier.

</strong></em></p>

<p><em><strong>Yes, a hard drive can hold a copy of every single copy and the 
drive continues to write until it is full, and then the new data writes 
over the old copies. If that hard drive leaves the institution or is 
accessed, this is a violation of privacy under GLBA. Try explaining how 
that data made it into the hands of someone who wasn&#39;t supposed to see 
it. Or how after a copier was sent back to the seller for servicing or 
because its lease was up, a data breach was traced back to your 
institution -- specifically to that machine. <br /></strong></em></p>

</blockquote>

<p>Banks should have already addressed this issue as part of their information security program that is mandated by the Information Security Guidelines adopted by the FFIEC pursuant to the Gramm-Leach-Bliley Act. The hard drives of these machines should be treated in the same way (and protected and disposed of in the same way) as any other computer hard drive that sits on an employees desktop or is ported about in a laptop, netbook, I-pad, mobile phone, etc. The fact that the FDIC decided that it should issue specific guidance on the topic means that its examiners have discovered a potential &quot;hole&quot; in this respect at more than one bank.</p>

<p>Linda offers some common sense steps that banks should take to address and mitigate these risks:</p>

<ul>
<li>change the passwords from the default on copiers and the multi-function printers.</li>
<li>turn off all the things you don&#39;t want and check that the data and fax 
modems are separate (so you won&#39;t run into the problem of having a
 modem linked in, looking at the records that only a select few are 
supposed to see in your institution).</li>
<li> add the manufacturer&#39;s security kit that encrypts information on the
 copier. The kit also shreds each copied document by overwriting the 
image after it&#39;s printed.</li>
<li>adopt a written policy on the handling of copies, faxes, printed material or stored data, including their secure disposal (if you don&#39;t already have one).</li>
<li>adopt a written policy on the handling and disposal if data on these machines&#39; hard drives.</li>
</ul>
<p>
This is not only good business practice, but, as Linda also discusses, will protect both the institution ad its officers and directors from potential civil money penalties for violation of the requirements of the G-L-B Act.</p>

<p>You may think you&#39;ve got bigger fish to fry than sweating this &quot;small stuff,&quot; but a tiny bump can trip you up. Check your information security policies and make certain this &quot;small stuff&quot; is addressed, whether or not the FDIC is your primary federal regulator.</p>

<p> </p><input id="gwProxy" type="hidden" /><input id="jsProxy" onclick="if(typeof(jsCall)==&#39;function&#39;){jsCall();}else{setTimeout(&#39;jsCall()&#39;,500);}" type="hidden" /><div id="refHTML"></div></div>
</content>


    </entry>
    <entry>
        <title>Surprisingly Unsurprising</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2010/05/surprisingly-unsurprising.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2010/05/surprisingly-unsurprising.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef0133ed6ce439970b</id>
        <published>2010-05-09T21:45:00-05:00</published>
        <updated>2010-05-10T10:43:11-05:00</updated>
        <summary>We&#39;ve discussed (most recently here) incidents that demonstrate how expensive to banks data security breaches can be. Lawyer and law technology columnist Eric Sinrod cited a recent study conducted by The Ponemon Institute and co-sponsored by PGP Corporation that, says...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Litigation" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Privacy" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p>
<a href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef0133ed6ce1c7970b-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Data-breach" class="asset asset-image at-xid-6a00d8341c652b53ef0133ed6ce1c7970b " src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef0133ed6ce1c7970b-120wi" style="margin: 0px 5px 5px 0px;" /></a> We&#39;ve discussed (most recently <a href="http://www.banklawyersblog.com/3_bank_lawyers/2009/01/data-breaches-on-the-rise-and-striking-the-heartland.html">here</a>) incidents that demonstrate how expensive to banks data security breaches can be. <a href="http://blogs.findlaw.com/technologist/2010/04/the-cost-of-data-breaches-it-aint-cheap.html">Lawyer and law technology columnist Eric Sinrod</a> cited a recent study conducted by The Ponemon Institute and co-sponsored by PGP Corporation that, says Eric, confirms what we&#39;ve always suspected: &quot;the cost of data 
breaches is substantial.&quot;</p>

<blockquote><p><em><strong>The average global total cost of each data breach in 2009 was $3.43 million, with an average cost of $142 per affected record.&#0160;And here in 
the United States, the average total cost per breach was a staggering 
$6.75 million, with an average cost of $204 per affected record.</strong></em></p></blockquote>

<p>When I first read this, I wondered how much of the additional cost in the United States might be attributable to the fact that we&#39;re the most over-lawyered country on the planet; in fact, I&#39;d suspect the most over-lawyered spot in the known universe. Apparently, however, it&#39;s not the fault of the lawyers but of the laws.</p>

<blockquote><p><em><strong>Perhaps not surprisingly, the costs were highest where data breach notification laws place requirements on organizations that experience a breach to disclose the details of breach incidents. Accordingly, the costs were the highest in the United States, where practically all states at this point have passed data breach legislation. And Germany, where similar laws were placed last year, experienced the second-highest costs.</strong></em><strong></strong></p></blockquote>

<p>Interestingly, but not surprisingly, a whopping percentage of losses relate to lost business to the company that suffers the data breach.</p>

<blockquote><p><em><strong>In a wake up call to companies, on average 44% of incurred data loss expenses related to lost business. When customers learn of data breaches, they evidently take their business elsewhere. This should encourage companies to do their very best in preventing and addressing breaches. With respect to the percentage of data loss expenses relating to lost business, the numbers come in like this: Australia 33%; France 30%; Germany 34%; the United Kingdom 46%; and the United States a whopping 66%.</strong></em></p></blockquote><em><strong></strong></em><strong></strong>

<p>I&#39;ve become convinced that the major risk of data security breaches is reputational risk. The report seems to bear this out. A bank may have in place &quot;commercial reasonable&quot; information security measures that will pass muster with bank regulators as being in compliance with FFIEC information security guidelines and safety and soundness principles. A bank may also have limited its legal liability to its customers by means of its agreements with its customers. Nevertheless, all the well thought out, legally compliant procedures and written account documents in the world aren&#39;t going to save the bank from the ultimate hammer that any customer wields--taking its business elsewhere. That hammer blow can become even more painful if, as has occurred recently in Texas and elsewhere, local media picks up on a data breach that morphs into full-blown litigation and the customer alleges that not only doesn&#39;t the bank have adequate security measures, but when those measures fail, the bank refuses to make the customer whole.</p>

<p>Eric does offer one bright note from the report. Not surprisingly, that bright note involves hiring &quot;skilled&quot; legal counsel.</p>

<blockquote><em><strong></strong></em><p><em><strong>The report also demonstrates that when third-party and/or criminal attacks caused breaches, costs increased due to added forensics and investigations that were launched. The report further details that when there is a strong Chief Information Security Officer (CISO) who took active responsibility for managing a breach, costs were lower across the board in all five countries that were studied.</strong></em></p>

<p><em><strong>...It behooves organizations to get their data houses in order on the front-end, and when a breach happens notwithstanding best preventative efforts, the breach should be managed swiftly and effectively by a strong CISO with the assistance of legal counsel skilled in this area.</strong></em></p></blockquote><em><strong></strong></em><strong></strong>

<p>Gosh, I wonder which &quot;skilled legal counsel&quot; Eric has in mind? Since Eric doesn&#39;t state that the report suggested that the CISO be &quot;assisted&quot; by skilled legal counsel, we&#39;ll chalk that suggestion up to &quot;literary license.&quot; </p></div>
</content>


    </entry>
 
</feed>

<!-- ph=1 -->