President’s Identity Theft Task Force Report Outlines Battle Plan

President’s Identity Theft Task Force Report Outlines Battle Plan
The ongoing fight against identity theft criminals has a new set of battle plans with the release of the President’s Identity Theft Task Force Report, released on April 23. The entire report with its supplement report is less than 190 pages, but the plans are clearly drawn and tasks for each industry are outlined. Everyone in the public and private sectors are mentioned, including financial institutions.

These two volumes contain the direction from the government’s task force: Combating Identity Theft A Strategic Plan and Combating Identity Theft, Vol. 2, Supplemental Information. This report was issued by a collective 17 federal agencies, including financial institution regulatory agencies FRB, FTC, FDIC, NCUA, OCC, OTS and the SEC.

All financial institutions should download this report and its supplemental information and read through each to understand the important role that financial institutions will take in the fight to combat identity theft.


About the Author

Linda McGlasson

Linda McGlasson

Managing Editor

Linda McGlasson is a seasoned writer and editor with 20 years of experience in writing for corporations, business publications and newspapers. She has worked in the Financial Services industry for more than 12 years. Most recently Linda headed information security awareness and training and the Computer Incident Response Team for Securities Industry Automation Corporation (SIAC), a subsidiary of the NYSE Group (NYX). As part of her role she developed infosec policy, developed new awareness testing and led the company's incident response team. In the last two years she's been involved with the Financial Services Information Sharing Analysis Center (FS-ISAC), editing its quarterly member newsletter and identifying speakers for member meetings.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.