World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

The Use of Technology to Combat Identity Theft

By United States Department of the Treasury

Click here to view

Book Id: WPLBN0000658859
Format Type: PDF eBook
File Size: 760.35 KB.
Reproduction Date: 2005
Full Text

Title: The Use of Technology to Combat Identity Theft  
Author: United States Department of the Treasury
Volume:
Language: English
Subject: Government publications, Economics., United States. Department of the Treasury--Appropriations and Expenditures.
Collections: U.S. Department of the Treasury Collection
Historic
Publication Date:
Publisher: United States Department of the Treasury

Citation

APA MLA Chicago

Department Of The Treasury, U. S. (n.d.). The Use of Technology to Combat Identity Theft. Retrieved from http://www.hawaiilibrary.net/


Description
Government Reference Publication

Excerpt
Introduction: The Fair and Accurate Credit Transactions Act (FACT Act, Public Law 108?159, 117 Stat. 1952), signed by President George W. Bush on December 4, 2003, amends the Fair Credit Reporting Act (FCRA).1 The FACT Act amendments provide consumers new tools to fight identity theft and preserve certain national standards for consumer credit markets. This report satisfies the requirements of section 157 of the FACT Act, ?Study on the Use of Technology to Combat Identity Theft.? Section 157(a) of the FACT Act requires the Secretary of the Treasury to study ?the use of biometrics and other similar technologies to reduce the incidence and costs to society of identity theft by providing convincing evidence of who actually performed a given financial transaction.? Section 157(d) requires the Secretary of the Treasury to report the findings and conclusions of the study, and any recommendations to the Congress. Treasury Secretary John W. Snow presents the findings and conclusion of the study in Chapter V.

Table of Contents
TABLE OF CONTENTS i ACRONYMS iii LIST OF FIGURES AND TABLES vi CHAPTER I: INTRODUCTION 1 CHAPTER II: COMBATING IDENTITY THEFT 7 What is Identity Theft 7 Scope of the Problem 9 The Regulatory Regime for Financial Institutions 12 What the Private Sector is Doing to Combat Identity Theft 17 Consumer Expectations 27 Conclusion 28 CHAPTER III: BIOMETRIC TECHNOLOGIES: WHAT THEY ARE, HOW THEY ARE USED, AND HOW THEY ARE ASSESSED 31 What Biometric Systems Are 32 ? How Biometric Systems Work 32 ? Types of Biometric Technologies 35 How Biometrics Are Being Used 43 How Biometric Technologies Are Assessed 46 ? Technology and Operational Issues 46 ? Cost Issues 50 ? Consumer Acceptance Issues 51 Conclusion 54

 

Click To View

Additional Books


  • Partnership for Prosperity Report to Pre... (by )
  • Oig Study : Treasury Law Enforcement Wor... (by )
  • General Management : Treasury's Rural De... (by )
  • Embracing the Future (by )
  • Embracing the Future (by )
  • Department of the Treasury Financial Man... (by )
  • District of Columbia Judges Retirement P... (by )
  • The Community Reinvestment Act after Fin... (by )
  • A Report to Congress in Accordance with ... (by )
  • System for Accountability for the Fiscal... (by )
  • Diversity Strategy (by )
  • The Community Reinvestment Act after Fin... (by )
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.