Identity Software – May 2021 EXECUTIVE SUMMARY Identity Software Sector Update

Total Page:16

File Type:pdf, Size:1020Kb

Identity Software – May 2021 EXECUTIVE SUMMARY Identity Software Sector Update SECTOR SNAPSHOT: Identity Software – May 2021 EXECUTIVE SUMMARY Identity Software Sector Update The pandemic has driven digital transformation into overdrive with retailers and financial institutions rapidly adopting to consumer demand shifting from offline to online transactions, and enterprises accelerating migration to cloud to manage millions of workers working remotely. This unprecedented growth in digital activity saw a corresponding increase in intensity and regularity of identity fraud and data breaches on an almost daily basis. Advanced persistent threats are fueling rapid innovation and adoption of identity security and data protection solutions across different market verticals, which in turn have catalyzed some of the most significant M&A and funding activities in recent history Recent M&A activity has been robust across multiple sub categories especially in IAM, highlighted by: Select M&A Transactions ($MM) $28,940 $1,400 $6,408 $850 Financing and investment volume in the overall identity sector has continued unabated with sponsors making bold bets to unleash growth and create new unicorns: Select Financing Transactions ($MM) $210 $205 $150 $100 $100 $100 GCA expects these trends to continue with even stronger identity related market activity excepted in the remainder of 2021 2 I. GCA OVERVIEW II. IDENTITY SOFTWARE MARKET OBSERVATIONS III. APPENDIX 3 GCA’S DEDICATED SECTOR KNOWLEDGE AND EXECUTION EXCELLENCE GCA’s Identity Software Leadership Team Chris Gough Saif Malik Managing Director / Head of Cybersecurity Executive Committee Phone: (415) 318‐3658 Phone: (212) 537‐4533 [email protected] [email protected] GCA Identity Software Focus Behavioral Bot and Malware Data Management Fraud Detection Authentication Analytics Detection and Governance and Prevention Identity Access Identity Data Identity Proofing Identity Theft Regulatory Management Aggregation and Verification Protection Compliance GCA Overview 25 >500 500+ 245 80% Offices Around M&A Transactions In PE Deals In The Repeat Or The World Professionals Last 3 Years Last 3 Years Referred Clients 4 OUR GLOBAL INVESTMENT BANKING PLATFORM Global investment bank providing strategic M&A and capital markets advisory services to growth companies and market leaders STOCKHOLM MANCHESTER LEEDS PARIS FRANKFURT BIRMINGHAM MUNICH KYOTO NAGOYA ZURICH TOKYO LONDON SHANGHAI NEW YORK LAUSANNE MILAN NEW DELHI OSAKA TEL AVIV SAN FRANCISCO FUKUOKA TAIPEI MUMBAI SINGAPORE HO CHI MINH CITY Global platform: Sector expertise: Exceptional cross‐ 25 offices in key Experienced team: Expansive coverage border capabilities: markets across Over 500 employees and deep ~50% of all America, Asia and across the globe specialization transactions Europe Strong reputation Broad spectrum Diversified and track record: of clients: High number of business model: Leading repeat clients and Geographically conglomerates, top referrals with 189 balanced, synergistic private equity firms deals announced or and complementary and emerging high‐ closed in last 12 focus areas months growth companies 5 GCA operates as GCA in America and Asia, and GCA Altium in Europe OUR RECENT SOFTWARE TRANSACTION EXPERIENCE Deep software sector expertise with demonstrated success advising public and private companies sold to strategic investment from Advisor to ShowingTime acquired by 6 I. GCA OVERVIEW II. IDENTITY SOFTWARE MARKET OBSERVATIONS III. APPENDIX 7 CONVERGENCE OF VERIFICATION AND FRAUD DETECTION TECHNOLOGIES Increased Digital Activity Driving Need For Sophisticated Fraud Protection Solutions Covid‐19 accelerated the shift toward digital identity and triggered changes in online shopping behaviors, pushing retailers and financial Ecommerce… institutions to adopt eCommerce strategies penetration incr’d over 2.0x YoY, from 15% in CY19 to 35% in CY20 This drastic rise in online sales saw a corresponding increase in the volume and sophistication of fraudulent activity, especially ATO fraud involving bots, phishing, social engineering, credential stuffing and brute‐force attacks to infiltrate systems $861 billion… was spent via online channels in Steep costs of such attacks have fueled a stronger desire for KYC the US; 44% increase from 2019 onboarding and identity verification solutions, while enabling an inclusive frictionless experience for customers To prevent fraud, a robust multi‐layered and risk‐based identity 72% increase… solution is required to differentiate a trusted user from a fraudster in account takeover (ATO) fraud and combat all types of fraud, beginning with account origination to reported in 2020 from 2019 the transactions that follow Mastercard’s latest acquisition of Ekata, for example, brings the integration of identity verification data, fraud prevention and digital $4.2 billion… identity programs to help their customers ensure trust in real‐time in reported loses to US consumers during online account opening, payments and every other digital due to internet fraud interaction Investors are betting on continued growth of fraud prevention outside of ecommerce to other market verticals as evidenced by recent 12.8% CAGR… fundings of Signifyd ($205MM), Veriff ($69MM), Sift ($50MM), Jumio projected from 2020‐2025 in the ($150MM), Socure ($100MM), and Id.me ($100MM) global fraud prevention market Notes: Source: DigitalCommerce360, Federal Bureau of Investigation. 8 EXTENDING AUTHENTICATION AND AUTHORIZATION FOR DATA PROTECTION Implementation of Zero Trust Data Security Principles Rise in consumer online activity has also led to ever growing What companies have now amounts of personally identifiable information (PII), which must Lengthy Manual and ad‐ Incomplete Infrequent or retention hoc data be properly consumed, measured, tracked, and protected. identification decentralized policies and retention data disposal of data schedules processes Organizations lacking proper implementation of data security, What is the need privacy, governance and compliance are increasingly at risk, and Clarity on data assets Next‐gen governance Investment in the right have been subjected to a significant level of security breaches and retention methods of data retention technologies and tools recently Legacy architectures remain ill‐equipped to handle sprawling sensitive data as it transitions to distributed multi cloud Why environments. To address this, a redefined zero trust approach Enables Realizes value of Minimizes risks Gains consumer that works seamlessly across networks is required sustainable, data in including and stakeholder efficient privacy intelligence and compliance risk trust operations busines growth Identity layer is at the heart of securing these networks and endpoints, with authentication and authorization as the core Cumulative Data Breaches components of zero trust information access control 10,000 9.5 8.1 8.5 9,000 7.2 7.5 8,000 7,270 Recent acquisition of Auth0 by Okta, delivers the critical identity 7,000 4.9 6,162 5.5 solutions needed to streamline processes, maintain high security, 6,000 2.9 4,800 and improve customer experiences for growth 5,000 3.5 4,000 3,520 1.5 3,000 0.3 With continued recent large investments in BigID ($100MM) and 1,889 2,000 785 ‐0.5 Securiti.ai ($50MM) in data management and privacy, Biocatch 1,000 ($168MM) in behavioral biometrics / continuous authentication, 0 ‐2.5 and Hypr ($35MM) in passwordless authentication 2015A 2016A 2017A 2018A 2019A 2020A Cum. Data Breaches Cum. Individuals Impacted (B) Notes: Source: Identity Theft Research Center (2021), PwC Insights. 9 OVERVIEW OF THE END‐TO‐END IDENTITY SOFTWARE ECOSYSTEM Identity Theft Protection Provide software and services to reduce the risk of ID theft from online or electronic media Identity Theft Password Personal Identity Self‐Sovereign Utilize monitoring software to track unauthorized Protection Managers Products Identity (SSI) use of credit and other personal information Fraud Detection Provide tools to monitor user behavior and transactions in real‐time to detect suspicious activity and prevent account fraud User & Entity Fraud Prevention & Regulatory Compliance & Behavioral Biometrics Endpoint Malware Behavior Analytics Risk Management Transaction Monitoring & Bot Detection Detection Identity Access Management (IAM) Define and manage the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those Privileged Access Identity‐as‐ Identity Governance Customer Identity & Access Management a‐Service SSO & Administration Management (CIAM) privileges Identity Authentication Provide recognition technology for a user’s identity by associating an incoming request with a set of identifying credentials Multi‐factor Mobile Identity & FIDO Authentication Token Access Authentication Device Management Identity Proofing Verify and affirm the true identity of an individual interacting with an organization for the first time, based on document verification, digital attributes, Know Your Customer & Identity & Document Identity Background Data – Prevention – Detection – Remediation Entity Verification Verification Proofing Screening and national identity systems Data Aggregation Identity data gathered from multiple sources for combination into a summary analysis and to present a single view of an individual Credit Data Alternative Credit & Master Data & Scoring Aggregators Financial History Consent Management 10 IDENTITY SOFTWARE LANDSCAPE Proofing Fraud Detection IAM Identity Theft Protection KYC & Entity Verification User & Entity Behavior
Recommended publications
  • Statement of Natalie S. Talpas, Senior Vice President and Digital Product Management Group Manager, PNC Bank
    Statement of Natalie S. Talpas, Senior Vice President and Digital Product Management Group Manager, PNC Bank Consumer Financial Protection Bureau Symposium on Consumer Access to Financial Records, Section 1033 of the Dodd-Frank Act Wednesday, February 26, 2020 I. Introduction and Executive Summary PNC Bank, National Association (PNC) appreciates the opportunity to participate in the Consumer Financial Protection Bureau’s (Bureau) symposium regarding data aggregators and consumer access to financial records. PNC is a Main Street bank focused on serving the financial needs of our customers and communities. We have employees in more than 40 states across the country and a retail branch network located primarily in the Mid-Atlantic, Midwest and Southeast, with approximately 2,300 branches and 9,100 ATMs. We are proud of our longstanding history of supporting our customers, communities and employees while operating a sustainable long-term business. We are committed to providing our customers with access to convenient technology tools and the financial applications of their choice, while protecting the personal and financial information they entrust to us and maintaining the integrity of our systems. We support our customers’ use of financial applications (apps) and informed consumer choice in accessing and sharing their financial data. In fact, we process millions of trouble-free logins by financial apps, and the data aggregators that support these apps, each week. What are data aggregators? Data aggregators are nonbank financial services companies that gather financial data on consumers from banks and other financial institutions, such as broker- dealers, and make this information available to financial apps and, potentially, other purchasers of consumer data.
    [Show full text]
  • Technology and Innovation in the Insurance Sector
    Technology and innovation in the insurance sector TECHNOLOGY AND INNOVATION IN THE INSURANCE SECTOR Please cite this publication as: OECD (2017), Technology and innovation in the insurance sector This work is published under the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the OECD or of the governments of its member countries or those of the European Union. This document and any map included herein are without prejudice to the status or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city, or area. © OECD 2017 FOREWORD │ 3 Foreword “Insurtech” is the term being used to describe the new technologies with the potential to bring innovation to the insurance sector and impact the regulatory practices of insurance markets. This report catalogues these technologies and examines how InsurTech is being funded and how insurers are engaging with the start-ups entering the market. This report was prepared as part of the programme of work of the OECD Insurance and Private Pensions Committee, the international forum for addressing policy and regulatory issues in insurance and private pensions for governments, international organisations and industry. It has benefited from input from the insurance market and industry, including from a number of insurance start-ups. This report contributes to the OECD’s Going Digital project which is examining from a wide range of perspectives how technology and innovation is affecting the economy. TECHNOLOGY AND INNOVATION IN THE INSURANCE SECTOR TABLE OF CONTENTS │ 5 Table of contents Executive summary ..............................................................................................................................
    [Show full text]
  • Do Data Breach Disclosure Laws Reduce Identity Theft?
    Do Data Breach Disclosure Laws Reduce Identity Theft? Sasha Romanosky, Rahul Telang, Alessandro Acquisti The Heinz College Carnegie Mellon University ABSTRACT In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting “data breach disclosure laws” that require firms to notify consumers if their personal information has been lost or stolen. While the laws are expected to reduce identity theft, their effect has yet to be empirically measured. We used panel data from the U.S. Federal Trade Commission to estimate the impact of data breach disclosure laws on identity theft from 2002 to 2009. We find that adoption of data breach disclosure laws reduce identity theft caused by data breaches by, on average, 6.1 percent. Keywords Data breach disclosure, economics of information security, identity theft, fixed effects regression 2 Do Data Breach Disclosure Laws Reduce Identity Theft? INTRODUCTION Data breaches occur when personally identifiable information such as names, social security numbers, and credit card numbers are accidentally lost or maliciously stolen. These breaches can result in hundreds of thousands (sometimes millions) of compromised records, and lead to identity theft and related crimes (Givens, 2000).1 In the United States, identity theft resulted in corporate and consumer losses of around $56 billion dollars in 2005 (Javelin Research, 2006).2 In an effort to reduce these crimes, many states have responded by adopting data breach disclosure (or “security breach notification”) laws, requiring firms to notify individuals when their personal information has been compromised.
    [Show full text]
  • E-Aggregation: the Present and Future of Online Financial Services in Asia-Pacific (PACIS)
    E-Aggregation: The Present and Future of Online Financial Services in Asia-Pacific (PACIS) Hiroshi Fujii Taeko Okano Stuart Madnick Michael Siegel Working Paper CISL# 2002-06 September 2002 Composite Information Systems Laboratory (CISL) Sloan School of Management, Room E53-320 Massachusetts Institute of Technology Cambridge, MA 02142 E-Aggregation: The Present and Future of Online Financial Services in Asia-Pacific Hiroshi Fujii1, Taeko Okano1, Stuart Madnick2, Michael Siegel2 1Suruga Bank, Japan 2Sloan School of Management, Massachusetts Institute of Technology, USA Abstract Financial institutions see the Internet as an important channel and many have built websites to inform and attract customers. Financial aggregation services as represented by “Account Aggregator” present an opportunity by which financial institutions can build stronger relationships with customers. Account aggregation services began in the United States, but they are now widely used by financial institutions in other countries. In this paper, we examine financial aggregation services by classifying aggregator types and the method for implementing their service. Second, we explain the differences between financial account relationship aggregation services in the U.S. and in Asia-Pacific countries, including Australia, South Korea, and Japan. We then discuss the status of financial comparison aggregation services and related issues. Owing to the popularity of WAP phones and the fast- growing market for mobile phone service in Asia-Pacific, we will also look into the development of mobile aggregation services. Finally, we examine future directions for aggregators in conjunction with universal and global banking concepts. Keywords: Financial institution, Aggregation service, Universal banking, Global banking I. Introduction Financial institutions are one of the most influential businesses in the information technology (IT) revolution.
    [Show full text]
  • Symposium on Consumer Access to Financial Records February 26, 2020
    Symposium on Consumer Access to Financial Records February 26, 2020 Written Statement of Natalie R. Williams Managing Director & Associate General Counsel, Responsible Banking, Data & Privacy JPMorgan Chase & Co. Submitted to the Consumer Financial Protection Bureau Thank you for the opportunity to serve as a panelist at the Consumer Financial Protection Bureau’s (CFPB) Data Aggregation Symposium. I. Data Aggregation Presents Both Benefits and Risks Financial data aggregation has grown dramatically in recent years and has yielded consumer benefits. Among other things, it has facilitated the creation of an array of innovative products and services that can help consumers better understand and manage their financial lives. However, data aggregation should be undertaken in the best interest of consumers. It therefore must be executed with appropriate measures to ensure data safety and security and informed consumer consent. Most aggregators require consumers to provide financial account login credentials so that they can “screen scrape” the consumer’s financial information. Through this practice of “screen scraping,” aggregators have the ability to collect all of the consumer’s financial information, even if the financial application the customer desires to use doesn’t need it. That information can include account numbers, payees, and contact information as well as details on mortgage, investment and credit card accounts, joint accounts, and children’s accounts. Aggregators also generally store account login credentials and scraped customer data, creating highly attractive targets for hackers and malicious insiders. Moreover, current data aggregation practices often are insufficiently transparent regarding the use and sharing of consumer financial data. This, in turn, limits the control that consumers have over their own financial information, placing data privacy and data security at risk.
    [Show full text]
  • RIN 3064-ZA24 Attachments: SSRN-Id3622468.Pdf; SSRN-Id3864965.Pdf
    From: Susan Von Struensee Sent: Saturday, June 19, 2021 12:22 PM To: Comments Subject: [EXTERNAL MESSAGE] RIN 3064-ZA24 Attachments: SSRN-id3622468.pdf; SSRN-id3864965.pdf COMMENTS OF SUSAN VON STRUENSEE, JD, MPH to the Request for Information and Comment on Financial Institutions' Use of Artificial Intelligence, Including Machine Learning 86 FR 16837-38 (March 31, 2021) Agency/Docket Numbers: Docket ID OCC-2020-0049 Docket No. OP-1743 Docket No. CFPB-2021-0004 Docket No. NCUA-2021-0023 Please see attached file A Survey of Fintech Research and Policy Discussion The intersection of finance and technology, known as fintech, has resulted in the dramatic growth of innovations and has changed the entire financial landscape. While fintech has a critical role to play in democratizing credit access to the unbanked and thin-file consumers around the globe, those consumers who are currently well served also turn to fintech for faster services and greater transparency. Fintech, particularly the blockchain, has the potential to be disruptive to financial systems and intermediation. Our aim in this paper is to provide a comprehensive fintech literature survey with relevant research studies and policy discussion around the various aspects of fintech. The topics include marketplace and peer-to-peer lending, credit scoring, alternative data, distributed ledger technologies, blockchain, smart contracts, cryptocurrencies and initial coin offerings, central bank digital currency, robo-advising, quantitative investment and trading strategies, cybersecurity, identity theft, cloud computing, use of big data and artificial intelligence and machine learning, identity and fraud detection, anti- money laundering, Know Your Customers, natural language processing, regtech, insuretech, sandboxes, and fintech regulations.
    [Show full text]
  • Dara Aggregators and Financial Institutions Kimberly L
    NORTH CAROLINA BANKING INSTITUTE Volume 5 | Issue 1 Article 17 2001 If You Can't Beat Them, Join Them: Dara Aggregators and Financial Institutions Kimberly L. Wierzel Follow this and additional works at: http://scholarship.law.unc.edu/ncbi Part of the Banking and Finance Law Commons Recommended Citation Kimberly L. Wierzel, If You Can't Beat Them, Join Them: Dara Aggregators and Financial Institutions, 5 N.C. Banking Inst. 457 (2001). Available at: http://scholarship.law.unc.edu/ncbi/vol5/iss1/17 This Comments is brought to you for free and open access by Carolina Law Scholarship Repository. It has been accepted for inclusion in North Carolina Banking Institute by an authorized administrator of Carolina Law Scholarship Repository. For more information, please contact [email protected]. If You Can't Beat Them, Join Them: Data Aggregators and Financial Institutions I. INTRODUCTION: Data aggregation has been a hot topic in the financial industry since First Union's December 1999 suit against Secure Commerce Services.! Data aggregation is the process of gathering information from multiple websites and delivering it to a consumer on a single website.2 There are essentially two ways for an aggregator to gather information-direct feed and screen scraping? Both methods require a customer to create on-line account access with the institutions they want on their single website.4 The customer then turns over their account numbers, I.D. numbers and passwords to their selected aggregator.5 1. First Union Alleges Online Payment Service Used Bank Customers' Information Illegally, B.N.A., Feb. 1, 2000, at 2437 (citing First Union Corp v.
    [Show full text]
  • Americans for Financial Reform Education Fund Center for Responsible Lending Consumer Action Consumer Federation of America USPIRG
    National Consumer Law Center (on behalf of its low-income clients) Americans for Financial Reform Education Fund Center for Responsible Lending Consumer Action Consumer Federation of America USPIRG February 4, 2021 Via regulations.gov Comment Intake Consumer Financial Protection Bureau 1700 G Street NW Washington, DC 20552 Re: Consumer Access to Financial Records, Docket No. CFPB–2020–0034/RIN 3170- AA78. The National Consumer Law Center (on behalf of its low-income clients) (NCLC), Americans for Financial Reform Education Fund, Center for Responsible Lending, Consumer Action, Consumer Federation of America, and USPIRG are pleased to submit these comments in response to the Consumer Financial Protection Bureau (CFPB)’s Advanced Notice of Proposed Rulemaking regarding Consumer Access to Financial Records, Docket No. 2020-0034, issued November 6, 2020. The CFPB has requested comment on 46 questions to assist it in developing a proposed rule to implement Section 1033 of the Dodd-Frank Wall Street Reform and Consumer Protection Act. These comments address a selected number of these questions that we as consumer advocacy groups are particularly suited to answer. In summary, these comments discuss how: 1. The potential benefits for consumers of authorized data access, assuming strong provisions for consumer control, security, and use limitations, are significant, as consumer use of their own data could provide a better alternative and provide true competition to the Big Three credit bureaus. The CFPB should issue a strong rule under 1033 to ensure protections for consumers accessing their own account data. 2. Authorized data access also poses significant risks to consumers. Consumers face the dangers of losing control over the data, having it used against them, and having their privacy invaded.
    [Show full text]
  • The Use of Cash-Flow Data in Underwriting Credit Market Context & Policy Analysis
    The Use of Cash-Flow Data in Underwriting Credit Market Context & Policy Analysis FEBRUARY 2020 About FinRegLab FinRegLab is a non-profit research organization that was founded on the premise that independent, rigorous research is a primary ingredient in helping develop market norms and policy solutions that enable responsible innovation in financial services. Acknowledgments This report, The Use of Cash-Flow Data in Underwriting Credit: Market Context & Policy Analysis, and the accompanying Policy Overview were made possible through founding support from Flourish/Omidyar Network. Additional support was provided by the Milken Institute, which enabled FinRegLab to evaluate cash-flow data in small business credit underwriting. Detailed information on our funders can be found on the inside back cover. We would like to extend a special note of appreciation for their leadership and facilitation of FinRegLab’s policy working groups to Melanie Brody, Mayer Brown; Mark Schultz, Capital One; P-R Stark, Oliver Wyman; and Corey Stone, Financial Health Network. Thanks also to the Fintech Team at the Federal Reserve Bank of San Francisco for co-hosting a symposium entitled “The Role of Consumers in the Data Ecosystem.” FinRegLab would also like to recognize the individuals and organizations who participated in the policy working groups as listed in Appendix A, the participants of the Data Ecosystem symposium, and stakeholders who participated in interviews. We are particularly grateful to Marsha Courchane and Arthur Baines, Charles River Associates, for the role they played in designing and executing the empirical research analysis. We are also grateful to Thomas P. Brown and Stephen J. Bandrowsky, Paul Hastings, for legal assistance throughout the course of the research process.
    [Show full text]
  • Data Aggregation Services – De-Identification
    TECHNOLOGY MAY-RATHON DIGITAL HEALTH PRIVACY: THERE’S AN APP FOR THAT Reece Hirsch Partner, Morgan Lewis, San Francisco Co-chair, Privacy and Cybersecurity Practice May 19, 2017 © 2017 Morgan, Lewis & Bockius LLP The Technologies are New, The Laws … Not So Much • When the Health Insurance Portability and Accountability Act was enacted in 1996, there were no smart phones, no mobile apps, no cloud computing – HIPAA Privacy Rule became effective April 14, 2003 – HIPAA Security Rule became effective April 21, 2005 – Compliance date of HIPAA Final Rule: September 23, 2013 • In recent years regulators and digital health companies have had to stretch, tweak and interpret existing laws to fit this new landscape of – Healthcare mobile apps – Cloud hosting services – Personal health records 2 Privacy by Design • For companies venturing into the digital health space, privacy and security are critical issues that must be addressed from Day One – For startups, questions about privacy and security will be among the first that get asked by customers and potential acquirers – The due diligence process will show when a company scrambled to improve privacy and security immediately prior to potential acquisition – For established companies venturing into digital health, a stumble in the digital privacy space can damage a brand and customer relationships • Privacy by design is the FTC’s mantra, baking in privacy and security during the development of a product or service 3 The FTC and OCR • One overarching theme in digital health privacy is the overlapping jurisdiction of: – The Federal Trade Commission, the primary U.S. privacy regulator with the broadest purview – The Dept.
    [Show full text]
  • Do Data Breach Disclosure Laws Reduce Identity Theft? / 257 Mitigate, Any Resulting Harm
    Do Data Breach Disclosure Sasha Romanosky Rahul Telang Laws Reduce Identity Theft? Alessandro Acquisti Abstract In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal informa- tion has been lost or stolen. Although the laws are expected to reduce identity theft, their effect has yet to be empirically measured. We use panel data from the U.S. Federal Trade Commission to estimate the impact of data breach disclosure laws on identity theft from 2002 to 2009. We find that adoption of data breach disclo- sure laws reduce identity theft caused by data breaches, on average, by 6.1 percent. © 2011 by the Association for Public Policy Analysis and Management. INTRODUCTION Data breaches occur when personally identifiable information such as names, Social Security numbers, and credit card numbers are accidentally lost or maliciously stolen. These breaches can result in hundreds of thousands (sometimes millions) of compromised records and lead to identity theft and related crimes (Givens, 2000).1 In the United States, identity theft resulted in corporate and consumer losses of around $56 billion in 2005 (Javelin Research, 2006).2 In an effort to reduce these crimes, many states have responded by adopting data breach disclosure (also known as secu- rity breach notification) laws, requiring firms to notify individuals when their per- sonal information has been compromised. However, to date, no empirical analysis has investigated the effectiveness of such legislative initiatives in reducing identity theft.
    [Show full text]
  • Download the White Paper
    WHITE PAPER Selecting a Financial Data Integration Platform Key Vendor Evaluation Criteria for Fintech Adopters Authored by Sponsored by Selecting a Financial Data Integration Platform CONTENTS The Role of Data Aggregation in 1. Fintechs’ Strategies .....................................................# 2. Key Platform Evaluation Considerations................... # i. Data Reliability and Cleanliness .......................................... # ii. Source Coverage, Data Types, and Access Methods ......... # iii. Platform Adaptability and Support for Innovation ............... # iv. Security Practices ............................................................... # v. Privacy, Transparency, and Compliance ............................... # 3. Forging a Future with a Data Platform........................ # 2 WHITE PAPER Selecting a Financial Data Integration Platform Selecting a Financial Data Integration Platform 1. The Role of Data Aggregation in Fintechs’ Strategies “Data is the new oil,” argues Linda Jeng, a senior fellow at Georgetown Law and former Federal Categories of Evaluation Criteria for Reserve official. “If you have access to data, then you have the ingredients to build better services.”1 Selecting an Integration Platform: For fintechs, building those apps and services relies on access to a wide set of customer financial data. As an example, envision an app Data Reliability and that has secure, permissioned access to all of a Cleanliness consumer’s bank, investment, credit and loan, tax, and insurance accounts. It presents
    [Show full text]