The Scoring of America: How Secret Consumer Scores Threaten Your Privacy and Your Future

Total Page:16

File Type:pdf, Size:1020Kb

The Scoring of America: How Secret Consumer Scores Threaten Your Privacy and Your Future World Privacy Forum The Scoring of America: How Secret Consumer Scores Threaten Your Privacy and Your Future By Pam Dixon and Robert Gellman April 2, 2014 Brief Summary of Report This report highlights the unexpected problems that arise from new types of predictive consumer scoring, which this report terms consumer scoring. Largely unregulated either by the Fair Credit Reporting Act or the Equal Credit Opportunity Act, new consumer scores use thousands of pieces of information about consumers’ pasts to predict how they will behave in the future. Issues of secrecy, fairness of underlying factors, use of consumer information such as race and ethnicity in predictive scores, accuracy, and the uptake in both use and ubiquity of these scores are key areas of focus. The report includes a roster of the types of consumer data used in predictive consumer scores today, as well as a roster of the consumer scores such as health risk scores, consumer prominence scores, identity and fraud scores, summarized credit statistics, among others. The report reviews the history of the credit score – which was secret for decades until legislation mandated consumer access -- and urges close examination of new consumer scores for fairness and transparency in their factors, methods, and accessibility to consumers. About the Authors Pam Dixon is the founder and Executive Director of the World Privacy Forum. She is the author of eight books, hundreds of articles, and numerous privacy studies, including her landmark Medical Identity Theft study and One Way Mirror Society study. She has testified before Congress on consumer privacy issues as well as before federal agencies. Robert Gellman Robert Gellman is a privacy and information policy consultant in Washington DC. (www.bobgellman.com.) He has written extensively on health, de- identification, Fair Information Practices, and other privacy topics. Dixon and Gellman’s writing collaborations include a reference book on privacy Online Privacy: A Reference Handbook, as well as numerous and well-regarded privacy-focused research, articles, and policy analysis. About the World Privacy Forum The World Privacy Forum is a non-profit public interest research and consumer education group focused on the research and analysis of privacy-related issues. The Forum was founded in 2003 and has published significant privacy research and policy studies in the area of health, online and technical, privacy, self-regulation, financial, identity, and data brokers among other many areas. www.worldprivacyforum.org. The Scoring of America, p. 2 Contents THE SCORING OF AMERICA:................................................................................................................6 HOW SECRET CONSUMER SCORES THREATEN YOUR PRIVACY AND YOUR FUTURE.............6 INTRODUCTION ..........................................................................................................................................................6 PART I: SUMMARY AND BACKGROUND ..........................................................................................7 WHAT IS A CONSUMER SCORE? ..............................................................................................................................8 WHO HAS A SCORE? ..............................................................................................................................................8 GAPS IN CONSUMER PRIVACY RIGHTS AND PROTECTIONS AROUND CONSUMER SCORING (AND WHY EXISTING LAWS DON’ ALWAYS APPLY)................................................................................................................9 Key Issue: Score Secrecy..................................................................................................................................11 Key Issue: Score Accuracy ..............................................................................................................................12 Key Issue: Identity Theft and Consumer Scoring .................................................................................13 Key Issue: Unfairness and Discrimination ..............................................................................................13 Key Issue: Sensitive Health and Lifestyle Information and Consumer Scoring.......................14 Key Issue: Consent and Use of Consumer Data in Predictive Scores............................................15 SCORES THEN:AHANDFUL OF FACTORS. ……SCORES NOW:THOUSANDS OF FACTORS ........................ 15 SCORING METHODS AND MODELS ARE OPAQUE.............................................................................................. 18 EXAMPLES AND NUMBERS OF CONSUMER SCORES.......................................................................................... 19 USES OF CONSUMER SCORES,REGULATION, AND MODERN ELIGIBILITY .................................................... 19 DEJA VU: WHY THE HISTORY OF THE CREDIT SCORE IS IMPORTANT............................................... 21 SUMMARY OF FINDINGS AND RECOMMENDATIONS......................................................................................... 23 Findings: ................................................................................................................................................................23 Recommendations:............................................................................................................................................24 ADVICE FOR CONSUMERS:.................................................................................................................................... 26 PART II. CONSUMER SCORES: WHAT GOES INTO THEM, AND HOW THEY ARE MADE. 27 DEFINING CONSUMER SCORES MORE DEEPLY ................................................................................................. 27 MAKING A CONSUMER SCORE, STEP 1: WHAT CONSUMER INFORMATION GETS PUT INTO A CONSUMER SCORE? ............................................................................................................. 30 TRADITIONAL SCORE INGREDIENTS:CREDIT SCORES .................................................................................... 30 MODERN SCORE-MAKING INGREDIENTS:RAW CONSUMER DATA IN THE DIGITAL AGE......................... 32 CONSUMER DATA AVAILABLE FOR PURCHASE AND USE IN ANALYTICS ..................................................... 33 Demographic Information:.............................................................................................................................33 Contact Information:........................................................................................................................................34 Vehicles: ................................................................................................................................................................. 34 Lifestyle, Interests and Activities data (including medical):...........................................................34 Financial and Economic – Property and Assets data: .......................................................................36 Financial and Credit data:.............................................................................................................................37 SCORING MODELS: HOW THE CONSUMER SCORES ARE MADE, PART TWO .................... 38 ALGORITHM,INC. ................................................................................................................................................... 38 LAYERING SCORING MODELS ................................................................................................................................ 40 HOW MANY VARIABLES?....................................................................................................................................... 41 POLICY QUESTIONS ................................................................................................................................................ 41 PART III. THE CONSUMER SCORES ................................................................................................ 42 The Scoring of America, p. 3 CATEGORY:FINANCIAL AND RISK SCORES ........................................................................................................ 43 ChoiceScore ..........................................................................................................................................................43 Median Equivalency Score (Summarized credit statistics).............................................................44 Risk IQ Score ........................................................................................................................................................45 Consumer Profitability Score........................................................................................................................45 Job Security Score ..............................................................................................................................................47 Consumer Prominence Indicator Score....................................................................................................47 Discretionary Spending IndeX Score..........................................................................................................48 Invitation to Apply Score................................................................................................................................48 Charitable Donor Score...................................................................................................................................49
Recommended publications
  • Análisis De Klout Y Peerindex
    HERRAMIENtas WEB para LA MEDICIÓN DE LA INFLUENCIA digital: ANÁLISIS DE KLOUT Y PEERINDEX Javier Serrano-Puche Javier Serrano-Puche, profesor de teoría de la comunicación en la Universidad de Navarra, in- vestiga los fundamentos teóricos de la comunicación, y sobre todo del periodismo, con interés por el ámbito digital 2.0. En especial estudia las redes sociales, tanto por sus implicaciones para la expresión de la identidad personal como en la conformación de la esfera pública. Es autor de La verdad recobrada en la escritura (2011), una biografía intelectual de Leonardo Sciascia. Sobre este escritor siciliano también ha publicado numerosos ensayos en diversas revistas españolas y extranjeras. Universidad de Navarra Departamento de Comunicación Pública Edif. Biblioteca, 31080 Pamplona, España [email protected] Resumen Cada vez más es reconocida la relevancia en el entorno digital de los “líderes de opinión” o usuarios influyentes: aquellos que por medio de su actividad online (publicación de tweets y entradas en blogs, actualización de su estado en las redes sociales, recomendación de lecturas…), cumplen con la función de crear contenidos o de filtrarlos hacia personas sobre las que tienen ascendencia. Por eso han proliferado las herramientas que evalúan la influencia de una persona o marca a través de la monitorización de su uso de los medios sociales. Se analizan las dos más importantes: Klout y PeerIndex. Se explican los parámetros que constituyen la base de sus algoritmos de medición, así como sus carencias. La comprensión de cómo se ejerce y cómo puede medirse la influencia digital es una de las cuestiones más interesantes del fenómeno 2.0.
    [Show full text]
  • 2020 Identity Theft Statistics | Consumeraffairs
    2020 Identity Theft Statistics | ConsumerAffairs Trending Home / Finance / Identity Theft Protection / Identity theft statistics Buyers Guides Last Updated 01/16/2020 News Write a review 2020Write a review Identity theft statistics Trends and statistics about identity theft Learn about identity theft protection by Rob Douglas Identity Theft Protection Contributing Editor In 2018, the Federal Trade Commission processed 1.4 million fraud reports totaling $1.48 billion in losses. According to the FTC’s “Consumer Sentinel Network Data Book,” the most common categories for fraud complaints were imposter scams, debt collection and identity theft. Credit card fraud was most prevalent in identity theft cases — more than 167,000 people reported a fraudulent credit card account was opened with their information. Identity theft trends in 2019 In the next year, the Identity Theft Resource Center (ITRC) predicts identity theft protection services will primarily focus on data breaches, data abuse and data privacy. ITRC also predicts that https://www.consumeraffairs.com/finance/identity-theft-statistics.html 2020 Identity Theft Statistics | ConsumerAffairs consumers will become more knowledgeable about how data breaches work and expect companies to provide more information about the specific types of data breached and demand more transparency in general in data breach reports. Cyber attacks are more ambitious According to a 2019 Internet Security Threat Report by Symantec, cybercriminals are diversifying their targets and using stealthier methods to commit identity theft and fraud. Cybercrime groups like Mealybug, Gallmaker and Necurs are opting for off-the-shelf tools and operating system features such as PowerShell to attack targets. Supply chain attacks are up 78% Malicious PowerShell scripts have increased by 1,000% Microsoft Office files make up 48% of malicious email attachments Internet of Things threats on the rise Cybercriminals attack IoT devices an average of 5,233 times per month.
    [Show full text]
  • Suspect Until Proven Guilty, a Problematization of State Dossier Systems Via Two Case Studies: the United States and China
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Fall 2009 Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Kenneth N. Farrall University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian Studies Commons, Communication Technology and New Media Commons, International and Intercultural Communication Commons, and the Social Influence and oliticalP Communication Commons Recommended Citation Farrall, Kenneth N., "Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China" (2009). Publicly Accessible Penn Dissertations. 51. https://repository.upenn.edu/edissertations/51 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/51 For more information, please contact [email protected]. Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Abstract This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S.
    [Show full text]
  • Travelsofadam-Media2013.Pdf
    IT’S A BLOG ABOUT Travels of Adam is a top-rated travel website & blog of unique and interesting stories from around the world. The site receives over 50,000 page views per month from 100+ countries. Readers are modern, open-minded and socially responsible individuals with a very strong interest in travel and city destinations. Adam strives to find interesting and unique stories from around the world, whether political tours, art exhibits or destination guides. WHY BLOG? Travels of Adam is consistently ranked among the top 50 travel blogs by numerous online sources and is a featured source of information on the travel industry, specifically “hipster travel.” Advertising on travelsofadam.com, it’s possible to reach a highly commercial demographic. Readers consistently use the site as a source for useful & interesting travel information. Readers have been known to purchase tours, visit recommended travel websites & change travel itineraries based on recommendations published on this website. Travels of Adam.com March 2013 EDITORIAL ART, MUSIC, DESIGN & PHOTOGRAPHY With a background in graphic design, Adam writes about museums, art galleries, exhibits and unusual architecture. Read: David Guetta live in Berlin ALTERNATIVE THINGS TO DO Popular posts include alternative city guides with information on graffiti, interesting tours, local blogs and unique restaurants. Read: Alternative things to do in Tel Aviv HOTEL & ACCOMMODATION REVIEWS POLITICAL & SOCIAL ISSUES With a section devoted entirely to hotel and other accommodation reviews, Adam is able to provide honest feedback to readers on Travel isn’t just about visiting landscapes & famous tourist sites where to stay. Adam is also the curator and founder of a growing but also learning about the local political climate and culture.
    [Show full text]
  • Social Networks Influence Analysis
    University of North Florida UNF Digital Commons UNF Graduate Theses and Dissertations Student Scholarship 2017 Social Networks Influence Analysis Doaa Gamal University of North Florida, [email protected] Follow this and additional works at: https://digitalcommons.unf.edu/etd Part of the Computer Sciences Commons Suggested Citation Gamal, Doaa, "Social Networks Influence Analysis" (2017). UNF Graduate Theses and Dissertations. 723. https://digitalcommons.unf.edu/etd/723 This Master's Thesis is brought to you for free and open access by the Student Scholarship at UNF Digital Commons. It has been accepted for inclusion in UNF Graduate Theses and Dissertations by an authorized administrator of UNF Digital Commons. For more information, please contact Digital Projects. © 2017 All Rights Reserved SOCIAL NETWORKS INFLUENCE ANALYSIS by Doaa H. Gamal A thesis submitted to the School of Computing in partial fulfillment of the requirements for the degree of Master of Science in Computing and Information Sciences UNIVERSITY OF NORTH FLORIDA SCHOOL OF COMPUTING Spring, 2017 Copyright (©) 2017 by Doaa H. Gamal All rights reserved. Reproduction in whole or in part in any form requires the prior written permission of Doaa H. Gamal or designated representative. ii This thesis titled “Social Networks Influence Analysis” submitted by Doaa H. Gamal in partial fulfillment of the requirements for the degree of Master of Science in Computing and Information Sciences has been Approved by the thesis committee: Date Dr. Karthikeyan Umapathy Thesis Advisor and Committee Chairperson Dr. Lakshmi Goel Dr. Sandeep Reddivari Accepted for the School of Computing: Dr. Sherif A. Elfayoumy Director of the School Accepted for the College of Computing, Engineering, and Construction: Dr.
    [Show full text]
  • Using Facebook Metrics to Measure Student Engagement in Moodle
    IJODeL, Vol. 2, No. 2, (December 2016) Using Facebook Metrics to Measure Student Engagement in Moodle Leonardo Magno Senior Editor, Publishing Team, Asian Development Bank, [email protected] Abstract Facebook uses engagement rates as a metric for social media managers and marketers to measure how efectively a page, a post, a comment, a brand, or a topic is able to engage the target audience. Studies have proposed the use of these metrics for other types of online measurements in applications and industries other than social media. This concept paper proposes the use of a modifed Facebook engagement rate formula to (i) measure students’ engagement with forum posts using virtual learning environments such as Moodle and (ii) get data from students regarding which topics or posts engage them more in the learning process. While virtual learning environments have their own logs and learning analytics software, and studies have explored the use of Facebook as a discrete and supplementary platform to traditional learning management systems, this paper flls the research gap by applying Facebook’s engagement rate formula to Moodle itself. Applying an existing social media audience engagement formula to an online course may provide instructors and educational institutions valuable feedback on what types of posts, comments, or topics make students interact and engage more in online learning sessions. Such an exercise may lead to new metrics which distance learning institutions could use to calibrate their content with the objective of improving students’ interaction and engagement with instructors, fellow students, and the online course in general. Keywords: Facebook, Moodle, social media, engagement rate, learning analytics Introduction Virtual learning environments like Moodle and Blackboard—sometimes referred to as online course platforms or learning management systems—come with their own analytics and reporting tools either as built-in features or as plug-in software.
    [Show full text]
  • Agencies, the Push by Management the Requirements of an Industry in Dire Need of New, Better Consulting, Growing Independent Firms, Etc.)
    Industry Update A summary of newsworthy client/agency relationship developments and relevant marketing or agency management trends from the past month. Volume 31 Executive Summary—Monthly Recap TALENT: securing the right talent and resources Holding companies are on the defensive. They’ve experienced poor stock performance as a result of disappointing revenue and negative organic Restructuring and consolidation are behind many new recent growth, which in turn results from intense competition announcements, impacting talent still too scarce to meet (the rise of in-house agencies, the push by management the requirements of an industry in dire need of new, better consulting, growing independent firms, etc.). ways to mature. Yet, it remains a highly dynamic industry with There is greater financial pressure from clients big names leading the pack. Alex Bogusky is back to CP+B, experimenting with ZBB to right-size marketing budgets Antonio Lucio leaves HP and goes on to save Facebook as and industry trends like GRDP which caused spend to its new CMO, and Sr. Martin Sorrell is still making headlines soften. A new report by Forrester, “Agency Holding rebuilding his empire brick by brick. Companies Need A Brave New Business Model,” says, • Publicis Groupe’s Publicis Communications hub “Agencies need a new business model that puts the restructured the production departments at three of its client at the center, elevates new services, and blends New York-based creative agencies in an effort to streamline creative entrepreneurialism with new executional its efforts, reduce operating costs, and drive efficiencies to prowess.” Agency holding companies must embrace better serve clients like P&G.
    [Show full text]
  • Tips, Dones and Todos: Uncovering User Profiles in Foursquare
    Tips, Dones and ToDos: Uncovering User Profiles in FourSquare Marisa Vasconcelos Saulo Ricci Jussara Almeida Universidade Federal de Universidade Federal de Universidade Federal de Minas Gerais Minas Gerais Minas Gerais Belo Horizonte, Brazil Belo Horizonte, Brazil Belo Horizonte, Brazil [email protected] [email protected] [email protected] Fabrício Benevenuto Virgílio Almeida Universidade Federal de Universidade Federal de Ouro Preto Minas Gerais Ouro Preto, Brazil Belo Horizonte, Brazil [email protected] [email protected] ABSTRACT 1. INTRODUCTION Online Location Based Social Networks (LBSNs), which com- Online Location-Based Social Networks (LBSNs) is a new bine social network features with geographic information paradigm of online social networks that has been experienc- sharing, are becoming increasingly popular. One such ap- ing increasing popularity, attracting millions of users. In plication is Foursquare, which doubled its user population LBSNs, users can check in, broadcasting their location to in less than six months. Among other features, Foursquare their friends, through the social graph. Check ins are per- allows users to leave tips (i.e., reviews or recommendations) formed in special locations, named venues, which represent at specific venues as well as to give feedback on previously physical places, such as universities, monuments, or even posted tips by adding them to their to-do lists or marking business enterprises and commercial brands. Check ins may them as done. In this paper, we analyze how Foursquare be converted into points that allow users to earn badges, users exploit these three features – tips, dones and to-dos venue mayorships as well as receive special offers.
    [Show full text]
  • Using Big Data Analytics to Fight Identity Fraud
    Primary IDA Color Palette Secondary Color Palette - Medium R122 R247 R0 R0 R154 R250 R47 R165 G134 G143 G53 G114 G155 G187 G163 G194 B142 B30 B95 B156 B157 B119 B255 B218 Gray Orange Navy Blue Blue Using Big Data Analytics Gray Orange Navy Blue Blue R106 R84 R102 R191 R42 R147 R165 R216 G154 G148 G49 G191 to Fight Identity Fraud G197 G201 G113 G216 B194 B63 B144 B191 B255 B129 B206 B216 Light Blue Green Purple Light Gray Light Blue Green Purple Light Gray Dr. Stephen Coggeshall Chief Analytics and Science Officer ID Analytics/Lifelock 2nd Workshop of Mission-Critical Big Data Analytics Prairie View, May 16,17 A Symantec Company © 2017 ID Analytics, Inc. Confidential Primary IDA Color Palette Secondary Color Palette - Medium R122 R247 R0 R0 Outline R154 R250 R47 R165 G134 G143 G53 G114 G155 G187 G163 G194 B142 B30 B95 B156 B157 B119 B255 B218 Gray Orange Navy Blue Blue Gray Orange Navy Blue Blue • All about identity fraud R106 R84 R102 R191 – modes R42 R147 R165 R216 G154 G148 G49 G191 G197 G201 G113 G216 B194 B63 B144 B191 B255 B129 B206 B216 – examples Light Blue Green Purple Light Gray Light Blue Green Purple Light Gray • Using big data analytics to catch identity fraud – a look into our technology © 2017 ID Analytics, Inc. Confidential 2 One column Primary IDA Color Palette Secondary Color Palette - Medium ID Analytics Overview R122 R247 R0 R0 R154 R250 R47 R165 G134 G143 G53 G114 G155 G187 G163 G194 B142 B30 B95 B156 ID Analytics applies advanced analytics to a unique sources of U.S.
    [Show full text]
  • Interpublic Group of Companies, Inc. (The) Annual Report 2019
    Interpublic Group of Companies, Inc. (The) Annual Report 2019 Form 10-K (NYSE:IPG) Published: February 25th, 2019 PDF generated by stocklight.com UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K ý ANNUAL REPORT PURSUANT TO SECTION 13 OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2018 or o TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Commission file number: 1-6686 THE INTERPUBLIC GROUP OF COMPANIES, INC. (Exact name of registrant as specified in its charter) Delaware 13-1024020 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) Identification No.) 909 Third Avenue, New York, New York 10022 (Address of principal executive offices) (Zip Code) (212) 704-1200 (Registrant’s telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of each class Name of each exchange on which registered Common Stock, $0.10 par value New York Stock Exchange Securities Registered Pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes ý No ¨ Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes ¨ No ý Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]
  • Gendered Visibility on Social Media: Navigating Instagram’S Authenticity Bind
    International Journal of Communication 13(2019), 4983–5002 1932–8036/20190005 Gendered Visibility on Social Media: Navigating Instagram’s Authenticity Bind BROOKE ERIN DUFFY1 Cornell University, USA EMILY HUND University of Pennsylvania, USA Although the digital economy’s guiding logics of attention and visibility rouse social media users to put themselves out there, individuals experience digital visibility in profoundly uneven ways. For women, in particular, the public nature of online communication is fraught with risk, opening the potential for ridicule, hate, and harassment. This research explores the vexed nature of visibility among Instagram content creators, a community that is especially beholden to this so-called “visibility mandate.” Drawing on in-depth interviews with 25 aspiring and professional Instagrammers, we show how they attempt to stave off potential critique in patterned ways. In their efforts to project themselves as authentic, many sought to deflect accusations of being too real, and, alternatively, as being not real enough. We argue that this uniquely gendered form of a socially mediated “authenticity bind” indexes the wider policing of women and other marginalized communities in digitally networked spaces, wherein they must carefully toe the line between visibility and vulnerability. Keywords: social media, visibility, gender, authenticity, Instagram, influencers Guided by the social media economy’s logics of attention and reputation, Internet users are roused to pursue markers of visibility in the form of likes, favorites, comments, and retweets. On the surface, at least, it seems the greater one’s visibility, the better; careers are borne, new social connections forged, and opportunities for status and professional success abound (e.g., Abidin, 2016; Banet-Weiser, 2012; Cotter, 2018; Duffy, 2017; Marwick, 2013; Schaefer, 2012).
    [Show full text]
  • United States Securities and Exchange Commission Washington, D.C
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 _______________________ FORM 8-K _______________________ CURRENT REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of report (Date of earliest event reported): October 1, 2018 The Interpublic Group of Companies, Inc. (Exact Name of Registrant as Specified in Charter) Delaware 1-6686 13-1024020 (State or Other Jurisdiction (Commission File (IRS Employer of Incorporation) Number) Identification No.) 909 Third Avenue, New York, New York 10022 (Address of Principal Executive Offices) (Zip Code) Registrant’s telephone number, including area code: 212-704-1200 (Former Name or Former Address, if Changed Since Last Report) Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligation of the registrant under any of the following provisions: o Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425) o Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12) o Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b)) o Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (17 CFR 240.13e-4(c)) Indicate by check mark whether the registrant is an emerging growth company as defined in Rule 405 of the Securities Act of 1933 (§230.405 of this chapter) or Rule 12b-2 of the Securities Exchange Act of 1934 (§240.12b-2 of this chapter). Emerging growth company o If an emerging growth company, indicate by check mark if the registrant has elected not to use the extended transition period for complying with any new or revised financial accounting standards provided pursuant to Section 13(a) of the Exchange Act.
    [Show full text]