Consumer Finance Monitor Podcast Episode: Responding to Direct and Indirect Identity Theft Disputes Under the FCRA: What Are The Differences?
Torres Talks Trade Podcast Episode 9 on U.S. Customs and Border Protection's Global Business Identifier program
Phishing: Cybersecurity’s Biggest Threat
Digging Deeper, Episode 1: The Con Queen of Hollywood
Preserving Black History in Bucks County, PA, with Recorder of Deeds Robin Robinson: On Record PR
What is Consumer Fraud and What Deceptions are Employed?
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
In the digital age, identity theft has taken on new and sinister forms, extending beyond the living to the deceased. When a loved one passes away, their identity doesn’t simply vanish; it lingers in both the digital realm and...more
Recently, I attended the 2024 Summer Meeting for the American College of Trust and Estate Counsel (ACTEC) in Toronto. While there I presented to ACTEC’s Digital Property Committee on ghost hacking. Ghost hacking is when a...more
A U.S. district court in the Eastern District of New York recently denied a motion for summary judgment filed by a credit card issuer because the plaintiff alleged identity theft and a reasonable factfinder could determine...more