vimarsana.com

[inaudible conversations] good morning now the executive session is complete data reaches not a new issue weve been focused on the consumer that was before i was elected to the senate. The breach is what many would consider to be the high profile breach with a number of investigations from the federal and state authorities. This was originally created by equifax so in terms of the trajectory the major did reach you could say we could come full circle. Congress paid close attention to the dative breach to strengthen Data Security requirements as well as those to affect companies to notify a the discovery of a breach so in that era with a large scale breach but while larger with consumers equifax is more severe given the sensitive nature. Weve heard from many constituents our concern of the lasting effects and i have heard complaints it is difficult to setet up the credit freeze if monitoring ispr the effective tool. The breach exposed those consumers including names and Social Securityin numbers and a drivers license numbers also expose the credit card numbers from consumers and documents for more then 180,000 consumers so today to have an update regarding the of a breach to mitigate dow harm from happening again. Will we will discuss today in was a prior w breach where similar information was stolen so the compromise data is names and telephone numbers and unscripted security questions theen answers but that 3 billion figure from the time of the breach today their representatives have the opportunity to mitigate the harm Going Forward. So that illustrates quite dramatically the nation faces cyberthreats those that collect and store summer should have Server Security and consequences of the failed to do so i look forward to the hearing as it considers legislation to bed dative breach notification if there is a risk we must make sure consumers have the information they need to protect themselves that is why i support the standard with a patchwork of laws in addition to the District Of Columbia and three other territories progressing well federalte standard with regard to notification of those data breach and provide consistency benefiting both consumers and businesses in order to ensure we have advocated for reasonable security requirements based on the size and scope of the sensitivity of the information. However in this regard the Equifax Breach is troubling it was already subject to the safeguard under the act that was considered to be as stringent regulation but it occurred so enhancing security will be a priority for thiss Committee Thanks to the witnesses for appearing in the above forward to your testimony. Thank you, mr. Chairmann chairman and just as you stated is the history of hearings we have held for Data Security in preaches so several senators have asked hearing senator baldwin in particular so thank you for bringing this to the forefront. If you start with a massive breach from 2005 then continuing with saudi, city group, a cbs, south shore, the parade of high profile data breach has no end and billions of insumers have had their to have personally identifiable information compromised including Social Security numbers, a drivers license, addresses and for years Going Forward criminals can use the data attu steal the identity of venice and consumers to create fakena accounts and i might point out right now we estimate 5 billion per year is stolen from the u. S. Treasury just with fake federal income tax returns that they get a refund a unit on top of that we also recently found out the 2013 yacht reach yahoo breached 3 million users the biggest in history dealing in the aftermath of the Equifax Breach involving the personal identification informationon of 145 million americans. Now the most recent is a more troubling question because of Credit Reporting agencies that offer the Credit Monitoring Services cannot protect their own data and how do they trust any company to protect information . So let me say when you get up against the sophistication of the state actors it will be hard to protect against them. So sadly the question millions of americans are asking, in the wake is what do we do . So this committee will consider what it will do to make sure consumers are protected. But if we do anything meaningful remus have the political will to hold these Companies Accountable to have to raise Enforcement Actions for lacks Data Security practices. The industry has recently challenged the Legal Authority to bring such actions so this piecemeal after the fact approach would be better served if the ftc could prescribe rules toib prescribe companies to adopt reasonable security practices in the first place purport already put forward rules that apply to Financial Institutions like equifax. The agency should have a similar authority for the restr of the commercial sector. So at the end of the day it is deferring enforcement with the stringent penalties to incentivize to safeguard Consumer Information and notifyme consumers. I strongly believe without rigorous Data Security rules in place not if but when. We can take action with commonsense rules are start planning for this issue. The also hope the hearing can informre those future actions. The panel has the executive office and from equifax next to him the former co pay equifax. Then the former ceo at yahoo corporate. The deputy general counsel chief privacy officer at Verizon Communications a part of yahoo . Then we will ask you to proceed with comments starting a mile left to confine your all remarks at five minutes anything you want to add will be included in the written record. Thanks for being here. Good morning. To members of the committee thank you for the opportunity tof f be here for crow six weeks ago i was named chief executive officer of equifax and never expected to become ceo in this circumstance but i am honored to be in this position. Speaking for everyone for those that have been breachedac you can tell from an accident did not grow up in georgia and a native of brazil i had the privilege working most of my adult life in the u. S. And i children were born here. And engineer by training to spend a lifetime fixing complex business problems. Said the first act was to address the consumer response so the engagement that theyre working hard to fix the problem. Lasso apologize to the American People but i promise each of you that equifax will be focused every day to provide support for consumers to give them more control side like to review so the highest priority i have visited call centers and is spoken with the representatives i have taken calls from consumers and help to resolve their issues. With a social media will significantly improve the web site and the call centers to make it more consumer friendly. Second to revise the Corporate Structure the chief Security Officer now reports directly to me. So this is a response to the cybersecurity. Third we are improving the security infrastructure. Introducing the new vulnerabilities and with that accountability mechanisms. Those that w are committed to thoseo solutions with cybersecurity and challenges we all face. And finally we promised to launch what gives the consumers the power to block access to their personal credit data. So were on schedule and make itt they can extremely valuable. We have done a lot in a time butiod of this is just the beginning so i remind me to everyday so with those capabilities requires a daily engagement and a lifetime i commitment. Equifax has 10,000 people it is not well understood but helping consumers get the credit that they need. So to protect the data we do not meet those expectations. We are committed to working with consumers and congress and the regulators to restore public trust. This has been my focus with the first six weeksks as ceo and every day. Thank you for your attention and i welcome your questions. Chairman and Ranking Member and honorable members of the committee i submitted my written testimony to this committee as well as others in the senate in the house and the written testimony goes into the record of the events when the breach occurred and i will answer any questions you may have. Chairman, Ranking Member nonsense and distinguished members of the committee, things for the opportunity to appear before you today and have the honor of privilege of serving as the yahoo chief executive officer july 2012 through the sale of june this year. Yahoo is the victim of statesponsored attacks resulting in the fact that we worked hard over the years and as ceo and want to sincerely apologize to each and every one of our users. When yahoo learned of the attack in late 2014 they promptly reported to Law Enforcement notifying the users that have been directly impacted. Working closely with lawenforcementhe we were able to identify and expose the hackers responsible. We now know the russian Intelligence Officers in statesponsored hackers were responsible on the yahoo systems. Fortyseven count indictment charging for individuals with these crimes in the users the other day the fbi praised yahoo for our proactive impeachment and november 2016 Law Enforcement provided us with data files and thirdparty claims. Fromzing it was stolen the company in august 2013 and although yahoo was working with experts the company promptly disclosed to notify the accusers and to secure all User Accounts and personally when field about this and growing up in wisconsin i had my first computer in college. To see how that emerging technology could use the world. That i was hired by google. Then over thee next 30 years there worked my way up to software engineer. So in july 2012 i became ceo of yahoo . I will always be grateful for that opportunity to lead yahoo for the last five years my experience has shown me the amazing potential of the internet to change for the better. I am here today to discuss our efforts with the challenges of cybersecurity with those measures that yahoo had in place to of finance so throughout my tenure we would protect our systems devoting substantial resources tuesday ahead of the threats. Then be roughly double the internal security staff with the leadership a and the team. In addition we also improve the system defense. Of sophisticated protection we were extremely committed to those resources thanks for their tireless efforts to address yahoo security unfortunately coming up against a barrage of attacks russian agents intruded on our systems. That change the Playing Field so dramatically even those of the most well defended so its a Global Challenge no Government Agency is in you. The attack shows that collaboration between public and private sector is essential against cybercrime and in addition as the doj exhibit it could be a deterrent. So to echo the words of the attorney general nomination stage attack is not a fair fight by workingt together we can help. Thanks for the opportunity to address the community. Chairman, Ranking Member and members of the committee, thank you for the opportunity to testify today. I am verizon chief privacy officer. With a certificate and longstanding driven to protect and safeguard consumer data to build trust of mine in the increasingly connected world for a rise in recognizes Consumer Trust is a prerequisite to compete in the digital economyy the nature has required it makes Data Security a top priority. Verizon announced it entered the agreement to enter the operating business so now newo is part of a company that consist of more then 50 digital and Global Brands including yahoo news and sports and aol. In december 2016 and announced the dave del was stolen in two separate instances 2013 and 2014. Well before verizonon acquisition so at the time it disclosed more than 1 million of those 3 billion accounts were likely impacted. After verizon acquired it to give this Team Forensic experts used previously. Based on the review we concluded all accounts were impacted by the security incident so bin yahoo provided further notice beginning october 3rd october 3rd, 2017 less than one week. After the impacted accounts it did not include Social Security numbers or passwords and did not include Financial Information like payment card data or a bank accounts. Ownough verizon did not root yahoo at the time we understood that they took action around the time of the announcement to protect the users accounts. They require a password changes if they had not been changed since 2014. They also invalidated in an an unscripted security questions and answers. They took these actions beyond what was impacted so this means they took steps to protect all users including those that were individuallyti notified. Proactively enhancing security is a top priority. We track the evolution of attacks and leverage technologyll advances to apply more advanced protection so as part of integrating with two strong existing Security Teams to examine those practices to apply the best practices and tools to create the Advisory Board consisting of the external Security Experts with the overalls approach for crow security has always been in horizons dna and for us to meet the security challenges of the future. We are weser focused on the needs of our customers we expect that will be secure. As a result we go to Great Lengths across the network and platforms and products with substantial resources to extend assets including those acquired with the transaction of yahoo her call with the benefits of resources with the highest level of accountability we will continue to strive to stay ahead of the ever revolving threat. Thank you for the opportunity to testify a look forward tord answering question. Chairman and Ranking Member and members of the committee thank you for the opportunity for these data reaches touching the vast majority what is necessary so almost 50 years we have provided solutions for a the identities with banking and government it is a foundational element the way they build their Financial Lives that value is the primary reason it is targeted that would be too significant data reaches. With the evolving and sophisticated task with greater connectivity with every aspect. So 43 percent could all be traced to a malicious actor. To use this information to gain access and once compromised in is consumer identity. With those most recent breaches the most identifiable information for millions of american citizens for the focus is to examine the recent data reach to ensure the of safety with those options for the future for regarding those issues of consumer data to date they are challenged by increasingly complex systems from other wellat organized groups. No system is free from vulnerabilities. So there are documented best practices. So it m is the result of Common Security mistakes. So today a substantial amount of the basis of identities and with driving responsible behavior writing in answer to the underlying consumer identities. It is critical to respond to recover quickly to ensure consumer data is no longer a risk. En that provides a nine digit number or Social Securityed card is issued at birth in difficult to change so while we made substantial advances and the recommendation is with that framework that is through that given Industry Collaboration with those partnerships around the world that identity framework allows citizens to utilize the morsi to reduce the breach or compromise so it could minimize risk and allow a consumer to cover their identity. That system today is broken into the secure this time to leverage available technologies and in the of previous t testimony with a publicprivate ecosystem to security identities with that self assessment. Whether we drive that we to proceed now. So with that information that has already been compromised to have a more resilient identity. Thank you for your time today. We deeply value our security and with those cyberattacks there are persistent with that understanding of the facts. And to this day they have not been able to identify that intrusion receiving files from lawenforcement we verify that it came from yahoo we dont know how it was perpetrated. Why the delay . And then to underestimate yahoo did not know of the intrusion in 2013. It in a very short period of time that it was most likely from august of 2013 and notify lawenforcement and other users to take action on the accounts at that time we estimated more than 1 billion users. There were recente amounts from those the nederlander with the company. The 500 million originally then jumped up at 3 billion. Into calculate those. That 500 million number was the fall from 2014 to reach. In prior testimony with that vulnerability and compound it by that scandal should have detected the failure but didnt. And that vulnerability could persist for several months without corrective action. So the company that holds the most Sensitive Information i hope you can understandon why this is so hard to distained. Can you explain why there were not more redundancies built into theno system . You testified nore weaknesses have been addressed and also elaborate on how . So to be certified with of protocol with that open sourceof software. But thats scant did not find those portabilitys. It was human error along with technology error. So why wouldnt you have more redundancies built into the system . That just comes down to one employee . That is hard to fathom. That skinner did not work as well. And to identify the patch then to go back a week later with a scanner. So can you elaborate . On any further steps since the breach . We installed shortly after that scanning technology that new generations scanner with some process changes. So with those systems and our company a comprehensive talked to a review and were strengthening all aspects of operation including our capabilities and dancing and updating the tools to make sure we have the stronger policies in place to have more redundancy with the closed lips to make sure those actions. Have you disposed of the data you no longer need . So whatever is necessary spirit but including the encryption. So that would be displaced. N we had these hearings before we will be having a lot of these hearings again at this point we are wondering there is no such thingg as did the security. Such as china or russia your companies cannot stand up against them. [inaudible]on on. [inaudible] [inaudible] [inaudible] [inaudible] thank you senator. A couple of different things. First, your point that we have to Work Together is absolutely right. I think we need to work with industry and government to tackle this problem. Theres Data Security data breach legislation, legislation should all of the Security Teams to understand that security is instead a, sorry changing. The tools are getting better, the intelligence were gathering is changing so were trying to improve our Security Systems to improve and keep up. Thats a good intention. But, its going to take more. Its going to take an attitude change among companies such as yours that we have got to go to extreme limits to protect our customers privacy. Mr. Smith, you all hold a lot of financial guillotine over a lot of your customers by virtue of what your Credit Rating is. So if your date is not protected house were to buy house and hes got it ready and has the down payment and that he cannot get a mortgage because now he is a black mark on his Credit Rating that is is not real, but has been placed there because of the data breach and the poor fellow can close on his house. This has huge consequences. What are you going to do about it . Theres no doubt the security data is the core value of our company. I also apologize deeply to the American Public for the bridge that we had when we let the public down. I agree with the other panelists. The accommodation between public and private to address issues. My 12 years of meaning the companys an increase in Cyber Attacks is remarkable to see its not unusual for us in any given year to see suspicious activity is unwanted attempted attacks. Okay, but didnt you describe the faxes the victim . The company failed to secure the vulnerability that led to the breach. Was a colfax really the victim . I agree were victim of a criminal attack. Do you consider this to be a victim . Theres been many victims in the case of the breaches. The impact from hackers moving in and caused me to be a victim. Well, deeply they had Adequate Security measures in place . Based on my understanding were talking about patching security vulnerabilities in a timely way we seem the disc the breach, this is what isaac just you. I dont understand your question. Do consider them to have had appropriate security protocols. I would not recommend suggesting that was the protocol so, vehicle faxes not the victim, that support customers of the equity facts. I believe both are victims. This is a Publicprivate Partnership will i wonder if also you could apply to if you could do user id numbers, and ill ask mr. Wilkinson to address this question also because in your testimony you talk about dynamic is a way to address this in the modern age knowledge shirts. Some sort of Digital Identity that might last for three years. Go to mr. Wilkinson first and then back to mr. Smith is a system working better for the consumer and brazil is against this onslaught which mr. Nelson described in his question is in the cases of a Social Security number you we can framework the theres many tools today that companies are using for these that help overcome the vulnerabilities we see. Some of them have to be deployed as we talk about the results numbers as a primary form of identification. Skies have additional examples of what we see other countries during that i want suggest best practices that would be important for committees to look at. But our recommendation is moving from the situation the United States is no longer secure. This that was issued by the federal government is a providing a citizen with a Digital Identity that they can easily certain transactions, high security needs, digital requirements and it has a like. The way they avoid that is more secure in makes them more resilient than what they are today. In your view the consumer is better protected than this brazilian system . What do you say . I would agree. That theres some digital multifactor authentication. As you suggest legislation and it might be all five members of the panel advocating legislation. In general over this legislation look like . The two key things data breach legislation or number one the net National Framework so that we have one standard to comply with is were stopped funding to the data breach, number two, its important etiquette standard when we notify customers. Its important to notify customers, they really need but also make sure that were not notifying them so often about so many things that they stepping attention. Would anybody like to take issue with senator nelsons overall conclusion against the state actor like we have seen . Im Years Company is unable to understand that without going. December disagree with that . No takers. Thank you. Thank you. Thank you mr. Chairman and thank you for having hearing that they could to the witnesses for being here. I think almost every American Consumer at this point is where the of the unacceptable risks that are entailed in many of our business practices, risk to their privacy. , information that they expect and reasonably anticipate will be safeguarded by companies that do business with them. And where their customers. The carfax breach expose the limits of the trade commissions need to protect consumers the trinidad negligence. Under current law even some of the most egregious example can be met only with apologies and promises to do better next time. Finds were other penalties, real deterrence that provide incentives to Business Executives to actually do better. The real deterrence will, those penalties are imposed on executives like the ones before us today. The entities that holder data can be trusted to protect it, then the government needs the tools to not only go after hackers and thieves but also whole Companies Accountable. , since legislation in the data breach accountability enforcement active 2017, including nonprofits and can impose civil penalt penalties te sufficiently strong to motivate companies to implement Strong Security at the onset. This area truly an ounce of prevention is worth a pound of cure. In many instances theres no real cure. When you were here last, i think it was as you are on the senate side at least we can be for the Judiciary Committee and i asked if you could commit and none of your consumers would never be required to go through arbitration. You said you are no longer with the company cannot guarantee small to ask and i appreciate you being here today. I have the same question, can you guarantee that no consumer will be required to go through arbitration services. Senator, i understand the question on the arbitration that needs to be removed, arbitration is a tool used by the consumer industry. We have you said to in the light of the law, will continue to go through the process and examine the use of this. I apologize for interrupting you but my time is limited as you understand. So, this is one of these yes or no answers. Can you guarantee you will use arbitration . I understand all of on the on the one hand, on the other hand, sexually. Consumers expect to have a right to go to court and have the rights vindicated there, can you guarantee that you will not force arbitration . I believe consumers have a choice with the product. But if they choose your products they will not be forced into arbitration. To know the difference between a credit freeze in the credit lot . Can you guarantee that the credit lot if you use them will be subject to Consumer Protection under the state laws were consumers live . We understand that we use freezing mark. At the end of the day for the consumer the same result will. The state law requires regulated process for the previous. Credit freeze are regulated by credit locks. Is it to avoid state oversight and scrutiny. No. Simple to use more access, easytounderstand for the consumer. My time is expired. Q hope will have a second. Thank you mr. Chairman. Thank you for being here. To think consumers should be able to see the same information their pain uses the bank makes a credit decision. As we have is industry not done a good job representing the consumer how we play in this process is information is provided by the consumer in the process of acquiring the card, opening a credit card, most of the times the financials. When the bank evaluates my creditworthiness they get a bunch of data. I dont get to see what theyre looking at. To think i should be able to see what theyre looking at when evaluating my credit worthiness . This is also probably a yes or no answer. You have access to Credit Report, most of the time is used to make a decision and the Credit Report is the same way score is the same as i have. The information socalled customer has is all that a bank is provided by a fax . I dont know what. You sound like you wanted to correct. If a consumer is going to a bank to apply for loan typically the underwriter they have an access to get free i think what youre referring to is the banks dont just use like a standard fica score. That is not disclose about the individual consumer. Are we are customers . The peoples who dads preacher we are customers . I see that. We have customers and consumers. It seems to me theres a line on this which is to say not to excuse what happened but is different. Incentives are different between the Credit Report agencies who have zero financial incentive to get it right. You guys enter from the department of Homeland Security that theres a vulnerability, your scanner doesnt work, executives cash out their stock. Then you have people lock their credit. You then start to promote through lifelock you have commercials with my foxing theres been a breach, you might want to use the product. Lifelock subcontracts equity facts and you continue to be profitable on the other side for verizon and other companies, if you screw up with your customers theres a Customer Relationship sets freight. But in the case of the Credit Reporting that the foundational problem. Is theres no incentive on your side to do anything other than changes to solve the problem you cause. No incentive to spend the money it would take to transform the company to actually treat us like customers because their lenders. Theyre not the ones that got harmed through the breach. I think the biggest incentive we have this for consumers to keep the data. But thats not fiduciary. You have an Earnings Call and youre going to report that everything is fine. Maybe even that you may more profit than usual i would be remiss if i did not mention because people back home were all of us live cannot understand ceo of equity facts and yahoo walked away with 90,000,000. 27 million and possibly a quarter Million Dollars in stocks. This is unfashionable. Understanding say this is in the proxy separate the board is, i understand that but you people dont understand that. They shouldnt understand how you harm consumers and then walk away that small city or county uses for their annual operating budget. Its not fair and its why we have an obligation to make a law. Mr. By asking this question so as this determines probability. It makes the decisions about how to invest in this case the Data Security based on events happened. My question is, before the breach has occurred at adequate facts and with both companies, what did you expect and say to executive committee and your board of directors. The probability of a preacher crying in was that probability today to calculated what they were and made decisions about them is what the, but the as is it was different prior to the original breaches . We dont calculate the percentage probability, we have Enterprise Risk Management for ten years as Data Security is the most high risk, high probability risk we have company. If we had Cyber Security event it be detrimental to the company. Does that mean you would expect a breach . The probability of a breach is hot as. Is a calculation different today is based on the changes you made at the company is it still the same probability of breach prior to the earlier preachers . We believe today were better than what we were for one reason. You have to make significant investments is. So how much more money are you spending today to prevent a breach from happening. Is a natural response theres been a significant more money in that process. What percentage increase has occurred as a result of what youve learned in. Expect to have a specific spike on the cost. You spend 50 more today . 200 . Four times more. And as a result is it less likely a data breach occurs the company then it occurred before . What is the reduction the probability. I dont have a specific number. I can say we believe its better today. What it be better if youre spending six times more . Or is it technology out there that you could prevent it from happening . Were being advised by specialist. Would yahoo answer this question in the circumstances. We have one of the most valuable databases in the world because of the sheer number of users contained there is we describe this as an arms race. Hackers have become sophisticated. Would you have predicted a breach . I assume the answer is normally would been doing more. We did not correctly percentages for investment security we took efforts which included a factor of two, we empowered users to opt out of passwords star, increased encryption to thwart hackers, where reduce the bounty were outside developers could report vulnerabilities and we would work that calls for we hired outside teams to attack us and tell us where weaknesses were. And then ultimately identify when intrusions occurred. We took extensive actions. Is the probability of a breach less today. We dont calculate the probability of a breach. Are customers more secure today than they were prior to the breach . West expectation is that the less expectation that their data is at risk for an early age . For all. Verizon has always taken security very seriously. Being that same focus and intensity that we brock turner our network what seems to be missing. Which seems to be missing to the insurance that is the customer is and should have a sense that they are safer today than they are before. I dont have insurance thats the case. We ought to be concerned today about reach your goal and what i hear is were taking tabs we to believe other companies in a similar business reach that would affect consumers if there is a breach reaches companies they is moldable to breaches us this is not limited to your company has been not limited to yahoo or fax. Businesses just theyre just as vulnerable as you have them . In addition in response to the breach we took significant steps causing users to reset passwords and changing correction asked in the access that internal employees have low systems. Spot by all means we did respond to change a lot of and and therefore today is a customer i should feel better than my dad a safe . Theres no question that the users are better protected todays breaches because breaches were detected money necessary. Are you spending all the money necessary to increase that protection . Could they be safer if you did more . Certainly during my tenure there is the case security and security. The Security Team value their job against any and all it is to defend against any and all attackers and thats what were trying to. And the Company Provides them with the resources. To any of you disagree that the federal trade commission has jurisdiction over a your data breaches and has the ability to regulate was to penalize if there are breaches question tcs smacked you agree that ftcs your regulator . Make sure the regulatory perspective is in place certainly. Certainly for the yahoo accident Telecom Telecom saw its a complicated question. Thank you. In the absence of the chairman recognition senator. Thank you. Question i know mr. To start with the question of the panel will consist i identify few have any information today about who hack with facts, who possesses personal identifying information 145 million americans doing what you believe thing to do and i. Can you identify patient if any of you have that information today. Known as. We engaged in the on august 2 it. In our experience once the breach has occurred state everyone owns the data because its in the public thank you. Thank you. The real nokia Equifax Breach compromise the personal financial 4,145,000,000 americans. I cant begin to know what we cant even begin to know what ramifications will have this really have individual to the families and individuals that are impacted. I think its clear that a good for her needs to do more than have response to help victims respond to this breach right here and now that you make a commitment right here now that equifax will notify every person who is impacted is breach . Yes or no we. We have been working with consumers and have a social media or webbased to make sure social media work is active. Is teamwork and i have a team working every day to make sure area. I know you backed it in areas were state laws and demands that you do so. I wrote doesnt are you going to reach out to check every individual is believed was impacted to let them know. We will execute morning to the long as accident if theres an absence of long, you want to anything . Were actively engaged to make sure that the equifax have to go set up a poorly functioning website find out where they could go to the website if they were in fact. How many people have gone through this process . We. Is we hads to 400 million individuals. You know how many individuals . 30,000,040. Item 145 to center et cetera. You mentioned call sentence in your testimony, were faxes call centers . In florida and nevada las vegas it was the two major ones are like city is the one in las vegas. Any outside the United States . Should. We use call centers in costa rica. Another practical question. Malaysia, india, most of the colors you are hearing u. S. Is out of the search. I. Tax credits now offering free credit blocking for credit monitoring but only a free Credit Report monitoring through january 31, 2000 need to offer you make a commitment that the facts will offer creep you free credit monitoring for life . If you enroll in january you have another 12 months to use the product. The new product we put in place for consumers cannot credit file free will be available for life. And monitoring . I victims. Victims of this breach only to be able to control ourselves from all three to the reports from all three credit agencies. The other. Will you be offering rebates is to the victims to cover their freezing crawford with the other reporting agencies . Host i believe the resolution is to be want to protect the consumer and sustainable. It has to be skillful an industry driven. We have a first step Forward Service to offer a service that consumers contact to lock and unlock the credit data for free. We want to make sure that we have a similar capacity to you your firm recently completed stock trades prior to the Public Disclosure of the breach and hack special Committee Report on the words that none of the four executive circulation insidertrading. Report failed to mention that equifax chief legal officer, john j kelly prove some of the stock sales on the same day the eye because the fbi company alerted that the company had a problem. Weeks to it took mr. Kelly two more weeks executive there were no longer allowed to sell stock. Yet this is an appropriate. The report doesnt even mention history kelly said he still works for a quick five. Both mr. Do you believe mr. Kellys here to was appropriate . I think its not my perspective to provide is it was appropriate or not. The board has actively defined the correct form. The special committee continues to review the process to review the process is related to the cyprus the incident. Only thing i would say what is theres a full investigation, you saw the report published earlier this week or last week. Its not unusual for us to engage outside Forensic Experts or the fbi we have three to 4 millions this suspicious activities in attendance. Its not an on you. Thank you. Thank you for see. Chair and recommending to the chair and Ranking Member holding her so her serve the facts and the concerns. Theres about 3 Million People in nevada million and 1. 3 million are impacted by the breach. Received 4000 letters conceived over four dozen letters cartilage. Eleven to say no citizen has a say in the reporting practices to start. I did not true sacrifice to store information nor did my husband and children. Yet it is there in the affected not do enough to protect her information. To Data Collected a lot of drill down into the data that was collected. We should be looking at that. The breach for my understanding of the breach, the data that was collected as consumers needs of consumers, Social Security numbers, drivers license conversation true and credit card information, is that true . Yes or no. In some cases, in some cases no. What other data you collect other than what i just identified . Most of the data included your numbers excluding members, name,. What other data do you collect . The record that is providing if they could please provide me with that is curious, does yahoo collect drivers license number . Thats knowledge. Because to me the data breach. The data breach that happen at a factor physically. Realtime happens all the time its getting crazy getting cleaned we have heard it, what i from from what ive heard security is Cyber Security is a challenge. All its incumbent upon all of us included effectively curies to not only have the always evil sophisticated protect security ensuring that you are protecting has data. Counseling enforcement should you should be held accountable to notify the consumer should be notified there should be restitution. Because to me this is about the data. Even those individuals that you work with those who credit locks increases their data was still breached, correct . Because right, so it doesnt matter. Social security number and i see mr. Olson your audience is that correct isnt that correct . Consumers. Yes shouldnt outline consumers had no one at dinner out with the data that i want to share with you. This is part of the way the economy works. As when a consumer goes. The consumer doesnt have a choice, so doesnt have a choice on the data as your collecting. I know i know it and quite frankly, the Credit Report sacred theology do not tell me all the data youre collecting on me. Its is was attorney general for eight years in nevada, Identity Theft and nevada the countries through the roof. Still is what is egregious about what lives now for the rest of life, all the people i hear from the 1. 3 Million People whose identities are stolen they will have to clear the record for the rest of their life. People can create crimes in their name. Ive seen it. Theyre spending their lives clearing their record and their good name. So just thats why this is so egregious and you have an application to not only look at the data youre collecting there is but make sure youre protecting it restitution and youre doing everything you can still to bring restitution. Mr. Will talk about the data and Social Security numbers an idea that we have to look at it differently and identify the iis. We have anything specific on what we should be doing shared or like that that data thats been shared eclectic . Is just to make his first bridge in the case of these breaches we of the items of personal information that was week. When you combine that with others were getting very close states to the information that has been breached in some way so what are you trying to contact . In the case of financial card like the target breach from several years ago that we testified your all, that time i think theres a good point to consider in contrast with those. Actual payment since the financial Payment System is reasonably resilient. It was as consumers despite the fact it was a burden for consumers to have that fraud remediated folders and the ability to do commerce is relatively resilient in addition to liability is the shores of the financial cards, so looking to some examples of the system is an example. Identities are out there. I continue to reinforce that her position is that recently we believe a more resilient framework used to be brought forward. I know. Im running out of time. Throughout the i agree that identities are out there. Tour kids, its not too little and we need to look to the future protect their information. Me something not static address we have to figure out how to address issues the different for you talk about the government coming up with something different. There should be a Publicprivate Partnership. We have to figure this out. Choice were taking their data and they have no choice. Information or monetizing the monetizing it, then they can start killing dealing with the results of a breach. Thank you. Thank you mr. Chair morning to thank you and good morning tour family is as this is a question to the payload most relevant although the most relevant example spot we can call on is a response from the facts which is a major data breach. Their state laws requiring public and private entities to notify people when their Security Breaches. The lowest these represent the most telecommunication required. Companies im interested in what companies i will do consumers affect to help notify those affected stores sorrows is know you stated that koufax has taken steps to further to consider is your satisfaction in your complaint. Only after the seems to have come only after public outcry to the initial response. Can each of you elaborate on what decisions Union Companies take into account when determining steps to remediate the damage done. Will all is lost a research we took this very seriously the state requirement for your. Im asking beyond that. So what you guys so what are you now deciding to do beyond that and what consideration are you making . One of my Top Priorities have been from security response. On the consumer we made our call centers more scalable. You can get in and out and have access with a threeminute. Prolapse im also talking about proactive efforts to notify consumers the on the requesting that state law gives you. Weve been working with consumers to make sure that there using the services we provide for free. You free on them all introduce our locks free for life. In the process we did use was legal and acceptable. I think that is question. The other pets not my question. For what are the factors youre considering went to notify a consumer is . yahoo we take a proactive stance to the nature of our business which is to say that was very from state to state. Frequently of his vacation was required we did it everywhere. Accuracy and comprehensiveness are very important as well as analyze how data may have been misused and be swift in response. verizon we look at what the law requires that the cap what the right thing for the custom customer. Our company doesnt hold Consumer Information so applicable. I want to follow up tomorrows about the difference between credit lock and credit free services. Placing the freeze on it is one of the best ways they can protect themselves. The facts will do freeze and at that point the company stated testimony mistress that will offer consumers the ability to lock the credit for free. You sure the legal differences between the credit lock in a credit freeze access and who has access to this report when it is frozen versus locked. Is fundamentally there is no difference between a locking freeze. When you freeze you use a regulatory process, you make a phone call and identify yourself. You could append and are ready to execute freeze. When he did the lock its a simplicity of the process. Financial institution try to get to your file for situations there frozen will as i. My time is up. There are experts who disagree the terms of your statement that theres no difference between freezing a lot. One thing i will follow up is the fees that koufax gets from helping consumers on fleecing or unlocking information. I thank you for your indulgence. I think the panels being here today question to start the question to you, to your knowledge has any information breached, his drivers license, Social Security, birthdates and addresses, did any indication those customers any of those folks was his data was breeze has been misused . Did you have any indication the release of their data to make other purchases. Its premature to make an assessment. What about in terms of yahoo and the data breach. Did you have any indication that yahoo that an individuals data had been misused. Was that a red flight . Now. We saw no volume of reports. We did a lot of bands protection against threats to notify users if we saw information that their account is being used by a statesponsored attacker. So, in light of the fact that all the information was of the public domain, out there in general we would assume that, does it surprise you that none of this information has been used in a way that anybody can detect at this point. It would surprise me if it hasnt been recently given the time frame. It surprises me as well. Terms of how. You talked about how individuals are contacted noting that yahoo has a direct communication through their email accounts. Are the Data Collected this not indicate any email address or phone number could send out a mass warning signal. So your customers have to opt in when youve been on social media telling them how to do that. I. Would that change your profile and having more efficient and wider spread we to disseminate information to the information your collection . It frustrates us because we would like to have more with the consumer. You have improved significantly our website. Its more friendly, we have more phone numbers available test questions. A website our website has this as well. Were proactively doing this through social media we want to make sure we respond in direct to the right solutions. Is people want to talk with you when they see something other Credit Report that they dont agree with. Your company through the years has realize this is an enormous problem theres a false entry on their Credit Report. Especially for next on the Credit Rating. I know it happens frequently and try to correct this problem will i would hope having myself try to do this for my own personal Credit Report and how frustrating it is to get through to will rise trying to get through line to register a complaint to work through the process, its timeconsuming and difficult is the i would assume those processes are tightening up in light of a Security Breach receivers. In terms of consumer friendliness. Its one of the top concerns i have and how to talk with consumers with and have a better way to communicate. Also interested in your proposal to like information as individual he said it would be onstream in january the customer could opt in or out, lock and unlock their own personal data. How does that work is in terms of your business framework . The consumer locks the data out are you blacked out that dad i in terms of like if somebody wants to purchase a home or something . We need to make sure the consumer has power in their hand. May have locked file a block you should be the information to be. s think his editor. Next up was senator carter. Thank you to our witnesses for being here today. I have questions about your filing your information. Ive heard that its personal identification information. Who owns the information that you provide to your clients and customers . A according to the Regulatory Framework we own it. Can they say we dont want you to have that information . They have the opportunity today thomas from like the file. Can i say that i dont want koufax to have that information. Is the Regulatory Framework that we have today. They cannot exit out. I think its not my perspective as it is right or wrong from the perspective we work on it. Who owns the credit card information that you have come about you at that point, correct . , do you think consumers should own their data . Showed consumers own their own information . Yes, ideally they should. Should we be able to control our own information . They should control the information. But youre saying that it can be hacked by somebody with consumer control. Nobody has access to the file. To say i dont want that information to go to experience or trans union . Need to understand how the economy will behave in that perspective. In the consumer dispute portaportal that wasnt addresso correct . Correct is that if the answer is yes as you said it was with t the fact remain unencrypted, the results of an oversight or is that a decision that was made to manage the data . There are multiple tools they use. Masking, firewalls, multiple layers. For the decision was made to leave its unencrypted. Correct. The beach that you directed to encrypt such data. We have done a topdown review of the security situation we used the companies to help us. Yes or no question. The data remain unencrypted . Yes or no data remains unencrypted. You dont know the reason is that correct . Is one format of defens of formd we have several in place now that can prevent this. We have several different tools and encryptionen is one tool. Of the entire environment which the attack occurred is much different but the more moderatthat the moremoderate enh multiple layers of security encryption is only one of those levels of security. Is a safe methodology to leave this unrest . I think weve spoken at the high value it can be used for today. The encryption is one of the tools, but certainly from our companys perspective it is to be used for the data of this type that is of a high value. So it is irresponsible to leave this. Other segments of the industry of the payment payment ecosystee requirements on the requirements that require this credit card data and things like that to be encrypted. When did you notify the other Credit Reporting agencies about the brief . We notified them and the public. September 7. We saw this activit solve the 29th and 30th of july on the seventh of september. So thats when the other agencies also received that information. Yes. Thereve been multiple investigations. Thank you senator. I think the panelists for being here today. You were the ceo of th a data breach in all of human history. You testified here today that the 2014 breach wasas statesponsored but you have not concluded that the 2013 was correct . Nsored is that we have not been able to determine who perpetrated the breach. You testified today and you didnt learn either data breach until 2016 is that correct . I learned breaches at the scale reported in 2016. In december 2014 we saw the intrusion and 26 individuals all with connections of interest in russia with accounts compromised and we put in place a special notice for those that had to be dismissed by a user action to to make sure they were aware that this had happened. Is that correct you didnt learn of the 2013 breach until 2016 . Thats right. What information can you provide that supports the claim . The board formed an independent committee and have reported on the findings. Those othose are the facts are l for your presence today and i represent 6. 5 million hoosiers, 3. 8 million jurors come to 60 of indianas population are impacted by the koufax data breach equifax data breach. Many of these wont be discovered until years down the road. When she finds out the credit what does that koufax do to remedy the situation for that what does equifax to do . That was the idea behind the lifetime ability t to lock and unlock the file in the prior hearings. In the prophylactic it seems like a good thing to do. I will say weve had these massive data breaches and to the basic sense of fairness that most americans at the top executives plead with tens of millionsh of dollars when i see the United States navy fire officers in the pacific on account of some sailors that died in the wake of the uss john mccain situation that they were separated because ofo a loss of confidence i think this is an issue that we collectively in Congress Need to start discussing more seriously if the Free Enterprise here in the United States are taken more seriously when things like this happen. It offends the sensibilities of most within months somebody leaves with hundreds of millions of t dollars . I left with nothing except attention. Sk i waved my bonus coming next year working for three months or six months for free as an advisor capacity. Ive been talking about big business in this country and i would like to touch on one policy before he moved forward. The idea that the Credit Reporting agency moving forward will give the right to request blocking access. Can you pledge that five years from now. The industry cant charge to lock or unlock an unlimited number of times each year. It is free for life and we welcome the conversation with the rest of the industry. Thank you mr. Chairman for holding this hearing. Weve had several larger Commerce Committee hearings on cybersecurity certainly summon the Energy Committee and the Armed Services committee has had some. Now its time for us to be very serious about passing the legislation as we did out of the senate to help us fight the issue of cyber crime and help strengthen the Critical Infrastructure against the attacks. But these are not the only things being attacked. The power plants, pipelines, the whole variety of things and we continue to grow the economy of the internet of things. At the hearing we had yesterday i guess we also heard about how more devices and collectivity means more data for people to attack. I hope the committee will join in the efforts for cybersecurity legislation i hope it isnt too soon to act. I want to bring up that theres 3 billion of the washingtonians impacted by the koufax according to my information. A patch was available that wasnt implemented like a basic hygiene issue is that correct . This correct. Why cant he answer that question, because he doesnt know . He wasnt present ater the time. Okay. At this is my understanding of what happens in a combination of the technology because he actually lives in this process. It wasnt implemented by an employee of the reason is i understand the dual role but we have to do both. The issue of cybersecurity is here. Its a National Security issue, its a future issue on Identity Theft and the ability for individuals to protect things that we have to do both at the federal level of the game and make sure that we are making enough to help the Critical Infrastructure. What do we need to do to get people on the same page and fighting cyber criminvitingcybee we need to make sure everybody gets the hygiene of the daytoday business and your home computer and Everything Else will be at the critical aspect of the world we now live in. So, i want you to know and be able to speak to the fact one individual failing to put a patch in place caused such damage. Firstrd is the Security Systems. We have done a comprehensive review in the process including the capabilities and tools making sure they protect the process much more up to speed up the stage. I understand the safeguards that we have and it provided the scope that is ahead of that in manyst perspectives and definity welcomed the conversation. I would say that we need something more at this point in time. If on the hygiene issue one employee was missing something as m critical as this and put so much data at risk that we need something to make sure that this is implemented, does anybody else on the panel want to answer that question . What we are speaking about we were aware of it and march and this is a zero day vulnerability. They are serious and they have beeney for often as we would lie to speak about. When we become aware of these threats come our need to react as quick and has to be conclusive. This is something that we will continue to see. It is an new and it is going to continue to happen. It is a concept that you continue to speak about as an important one because i liken it a little bit. Just because that isnt going to protect you. That is my point exactly thank you so much for that. You just explained we have the National Labs working day and night with an unbelievable amount of attacks happening every school day. Getting a skilled work force this committee at a hearing on that we need companies to follow a hygiene with great religious for. If the state actors continue, we need to do something that we need the companies to follow a hygiene and be religious about it. Thank you senator cantwell. Tos is the impacted is going have on my hundred 40 million americans in the case of the breach over 4 million in my state and i just want to expand a little bit before i have some questions to mr. Wilkinson. I want to be clear this was a vulnerability that was discovered and there was a patch created. The information went out and that means one of my understandings when this goes out the bad guys find out about them as well and they are broadcasting there is a vulnerability people can figure out pretty easily so at least some of the experts i talked to have said this is not a sophisticated hack. It was Pretty Simple because the roadmap was pretty much put out for folks to take. So we have had discussions about national or state actors involved, highly sophisticated networks. This was a roadmap for the bad guys and they jumped in andba gt in is that correct . It goes back to the discussion of when they create a roadmap as you said just why you say they needed to respond quickly to close down those threats in the ecosystem is important. I want to paint a picture for the public the roadmap was put out for all the bad guys that want to do us harm and there is a f vulnerability. They have the most Sensitive Information and as we heard from testimony earlier we do not have a choice in the matter. Companies can collect all this information and they dont even take the time to look at a roadmap that has been put out. I cant think of a definition of the negligence anywhere dan a company that has been interested in the most Sensitive Data and customers didnt have a choice to hold it. I didnt ask equifax to have that information, no one did that. You are holding the and dont te the precautions when a roadmap has been put out. Sometimes the criminal may wait before using the data. So it may be a while before we see it being used. I think it goes back to my original comment which is this type of data. We have to worry as you mentioned that theres free credit monitoring for one year. Only 12 months when we currently have to worry about the rest of our lives. [inaudible] the consumer can lock and unlock their file and it is free for life. That it is only with your company. This information can now be used with all of the other acts of Credit Reporting agencies. Theres all sorts i of avenues w that you can basically use this information to create a false identity and you are saying your response as a company is you can lock your credit with us Going Forward but you still have vulnerabilities with all of the other agencies. This is Pretty Simple if you are a bad guy just go to one of the others. If you are getting information of mine and i did not ask to have that information given i understand you make money when you provide information to Financial Institutions. Today i dont understand why i dont have the ability individuals for any kind of agency. This raises a host of major issues. Without having access 140 Million People with most private information there needs to be some strong liabilities. They need to be subjected to strict liability. Mr. Tremaine, the public wants us to do more to protect their privacy. They adopt reasonable Data Securityiz protections. They proposethey propose peace n instrumental role in ensuring that they were in fact repealed. Broadband providers like verizon argued that we needed a light touch in the Regulatory Framework like those governing websites. 3 billion account users have now learned that light touch means hands off, no protection, free range. And now because of congressional action and show the most Sensitive Information into the reasonable Data Security protections and avoid the fighting consumers when the Sensitive Information has been compromised. You stated that verizon would support the national Data Security legislation. But actively and vigorously lobbied to eliminate the Data Security and privacy breach notification protections. How are these consistent . They believe that there should be a framework when it comes to Data Security. We do support legislation in both of those areas and we would be happy as i said earlier to work with your office or other members of theou legislation, bt we do think that there should be one overarching framework. Heres where we are. Now we have nothing. So coming you repealed the law thadoes require that there be protections and now we have nothing. From my perspective, you didnt have to reveal one of comprehensive Data Security. That is the problem that we have right now that we have very strong Data Security privacy protections on the books. At the senate and the house earlierer this year so as we sit here, we hear concerns about the need to have legislation. We have it and it was going to actually work in terms of ensuring that we would have the regulations that would be putnsn the books, but instead we dont have anything. Do you think that it was in the Public Interest t to eliminate e Data Security breach notificationat protections if yu could go back in time earlier this year would you still move comes protections on the books . Decide what, senator. We think there should be National Data breach protection. You advocated protection. We had a stronger regime that was in place and was going to be made Even Stronger and that is in fact what the American People want. They want real accountability from the private sector in terms of the guarantee that there is security aroun around the data t goes to the very identity of who people are as citizens of the country. And instead of toughening the law this year, there was a serious weakening as year after year goes by. They do not have specifically as the principled objective. The next up is the senator. For the Credit Monitoring Services, for example, equifax loss of Social Security numbers and dangers the wellbeing of the nations veterans who receive the va disability benefits. If a veteran is not comfortable going online, he or she can manage the disability account by fax so for example, a veteran ken fax a request to change the bank account and they will be made if the form includes a Social Security number that matches the name of the request or. This policy and processes likely created in the era when the Social Security number could serve as an effective authentication tool. Obviously that is no longer the case. My question to you is simple. Following the millions of Social Securitye numbers, but concrete steps t that the company take to notify Government Agencies into the United States department of Veterans Affairs of the need to strengthen the authentication policies to prevent the veterans from having their benefits to one. To make sure that we enhance the communication process and have solutions that would allow the office to be informed about how to protect themselves using the services. When you went public with the information on the breach when did you contact the department of Veterans Affairs to inform them of the significance of the breach and what they would have to do to strengthen their process . I asked my people to make sure that they contacted the associations and they have done recently, a few weeks ago. So, was anythingo. Done, you know, when the breach was known and when it became public . Specific to the veterans . To the Veterans Department of yours and defense. Not that i am aware of. So, you just left the veterans exposed. I would like to know, so please find out and provide me with that information. So, the fact that the disability benefit is an urgent problem that can be financially devastating for veterans who need the funds to pay their rent and afford their groceries and keep the lights on even when a veteran notices the benefits was not received and contacts the da does represent a first step in what is a complex maze to get restored. Thinking back to whenth this occurred you will see that they will be suffering because you didnt call the va or hopefully youu told them. The Financial Institution where the money was sent erroneously that it received information they have to work out an agreement with the financial entity to return the funds back to the u. S. Treasury department general fund. Then they must get a confirmation from the treasury that fraudulent payment was actually recouped and then return them to the va before they would send the money back to the veteran. And in the best Case Scenario process can take weeks or months. My office has organizations of the need to notify the members of this danger and im working with them to strengthen authentication policy and proceduresth. However, given your role in the safeguard of the critical data, i would like the commitment to work with the va, the veteran Service Organizations and individual veterans to provide valuable support and benefits such as unlimited, free credit freezes and monitoring for life. Will you make that commitment on behalf of the men and women willing to lay down their lives to protect you and your family and business in this country . We have engaged with the department of defense. As my colleague just mentioned, that does not apply because they will go somewhere else. Basically saying you will not make this commitment to the nations veterans. The people who protect the ability to make money to protect your freedom. It is a safer product than the monitoring that we have. I must say some of the testimony is pretty discouraging here. There were 46,800 new mexicans whose identity and possibly their credit worthiness was endangered by a plate and carelessness of equifax employees when you previously testified, you specifically said that the data was stored in plain text and has not been an encrypted. Its an unacceptable practice for an organization with such power over the consumers lives and painfully clear that americans cannot rely on the Large Companies that store their data to protect it. As a possible solution, congress should consider banning the s ue of unverified Social Security numbers and commerce. There is the potential for strong bipartisan support for this. Socialrt security numbers were never intended to be used as universal online ids. Im gladd to hear that the white house is looking at this and congress should also evaluate the possibility as well. Innt that regard, the committee should take a closer look at the National Institute of standards and technology as initiated in the trusted indemnities group to develop secure online ids and then the use of Social Security numbers. I look forward to working with others and building on the work of this group is already undertaking. The following are yes or no questions for the the panels anm interested in banning the use of unverified Social Security numbers. Is it necessary for online commerce to rely on the Social Security number or fax to become . Please give me a yes or no it iifits a simple question. It is a process that was developed in 1936. I think that we need to have a better imprint perspective when dealing with the commerce. So your answer is yes. Today some sites do rely on it. We did not need it for the conduct. Very happy to work with this committee and others to come up with a list of Social Security numbers. It is a static identity as a basis for these that will never be secure in the future. Do your businesses and other yes or no question to the businesses require a Social Security number before you will do business with them . Most of the them we gave with entities that does require information. Mr. Smith. The answer is no, but it is part of a typical way that we will go through a credit check for a new customer. We are focused inre the arean Social Security numbers. Another question do you think the development of a Security Digital id can break the breaches and Identity Theft clacks yes. I think it is necessary but not necessarily sufficient. Of the final one, do you think it is worthwhile to consider legislation to restrict the use of unverified Social Security numbers and other personal information while promoting the use of the digital identification . Essentially anything that can move us forward in a static number will be supported. I dont know that my opinion matters, but yes. A trusted group is comprised of a Publicprivate Partnership to promote the adoption of an easy to use Digital Identity and i will ask the fina a final quests wondering if you could work on this group but since im running out of time here will you commit to my office to improve the Current Working Group and expand its efforts to. Absolutely. Thank you very much, mr. Chairman. I really appreciate you holding this hearing. I knowi there was great interet on both sides of the aisle. Ive seen today, ive been here a long time but listening to a there is a lot of good ideas and hopefully we can find a bipartisan way to deal with the situation. Thank you very much mr. Chairman. I am the last one here to ask questions i would use this opportunity to welcome. I hope things have been going well from my home state here before us again and its more than 2200 Workers Worldwide and 800 of them in the state, so thank you for being here. I will start with you. Know much of the ground has been covered. In your testimony you mentioned the model of issuing the identities to citizens and in this model the government would provide consumers options to access general certificate identification. They ensure the private partners can keep citizens Information Safe . Brazil is a great example that i wouldnt necessarily promote the u. S. In terms of where the center why is, but certainly the framework they built for the identities we are proposing looking forward toy, e work for the identity Going Forward. They are doing good work and we would love to spend more time describing what it can look like in the future. Thank you very much. Mr. Smith appeared before us in the judiciary and i think i expressed my frustration i have with others about what went on but i thought i would focus with you on whats happening now. Theyve announced that it would be launching this act in january and allow them to lock and unlock the credit data while providing consumers with more control over their Credit Information as a positive step we dont want more avenues so are there additional cybersecurity challenges that come in to this technology. This is a strict connection to the main file so has all of the securities f needs ive been working a lot on the issues. The manufacturers and Software Companies and i see this as kind of going handinhand with the attack and i have seen some of my companies and others. We have individual hackers and statesponsored attacks like we believe occurred in the 2016 election. In your experience, how did the statesponsored attacks differ from those individuals. They offer several companies trying to stitch together what they are actually seeking. He was a central figure in many of theseth investigations. They should be the targets and the sources of the issue. What do you think we should be doing for the statesponsored attacks that we should be doing out of congress. I think it is an aggressive pursuit of the hacking and i was pleased with the fbi and the department of justices work to bring to the people that perpetrated the crimes against us and i think that we should be empowering the them logisticalld financially. One of the individuals in the case was apprehended in canada and has beeniv extradited to the u. S. I think on the election side, its different. It is a lot of the same issues that the business is facing as well. We will keep the record open and allow for members to set it questions for the record from a couple of weeks but if you could respond as quickly as you can weevil get them included in the record. Reminded members on both sides of the committee we have an interest in moving forward. Thank you again and with that, the hearing is adjourned. [inaudible conversations] the declining from the time of Ruth Bader Ginsburg but was antisemitic. Basic health care and youth sports the court with another hebrew. They finished up work on the house gop bill and the Senate Released its own proposal. Here are a couple headlines from the wall street journal writing the plan differs from the house on individual rate and timing of corporate rate cuts. Thethey aim to do by the end ofe year. On the marks for the tax cut and jobs act, the combination of years of efforts weve been at this for a long time and todays markets where we further the document as a chairmans mark

© 2025 Vimarsana

vimarsana.com © 2020. All Rights Reserved.