advertisement
advertisement

Full text of Now-Vetoed California Data Protection Bill

Written by Evan Schuman
October 14th, 2007

BILL NUMBER: AB 779 ENROLLED
BILL TEXT

PASSED THE SENATE SEPTEMBER 6, 2007
PASSED THE ASSEMBLY SEPTEMBER 10, 2007
AMENDED IN SENATE AUGUST 31, 2007
AMENDED IN SENATE AUGUST 20, 2007
AMENDED IN SENATE JULY 10, 2007
AMENDED IN SENATE JULY 3, 2007
AMENDED IN ASSEMBLY JUNE 1, 2007
AMENDED IN ASSEMBLY MAY 14, 2007
AMENDED IN ASSEMBLY MAY 1, 2007
AMENDED IN ASSEMBLY APRIL 10, 2007

INTRODUCED BY Assembly Member Jones
(Coauthors: Assembly Members DeSaulnier, Huffman, and Krekorian)
(Coauthor: Senator Migden)

FEBRUARY 22, 2007

An act to add Sections 1724.4 and 1724.5 to, and to repeal and
amend Sections 1798.29 and 1798.82 of, the Civil Code, relating to
personal information.

LEGISLATIVE COUNSEL’S DIGEST

AB 779, Jones. Personal information: state agencies and
businesses.
(1) Existing law imposes specified duties upon certain persons or
businesses that conduct business in California to, among other
things, take reasonable steps to destroy customer records, implement
and maintain reasonable security measures, disclose a breach of
computerized data, and, upon request, provide specified information
to a customer in relation to the disclosure of personal information
to 3rd parties. For a violation of any of the above-described
provisions, existing law allows an injured customer to institute a
civil action to recover damages or for injunctive relief.
This bill, on and after July 1, 2008, would prohibit a person,
business, or agency, as defined, that sells goods or services to any
resident of California and accepts as payment a credit card, debit
card, or other payment device, from storing, retaining, sending, or
failing to limit access to payment-related data, as defined,
retaining a primary account number, or storing sensitive
authentication data subsequent to an authorization, as specified,
unless a specified exception applies. Upon a violation, and as
applicable, the bill would apply specified reimbursement and notice
provisions, as described below.
(2) Existing law requires any state agency, or a person or
business that conducts business in California, that owns or licenses
computerized data that includes personal information, as defined, to
disclose any breach of the security of that data to any resident of
California whose unencrypted personal information was, or is
reasonably believed to have been, acquired by an unauthorized person.
Existing law allows for that disclosure by written notice,
electronic notice, or, upon a specified condition, by substitute
notice, which, if utilized, also requires notification to major
statewide media.
This bill, if substitute notice is utilized, would require that
notice to also be provided to the Office of Privacy Protection. The
bill would also repeal duplicative provisions of law.
(3) Existing law requires any agency, person, or business that
maintains computerized data that includes personal information that
the agency, person, or business does not own to notify the owner or
licensee of the information of any breach of the security of the data
immediately following discovery, if the personal information was, or
is reasonably believed to have been, acquired by an unauthorized
person.
This bill, on and after July 1, 2008, would require that
notification to the owner or licensee of the information to include,
among other things, a description of the categories of personal
information that were, or may have been, acquired, a toll-free or
local telephone number or electronic mail address that individuals
may use to contact the agency, person, or business, and the telephone
numbers and addresses of the major credit reporting agencies. If the
owner or licensee of the information is the issuer of the credit or
debit card or the payment device, or maintains the account from which
the payment device orders payment, the bill would require the owner
or licensee to disclose the same information to the California
resident in plain language, as specified.
(4) This bill would provide that its provisions are severable.
(5) This bill would incorporate additional changes in Section
1798.29 of the Civil Code, proposed by AB 1298, to be operative only
if AB 1298 and this bill are both chaptered and become effective on
or before January 1, 2008, and this bill is chaptered last.
(6) This bill would incorporate additional changes in Section
1798.82 of the Civil Code, proposed by AB 1298, to be operative only
if AB 1298 and this bill are both chaptered and become effective on
or before January 1, 2008, and this bill is chaptered last.

THE PEOPLE OF THE STATE OF CALIFORNIA DO ENACT AS FOLLOWS:

SECTION 1. Section 1724.4 is added to the Civil Code, to read:
1724.4. (a) For purposes of this section, "payment related data"
means any computerized information described in paragraph (3) of
subdivision (e) of Section 1798.82, whether individually or in
combination with any other information described in paragraph (3) of
subdivision (e) of Section 1798.82.
(b) In addition to being subject to the provisions of Title 1.81
(commencing with Section 1798.80) of Part 4, a person, business, or
agency, as defined in subdivision (b) of Section 1798.3, that sells
goods or services to any resident of California and accepts as
payment a credit card, debit card, or other payment device shall not
do any of the following:
(1) Store payment related data, except when the person, business,
or public agency has a payment data retention and disposal policy,
which limits the amount of payment related data and the time that
data is retained to the amount and time that is required for
business, legal, or regulatory purposes as documented in the payment
data retention policy, and payment related data is stored only for a
time period and in a manner that is permitted by the policy.
(2) Store sensitive authentication data subsequent to
authorization, even if that data is encrypted. Sensitive
authentication data includes, but is not limited to, all of the
following:
(A) The full contents of any data track from a payment card or
other payment device.
(B) The card verification code or any value used to verify
transactions when the payment device is not present.
(C) The personal identification number (PIN) or the encrypted PIN
block.
(3) Store any payment-related data that is not needed for business
purposes.
(4) Store any of the following data elements:
(A) Payment verification code.
(B) Payment verification value.
(C) PIN verification value.
(5) Retain the primary account number unless retained in a manner
consistent with the other requirements of this subdivision and in a
form that is unreadable and unusable by unauthorized persons anywhere
it is stored.
(6) Send payment-related data over open, public networks unless
the data is encrypted using strong cryptography and security
protocols or otherwise rendered indecipherable.
(7) Fail to limit access to payment-related data to only those
individuals whose job requires that access.
(c) This section shall not apply to any person or business subject
to Sections 6801 to 6809, inclusive, of Title 15 of the United
States Code and state or federal statutes or regulations implementing
those sections, if the person or business is subject to compliance
oversight by a state or federal regulatory agency with respect to
those sections.
SEC. 2. Section 1724.5 is added to the Civil Code, to read:
1724.5. (a) Any person, business, or agency subject to Section
1724.4 that is required to give notice of a breach of the security of
the system pursuant to subdivision (b) of Section 1798.29 or
subdivision (b) of Section 1798.82 shall include in that notification
to the owner or licensee of the information, in plain language, all
of the following information if available at the time the notice is
provided:
(1) The date of the notice.
(2) The name of the agency, person, or business that maintained
the computerized data at the time of the breach.
(3) The date, or estimated date, that the breach occurred, if the
date or estimated date is possible to determine.
(4) A description of the categories of personal information that
was, or is reasonably believed to have been, acquired by an
unauthorized person.
(5) A toll-free telephone number for the agency, person, or
business subject to the breach of the security of the system of that
agency, person, or business or, if the primary method used by that
agency, person, or business to communicate with the individuals whose
information is the subject of the breach is by electronic means, an
electronic mail address that the individuals may use to contact the
agency, person, or business so that the individuals may learn what
types of personal information that agency, person, or business
maintained about the individuals were subject to the security breach.
If the agency, person, or business that experienced the breach does
not have a toll-free telephone number, a local telephone number may
be provided to the owner or licensee of the information to contact
the agency, person, or business.
(6) The toll-free telephone numbers and addresses for the major
credit reporting agencies.
(b) The notification required by subdivision (a) may be delayed if
a law enforcement agency determines that the notification will
impede a criminal investigation. The notification required by
subdivision (a) shall be made after the law enforcement agency
determines that it will not compromise the investigation.
(c) If the owner or licensee of the information is the issuer of
the credit or debit card or the payment device, or maintains the
account from which the payment device orders payment, the owner or
licensee shall disclose to the California resident in any
notification provided pursuant to subdivision (a) of Section 1798.29
or subdivision (a) of Section 1798.82, in plain language, all
information described in paragraphs (1) to (6), inclusive, of
subdivision (a) that is available at the time that notification is
made, except however, with respect to paragraph (5), an electronic
mail address may be provided in lieu of a toll-free or local
telephone number to those individuals with whom the primary method
used by that agency, person, or business to communicate is by
electronic means.
(d) (1) In addition, a person, business, or agency subject to
Section 1724.4 shall be liable to the owner or licensee of the
information for the reimbursement of all reasonable and actual costs
of providing notice to consumers pursuant to the breach as required
by subdivision (a) of Section 1798.29 or subdivision (a) of Section
1798.82 and for the reasonable and actual cost of card replacement as
a result of the breach of the security of the system.
(2) A person, business, or agency subject to Section 1724.4 may be
excused, in whole or in part, from any obligation to reimburse the
owner or licensee pursuant to this section if the person, business,
or agency can demonstrate compliance with all provisions of Section
1724.4 at the time of the breach of security of the system.
SEC. 3. Section 1798.29 of the Civil Code, as added by Section 2
of Chapter 915 of the Statutes of 2002, is repealed.
SEC. 4. Section 1798.29 of the Civil Code, as added by Section 2
of Chapter 1054 of the Statutes of 2002, is amended to read:
1798.29. (a) Any agency that owns or licenses computerized data
that includes personal information shall disclose any breach of the
security of the system following discovery or notification of the
breach in the security of the data to any resident of California
whose unencrypted personal information was, or is reasonably believed
to have been, acquired by an unauthorized person. The disclosure
shall be made in the most expedient time possible and without
unreasonable delay, consistent with the legitimate needs of law
enforcement, as provided in subdivision (c), or any measures
necessary to determine the scope of the breach and restore the
reasonable integrity of the data system.
(b) Any agency that maintains computerized data that includes
personal information that the agency does not own shall notify the
owner or licensee of the information of any breach of the security of
the data immediately following discovery, if the personal
information was, or is reasonably believed to have been, acquired by
an unauthorized person.
(c) The notification required by this section may be delayed if a
law enforcement agency determines that the notification will impede a
criminal investigation. The notification required by this section
shall be made after the law enforcement agency determines that it
will not compromise the investigation.
(d) For purposes of this section, "breach of the security of the
system" means unauthorized acquisition of computerized data that
compromises the security, confidentiality, or integrity of personal
information maintained by the agency. Good faith acquisition of
personal information by an employee or agent of the agency for the
purposes of the agency is not a breach of the security of the system,
provided that the personal information is not used or subject to
further unauthorized disclosure.
(e) For purposes of this section, "personal information" means an
individual’s first name or first initial and last name in combination
with any one or more of the following data elements, when either the
name or the data elements are not encrypted:
(1) Social security number.
(2) Driver’s license number or California identification card
number.
(3) Account number, credit or debit card number, in combination
with any required security code, access code, or password that would
permit access to an individual’s financial account.
(f) For purposes of this section, "personal information" does not
include publicly available information that is lawfully made
available to the general public from federal, state, or local
government records.
(g) For purposes of this section, "notice" may be provided by one
of the following methods:
(1) Written notice.
(2) Electronic notice, if the notice provided is consistent with
the provisions regarding electronic records and signatures set forth
in Section 7001 of Title 15 of the United States Code.
(3) Substitute notice, if the agency demonstrates that the cost of
providing notice would exceed two hundred fifty thousand dollars
($250,000), or that the affected class of subject persons to be
notified exceeds 500,000, or the agency does not have sufficient
contact information. Substitute notice shall consist of all of the
following:
(A) E-mail notice when the agency has an e-mail address for the
subject persons.
(B) Conspicuous posting of the notice on the agency’s Internet Web
site page, if the agency maintains one.
(C) Notification to major statewide media and the Office of
Privacy Protection.
(h) Notwithstanding subdivision (g), an agency that maintains its
own notification procedures as part of an information security policy
for the treatment of personal information and is otherwise
consistent with the timing requirements of this part shall be deemed
to be in compliance with the notification requirements of this
section if it notifies subject persons in accordance with its
policies in the event of a breach of security of the system.
SEC. 4.5. Section 1798.29 of the Civil Code, as added by Section 2
of Chapter 1054 of the Statutes of 2002, is amended to read:
1798.29. (a) Any agency that owns or licenses computerized data
that includes personal information shall disclose any breach of the
security of the system following discovery or notification of the
breach in the security of the data to any resident of California
whose unencrypted personal information was, or is reasonably believed
to have been, acquired by an unauthorized person. The disclosure
shall be made in the most expedient time possible and without
unreasonable delay, consistent with the legitimate needs of law
enforcement, as provided in subdivision (c), or any measures
necessary to determine the scope of the breach and restore the
reasonable integrity of the data system.
(b) Any agency that maintains computerized data that includes
personal information that the agency does not own shall notify the
owner or licensee of the information of any breach of the security of
the data immediately following discovery, if the personal
information was, or is reasonably believed to have been, acquired by
an unauthorized person.
(c) The notification required by this section may be delayed if a
law enforcement agency determines that the notification will impede a
criminal investigation. The notification required by this section
shall be made after the law enforcement agency determines that it
will not compromise the investigation.
(d) For purposes of this section, "breach of the security of the
system" means unauthorized acquisition of computerized data that
compromises the security, confidentiality, or integrity of personal
information maintained by the agency. Good faith acquisition of
personal information by an employee or agent of the agency for the
purposes of the agency is not a breach of the security of the system,
provided that the personal information is not used or subject to
further unauthorized disclosure.
(e) For purposes of this section, "personal information" means an
individual’s first name or first initial and last name in combination
with any one or more of the following data elements, when either the
name or the data elements are not encrypted:
(1) Social security number.
(2) Driver’s license number or California identification card
number.
(3) Account number, credit or debit card number, in combination
with any required security code, access code, or password that would
permit access to an individual’s financial account.
(4) Medical information.
(5) Health insurance information.
(f) (1) For purposes of this section, "personal information" does
not include publicly available information that is lawfully made
available to the general public from federal, state, or local
government records.
(2) For purposes of this section, "medical information" means any
information regarding an individual’s medical history, mental or
physical condition, or medical treatment or diagnosis by a health
care professional.
(3) For purposes of this section, "health insurance information"
means an individual’s health insurance policy number or subscriber
identification number, any unique identifier used by a health insurer
to identify the individual, or any information in an individual’s
application and claims history, including any appeals records.
(g) For purposes of this section, "notice" may be provided by one
of the following methods:
(1) Written notice.
(2) Electronic notice, if the notice provided is consistent with
the provisions regarding electronic records and signatures set forth
in Section 7001 of Title 15 of the United States Code.
(3) Substitute notice, if the agency demonstrates that the cost of
providing notice would exceed two hundred fifty thousand dollars
($250,000), or that the affected class of subject persons to be
notified exceeds 500,000, or the agency does not have sufficient
contact information. Substitute notice shall consist of all of the
following:
(A) E-mail notice when the agency has an e-mail address for the
subject persons.
(B) Conspicuous posting of the notice on the agency’s Internet Web
site page, if the agency maintains one.
(C) Notification to major statewide media and the Office of
Privacy Protection.
(h) Notwithstanding subdivision (g), an agency that maintains its
own notification procedures as part of an information security policy
for the treatment of personal information and is otherwise
consistent with the timing requirements of this part shall be deemed
to be in compliance with the notification requirements of this
section if it notifies subject persons in accordance with its
policies in the event of a breach of security of the system.
SEC. 5. Section 1798.82 of the Civil Code, as added by Section 4
of Chapter 915 of the Statutes of 2002, is repealed.
SEC. 6. Section 1798.82 of the Civil Code, as added by Section 4
of Chapter 1054 of the Statutes of 2002, is amended to read:
1798.82. (a) Any person or business that conducts business in
California, and that owns or licenses computerized data that includes
personal information, shall disclose any breach of the security of
the system following discovery or notification of the breach in the
security of the data to any resident of California whose unencrypted
personal information was, or is reasonably believed to have been,
acquired by an unauthorized person. The disclosure shall be made in
the most expedient time possible and without unreasonable delay,
consistent with the legitimate needs of law enforcement, as provided
in subdivision (c), or any measures necessary to determine the scope
of the breach and restore the reasonable integrity of the data
system.
(b) Any person or business that maintains computerized data that
includes personal information that the person or business does not
own shall notify the owner or licensee of the information of any
breach of the security of the data immediately following discovery,
if the personal information was, or is reasonably believed to have
been, acquired by an unauthorized person.
(c) The notification required by this section may be delayed if a
law enforcement agency determines that the notification will impede a
criminal investigation. The notification required by this section
shall be made after the law enforcement agency determines that it
will not compromise the investigation.
(d) For purposes of this section, "breach of the security of the
system" means unauthorized acquisition of computerized data that
compromises the security, confidentiality, or integrity of personal
information maintained by the person or business. Good faith
acquisition of personal information by an employee or agent of the
person or business for the purposes of the person or business is not
a breach of the security of the system, provided that the personal
information is not used or subject to further unauthorized
disclosure.
(e) For purposes of this section, "personal information" means an
individual’s first name or first initial and last name in combination
with one or more of the following data elements, when either the
name or the data elements are not encrypted:
(1) Social security number.
(2) Driver’s license number or California identification card
number.
(3) Account number, credit or debit card number, in combination
with any required security code, access code, or password that would
permit access to an individual’s financial account.
(f) For purposes of this section, "personal information" does not
include publicly available information that is lawfully made
available to the general public from federal, state, or local
government records.
(g) For purposes of this section, "notice" may be provided by one
of the following methods:
(1) Written notice.
(2) Electronic notice, if the notice provided is consistent with
the provisions regarding electronic records and signatures set forth
in Section 7001 of Title 15 of the United States Code.
(3) Substitute notice, if the person or business demonstrates that
the cost of providing notice would exceed two hundred fifty thousand
dollars ($250,000), or that the affected class of subject persons to
be notified exceeds 500,000, or the person or business does not have
sufficient contact information. Substitute notice shall consist of
all of the following:
(A) E-mail notice when the person or business has an e-mail
address for the subject persons.
(B) Conspicuous posting of the notice on the Internet Web site
page of the person or business, if the person or business maintains
one.
(C) Notification to major statewide media and the Office of
Privacy Protection.
(h) Notwithstanding subdivision (g), a person or business that
maintains its own notification procedures as part of an information
security policy for the treatment of personal information and is
otherwise consistent with the timing requirements of this part, shall
be deemed to be in compliance with the notification requirements of
this section if the person or business notifies subject persons in
accordance with its policies in the event of a breach of security of
the system.
SEC. 6.5. Section 1798.82 of the Civil Code, as added by Section 4
of Chapter 1054 of the Statutes of 2002, is amended to read:
1798.82. (a) Any person or business that conducts business in
California, and that owns or licenses computerized data that includes
personal information, shall disclose any breach of the security of
the system following discovery or notification of the breach in the
security of the data to any resident of California whose unencrypted
personal information was, or is reasonably believed to have been,
acquired by an unauthorized person. The disclosure shall be made in
the most expedient time possible and without unreasonable delay,
consistent with the legitimate needs of law enforcement, as provided
in subdivision (c), or any measures necessary to determine the scope
of the breach and restore the reasonable integrity of the data
system.
(b) Any person or business that maintains computerized data that
includes personal information that the person or business does not
own shall notify the owner or licensee of the information of any
breach of the security of the data immediately following discovery,
if the personal information was, or is reasonably believed to have
been, acquired by an unauthorized person.
(c) The notification required by this section may be delayed if a
law enforcement agency determines that the notification will impede a
criminal investigation. The notification required by this section
shall be made after the law enforcement agency determines that it
will not compromise the investigation.
(d) For purposes of this section, "breach of the security of the
system" means unauthorized acquisition of computerized data that
compromises the security, confidentiality, or integrity of personal
information maintained by the person or business. Good faith
acquisition of personal information by an employee or agent of the
person or business for the purposes of the person or business is not
a breach of the security of the system, provided that the personal
information is not used or subject to further unauthorized
disclosure.
(e) For purposes of this section, "personal information" means an
individual’s first name or first initial and last name in combination
with one or more of the following data elements, when either the
name or the data elements are not encrypted:
(1) Social security number.
(2) Driver’s license number or California identification card
number.
(3) Account number, credit or debit card number, in combination
with any required security code, access code, or password that would
permit access to an individual’s financial account.
(4) Medical information.
(5) Health insurance information.
(f) (1) For purposes of this section, "personal information" does
not include publicly available information that is lawfully made
available to the general public from federal, state, or local
government records.
(2) For purposes of this section, "medical information" means any
information regarding an individual’s medical history, mental or
physical condition, or medical treatment or diagnosis by a health
care professional.
(3) For purposes of this section, "health insurance information"
means an individual’s health insurance policy number or subscriber
identification number, any unique identifier used by a health insurer
to identify the individual, or any information in an individual’s
application and claims history, including any appeals records.
(g) For purposes of this section, "notice" may be provided by one
of the following methods:
(1) Written notice.
(2) Electronic notice, if the notice provided is consistent with
the provisions regarding electronic records and signatures set forth
in Section 7001 of Title 15 of the United States Code.
(3) Substitute notice, if the person or business demonstrates that
the cost of providing notice would exceed two hundred fifty thousand
dollars ($250,000), or that the affected class of subject persons to
be notified exceeds 500,000, or the person or business does not have
sufficient contact information. Substitute notice shall consist of
all of the following:
(A) E-mail notice when the person or business has an e-mail
address for the subject persons.
(B) Conspicuous posting of the notice on the Internet Web site
page of the person or business, if the person or business maintains
one.
(C) Notification to major statewide media and the Office of
Privacy Protection.
(h) Notwithstanding subdivision (g), a person or business that
maintains its own notification procedures as part of an information
security policy for the treatment of personal information and is
otherwise consistent with the timing requirements of this part, shall
be deemed to be in compliance with the notification requirements of
this section if the person or business notifies subject persons in
accordance with its policies in the event of a breach of security of
the system.
SEC. 7. The provisions of this act are severable. If any provision
of this act or its application is held invalid, that invalidity
shall not affect other provisions or applications that can be given
effect without the invalid provision or application.
SEC. 8. Section 4.5 of this bill incorporates amendments to
Section 1798.29 of the Civil Code proposed by both this bill and AB
1298. It shall only become operative if (1) both bills are enacted
and become effective on or before January 1, 2008, (2) each bill
amends Section 1798.29 of the Civil Code, and (3) this bill is
enacted after AB 1298, in which case Section 4 of this bill shall not
become operative.
SEC. 9. Section 6.5 of this bill incorporates amendments to
Section 1798.82 of the Civil Code proposed by both this bill and AB
1298. It shall only become operative if (1) both bills are enacted
and become effective on or before January 1, 2008, (2) each bill
amends Section 1798.82 of the Civil Code, and (3) this bill is
enacted after AB 1298, in which case Section 6 of this bill shall not
become operative.
SEC. 10. Sections 1 and 2 of this act shall become operative on
July 1, 2008.


advertisement

Comments are closed.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.