Site hosted by Angelfire.com: Build your free website today!

IDENTITY THEFT SPECIALIST


It is our policy to respond to clear notices of alleged copyright infringement that comply with the Digital Millennium Copyright Act. In addition, we will promptly Prosecute without notice the accounts of those determined by us to be "repeat infringers". If you are a copyright owner or an agent thereof, and you believe that any content hosted on our web site infringes your copyrights, then you may submit a notification pursuant to the Digital Millennium Copyright Act ("DMCA") by providing Designated Copyright Agent with the following information in writing (please consult your legal counsel or see 17 U.S.C. Section 512(c)(3) to confirm these requirements): A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed. Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works on the web site are covered by a single notification, a representative list of such works at that site. Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit Mdj Studio to locate the material. Providing URLs in the body of an email is the best way to help us locate content quickly. Information reasonably sufficient to permit Mdj Studio to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted. A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law. A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed. Please note that under Section 512(f) of the DMCA, any person who knowingly materially misrepresents that material or activity is infringing may be subject to liability.

WELCOME

Hi My name is Michael D. Jenkins
I am an Identity Theft Consultant and Specalist in the DFW, Texas
area for Business and privat home Owners.I am License in The State of Texas
for Profit Legal Services, TDLR # upon secured request.


The Number One Crime In America Is Now Idenity Theft!

Below is a summery of the Laws Passed by Congress
concerning Identity Theft...
RED FLAG Law goes into affect November 1st 2008


It is a Federal Mandate for All Business to protect
information concerning Employees, Guests, Vendors
and Suppliers from Identity Theft.


Four Law of Legislation

  • F.A.C.T.A. Fair and Accurate Credit Transactions
  • Act
  • GLB Gramm-Leach-Bliley Act of 1999
  • RED FLAG Identity Theft Act
  • HIPPA Health Identifier for Health Care Providers


  • Basically for the business owner this means that if
    not in compliance with Federal mandates and a
    breach is discovered or implied, the business owner
    can be fined one million dollars and serve ten years
    imprisonment and all management terminated within the company found at fault.


    This is a SERIOUS law!



    Any company that supplies company information to a
    vendor or service by any means, that company is held responsible for
    any breach of security not the vendor or supplier.



    The Largest cause of a security breach for NPI or Non
    Public Information is the World Wide Web.




    So how does one get this monkey off their backs?


    We at the Lionheart group have the plan.


    We help in establishing your Company’s Information Security Officer.
    We help in a mandated written plan that is to be implemented by your company.
    We help train your company’s employees in the proper use and security of this information.
    We help evaluate your company’s security of handling
    all NPI (Non Personal Information) as a
    consultant
    This Agent has a background in securing United
    States Federal Documents for the United States Air
    Force in their Nuclear Weapons Programs During The VietNam Era Having a Top Secret Clearence.


    The Knowlege Is There.

    What if I have a Security Breach or I Have No Plan?
    and most companies will have a plan but there are
    problems with some plans or gaps in them.

  • 1. A Possible One Million Dollar Fines for each occurrence
  • 2. Ten Years in jail for Executives
  • 3. Class Action Suites with No Time Limits on the suites
  • 4. Repayment of Individuals who incurred loss
  • 5. Mandatory Removal of Management in position.

  • Let me ask this… Would this affect your business?
    What if I could tell you we could help provide at no
    direct cost to your company?


    This is what our help can do!

  • 1.Provide selection of a CISO
  • 2.Provide a written policy
  • 3.Provide Employee Traning on NPI handeling

  • At No Cost to You!


    So then How May We Serve You?

    E-Mail Me and We can Start Helping today before its to late!

    What We Offer



    Helpful Information for Your Security
    How Safe is Your Identity?
    July 2008
    by Ryan Hagen
    Remember that questionable photo your buddy sent you
    that you instantly deleted and made disappear
    for good? You didn’t. Or what about all
    those credit card transactions that reveal your
    sensitive financial information, nobody can have
    access to that right? They can!

    Unfortunately your PC is an open book. Anyone that has
    access to it has the power to exploit your
    sensitive information, which can lead to personal
    and financial disaster.
    NOTE: Access can be obtained by NonSecure close outs of your computers Log ins or site Log in. Hackers Love This! Hacking has become a mofia like business today!The Cyber Skys the Limit.
    It’s a good thing there are programs out there that
    will make the paper trail disappear.
    But what of the Computer? More People today pay their bills
    via computer under the supposedly secure site.
    Privacy control programs can allow you to decide
    which files you want to destroy for good, and make
    sure that it is done in a discreet manner.
    Some of these powerful programs allow you to
    permanently wipe out any data related to your
    Internet activity such as website history, cookies and confidential information like passwords, IDs and
    banking and credit card information.
    If you get your hands on the right application, you
    will have the capacity to purge a wide range
    of files and caches created by P2P applications,
    such as Bit Torrent, LimeWire, Azureus, Kazaa,
    Torrent and Morpheus. As well as Instant Messaging
    and Voice Over Internet Protocol such
    as: AOL, ICQ, MSN, Yahoo Instant Messenger, Adding New Smileys can be a danger too
    Trillian, Google Talk, Skype, Windows Live
    Messenger, and GAIM.
    Living in a time where personal security is of the
    utmost importance in both our personal and
    business lives, it’s good to know that there are
    ways to make sure that your sensitive information
    doesn’t find its way into the hands of an unwanted third party.
    The Federal Trade Commission (FTC) reported that there
    will be about 9 million identities stolen in
    the U.S. this year. With the total cost
    estimated at around $52 billion, over $5,000 for
    the average victim.
    Even when selling your computer or having it repaired
    by a technician, your confidential information is
    vulnerable long after you have deleted it.
    It is important to have it shredded for good through
    the permanent removal of files.



    U.S.BUSINESS AND UNTED STATES GOVERNMENT LINKS

    The Lionheart Group
    Federal Trade Commission on Identity Theft
    Federal Trade Commission
    U.S. On Guard Online
    Test your Knowledge of Spyware

    Email: tx.art@hotmail.com