Bogus Filing Tactics: A Primer - IACA€¦ · Bogus Filing Tactics: A Primer Paul Hodnefield,...

Post on 25-Sep-2020

1 views 0 download

transcript

Bogus Filing Tactics: A Primer

Paul Hodnefield, Corporation Service Company The Honorable Elaine Marshall, North Carolina

Secretary of State Trevor Timmons, Colorado

38th Annual Conference – Savannah, Georgia

Method

2

Clues?

3

Harassment

4

Estate

5

Trust

6

Address

7

Amount

8

General Observations

• Lenders are Most Common Target

– UCC record serves as basis for defense in foreclosure actions or for proactive litigation.

– Often names other persons that play a role in the foreclosure process.

• Harassment is Also Common

– Used against businesses or individuals that have crossed the perpetrator.

9

Preemptive Measures in North Carolina

• North Carolina General Statutes – § 25-9-516. What constitutes filing; effectiveness of filing.

• (b)(8) In the case of a record presented for filing at the Department of the Secretary of State, the Secretary of State determines that the record is not created pursuant to this Chapter or is otherwise intended for an improper purpose, such as to hinder, harass, or otherwise wrongfully interfere with any person.

– § 25-9-518. Claim concerning inaccurate or wrongfully filed record. • (b2) Statement by Secured Party of Record. - A person may file in the filing office an

information statement with respect to a record filed there if the person is a secured party of record with respect to the financing statement to which the record relates and believes that the person that filed the record was not entitled to do so under G.S. 25-9-509(d).

• (b3) Contents of Statement Under Subsection (b2). - An information statement under subsection (b2) of this section must:

– (1) Identify the record to which it relates by the file number assigned to the initial financing statement to which the record relates;

– (2) Indicate that it is an information statement; and – (3) Provide the basis for the person's belief that the person that filed the record was

not entitled to do so under G.S. 25-9-509(d).

• North Carolina takes a proactive approach to fraudulent filers • North Carolina also has a “do not file” list, provided by the

federal courts

10

ULC Hip Pocket Amendment

• Developed as an alternative to non-uniform bogus filing legislation – It is not intended to replace existing bogus filing laws

• The amendment introduces the concept of a “trusted filer.” – This is a person that regularly files with a filing office and has provided the

office with current contact information sufficient to establish its identity – This person has been issued credentials to access online filing services or has

established a prepaid or direct debit account for payment of filing fees.

• It also provides a mechanism for a person identified as a debtor to file an affidavit of wrongful filing. – When the filing office receives such an affidavit, there are set procedures to

follow to terminate the filing, including sending notice to the secured party of record

– Secured party may bring a court action and the amendment provides rules and procedures in the event of court-ordered reinstatement

– There is a filing office administrative review prior to termination of a record submitted by a trusted filer.

11

2015 Legislation

• Indiana – Passed bill that requires court approval to file a

common-law lien against a public official.

• Utah – Hip Pocket Amendments (“HPA”) enacted.

• Maryland – Enacted law with similar concepts to HPA.

• New Jersey – Passed bill that adds reasons for rejection and

exempts records filed by a “registered organization.”

12

2015 Pending Bills

• California – Gives counties more authority to reject potentially

fraudulent UCC records.

• Maine – Provides additional reasons for rejection.

• New York, Nevada and Kansas – Bills revise civil and/or criminal penalties for filing

fraudulent UCC records.

• Pennsylvania – Provides for administrative hearings on fraudulent

UCC records.

13

IT Resources

• Disclaimer!

– I’m not talking about “strawman” filers specifically

– Many resources already available (including from my esteemed co-panelists)

– I am talking about detection and response in the digital world

14

Three Keys

• Key #1: Know (what is happening on your website)

• Key #2: Take Action (based on what you are permitted to do)

• Key #3: Support Enforcement (whether internal or outside your office)

15

Key #1 Know your Filers & Your Filing

System

– This used to be easy

– Move to online makes this harder

– But, all is not lost!

16

• Develop a Baseline

Key #1 Know your Filers & Your Filing

System

17

• Identify Anomalies

Key #1 Know your Filers & Your Filing

System

18

• Investigate (in the graph below, “visitors” #2-7 are each between 130k and 88k visits)

Key #1 Know your Filers & Your Filing

System

19

• Block and apologize later

Key #2 Take Action

20

• Collect Information

– Filing information

– IP address

– Payment information

– Other filings associated with findings

Key #2 Take Action

21

• Contact Appropriate Security Team(s) – State

– Agency

• Contact Law Enforcement – State Bureau of Investigation

– State Attorney General

– Secret Service

– U.S. Attorney

Key #2 Take Action

22

• Consider Contacting Advocates for Victims

– Consumer Protection

– Identity Theft Unit

• Coordinate with Law Enforcement

Key #2 Take Action

23

Key #3 Support Enforcement

• Follow their Lead

24

• Affidavits

Key #3 Support Enforcement

25

• Credit Card Issuers

• Banks

Key #3 Support Enforcement

26

• Develop a Process

Key #3 Support Enforcement

27

• Stick with It!

Key #3 Support Enforcement

28

Wrap Up

• Develop Knowledge

• Do What you Can

• Establish Relationships

29