Guest | Contact Us | Print Page | Sign In
News Blog
Blog Home All Blogs

AI Cheat Sheet - from Axios

Posted By Robert Treuber, Wednesday, June 4, 2025

https://www.axios.com/2025/06/04/ai-cheat-sheet-chatgpt-grok-gemini-claude

(This article is from the Axios Newsletter)

Anthropic CEO Dario Amodei's warning in our column last week about a looming AI-driven white-collar job apocalypse ignited a national conversation that pulled in everyone from former President Obama to President Trump's AI czar.

  • Critics saw the warning as alarmist, saying the "doomer" attitude fails to account for the new jobs and economic riches AI might shower on the U.S. public.
  • On the flip side, Obama and others saw the interview as vital truth-telling — a clear-eyed warning that government and companies should consider deeply and urgently.

Why it matters: In the flood of conflicting views, one broad consensus emerged. Every U.S. citizen should start preparing today for society-shifting AI advancements coming soon.

  • So we plucked the best of what AI experts, government officials, business leaders, AI-savvy college students and Axios readers sent us to compile a toolkit for turning AI into a force multiplier for you.

Learn the models: There are many generative AI models you can use now for free. Here's a cheat sheet for where to get each one, what it's best for, and what you get if you upgrade to paid version, via Axios chief tech correspondent Ina Fried:

  • ChatGPT (OpenAI): The pioneering chatbot offers image and video generation, and can be used through mobile and computer apps as well as via ChatGPT.com (and even an 800 number). ChatGPT Plus service ($20/month) offers more and earlier access to the latest models, plus additional privacy options. Check out the advanced voice mode's natural back-and-forth conversation.
  • Claude (Anthropic): Though less-known than ChatGPT, Claude is favored by many businesses for its impressive coding skills and neutral, helpful tone. The $20-per-month version allows for more usage, priority during busy times and early access to new models.
  • Grok (X): Built into X (formerly Twitter), Grok pitches itself as a "truth-seeking AI companion for unfiltered answers" — though its responses tend to be similar to those of other engines. Free users get a limited number of queries and image generations. Paid options include the $30-per-month SuperGrok and premium subscriptions to X (starting at $8/month).
  • Perplexity: Perplexity has carved out a niche as a combination of AI chatbot + search engine. The $20-per-month Perplexity Pro service offers image generation and access to a range of models, allowing you to see their different responses in one place.
  • Gemini (Google): Google's assistant can integrate with Gmail and offers a well-regarded tool called NotebookLM that can turn your notes (or any document) into a podcast. The $19.99-per-month Pro plan includes more access to its Whisk and Veo video tools plus more storage.
  • Meta AI: Meta's AI assistant is available across Facebook, WhatsApp and Instagram, with free access to image generation and a chatbot based on the company's Llama model.
  • Apple: Apple has the most limited AI of the group. But Apple Intelligence offers a taste of the technology in the apps you already use on your iPhone or Mac, including tools to tweak your writing, create a custom emoji or generate images. Apple Intelligence is free but requires a recent Mac or iPhone.

Experiment aggressively: You only see the possible magic by experimenting. Three easy ways to start:

  1. Writing: Train the model to write in your voice by asking the LLM to save your writing style after feeding in things you've written in the past. The more you feed, the better it mimics. Jim has a JimGPT, trained on hundreds of speeches and columns, as well as a saved version of our Smart Brevity™ style, fine-tuned to his personal quirks.
  2. Health: Feed in as much health information as you feel comfortable, including lab results, and you'll be amazed by generative AI's ability to help guide you on health choices, workouts, warning signs and supplements. (Always consult a doctor where appropriate!)
  3. Research: AI chatbots can be great for preparing for a meeting, understanding a new subject or planning a trip. Just ask for what you want to know — background on a person or company, or some good day trips in the city you're visiting.

Master the prompts: This is the first advanced technology that you don't need to be a computer nerd or coder to master. You simply need to master the art of prompting. These tips are excerpted from a Substack synthesis by Elvis Saravia, a U.K.-based machine-learning research scientist, summarizing a Y Combinator roundtable:

  1. Be hyper-specific & detailed (the "manager" approach): Treat your LLM like a new employee. Provide very long, detailed prompts that clearly define their role, the task, the desired output, and any constraints.
  2. Assign a clear role (persona prompting): Start by telling the LLM who it should act like (e.g., "You are a manager of a customer service agent," "You are an expert prompt engineer"). This sets the context, tone, and expected expertise.
  3. Outline the task & provide a plan: Clearly state the LLM's primary task (e.g., "Your task is to approve or reject a tool called..."). Break down complex tasks into a step-by-step plan for the LLM to follow.
  4. Meta-prompting ("LLM, improve thyself!"): Use an LLM to help you write or refine your prompts. Give it your current prompt, examples of good/bad outputs, and ask it to "make this prompt better" or critique it.

Reality check: AI bots are known to sometimes make things up, known as hallucinating. Verify the information you get if you plan to rely on it.

  • Be sure you're comfortable with the information you're sharing with an AI assistant. In some cases, companies may use the data you share to train the models or serve advertising. Paid versions sometimes allow you to limit this. This Axios series, "What AI knows about you," details how the various chatbots train their systems.

Know the danger zones: If you're worried about your current major or job, be clear-eyed that the following list is areas AI experts think are most vulnerable:

  • Programming and coding jobs, particularly entry-level, are likely to be the first to be hit.
  • Telemarketers, some types of teachers, political scientists and arbitrators are quite vulnerable to automation by LLMs, a study by professors at Princeton, NYU and the University of Pennsylvania found.
  • Image-generating AI will affect opportunities for interior designers, architects, art directors and mechanical drafters, the study says.

Own it: Figure out, now, ways to leverage LLMs to vastly improve your productivity, creativity and enjoyment. This is a snooze-you-lose moment. But if you jump in, start to master LLMs, and try to 2x your output this year and 10x it down the road, this could be a game-changer for your career.

  • We encourage Axios colleagues to share their best findings with others in related gigs so that everyone grows with AI.

Go deeper: "Behind the Curtain: A white-collar bloodbath."

Tags:  AI  technology 

PermalinkComments (0)
 

Priority 1 Bill signed by Governor

Posted By Robert Treuber, Friday, March 3, 2023

A bill (A610 / S2220) has been signed by Gov. Hochul and chaptered.

 

The bill prohibits agencies from charging a fee for records where an electronic copy is already available from a previous request made within the past six months except for the actual cost of a storage device or media if provided to the requester.

 

The following is from the bill memo.

 

SUMMARY OF PROVISIONS:
 
Section one of this bill would clarify that charging a fee for requests
under Article 6 of the Public Officers Law, constituting the Freedom of
Information Law (FOIL), shall be prohibited when an electronic copy for
such record already exists for the same request made within the previous
six months, except when a different fee is otherwise prescribed by stat-
ute or if the reproduction of such record is in the form of a storage
device, in which case the actual cost of that device or media may be
charged.

 

JUSTIFICATION:
 
In cases where a public record has been previously requested and exists
in the form of an electronic copy, the agency that furnished the record
can provide an electronic copy of that record upon subsequent request at
no additional cost to the agency. In those circumstances, agencies
should not be able to charge a fee for the original time taken to
produce the record. They may charge for the storage device or media
provided to comply with the request. This bill seeks to clarify such
changes made pursuant to Chapter 745 of the Laws of 2022.

 

 

Tags:  Fees  Law  technology 

PermalinkComments (0)
 

ANNUAL CERTIFICATE OF COMPLIANCE CERTIFICATION DUE APRIL 15TH

Posted By Robert Treuber, Monday, March 14, 2022
Updated: Monday, March 14, 2022

 

Annual Certifications of Compliance

The Certification of Compliance is a critical governance pillar of the cybersecurity programs of all Covered Entities. Prior to April 15th of each year, all Covered Entities must file a Certification of Compliance confirming their compliance with the Cybersecurity Regulation for the previous calendar year.

 

An entity or individual should only submit a Certification if they were in compliance with all portions of the regulations that applied to that Covered Entity during the time period the Certification covers. Even if a Covered Entity qualifies for an exemption pursuant to 500.19(a), (c), or (d), it has to submit a Certification of Compliance to demonstrate that it was in compliance with the sections of the regulation that apply pursuant to the particular exemption. (The exemption set forth in 500.19(b) is the only exemption that does not require a Covered Entity to file a Certification of Compliance.)

 

Certifications of Compliance for the calendar year 2021 are due by April 15, 2022.  Covered Entities that hold more than one license must file a separate Certification of Compliance for each license it holds.

 

Instructions on how to file a Certification of Compliance can be found by clicking https://www.dfs.ny.gov/system/files/documents/2019/12/cyber_cert_compliance_filing.pdf

 

 

Covered Entities Do Not Need to File New Notices of Exemption
Any DFS regulated entity or licensed person who filed a Notice of Exemption previously does not need to refile a Notice of Exemption. However, if your exempt status has changed, then the entity or individual should amend or terminate their filing through the DFS portal.

 

 

How to File
The DFS Cybersecurity Portal has been redesigned to assist you with your filings. To ensure that filings are matched to the appropriate Covered Entity or licensed person, we encourage the use of an identifying number when filing. Identifying numbers are New York State License number, NAIC/NY Entity number, NMLS number or Institution number. Please make sure that you have your license number available when you make your filing. A look-up feature is included in the Portal for anyone who does not know which number to use.

 

 

To get started please visit the DFS Cybersecurity Portal: https://myportal.dfs.ny.gov/web/cybersecurity/ 

 

 

 

 

 

Tags:  compliance  cyber  cybersecurity  DFS  Licensing  Regulations  technology 

PermalinkComments (0)
 

Remote Notary FAQ from NY Secretary of State

Posted By Robert Treuber, Friday, March 4, 2022
Updated: Friday, March 4, 2022

https://dos.ny.gov/notary-public#remote-notarization-faqs

 

 

Remote Notarization FAQs

What is remote notarization?
“Remote notarization” is a form of notarization where the notary officiates the document remotely through audio-visual technology and other security protocols. Remote notarization can be performed by a notary public by traditional ink (e.g., pen) or electronic signature.

How is remote notarization performed?
To provide a remote notarization, the notary public must be physically located within the State of New York at the time of the notarization.  The notary must identify the remote signor (also known as the “principal”) of the document through any of the following three methods:

  1. the notary’s personal knowledge of the signor;
  2. by means of communication technology that facilitates remote presentation by the signor of an official, acceptable form of ID, credential analysis, and identity proofing; or
  3. through oath or affirmation of a credible witness who personally knows the signor, and who is either personally known to the notary or identified by the previously referenced means of communication technology.

Commercial software is available to notaries public to perform identify proofing and credential analysis.

Regardless of the method used to confirm the identity of the signor, the notary must be able to see and interact, in real-time, with the remote signor of the document through audio-visual communication technology.  This technology must have security protocols in place to prevent unauthorized access.  The notary must make and keep an audio-visual recording of the remote notarization, and ensure that there is a back-up of the recording.

After the remote signor has executed the document, it must be transmitted to the notary public for officiating.  The notary must confirm that the document is the same as the one signed remotely in the notary public’s presence before applying the notary stamp and signature to the document.  The following statement must be added to the jurat “This remote notarial act involved the use of communication technology.”

What is credential analysis?
Credential analysis is a process where a third-party service validates a government-issued identification presented by an individual through a review of public and proprietary data sources.

What is identity proofing?
Identity proofing is a process or service through which a third party confirms the identity of a signor through review of personal information from public and proprietary data sources.

What is the difference between credential analysis and identify proofing?
Credential analysis validates the authenticity of the principal’s government-issued identification, and identity proofing validates the identity of the individual principal.

How long must a notary retain the audio-visual recording of each remote notarization performed?
A recording, containing both audio and video, of the remote notarization must be retained by the notary for at least ten (10) years. The notary must take reasonable steps to ensure a backup recording of the remote notarization exists and is secured from unauthorized use. The notary may authorize a third party to retain the recordings on behalf of the notary, provided that all recordings retained by a third party be made available to the Secretary of State upon request.

Is a notary journal required?
Yes, the notary public must keep a journal of all remote notarizations performed. Each journal entry must be made contemporaneously with the performance of the notarial act, and each entry must include the date and approximate time of the notarization, the name of the remote signor, the audio-visual technology used to perform the notarization, the number and type of documents officiated and notarial services provided, and the type of identification/credential presented by the remote signor of the document or documents.  The journal must be kept by the notary public for as long as they remain a notary and for an additional five years thereafter.

How much can a notary charge for remote notarization?
A notary public may charge $5.00 per act/signature. If the notary is not performing a remote notarization, the fee cannot exceed $2.00 per act.

Does the notary have to provide remote notary services?
No, if the notary does not have the appropriate technology or capability to provide such services, or does not wish to engage at all in remote notarization, a notary may decline to provide remote services. Additionally, a notary may and should refuse to provide remote notary services if the notary does not believe the person signing the document remotely has capacity to sign or if the notary does not believe the remote signor is signing the document voluntarily.

Do notaries have to register with the Secretary of State to provide remote notary services?
Any notary public commissioned by the NYS Department of State can act as a traditional or remote notary. No separate application or license is required, and the notary is not required to pay any additional fee to the Department of State or the County Clerk where the notary is currently commissioned.  On January 31, 2023 the rules for remote notarization will change.  One significant change is that as of January 31, 2023, any notary wishing to provide remote notarization, must register the capability to perform electronic notarizations with the NYS Department of State, Division of Licensing Services, and pay the requisite fee (which is to be determined and established in regulation) to act as an electronic notary.

Will remotely notarized documents be accepted by a county clerk or other government offices?
Yes, the new law states, in part, “[a] county clerk, city registrar, or other recording officer where applicable shall accept for recording a tangible copy of an electronic record and that is otherwise eligible to be recorded under the laws of this state if the record has been certified by a notary public or other individual authorized to perform a notarial act.” New York Executive Law § 135-c(12)(b). To be accepted, the notary would first have to certify the remotely notarized document.  New York Executive Law § 135-c(12)(a). Specific questions about filing such documents should be directed toward the filing office where the document will be submitted.

 

 

Tags:  Dept of State  Notary  Remote Inksigned Notary  Remote Online Notary  RIN  technology 

PermalinkComments (0)
 

Are You Working From Home?

Posted By Robert Treuber, Wednesday, April 22, 2020
Updated: Wednesday, April 22, 2020

The Technology Committee has compiled a guide to tools and technologies for title professionals who are working from home.

 

You can view/download it HERE or from the WFH Handbook link on this page.

 

You can also locate the Handbook in the Technology Committee File Library, following the top navigation path:

RESOURCES > DOCUMENTS & FILE LIBRARIES > TECHNOLOGY COMMITTEE FILE LIBRARY

 

If you have suggestions for the next edition of the Handbook, please email RGT@NYSLTA.ORG

 

 

 Attached Files:

Tags:  COVID-19  technology  WFH  Work from Home 

PermalinkComments (1)
 

DFS letter: Cybersecurity Awareness During COVID-19 Pandemic

Posted By Robert Treuber, Tuesday, April 14, 2020
Updated: Tuesday, April 14, 2020

 

Released on April 13, 2020

 

https://www.dfs.ny.gov/industry_guidance/industry_letters/il20200413_covid19_cybersecurity_awareness

 


Re: Guidance to Department of Financial Services (“DFS”) Regulated Entities Regarding Cybersecurity Awareness During COVID-19 Pandemic

 

To: All New York State Regulated Entities

 

As we face an unprecedented threat from the novel coronavirus known as “COVID-19,” every organization’s highest priority must be health and safety.  The extraordinary steps necessary to combat the COVID-19 pandemic have also created new challenges as regulated entities work to continue operating and providing critical services.  Among these new risks is a significant increase in cybercrime, as criminals seek to exploit the situation.[1]

 

The Department of Financial Services (“DFS”) has identified several areas of heightened cybersecurity risk as a result of this crisis.  As called for by DFS’s cybersecurity regulation, 23 NYCRR Part 500, regulated entities should assess the risks described below and address them appropriately.[2]

 

We also remind all regulated entities that, under 23 NYCRR Section 500.17(a), covered Cybersecurity Events must be reported to DFS as promptly as possible and within 72 hours at the latest.  Prompt reporting will enable DFS to respond quickly to new threats as DFS works to protect consumers and the financial services industry in these difficult times.

 

Heightened Risks

  1. Remote Working

    The abrupt shift to mass remote working forced by COVID-19 has created new security challenges, and attackers are exploiting these new vulnerabilities.[3]  These heightened risks to regulated entities’ networks and Nonpublic Information[4] include: 

    • Secure Connections.  Companies should make remote access as secure as possible under the circumstances.  This includes the use of Multi-Factor Authentication and secure VPN connections that will encrypt all data in transit.  See 23 NYCRR §§ 500.12 & 500.15.
    • Company-Issued Devices.  As new devices such as computers and phones are acquired or repurposed for remote working, regulated entities should ensure that they are properly secured.  This includes locking down the devices so applications cannot be added or deleted by the user, and installing appropriate security software, such as Endpoint Detection & Response and Mobile Device Management.
    • Bring Your Own Device (BYOD) Expansion.  Regulated entities that have expanded their BYOD policies to enable mass remote working should be aware of the security risks and consider mitigating steps.  Some personal devices are not properly secured or are already compromised.  If an expanded BYOD policy is necessary, compensating controls should therefore be considered.
    • Remote Working Communications.  Remote working has increased reliance on video and audio-conferencing applications, but these tools are increasingly targeted by cybercriminals.  Regulated entities should configure these tools to limit unauthorized access, and make sure that employees are given guidance on how to use them securely.
    • Data Loss Prevention.  Employees may be using unauthorized personal accounts and applications, such as email accounts, to remain productive while remote working.  Regulated entities should remind employees not to send Nonpublic Information to personal email accounts and devices.  Anticipating and solving productivity problems will reduce the temptation to use such devices.

  2. Increased Phishing and Fraud

    There has been a significant increase in online fraud and phishing attempts related to COVID-19.  For example, the FBI has reported that criminals are using fake emails that pretend to be from the Centers for Disease Control and Prevention (“CDC”), ask for charitable contributions, or offer COVID-19 relief such as government checks.[5]

  3. Regulated entities should remind their employees to be alert for phishing and fraud emails, and revisit phishing training and testing at the earliest practical opportunity.  Now that face-to-face work is curtailed, authentication protocols may need to be updated – especially for key actions, like security exceptions and wire transfers.


  4. Third-Party Risk

    The challenges created by the COVID-19 pandemic have also affected third-party vendors, and regulated entities should re-evaluate the risks to critical vendors.  See 23 NYCRR § 500.11.  Regulated entities should coordinate with critical vendors to determine how they are adequately addressing the new risks.

 

Conclusion

The COVID-19 pandemic has disrupted normal operations in the financial services industry and beyond, and cyber criminals are exploiting the crisis. Despite the extraordinary challenges, regulated entities should remain vigilant.  By following good cybersecurity practices, entities can identify, mitigate, and manage the risks.

 


[1] See DHS Cybersecurity and Infrastructure Security Agency (“CISA”), COVID-19 Exploited by Malicious Cyber Actors (April 8, 2020).

[2] Heightened cyber risk should also be addressed in the COVID-19 operational preparedness plans called for by DFS guidance issued on March 10, 2020.  See Guidance to New York State Regulated Institutions and Request for Assurance of Operational Preparedness Relating to the Outbreak of the Novel Coronavirus.

[3] See FBI, Cyber Actors Take Advantage of COVID-19 Pandemic to Exploit Increased Use of Virtual Environments (April 1, 2020); U.S. Secret Service, Secret Service Issues COVID-19 (Coronavirus) Phishing Alert (March 9, 2020).

[4] 23 NYCRR § 500.01(g).

[5] See FBI, FBI Sees Rise In Fraud Schemes Related to the Coronavirus (COVID-19) Pandemic (March 20, 2020).

Tags:  Coronavirus  COVID-19  cybersecurity  DFS  technology 

PermalinkComments (0)
 

Bob's Blockchain Blogroll

Posted By Robert Treuber, Wednesday, March 28, 2018
Updated: Wednesday, March 28, 2018

 

Blockchain Blogroll

 

NYSLTA has had an ad-hoc discussion group on the topic of Blockchain since 2016.

 

Here is my constantly updated list of web sites, articles and videos. Please note some of these links are PDF downloads.

 

I hope you will be able to form your own perspective and understanding from these resources.

 

If you have a Blockchain resource you want to add, please mention it in the comments section.

 


http://associationsnow.com/2016/11/national-association-realtors-analyzes-blockchains-real-estate-potential/

 

http://www.csoonline.com/article/3138869/security-awareness/fraud-and-privacy-problems-on-the-blockchain.html

 

http://www.coindesk.com/blockchain-mortgages-compelling-premature/

 

https://blockchainedu.org/learn/?gclid=CJK3nuKcytECFYWKswodXpINXw

 

http://bravenewcoin.com/assets/Reference-Papers/A-Gentle-Introduction/A-Gentle-Introduction-To-Blockchain-Technology-WEB.pdf

 

https://www.pwc.com/us/en/financial-services/publications/viewpoints/assets/qa-what-is-blockchain.pdf

 

http://x9.org/wp-content/uploads/2016/02/Blockchain-Explained-v2.09.pdf

 

https://www.eitdigital.eu/fileadmin/files/2016/events/nl-id2016/Ad_Kroft_-_PresentatieBC_EITdigital_-_session_blockchain.pdf

 

https://totalcrypto.io/blockstrap-beginner-course-blockchain/

 

http://dataconomy.com/2015/10/wtf-is-the-blockchain-a-guide-for-total-beginners/

 

http://www.mortgageorb.com/blockchain-next-mortgage-industry-shake

 

https://medium.com/@dsearls/customertech-will-turn-the-online-marketplace-into-a-marvel-like-universe-in-which-all-of-us-are-ea6adcfc94f1 

 

http://www.computerweekly.com/opinion/Self-sovereign-identity-on-the-block-ideal-or-no-deal

 

https://qz.com/989761/microsoft-msft-thinks-blockchain-tech-could-solve-one-of-the-internets-toughest-problems-digital-identities/

 

https://www.economist.com/news/world-if/21724906-trust-business-little-noticed-huge-startups-deploying-blockchain-technology-threaten

 

http://fortune.com/2017/07/20/term-sheet-thursday-july-20/?t=1&cn=ZmxleGlibGVfcmVjc18y&iid=b4db65ad628f4e0298e66b6f71be7952&uid=242749434&nid=244+285282312

 

https://finance.yahoo.com/news/microsoft-unveils-technology-speed-blockchain-130857956.html

 

http://www.governing.com/topics/mgmt/gov-blockchain-technology-government-services.html

 

https://www.fastcompany.com/40449268/will-blockchain-revolutionize-global-real-estate-next

 

https://www.linkedin.com/pulse/can-blockchain-verifiable-claims-eliminate-next-breach-gary-rowe/

 

http://plog.proplogix.com/4-things-title-agents-should-know-about-blockchain-technology

 

https://www.coindesk.com/100-diplomas-mit-issues-graduate-certificates-on-a-blockchain-app/

 

http://www.slate.com/blogs/future_tense/2017/10/27/the_list_of_things_blockchain_will_revolutionize_according_to_the_tech_industry.html

 

https://www.housingwire.com/blogs/1-rewired/post/41678-mortgage-lenders-heres-your-blockchain-primer

 

https://www.bloomberg.com/gadfly/articles/2017-11-22/bitcoin-leaves-the-tech-giants-trailing

 

https://www.linkedin.com/pulse/blockchain-basics-level-set-enterprise-executives-gary-rowe/

 

https://techvisionresearch.com/project/blockchain-101/

  

https://techvisionresearch.com/project/identity-new-perimeter/

  

https://techvisionresearch.com/project/smart-contracts-blockchain/

 

https://www.bloomberg.com/news/articles/2018-01-18/hackers-have-walked-off-with-about-14-of-big-digital-currencies

 

https://www.enterprisetech.com/2018/01/26/vermont-launches-blockchain-project/

 

https://www.housingwire.com/blogs/1-rewired/post/42393-blockchain-isnt-magic-but-its-designed-to-make-you-think-so

 

https://www.theguardian.com/global-development/2018/feb/06/unicef-recruits-gamers-mine-ethereum-aid-syrian-children

 

https://www.linkedin.com/pulse/blockchain-basics-level-set-enterprise-executives-gary-rowe

 

 

 

 

 

Tags:  Blockchain  change management  cyber  cybersecurity  data security  technology 

PermalinkComments (2)
 

Cybersecurity Reg Limited Exemption Timeline

Posted By Robert Treuber, Wednesday, August 9, 2017

The cybersecurity regulation has the first of many interim deadlines arriving on Aug. 28, 2017.

 

We have posted a file called the "Cybersecurity Limited Exemption Timeline" (access restricted to signed-in members only).


 

If you need help with the regulation, please contact the consultants listed on our cybersecurity compliance page. These firms have agreed to provide discounted services to NYSLTA Members.

 


Hey, why not subscribe to this newsblog and get an email notification whenever a new item is posted?

Here's how   Guide - How to Subscribe to News and Reports.

 

 

.

Tags:  Consumer protection  cyber  cybersecurity  data security  DFS  technology 

PermalinkComments (0)
 

You're not going to like this

Posted By Robert Treuber, Monday, December 5, 2016
Updated: Monday, December 5, 2016

Trust me, you are not going to like this.  This is about changing the way you operate and conduct business. This is going to cost you money and time. This is "information security" and it is very important.

 

Before you go any further, I am going to reiterate something John Hollenbeck of First American Title said at our Annual Meeting in September. He said data security for title companies is important because when consumers buy a house, they give you all their information. And then they give you all their money.

 

The NY-DFS and an array of federal agencies are developing or have already issued regulations or standards for cybersecurity.  By Valentine's Day, you are going to be tired of seeing and hearing the term "cybersecurity".

 

The NYSLTA is preparing to submit testimony to the State Assembly's public hearing on cyber security.  In January, we plan to offer a CE course on the basic elements of cybersecurity.  We have posted a document titled, "Small Business Information Security: The Fundamentals" in the Technology Committee File Library.

 

Question: How do you eat an elephant?

Answer: One bite at a time

 

If you put off facing the inevitability that cybersecurity is going to be part of your business, one day you will  have to eat an entire elephant in one bite.  My advice is to start slow and start now.

 

Here is a link to a good, easy to read and easy to implement article on cybersecurity:

There’s No Flying Under the Radar: Why Small Businesses Should Get Smart About Information Security

 

 

 

Tags:  CE  Consumer protection  cyber  cybersecurity  DFS  technology 

PermalinkComments (1)
 

Our response to proposed regulation for cybersecurity

Posted By Robert Treuber, Tuesday, November 15, 2016
Updated: Tuesday, November 15, 2016

On November 14, 2016 I signed and sent a letter to DFS Deputy Superintendent Cassandra Lentchner.

 

In September, the DFS issued a proposed regulation for all "covered entities" under DFS purview, which includes all underwriters and licensed title agents. The regulation, designed for the enormous global financial institutions regulated by DFS, imposed drastic changes to security procedures, compliance, business operations, reporting and company governance.

 

The general assessment is this regulation is a positive development for both consumer and financial services protection. The specifics of the regulation proved in some instances to be overly burdensome and ill suited for the kind of business title companies conduct.

 

The letter was the result of more than a month of work by a specially appointed joint working group of volunteers drawn from the Government Regulations Committee and the Technology Committee.  This project was headed by Jean Partridge, who also was the primary author of the document. She was advised and supported by Bill Collins, Victor Pajonas, Chris Davis and Vincent Danzi.

 

The letter is attached to this blog post and it resides in the Government Regulations File Library, on this web site [RESOURCES>DOCUMENT & FILE LIBRARIES].

 

The joint working group worked cooperatively with counterparts at FNTG, Old Republic, Stewart Title, First American, and ALTA. There was cross-industry collaboration with trade associations representing property & casualty agents in NY and DC- based financial institution trade associations. As always, our Albany lobbyists, Scott Wexler and Kate Corkery provided advice and perspective.

 

For a regulation that has the potential for profound impact on title agents - and by profound I mean expensive - the awareness and engagement from the membership was imperceptible.I announced this regulation and posted the proposed in an email blast.  I provided an email address for comments. One member commented. NYSLTA is fortunate to have such skilled and dedicated members, such as the handful of people who produced this letter.

 

This Association will continue to seek engagement with DFS on your behalf. The challenges ahead are countless. Your contribution of time and your expertise are much needed and always welcome.

 

RGT

 

 

 

Download File (PDF)

Tags:  Consumer protection  cyber  cybersecurity  DFS  Regulations  technology 

PermalinkComments (0)
 
Page 1 of 3
1  |  2  |  3
Contact Us

120 Broadway, Suite 945
New York, NY 10271

212. 964. 3701

info@nyslta.org

Our Mission

The New York State Land Title Association, Inc. advances the common interests of all those engaged in the business of abstracting, examining, insuring titles, and otherwise facilitating real estate transactions. The Association promotes the business and general welfare of its Members and protects real property title holders’ ownership rights.