Credit reports under the fair credit reporting act

Assignment Help Operation Management
Reference no: EM132115402

Discussion #8: Part I: Use of Credit Reports under the Fair Credit Reporting Act; Part II: Repossession and Breach of the Peace

Course Content Learning Objective: Demonstrate how the legal environment controls activities between businesses and private citizens; Describe and explain important legal concepts, demonstrate the ability to apply them to new situations and communicate solutions

Chapter 9 Learning Objective: How consumers enter into credit transactions and what protections they are afforded when the do.

Chapter 10 Learning Objective: Priorities for claims on the security interest

Part I:  Read the case study below Rodgers V. McCullough and answer the three questions at the end of the case study. Make certain to clearly indicate your answers to each of the three questions. Be complete in your answers.

Rodgers v. McCullough

296 F.Supp.2d 895 (W.D. Tenn. 2003)

This case concerns the Defendants’ receipt and use of Christine Rodgers’ consumer report. Ms. Rodgers gave birth to a daughter, Meghan, on May 4, 2001. Meghan’s father is Raymond Anthony. Barbara McCullough, an attorney, represented Mr. Anthony in a child custody suit against Ms. Rodgers in which Mr. Anthony sought to obtain custody and child support from Ms. Rodgers. Ms. McCullough received, reviewed, and used Ms. Rodgers’ consumer report in connection with the child custody case.

Ms. McCullough instructed her secretary, to obtain Ms. Rodgers’ consumer report. She reviewed the report in preparation for her examination of Ms. Rodgers during a hearing. She also used the report during the hearing, including attempting to move the document into evidence and possibly handing it to the presiding judge.

The dispute in this case centers around whether Ms. McCullough obtained and used Ms. Rodgers’ consumer report for a purpose permitted under the Fair Credit Reporting Act (the “FCRA”). Plaintiff contends that Ms. McCullough, as well as her law firm, Wilkes, McCullough & Wagner, a partnership, and her partners, Calvin J. McCullough and John C. Wagner, are liable for the unlawful receipt and use of Ms. Rodgers’ consumer report in violation 15 U.S.C. §§ 1681o (negligent failure to comply with the FCRA) and 1681n (willful failure to comply with the FCRA or obtaining a consumer report under false pretenses). Plaintiff has also sued Defendants for the state law tort of unlawful invasion of privacy.

Plaintiff has moved for summary judgment on the questions of whether Defendants failed to comply with the FCRA (i.e. whether Defendants had a permissible purpose to obtain Ms. Rodgers’ credit report), whether Defendants’ alleged failure to comply was willful, and whether Defendants’ actions constituted unlawful invasion of privacy.

The United States Court of Appeals,W.D. Tennessee GRANTED Plaintiff’s motion for partial summary judgment on the question of whether Defendants had a permissible purpose to obtain Ms. Rodger’s credit report. It DENIED Plaintiff’s motion for summary judgment on the question of willfulness under the act. It also DENIED Plaintiff’s motion for summary judgment on the question of whether Ms. McCullough obtained and used Ms. Rodger’s credit report under false pretenses or knowingly without a permissible purpose.

Case Questions

1. Why did the defendant, McCullough, order her secretary to obtain Ms. Rodgers’s credit report? If Ms.McCullough is found liable, why would her law firm partners also be liable?

Reference no: EM132115402

Questions Cloud

What are the tools of expansionary fiscal policy : What are the tools of expansionary fiscal policy?
Why is privacy and data security so important : Why is Privacy and Data Security so important? Each week, research a unique news story or article related to Information Security/Information Technology.
Discuss advantages and pitfalls of information technology : Research, analyze and discuss the advantages and pitfalls of information technology, -coping with regulations, and -effectively using risk management
Discuss the model-based threat modeling technique : STRIDE is a model-based threat modeling technique developed by Microsoft. The methodology guides the security analyst through several activities.
Credit reports under the fair credit reporting act : Use of Credit Reports under the Fair Credit Reporting Act, Repossession and Breach of the Peace.
Identify best approach which is easy to maintain in future : Identify the best approach which is easy to maintain in near future. I would encourage team by planning lunch and learns by which new concept can be learnt.
Used for controlling inventory and satisfying demand : The Economic Order Quantity (EOQ) model is a classical model used for controlling inventory and satisfying demand.
How would their mrp system facilitate the material purchase : Take the virtual tour at Defiance Metal Products. How would their MRP system facilitate the material purchase process?
Ingredient in special plastic used in automobile bumpers : A small but important raw material is an ingredient in a special plastic used in automobile bumpers.

Reviews

Write a Review

Operation Management Questions & Answers

  Book review - the goal

Operations Management is about a book review. Title of the book is "Goal". This book has been written by Dr. Eliyahu Goldartt. The book has been appreciated by many as one of those books which offers an insight into the operations and strategic capac..

  Operational plan in hospitality enterprise

Operational plan pertaining to a hospitality enterprise is given in detail in the solution. The operational plan is an important plan or preparation which gives guidelines regarding the role and responsibilities of each and every operation at all lev..

  Managing operations and information

Recognise the importance of a strategic approach to the development and deployment of organisational information systems. Demonstrate an understanding of the importance of databases and their integration to the organisation's overall information mana..

  A make-or-buy analysis

An analysis of the holding costs, including the appropriate annual holding cost rate.

  Evolution and contributor of operations management

Briefly explain Evolution and contributor of Operations management.

  Functions and responsibilities of an operations manager

A number of drivers of change have transformed the roles, functions and responsibilities of an operations manager over recent years. These drivers have not only been based on technological innovations but also on the need for organisations to develop..

  Compute the optimal order quantity

Compute the Optimal Order quantity of DVD players. Determine the appropriate reorder point.

  Relationship to operations practice in the organisation

Evaluate problems in operations and identify approaches to overcoming them. Critically evaluate operating plans and identify areas for improvement. Justify, implement and evaluate changes to operations in line with modern approaches.

  A make or buy analysis

Develop a report for Figi Fabricating that will address the question of whether the company should continue to purchase the part from the supplier or begin to produce the part itself.

  Prepare a staffing plan

Prepare a staffing plan showing the change of your unit from medical/surgical staffing to oncology staffing.

  Leadership styles in different organizations

Ccompare the effectiveness of different leadership styles in different organizations

  Risk management tools and models

Be able to understand the concept of risk, roles and responsibilities for risk management and risk management tools and models.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd