Red Flags Identity Theft Plan Bay Equity LLC Table of Contents Section 1 Overview of the Compliance Program... 5 Section 2 Terminology...

Size: px
Start display at page:

Download "Red Flags Identity Theft Plan Bay Equity LLC Table of Contents Section 1 Overview of the Compliance Program... 5 Section 2 Terminology..."

Transcription

1 Table of Contents Section 1 Overview of the Compliance Program Mission Statement Annual Review and Updating Role & Responsibilities of the Compliance Officer Role & Responsibilities of the Executive Board Legal Requirements of Section 114 & 315 of FACTA Quality Control Auditing Training... 8 Section 2 Terminology Summary Identifying Information Definitions Identification of Red Flags List of 26 Red Flags by the Federal Trade Commission Section 3 Red Flag Detection and Response Address Discrepancies Accuracy of Information from Credit Agency Reports Social Security Validation Factual ID Reports Alerts, Warnings from a Consumer Reporting Agency Procedures for Mitigating Alerts from a Credit Agency Presentation of Suspicious Documents Presentation of Suspicious Personal Identifying Information Notices Received for Suspicious Activity Red Flag Response to Presented Documents Re-Pollution of a Borrower s Credit Report Section 4 Mitigation Assessment of Risk Mitigation Steps for Cleared Variance Non-returning Pre-qualification Applicants Steps When the Red Flag Cannot be Mitigated Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 1

2 4.5 Filing a Suspicious Activity Report (SAR) Identity Theft Affidavit Section 5 Information Security Safeguarding Confidential Information How Information is Obtained Policies and Procedures Electronic Access Network and Internet Policy Prohibited Activities Authorized Use of Software Administrative Access Control Firewall Procedures Data Center Security Document Destruction Incident Response and Preparedness Section 6 Consumer Privacy Privacy Policy Gramm-Leach-Bliley Act Consumer Privacy Notice to Applicants Confidentiality Agreement for Service Providers Closing Agent Authority under the Consumer Privacy Act Section 7 Fair and Accurate Credit Transactions Act Summary of the Fair and Accurate Credit Transactions Act Notices Required Under FACTA Fraud Alerts and Active Duty Alerts Initial Alert Access to Free Reports Initial Alert Fraud Alert and Active Duty Alert Extended Alert Access to Free Reports Extended Alert Section 8 Fair Credit Reporting Act (FCRA) Summary of the Regulation Permissible Purpose Credit or Insurance Solicitations Responsibilities of Furnishers of Information Responsibilities Regarding Disputes Record Retention Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 2

3 Section 9 U.S.A. Patriot Act Customer Identification Program (CIP) Customers Subject to CIP Requirements Required Customer Information to Be Collected Verification Through Documents Customer Notice Section 10 Vendor Management Policy Statement Vendor Risk Assessment Vendor Monitoring Section 11 Red Flags Check List Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 3

4 This Plan Was Updated October 2012 Revised December 2012 Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 4

5 Section 1 Overview of the Compliance Program 1.1 Mission Statement has developed this Red Flags Identity Theft Plan in accordance with Section 114 & 315 of the Fair and Accurate Credit Transactions Act of The foregoing policy has been developed to reflect the size, structure and business model of the company. The Red Flags Identity Theft Plan has been developed with the consent and approval of the company s Senior Executives, Board of Directors and Compliance Managers. The Red Flags Identity Theft Plan outlines the company s overall corporatewide program to detect, prevent and mitigate identity theft. Elements of the program apply to all company employees, contractors, affiliates, third party service providers, secondary market investors, insurers and agencies. Every entity handling a mortgage application or has access to any form of consumer information is responsible for ensuring compliance to the plan. has designated a responsible person to serve as Director of Compliance and ensure compliance to the plan, dissemination of materials and staff training. Members of senior management are responsible for ensuring the role as Director of Compliance is carried out adequately and that a second-in-command person be trained to serve in the absence of the Director of Compliance or Security Officer. Every employee is required to sign an acknowledgement that he/she has read and understands all components of the plan. 1.2 Annual Review and Updating On an annual basis, the company s senior executives and Board of Directors shall review the plan, audit reports and assess the merits of the plan. Changes and recommendations shall be discussed and approved. As appropriate and in accordance with the company s growth as well as changes to the company s business model, service delivery platforms, and expanded market areas, the foregoing plan shall be amended by the director of compliance. Revisions shall be submitted and approved by senior management. Bay Equity performs background checks on all new employees at application and all existing employees on an annual basis. This review includes GSA, GLB, and OFAC which is run through an approved Fraud Investigation service. In addition, applicable training and dissemination of updated materials shall be provided to all employees, affiliates and service providers. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 5

6 1.3 Role & Responsibilities of the Compliance Officer On at least a quarterly basis, the Compliance Officer is to make a written report to the executive board regarding the status of the company s compliance activities. Listed are the general areas of responsibility of the Director of Compliance: 1. Development and updating of the policy guide 2. Overall administering of the program 3. Oversight of employee background checks at application and annually 4. Development and delivery of employee training on an annual basis 5. Editing or adding to the list of red flags 6. Assigning the level of risk to each red flag 7. Development of forms and recordkeeping materials 8. Coordination of audit functions 9. Report results of audits to senior management 10. Ensuring related policy and procedures ensure compliance with the program, including: Consumer privacy policy Information security policy Vendor management 1.4 Role & Responsibilities of the Executive Board The company s executive board is responsible for ensuring the overall effectiveness of the plan and providing assistance to the Director of Compliance. Listed are the key responsibilities of the executive board: 1. Reviewing and approving the company s Red Flag Identity Theft Program and recommending updates or changes 2. Monitor changes to federal laws and mandates to ensure the company has the tools and resources to remain compliant 3. Providing guidance and assistance to the Director of Compliance charged with administering the program 4. Review audit reports and results of regulatory examinations 5. Review the company s response to incidents Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 6

7 6. Assess overall effectiveness on a periodic basis 1.5 Legal Requirements of Section 114 & 315 of FACTA must ensure that legal requirements are met in accordance with Section 114 & 315 of FACTA. Summarized are the compliance obligations of the regulation: 1. The filing of Suspicious Activity Reports (SAR) in accordance with the regulation and applicable supervisory agency (Refer to BSA/AML/SAR Policy Manual) 2. Complying with prohibitions of FACTA regarding the sale, transfer, and placement for collection of certain debts resulting from identity theft 3. Implementing any requirements regarding the circumstances under which credit may be extended when the company detects a fraud or active duty alert 4. Implementing any requirements for furnishers of information to consumer reporting agencies, such as to correct or update inaccurate or incomplete information, and not to report information that the furnisher has reasonable cause to believe is inaccurate 1.6 Quality Control requires management to ensure that the pre-funding and post-funding quality control file reviews include steps to determine if the requirements of the Red Flags identity theft plan are met. Pre-funding file reviews are performed by an in-house team of quality control auditors using Tena s SecondLook software. In addition, each mortgage application should be examined during the loan process to ensure that any noted red flags are properly mitigated via Mavent and CoreLogic (review wording). Bay Equity outsources post-funding quality control to Tena Companies, the compliance officer is responsible to ensure the company s quality control administrator monitors the QC efforts of the service provider and that the red flag monitoring is included in management reports. Any exceptions noted in QC findings report shall require remediation and management response. Corrective action may include acceptable curing options for the borrower file and or employee training. See Vendor Management for further requirements related to outsourcing. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 7

8 1.7 Auditing requires management to ensure that the internal controls and procedures established under the Red Flags Identity Theft plan to be tested at least annually by internal or external auditors. Reports of these audits should be reported to management and the board with recommendations for corrective action. 1.8 Training requires training for all employees about identify theft. All staff shall be trained: to detect red flags with regard to new applications to detect red flags related to the refinancing of borrowers whose prior confidential information is retained by the company. to mitigate identity theft, whether or not it is the employee s responsibility to complete the detection and mitigation steps. Regarding the contents of this policy and any underlying policies. Including but not limited to BSA/AML/SAR Policy, CIP, Privacy and OFAC. All new employees must receive identity theft training within 4 weeks of hire. All employees shall receive annual training to include: Any and all changes to this or related policies Regulatory changes with respect to related regulations Developments, changes and/or related industry best practices which may have occurred during the last year. A refresher and reinforcement of new hire training topics Those employees who are required to complete the follow through steps for red flag detection, response and mitigation shall complete advanced training and receive industry updates and guidance from agencies and federal regulators. All agency and federal guidelines are available to these employees through AllRegs.. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 8

9 Section 2 Terminology 2.1 Summary s Red Flag Identity Theft program applies to day-to-day operations and internal workflow on an interdepartmental level as well as external branches & operations centers. Compliance is applicable to all employees, agents, affiliates, third party brokers, loan correspondents, closing agents and other service providers. The primary objectives of the program are to detect, prevent, and mitigate identity theft in connection with the opening of all covered accounts or any existing covered accounts. This policy and subsequent procedures are designed to control reasonably foreseeable risks to the company s loan applicants and existing borrowers. 2.2 Identifying Information Specifically, identity theft is a fraud committed or attempted using the identifying information of another person without authority. Identifying information means any name or number that may be used (alone or in conjunction with any other information) to identify a specific person including the following: Name Social Security Number Date Of Birth Official State Or Government Issued Driver s License or Identification Alien Registration Number Government Passport Number Employer Or Taxpayer Identification Number Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 9

10 2.3 Definitions The following definitions correspond with the terms and entities referenced in Sections 114 and 315 of FACTA: Address Discrepancies Notices sent to lenders by credit agencies informing the lender of a substantial difference between the information provided on the request order form with the agency's database. Mandatory response steps include cross - checking data, verifying directly with the consumer and submitting a confirmation to the credit agency. Covered Accounts Credit cards, checking/savings accounts, car loans, cell phone service, utilities, margin accounts and mortgage loans. Creditors Organizations that regularly extend, renew or continue credit; companies that make arrangements to extend, renew or continue credit; and assignees of companies who extend, renew, continue credit. Examples are: finance companies, utility companies; automobile dealers, telecommunication companies, mortgage brokers and mortgage lenders. Creditors that advance funds on behalf of a person for expenses incidental to services provided by the creditor to that person are excluded from the definition of creditor under the Red Flag Program Clarification Act of Financial institutions Banks, thrifts, credit unions and entities that hold a "transaction account" where a consumer can make payments, drafts or transfers Examples are checking & savings accounts and broker accounts where consumers can write checks. Identity Theft A fraud committed or attempted using the identifying information of another person without authority. Identify Theft Report A report that alleges an identity theft; a copy of an official, valid report filed by a consumer with an appropriate Federal, State, or local law enforcement agency. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 10

11 Identifying Information Any name or number that may be used alone or in conjunction with any other information to identify a specific person. Incident Response Reporting of an information security breach, suspicious activity or red flag alert which cannot be cleared. Mitigation Evidence documented through a paper trail or interactive comment submitted to a factual ID vendor that the Red Flag alert has been cleared and no longer presents a risk; or reporting of an incident. Red Flags Alerts, discrepancies, warnings, variance, or unusual activity or pattern that is noticed by the creditor. Red Flag Detection A workflow step where a comparative review is made among documents furnished by the borrower, the information reported on the loan application, verification responses and information reported by credit repositories Detection steps may include the use of SSN validation tools, fraud checks and factual ID reports. Risk Assessment An evaluation of the risk to the lender and/or exposure to identity theft to the consumer. Response Action that the lender takes to obtain explanations and/or supporting documents from borrowers to clear discrepancies or unwarranted "false positives". Suspicious Activity Report (SAR) A federal form submitted to a law enforcement agency that describes the suspicious activity and identifies all known parties. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 11

12 2.4 Identification of Red Flags Red flags apply to covered accounts that include new or existing customer information accessed by the creditor or accessed by third parties. Red flags are often discovered by cross-checking telephone directories, public or internet sources. Listed are the types of sources which may contain a red flag: Documents furnished by the consumer Documents furnished by transaction parties Documents furnished by employers or other income source Notices received from outside persons or entities in connection to the account being serviced Red Flags are generally identified on consumer reports as: Alerts, notifications or warnings on the credit report Alerts noted on an SSN validation check Alerts noted on a Factual ID or Fraud-Check 2.5 List of 26 Red Flags by the Federal Trade Commission Listed are the 26 Red Flags identified by the Federal Trade Commission: 1. A fraud alert was indicated in the consumer report 2. Notice of a credit freeze in a consumer report 3. A consumer reporting agency provided notice of address discrepancy 4. Unusual credit activity, such as an increased # of accounts or inquiries 5. Documents provided for identification appear altered or forged 6. Photograph on ID inconsistent with appearance of customer 7. Information on ID inconsistent with information provided by customer 8. Information on ID, such as signature, inconsistent with information on file at financial institution 9. Application appearing forged, altered or destroyed and reassembled Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 12

13 10. Information on ID does not match any address in the consumer report, SSN has not been issued or appears on the SSN Administration s Death Master File 11. Lack of correlation between Social Security number range and date of birth 12. Personal identifying information associated with known fraud activity 13. Suspicious addresses supplied, such as a mail drop, prison, phone numbers associated with pagers or answering service SS number provided matches info submitted by another customer 14. SS number provided matches info submitted by another customer 15. Address or phone number matches other applicants 16. Customer unable to supply identifying information in response to notification that the application is incomplete 17. Personal information inconsistent with information already on file at financial institution or creditor 18. Person opening account or customer unable to correctly answer challenge questions 19. Shortly after change of address, creditor receives request for additional users of account 20. Most of available credit used for cash advances, jewelry or electronics, plus customer fails to make first payment 21. Drastic change in payment patterns, use of available credit or spending patterns 22. An account that has been inactive for a lengthy time suddenly exhibits unusual activity 23. Mail sent to customer repeatedly returned as undeliverable despite ongoing transactions on active account 24. Financial institution or creditor notified that customer is not receiving paper account statements 25. Financial institution or creditor notified of unauthorized charges or transactions on customer s account 26. Financial institution or creditor notified that it has opened a fraudulent account for a person engaged in identity theft Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 13

14 Section 3 Red Flag Detection and Response 3.1 Address Discrepancies requires immediate response to all notices of address discrepancy that is received from the credit reporting agency. The notice is sent when the agency has noted a substantial difference between the borrower s address the company provided when requesting the report to the address(es) in the agency s file. Upon receipt of such notice, it is the responsibility of the loan processor or underwriter to a) compare the information in the credit report provided by the agency and; b) verify the information in the credit report direc tly with the consumer. is required by law to furnish a borrower s address to the credit agency after the processor or underwriter reasonably confirms accuracy to the credit agency. Reasonable confirmation is when a lender can form a reasonable belief that the credit report relates to the borrower; has established a continuing relationship with the borrower; or regularly furnishes information to the credit agency. 3.2 Accuracy of Information from Credit Agency Reports requires that all credit reports and additional investigative reports be cross referenced for accuracy. Should there be a discrepancy in a borrower s address or other identifying information from one consumer report to an additional report, all steps and procedures must be followed. The response, request for borrower explanations and other mitigation must be separately applied to each consumer report ordered. may inform applicants that they can dispute the accuracy of credit information directly through the credit reporting agency. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 14

15 3.3 Social Security Validation requires a Social Security validation from a minimum of at least one consumer credit agency or factual investigation service. No mortgage file can continue with processing based on the social security that is provided on employer wage statements or other identifying information. Validation of SSN must be from authorized sources that obtain information from the Social Security Administration. 3.4 Factual ID Reports s underwriting procedures must conform to the investor or agency standards. A Factual ID shall be ordered on 100% of purchase transactions. Each report must indicate a sales transaction or chain of title record for the subject property. For cash-out refinance transactions where there is less than one year s seasoning since the last refinance of the applicant, a factual ID shall be ordered. On a case-by-case basis, underwriters may request a factual ID as a pre-funding condition. s underwriting procedures must conform to the investor or agency standards. A Fraud Check shall be ordered on all applications that are submitted to underwriting. Each Fraud Report is maintained in an electronic format attached to the specific loan record in Bay Equity s loan operations system as part of record retention. Any Alerts identified in the Fraud Report are reviewed and cleared by underwriting prior to final approval. Any Alerts that cannot be cleared shall be escalated to compliance for further investigation. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 15

16 3.5 Alerts, Warnings from a Consumer Reporting Agency requires immediate response to all alerts and warnings contained in a tri-merge credit report and/or all alerts and warnings noted on a Factual ID or Fraud Check report. The following examples are consistent with the types of red flags previously noted by the FTC: 1. A fraud or active duty alert is included with a credit report. 2. The credit agency provides a notice of credit freeze in response to a request for a consumer report. 3. The credit report provides a notice of address discrepancy. 4. The credit report indicates a pattern of activity that is inconsistent with the history and usual pattern of activity of an applicant or customer, such as: a. A recent and significant increase in the volume of inquiries b. An unusual number of recently established credit relationships c. A material change in the use of credit, especially with respect to recently established credit relationships d. An account that was closed for cause or identified for abuse of account privileges by a financial institution or creditor 3.6 Procedures for Mitigating Alerts from a Credit Agency Upon receipt of a consumer report that contains an initial, extended, or active duty alert, it is the responsibility of the processor and underwriter to re-verify the identity of the customer. In addition to the company s requirements for ID information under the USA Patriot Act, the company shall request at least one additional piece of verification as per Bay Equity s Customer Identification Program. If the alert contains instructions to contact the consumer before taking any action on the request, then the processor must contact the consumer for an explanation. Processors must document the steps taken to clear any Red Flags by providing a clear explanation in the conversation log and uploading documentation used to clear the Alert in the loan file or LOS system. Additionally, the submitted additional verification by the borrower should be indicated. Permission must be granted by a supervisor or the compliance officer to continue processing any loan application prior to the mitigation of Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 16

17 the red flag. If the red flag cannot be mitigated within thirty days of receipt of an application, the company will issue a Notice of Adverse Action. 3.7 Presentation of Suspicious Documents requires immediate response to all discrepancies and suspicious information found on documents furnished by the loan applicants or third parties. The following examples are consistent with the types of red flags previously noted by the FTC: 1. Documents provided for identification appear to have been altered or forged. 2. The photograph or physical description on the identification is not consistent with the appearance of the applicant or customer presenting the identification. 3. Other information on the identification is not consistent with information provided by the person opening a new covered account or customer presenting the identification. 4. Other information on the identification is not consistent with readily accessible information that is on file with the company, such as a signature card or a recent check. 5. An application appears to have been altered or forged, or gives the appearance of having been destroyed and reassembled. 3.8 Presentation of Suspicious Personal Identifying Information requires immediate response to all discrepancies and suspicious information found on documents furnished by the loan applicants or third parties. The following examples are consistent with the types of red flags previously noted by the FTC: 1. Personal identifying information provided is inconsistent when compared against external information sources such as: a. The address does not match any address in the credit report; or b. The Social Security Number (SSN) has not been issued, or is listed on the Social Security Administration s Death Master File. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 17

18 2. Personal identifying information provided by the customer is not consistent with other documents provided by the customer 3. The applicant does not respond to notifications that the application is incomplete or requests for more information 4. Personal identifying information provided is not consistent with previous information on file with the company. 5. Personal identifying information provided is associated with known fraudulent activity detected by the company, such as: a. The address on an application is the same as the address provided on a fraudulent application; or b. The phone number on an application is the same as the number provided on a fraudulent application. 6. Personal identifying information provided is of a type commonly associated with fraudulent activity such as: a. The address on an application is fictitious, a mail drop, or prison; or b. The phone number is invalid, or is associated with a pager or answering service. 3.9 Notices Received for Suspicious Activity requires immediate response to all notices received from third parties, existing or former customers, law enforcement authorities or other persons notifying the company that it has identified fraudulent activity or identity theft Red Flag Response to Presented Documents requires immediate response whenever a red flag is detected, wherever applicable, where the borrower is contacted to submit additional necessary information. Examples of responses are: Ask borrower to submit a written explanation Ask borrower to submit supporting documentation to clear the discrepancy Request borrower s employer to furnish supplementary payroll records. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 18

19 Processors and/or underwriters must complete a red flag checklist or use another procedure to document the detection, investigation, and outcome or response. The checklist must be placed in the borrower s folder or stored with borrower s other information in database. Copies should be uploaded to the electronic file folder for record retention Re-Pollution of a Borrower s Credit Report Re-pollution of a consumer s credit report occurs when information that has been identified as resulting from identity theft, either by the borrower or their credit agency continues to be reported as valid information. To avoid repollution, the following procedures will be followed if the company receives either of the following: Notice from a consumer reporting agency that information Bay Equity LLC provided resulted from identity theft An identity theft report from a consumer If the information is received from a credit agency, the compliance officer will conduct an investigation and verify the information is correct. After the investigation has been completed and the company has verified that the information provided to the credit reporting agency was the result of identity theft, the compliance officer will take action necessary to block the information. Section 4 Mitigation 4.1 Assessment of Risk must assess the level of risk and evaluate the exposur e to identity theft to the company and/or consumer. All processors and underwriters must immediately respond to suspicious activities, bogus or suspicious documents, document discrepancies, alerts on the credit report and/or alerts or warnings on a fraud check or Factual ID. The employee must respond to the Red Flag on a level that is commensurate with the degree of risk posed to the borrower or company. In some cases, the risk may be increased due to identity theft caused by a data security breach. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 19

20 4.2 Mitigation Steps for Cleared Variance must proceed with proper steps for mitigating the red flag or alert. These steps are followed when a red flag is cleared due to circumstances where there is a bona fide error or explained variance. These measures include: 1. Contacting the customer to obtain explanations and/or documentation 2. Contacting employers, gift donors, financial institutions to correct or supplement erroneous information previously provided 3. Updating the information on the reported loan application and LOS system 4. Updating the credit report via an interactive comment/feedback option 5. Updating the documents contained in the loan file 6. Completion of the Red Flag Checklist 4.3 Non-returning Pre-qualification Applicants must proceed with proper steps for mitigating the red flag or alert for all loan applications, including pre-qualifications that do not result in a submitted application; an application closed for incompleteness, a denied application and withdrawn application. These steps are followed when a red flag is detected: 1. Complete the Red Flag Checklist 2. Issue a letter to the consumer that describes the red flag and a statement that informs the applicant that, due to the cancellation of the application, the lender is not responsible for further steps that may be required to correct or mitigate the discrepant data 4.4 Steps When the Red Flag Cannot be Mitigated must proceed with its usual steps for denying the loan application or close the file for incompleteness if a) the loan does not meet the investor or agency standards and/or b) the red flag cannot be mitigated. The following procedure is for applicants whose circumstances do not warrant filing of a suspicious transaction. 1. Complete the red flag checklist Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 20

21 2. Issue a Letter of Adverse Action with applicable reason(s) 3. Issue a separate letter to the consumer that describes the red flag and a statement that informs the applicant that, due to the cancellation of the application, the lender is not responsible for further steps that may be required to correct or mitigate the discrepant data 4. Enter the proper HMDA code for denial in the LOS system as either: a. Denied b. Closed for Incompleteness c. Withdrawn 5. Draft a file memoranda that explains the type of red flags, identifies the source of the information, explains the reason(s) why the detected alert could not be mitigated 6. Submit a copy of the memoranda to the compliance officer 7. Notify Law Enforcement if warranted 4.5 Filing a Suspicious Activity Report (SAR) must report all instances of identity theft on a suspicious activity report (SAR) in accordance with the guidance provided by the Financial Crimes Enforcement network (FinCEN) and Bay Equity s BSA/AML/SAR Policy Manual. If applicable, the company will also report suspected mortgage fraud within the narrative of the SAR. A SAR must be filed within 30 days after the company becomes aware of a suspicious activity or transaction. The filing deadline may be delayed an additional 30 days if the relevant party is not yet identified, however the total time may be no longer than 60 days. In addition to filing a SAR, the company must notify law enforcement for violations that require immediate attention, such as suspected terrorist activity. Specifically, when identity theft is believed to be the underlying cause of the known or suspected criminal activity, we will complete a SAR in the following manner: 1. In Part III, Box 35, check all appropriate boxes that indicate the type of known or suspected violation being reported and, in addition, in the Other category, write in Identity Theft. 2. In Part V, explain what is being reported, including the grounds for suspecting identity theft in addition to the other violations being reported. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 21

22 3. In the event that the only known or suspected criminal violation detected is identity theft, write in Identity Theft as appropriate, in the Other category in Part III, Box Provide a description of the activity in Part V of the SAR. will utilize FinCEN s BSA E-Filing system for filing suspicious activity reports by enrolling online at SAR records must be maintained for 5 years from the date of the SAR filing. Records should include both SAR filing and supporting documentation. 4.6 Identity Theft Affidavit To assist borrowers who are found to be victim of identity theft, the following procedures are followed: 1. Provide the customer with the company s identity theft package. Instructions must be provided to assist the customer in completing the required forms. The packet includes: a. Cover Letter b. Identity Theft Affidavit Instructions c. Additional Identity Theft Procedures d. Identity Theft Affidavit e. Fraudulent Account Statement 2. Applicants can contact the Identity Theft Hotline of the Federal Trade Commission (FTC) at or call toll free (877) The company can obtain identity theft packets from the FTC website 4. Suggest the customer file a police report with local law enforcement agencies to document the crime. 5. Suggest the customer contact fraud departments of each of the three major credit bureaus and request that a fraud alert and/or a victim s statement be placed in their credit file. 6. Suggest that the customer order a free credit report to monitor their identity theft situation. Listed are the phone numbers of the three national credit bureaus: Equifax (800) Experian (888) Trans Union (800) Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 22

23 Section 5 Information Security 5.1 Safeguarding Confidential Information Below is an overview of Bay Equity s Information Security policy which can be viewed separately. Employees may have access to confidential information contained in the company s customer data base. Integral to the success of the mortgage industry is the business of refinancing loan applications of existing customers. Consumers may prefer to save time, and in certain cases, the expense of appraisals and other verification documents and request the review and re-use of their prior mortgage file depending on the age of documentation contained in the previous loan transaction. In all instances, the company requires the consumer sign a new credit authorization and Consumer Privacy Notice, whether or not an application is taken. All loan originators, processors and other staff-members referencing file documents from former customers for the purposes of evaluation and processing and application shall adhere to the policies set forth regarding use and re-use of consumer information and information-sharing. For direct marketing to prior customers, the consumer may be unaware of what information, and the extent of information, that has been made available to the company representative, who may be a different loan originator. In these cases, caution must be exercised to assure the borrower that access to their information was duly authorized and in compliance with privacy regulations. A general policy for safeguarding consumer information is to mark all s and correspondence with "Confidential. For purposes of this policy, confidential information includes, but is not limited to: Information regarding personnel who are currently or formerly employed by the company Procedures for computer access and passwords of employees and system users. Any information pertaining to mortgage borrowers who have closed loans with the company Any information regarding mortgage applicants whose loans were closed for incompleteness, withdrawn, denied or counter-offer not accepted. Prospect information concerning potential customers of the company Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 23

24 Any other information relating to the company s research, marketing, operations, investors, warehouse lenders and secondary marketing agencies. 5.2 How Information is Obtained Information can be stolen from consumers from a variety of ways. Thieves may use the information directly or sell the information to others, including thieves operating outside of the country. Listed are the various methods associated with identity theft: Dumpster Diving This is a method that involves thieves peering through the discard trash of a business. Companies who empty office trash into unsecured areas or unlocked outdoor receptacles are vulnerable to thieves seeking confidential consumer information. Mail Theft Mail can be stolen directly out of a consumer s mailbox. Another form of mail theft is when a thief completes a change of address form at the post office to divert a consumer s mail to another address where it can be intercepted and identity stolen. Shoulder Surfing This is a method used by thieves in public places, such as shopping malls and airports. Typically, shoulder surfing consists of long distance calling card numbers that are entered into public telephones. Skimming There are various methods associated with skimming and involve electronic and manual procedures for stealing credit card information. Skimmers are often employees of third parties, such as retailers or restaurants. The thief will either manually copy the credit card information while the customer waits, or use a sophisticated device where a swipe is made through an elicit piece of equipment that the thief keeps hidden. Third Parties Most third parties, such as employers, maintain personal information about individuals that, if obtained, can be used to commit identity theft. Dishonest employees working for the third party can commit identity theft without knowledge of their employer. Unauthorized Credit Reports Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 24

25 A thief poses as a landlord, employer, or financial advisor and orders a credit report claiming that they have a permissible business purpose Policies and Procedures s system is designed to improve service to customers, enhance internal communications, and reduce paperwork. Employees using the company s system must adhere to the following policies and procedures: 1. s system, network, and Internet/Intranet access are intended for business-use only. Employees may access e- mail and the Internet for personal use only during non-working hours, and strictly in compliance with the terms of this policy. 2. All information created, sent, or received via the company s system, network, Internet, or Intranet, including all messages and electronic files, is the property of the company 3. reserves the right to access, read, review, monitor, and copy all messages and files on its computer system at any time and without notice. When deemed necessary, the company reserves the right to disclose text or images to law enforcement agencies or other third parties without the employee s consent. 4. Any message or file sent via that contains borrower information of any type must come from an approved Bay Equity address and must have the employee s company approved signature attached. 5. Information transmittals must utilize extreme caution to ensure that the correct address is used for the intended recipient(s). 6. Any mortgage documents, including closing packages, and/or confidential customer information sent to service providers must be properly protected by a firewall or other appropriate security device(s) and/or software and transmitted through SSL systems. 7. All borrower confidential information cannot be sent via unless encrypted by company approved encryption software and according to established company procedure in affect at the time of transmittal. This includes, but is not limited to, the transmission of customer financial account numbers, Social Security numbers and other nonpublic consumer information. 8. Any mortgage documents, including closing packages, and/or confidential customer information sent to service providers must be Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 25

26 properly protected by a firewall or other appropriate security device(s) and/or software and transmitted through SSL systems. 9. Employees must provide the System Administrator and/or Information Security Officer with all passwords upon request. Passwords may not be changed without permission. 10. Only authorized management personnel are permitted to access another person's without consent and access shall be limited for the business related purposes except for unforeseen circumstances requiring access for other purposes. 11. All messages archived in the company s server, network and workgroup computers shall be deemed company property. Employees must archive messages to prevent them from being automatically deleted. Employees are responsible for knowing the company s retention policies. 12. Misuse and/or abuse of electronic access, including but not limited to, personal use during working hours, copying or downloading copyrighted materials, unprofessional content searches or messages will result in disciplinary action, up to and including termination. 5.4 Electronic Access provides every employee with electronic access to all employees that handle loan origination, closing and post-closing information. Personnel are assigned an address, a network connection, and Internet access. This policy governs all use of the company s network, Internet access, and s system at all company locations and offices. This policy includes, but is not limited to, electronic mail, chat rooms, the Internet, news groups, electronic bulletin boards, the company s VPN / Intranet and all other company electronic messaging systems. This policy governs the information security for all documentation utilized by the company and its affiliates, whether the communication is made by telephone, mail, facsimile, courier or any electronic system. 5.5 Network and Internet Policy Network configurations enable loan processors, originators, closing coordinators and administrative staff to access certain files. All rules and policies with respect to consumer information apply to files accessed among network users. Safeguarding confidential information involves local area network (LAN) and wide area network (WAN) configurations. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 26

27 requires all users having access to networked information comply with the safeguarding of confidential information in accordance with the foregoing red flags identity theft plan, as follows: 1. reserves the right to monitor, inspect, copy, review, and store at any time and without prior notice any and all usage of t he network and the Internet, as well as any and all materials, files, information, software, communications, and other content transmitted, received, or stored in connection with this usage. Use of network and Internet access extends throughout an employee s term of employment, providing the employee does not violate the company s policies regarding network, Internet or Intranet use. 2. By accepting an account password, related information, and accessing the company s network or Internet system, an employee agrees to adhere to company policies regarding their use. Employees agree to report any misuse or policy violation(s) including use of an account password by anyone other than the designated employee to the Security Officer. 3. reserves the right to suspend access at any time, without notice, for technical reasons, possible policy violations, security or other concerns. 4., at its sole discretion, will determine what materials, files, information, software, communications, and other content and/or activity will be permitted or prohibited. All such information, content, and file are the property of the company. 5. Network administrators may review files and intercept communications for any reason, including but not limited to maintaining system integrity and ensuring employees are using the system consistently with this Policy. 5.6 Prohibited Activities s employees are prohibited from using the company s system, network, or Internet/Intranet access for the following activities: 1. Downloading software without the prior written approval of the Security Officer. 2. Printing or distributing copyrighted materials. This includes, but is not limited to, software, articles and graphics protected by copyright. 3. Using software that is not licensed by the manufacturer or approved by the company. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 27

28 4. Sending, printing, or otherwise disseminating the company s proprietary data or any other information deemed confidential. 5. Operating a business or otherwise engaging in commercial activity outside the scope of employment. 6. Sending or forwarding messages containing borrower consumer credit or confidential information or account numbers. 7. Sending or forwarding a message that discloses personal information without authorization. This shall also include accessing, transmitting, receiving, or seeking confidential information about borrowers or mortgage transactions without written authorization. 8. Using another employee s password or impersonating another person while communicating or accessing the network or Internet including, but not limited to any company approved software or LOS system. 5.7 Authorized Use of Software purchases, leases or maintains site licenses for computer software applications from a variety of commercial manufacturers. To ensure compliance with software license agreements, the company s security policy, and to prevent identity theft resulting from shared, copied or unauthorized downloading of software programs, applications and data, all employees must adhere to the following: 1. Software must be used in accordance with the manufacturer s license agreements. Employees acknowledge they do not own the Loan Origination System (LOS), Desktop Originator, Loan Prospector, or other mortgage pre-qualification programs used in connection or as an adjunct to the firm s LOS system that are supplied by the company. 2. Employees may not make additional copies of any software, unless expressly authorized by the company and software publisher. 3. Any employee who knowingly makes, acquires, or uses unauthorized copies of computer software licensed to the company, or who places or uses unauthorized software on the company premises or equipment shall be subject to disciplinary action or termination. 4. Employees must obtain permission from the Security Officer prior to installing personal software onto the company s computer system. Employees are not permitted to copy software from the company s computer system for installation on home or other computers without prior authorization. Copyright 2012 Mortgage Resource Center, Inc. d/b/a AllRegs. ALL RIGHTS RESERVED. Without 28

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft. 16 CFR 681.2 681.2 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and creditors that are subject to administrative

More information

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial DEVELOPING YOUR DEALERSHIP S WRITTEN PROGRAM TO DETECT, PREVENT, AND MITIGATE IDENTITY THEFT AS REQUIRED BY THE THE RED FLAG RULES AND TO RESPOND TO NOTICES OF ADDRESS DISCREPANCIES The Interagency Guidelines

More information

CoreLogic Credco First American Way Poway, CA (800)

CoreLogic Credco First American Way Poway, CA (800) Red Flag Regulation WHAT IT IS The Red Flag Regulation implements Sections 114 and 315 of the FACT Act. It finalizes three distinct requirements two of which are relevant to automotive, RV and marine dealers,

More information

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 Introduction: Under the Fair and Accurate Credit Transactions Act (FACT Act), financial institutions (and creditors) that offer or maintain covered accounts

More information

University of Connecticut IDENTITY THEFT PREVENTION PROGRAM

University of Connecticut IDENTITY THEFT PREVENTION PROGRAM University of Connecticut IDENTITY THEFT PREVENTION PROGRAM I. BACKGROUND II. III. IV. PURPOSE AND SCOPE DEFINITIONS IDENTIFICATION & DETECTION OF RED FLAGS V. APPROPRIATELY RESPONDING WHEN RED FLAGS ARE

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Policy Title: Identity Theft Prevention Program Policy Number: PS 992 Purpose of Policy: Applies to: To ensure compliance with federal mandates relating to identity theft. It requires creditors who have

More information

Identity Theft Prevention Program (DRAFT)

Identity Theft Prevention Program (DRAFT) Identity Theft Prevention Program (DRAFT) Subject: Revised: Effective date: Review date: Responsible Party: Financial Affairs N/A TBD Annually TBD MSU-Bozeman Vice President for Administration & Finance

More information

University Identity Theft and Detection Program

University Identity Theft and Detection Program NUMBER: FINA 4.12 (formerly BUSF 4.12) SECTION: SUBJECT: Administration and Finance University Identity Theft and Detection Program DATE: March 3, 2011 REVISED: March 8, 2016 Policy for: All Campuses and

More information

Financial Transaction

Financial Transaction Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transaction I. The Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention Program

More information

Clarion University Identity Theft Prevention Program

Clarion University Identity Theft Prevention Program Clarion University Identity Theft Prevention Program A) Purpose The purpose of the Identity Theft Prevention Program (Program) is to detect, prevent and mitigate identity theft in connection with any covered

More information

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Last Reviewed May 24, 2016 AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Reference: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA))

More information

POLICY: Identity Theft Red Flag Prevention

POLICY: Identity Theft Red Flag Prevention POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information

More information

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Princeton University employees are responsible for detecting Red Flags consistent with

More information

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS References: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA)) I. The Purpose of the Identity

More information

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan May 28, 2010 1.0 INTRODUCTION... 3 2.0 PURPOSE... 3 3.0 DEFINITIONS... 4 4.0 THE PROGRAM... 4 4.1. Program

More information

Prevention of Identity Theft in Student Financial Transactions

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Prevention of Identity Theft in Student Financial Transactions 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA)) Date Issued: November 5,

More information

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 1 STUDENT SERVICES 2 3 AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 References: Fair

More information

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS The purpose of this Identity Theft Prevention Program (ITPP) is to control

More information

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS I. Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention Program (ITPP) is to control reasonably

More information

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Reference: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA)) I. The Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention

More information

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM PURPOSE AND SCOPE The Identity Theft Prevention Program was developed pursuant to the Federal Trade Commission s

More information

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag Page 1 Austin Peay State University Identity Theft Prevention POLICIES Issued: March 25, 2017 Responsible Official: Vice President for Finance and Administration Responsible Office: Information Technology

More information

LexisNexis Developing an Effective Red Flags Rule Program

LexisNexis Developing an Effective Red Flags Rule Program LexisNexis Developing an Effective Red Flags Rule Program Program Checklist R O I : R E T U R N O N I N F O R M AT I O N S O LU T I O N S Customer Development Authentication & Screening Fraud Prevention

More information

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM I. ADOPTION Michigan State University Identity Theft Prevention Program The Board of Trustees of Michigan State University adopted this Identity Theft Prevention

More information

Illinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College

Illinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College Illinois Eastern Community Colleges Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College Identity Theft Prevention Program Approved by the Cabinet: February 4, 2015

More information

IDENTITY THEFT RED FLAGS AND RESPONSES

IDENTITY THEFT RED FLAGS AND RESPONSES IDENTITY THEFT RED FLAGS AND RESPONSES Based on Supplement A to Appendix J Sources of Red Flags Financial institutions and creditors should incorporate relevant red flags from sources such as: Incidents

More information

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records; 3359-11-10.8 Identity theft detection, prevention and mitigation policy. (A) Introduction. (1) The university of Akron is committed to the detection, prevention and mitigation of identity theft associated

More information

Eastpointe Community Credit Union Identity Theft and Deterrence Policy

Eastpointe Community Credit Union Identity Theft and Deterrence Policy Eastpointe Community Credit Union Identity Theft and Deterrence Policy Areas of Responsibility: Management/Operations Board Approval December 14, 2016 Board Review: December 14, 2016 Last Revision: December

More information

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance see} white paper see} white paper Red Flag! Now What? If you are a large bank, credit union or credit card issuer, you are well aware of

More information

Identity Theft Prevention Program Procedure

Identity Theft Prevention Program Procedure Identity Theft Prevention Program Procedure Procedure Number 9.6P Effective Date 6/16/2010 1.0 PURPOSE The college shall operate an Identity Theft Prevention Program (Appendix A) according to the written

More information

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity Theft Prevention Program Lake Forest College Revision 1.0 Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:

More information

Number: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance

Number: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance POLICY USF System USF USFSP USFSM Number: 0-109 Title: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance Date of Origin: 1-11-11 Date Last Amended: Date Last Reviewed:

More information

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009 Identity Theft Prevention Program Approved by the Board of Trustees on February 20, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules

More information

Riverside Community College District Policy No Student Services PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Riverside Community College District Policy No Student Services PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Riverside Community College District Policy No. 5900 Student Services BP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Reference: Fair and Accurate Credit Transactions Act, (15 U.S.C.

More information

Identity Theft Prevention Program

Identity Theft Prevention Program ILLINOIS EASTERN COMMUNITY COLLEGES 0 Identity Theft Prevention Program Our mission is to deliver exceptional education and services to improve the lives of our students and to strengthen our communities.

More information

Secure Opening Plus Requirements for the Identity Theft Red Flag Program

Secure Opening Plus Requirements for the Identity Theft Red Flag Program Secure Opening Plus Requirements for the Identity Theft Red Flag Program Secure Opening Plus is a solution that assists financial institutions in obtaining identifying information and opening accounts

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Identity Theft Prevention Program In December 2008 the VSC Board of Trustees recognized that some activities of the VSC are subject to the provisions of the Fair and Accurate Credit Transactions Act (FACT

More information

Note: Action items are italicized

Note: Action items are italicized BEREA COLLEGE Red Flag Rules/ Identity Theft Prevention Policy Document No. FIN002 Effective Date 05/2009 Revision Date Pages 1-7 Approval: On File in F/A Note: Action items are italicized 1.0 Background

More information

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No. DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box 777 - Lexington, Nebraska - 68850 Tel. No.- 308/324/2386 Fax No.-308/324/2907 CUSTOMER POLICY IDENTITY THEFT PREVENTION I. OBJECTIVE Page

More information

Middlebury Institute of International Studies Identity Theft Prevention Program

Middlebury Institute of International Studies Identity Theft Prevention Program Middlebury Institute of International Studies Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury Institute of International Studies, hereafter referred to as the Institute, has developed

More information

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM TITLE II ADMINISTRATIVE REGULATIONS CHAPTER 30 IDENTITY THEFT PREVENTION PROGRAM 30.01 Program The Town of Flower Mound, Texas, as a utility provider ( Utility ), has developed an Identity Theft Prevention

More information

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 8 Chapter 13,

More information

IDENTITY THEFT DETECTION POLICY

IDENTITY THEFT DETECTION POLICY IDENTITY THEFT DETECTION POLICY PC 6.9 Date of Last Update: May 05, 2009 Approved By: President's Cabinet Responsible Office: Business and Finance POLICY STATEMENT Grand Valley State University (GVSU)

More information

Middlebury College Identity Theft Prevention Program

Middlebury College Identity Theft Prevention Program Middlebury College Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury College has developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's Red

More information

Identity Theft Prevention. Red Flags. Training Program

Identity Theft Prevention. Red Flags. Training Program Identity Theft Prevention Red Flags Training Program 1 Red Flags Training Program Adoption Amendment passed in 2003 to the Fair Credit Reporting Act called The Fair and Accurate Credit Transactions Act

More information

CITY OF ISSAQUAH. Identity Theft Prevention Program

CITY OF ISSAQUAH. Identity Theft Prevention Program Attachment A CITY OF ISSAQUAH Identity Theft Prevention Program Effective beginning May 1, 2009 Page 1 of 6 I. PROGRAM ADOPTION The City of Issaquah ( Utility ) developed this Identity Theft Prevention

More information

Red Flags Rule Identity Theft Training Program

Red Flags Rule Identity Theft Training Program Red Flags Rule Identity Theft Training Program October 2017 Purpose of Training The purpose of the UA Little Rock Identity Theft Prevention Program is to reduce the exposure of financial and personal loss

More information

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND The risk to Volunteer State Community College ( College ) its faculty, staff, students and other applicable constituents from data loss and

More information

Minnesota State Colleges and Universities Identity Theft Prevention Program

Minnesota State Colleges and Universities Identity Theft Prevention Program Effective 3-18-09 Identity Theft Prevention Program 1 This is the Minnesota State Colleges and Universities Identity Theft Prevention Program, including more detailed guidelines. The initial Program was

More information

30.17 Identity Theft Protection Policy October 2018

30.17 Identity Theft Protection Policy October 2018 30.17 Identity Theft Protection Policy October 2018 Preamble. The U.S. Congress has provided protection for consumers from identity theft by enacting the Fair and Accurate Credit Transactions Act ( FACTA

More information

Jack Byrne Ford & Mercury Identity Theft Program (ITPP)

Jack Byrne Ford & Mercury Identity Theft Program (ITPP) Jack Byrne Ford & Mercury Identity Theft Program (ITPP) PART ONE BACKGROUND 1. Effective Date All affected employees of Jack Byrne Ford & Mercury ( Dealership ) must comply with the terms of this policy

More information

Polson/ Ronan Ambulance Service Identity Theft Prevention Program

Polson/ Ronan Ambulance Service Identity Theft Prevention Program Purpose Polson/ Ronan Ambulance is committed to providing all aspects of our service and conducting our business operations in compliance with all applicable laws and regulations. This policy sets forth

More information

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),

More information

RED FLAG RULES ANNUAL REPORT TO MAYOR AND COUNCIL

RED FLAG RULES ANNUAL REPORT TO MAYOR AND COUNCIL BOISE CITY RISK AND SAFETY SERVICESDIVISION DEPARTMENT OF FINANCE AND ADMINISTRATION RED FLAG RULES ANNUAL REPORT TO MAYOR AND COUNCIL AS REQUIRED BY SECTIONS 114 AND 315 OF THE FAIR AND ACCURATE CREDIT

More information

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030 Christopher Newport University Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030 Executive Oversight: Executive Vice President Contact Office: Comptroller s Office

More information

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS BP 5800 Allan Hancock Joint Community College District Board Policy Chapter 5 Student Services BP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS The District is required to provide

More information

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Note: This sample identity theft prevention program is for informational purposes only. It may not be suitable for your district depending on its size, complexity and

More information

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010 I. Introduction THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART RED FLAGS IDENTITY THEFT PREVENTION PROGRAM A. Purpose February 24, 2010 The Cooper Union for the Advancement of Science and Art

More information

ORGANIZATIONAL MANUAL

ORGANIZATIONAL MANUAL I. PURPOSE ORGANIZATIONAL MANUAL IDENTITY THEFT PROTECTION A. To establish an Identity Theft Prevention Program designed to detect, prevent and mitigate Identity Theft in connection with the opening of

More information

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54 Rule on Identity Theft Detection and Prevention Program Section 1. General 1.1 Purpose: The purpose of this policy is to establish an Identity Theft

More information

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

ADMINISTRATIVE POLICY STATEMENT

ADMINISTRATIVE POLICY STATEMENT ADMINISTRATIVE POLICY STATEMENT Policy Title: Collection of Personal Data from Students and Customers APS Number: 7003 Brief Description: Effective: July 1, 2009 Approved by: APS Functional Area: RISK

More information

UM Identity Theft Protection Policy

UM Identity Theft Protection Policy UM Identity Theft Protection Policy Summary/Purpose: The purpose of the UM Identify Theft Protection Policy is to establish an Identity Theft Prevention Program pursuant to the Federal Trade Commission

More information

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Program Adoption Purpose Definitions Fitchburg State College (College) developed this Identity Theft Prevention Program to detect,

More information

Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide

Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide Compliance Program Creation Guide January 2015 1 Compliance Program Creation Guide January 2015 2 Insert Business

More information

Services and Features

Services and Features Services and Features IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific services and features.

More information

Attachment to Identity Theft Prevention Service Provider Attestation

Attachment to Identity Theft Prevention Service Provider Attestation Attachment to Identity Theft Prevention Service Provider Attestation Identify Theft Prevention Policy Effective January 1, 2011 Identity Theft is a crime in which an individual wrongfully obtains and uses

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

Services & Features for Employee Benefit Members

Services & Features for Employee Benefit Members Services & Features for Employee Benefit Members IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific

More information

Driven. FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 L50

Driven. FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 L50 Driven NADA Management series L50 A Dealer Guide to THE FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 The National Automobile Dealers Association (NADA) has prepared

More information

11/14/ FNBT FACT ACT

11/14/ FNBT FACT ACT 1 FNBT FACT ACT This class addresses the Fair Credit Reporting Act which governs the collection and use of information considered in connection with granting credit, providing insurance or offering employment.

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

B. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.

B. The College is considered a creditor under the Red Flags Rule because it defers payment for services rendered. COLLEGE of CENTRAL FLORIDA ADMINISTRATIVE PROCEDURE Title: Identity Theft Prevention Program Procedure Page 1 of 5 Implementing Procedure For Policy # # 2.04 Date Approved: 07/07/11 Division: Administration

More information

Chapter 3. Identifying Red Flags. 3:1 Overview

Chapter 3. Identifying Red Flags. 3:1 Overview Chapter 3 Identifying Red Flags 3:1 Overview 3:1.1 Identity Theft 3:1.2 Red Flag 3:2 Conducting an Initial Risk Assessment 3:2.1 Practical Considerations 3:2.2 Risk Factors to Consider 3:2.3 Other Sources

More information

Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide

Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide Insert Business Name Here Date of Adoption of this Anti-Money Laundering Program ANTI-MONEY LAUNDERING AND TERRORIST

More information

AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009

AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009 Item: AF: A-1 AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009 SUBJECT: REQUEST FOR APPROVAL OF FLORIDA ATLANTIC UNIVERSITY S IDENTITY THEFT PREVENTION PROGRAM. PROPOSED COMMITTEE ACTION Recommend

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Reno Police Department, complete a crime report and obtained a police report case number

More information

ADDENDUM #1 RFP# DBE/ACDBE Consultant January 19, 2015

ADDENDUM #1 RFP# DBE/ACDBE Consultant January 19, 2015 ADDENDUM #1 RFP# 2016-01-001 DBE/ACDBE Consultant January 19, 2015 1. Does the RFP apply to Right of Way Consultant Firms? No 2. What is the expected level of effort required to address the supplemental

More information

MEMORANDUM. Red Flag Identity Theft Regulations: Implications for Nursing Facilities and Assisted Living Facilities 1

MEMORANDUM. Red Flag Identity Theft Regulations: Implications for Nursing Facilities and Assisted Living Facilities 1 Carol C. Loepere Direct Phone: +1 202 414 9216 Email: cloepere@reedsmith.com Reed Smith LLP 1301 K Street, N.W. Suite 1100 - East Tower Washington, D.C. 20005-3373 +1 202 414 9200 Fax +1 202 414 9299 reedsmith.com

More information

UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION

UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION Responsible Department: Provost and Business and Financial Affairs Recommended By: Provost, VC Business and Financial Affairs Approved By: Chancellor

More information

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Revised April 2010 Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso County Sheriff s Office and obtained a police report number

More information

NATIONAL CONSUMER REPORTING ASSOCIATION, INC.

NATIONAL CONSUMER REPORTING ASSOCIATION, INC. NATIONAL CONSUMER REPORTING ASSOCIATION, INC. Fair Credit Reporting Act Fair and Accurate Credit Transactions Act Gramm-Leach-Bliley Act Red Flag Rules National Credit Repository End User Regulations Mortgage

More information

NAU Police Department s Identity Theft Victim s Packet

NAU Police Department s Identity Theft Victim s Packet NAU Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted the NAU Police Department and obtained a police report number

More information

A Step By Step Guide To Dealership Compliance Team One research and Training /Summit Group

A Step By Step Guide To Dealership Compliance Team One research and Training /Summit Group A Step By Step Guide To Dealership Compliance 2008 Team One research and Training /Summit Group As you probably already know, 2008 has brought the automobile dealer a whole new set of compliance issues

More information

PROCEDURE. This procedure is intended to identify third party arrangements and red flags involving College activities that will:

PROCEDURE. This procedure is intended to identify third party arrangements and red flags involving College activities that will: Subject Source PROCEDURE Identity Theft Prevention Vice President, Finance and Administrative Services Number: 1.07.02 Reference (Rule #) 6HX14-1.07 President s Approval/Date: 12/21/2017 POLICY: PURPOSE:

More information

MID-CAROLINA ELECTRIC COOPERATIVE, INC. SERVICE RULES AND REGULATIONS

MID-CAROLINA ELECTRIC COOPERATIVE, INC. SERVICE RULES AND REGULATIONS MID-CAROLINA ELECTRIC COOPERATIVE, INC. SERVICE RULES AND REGULATIONS 400 BILLING 401 BILLING PERIOD AND PAYMENT OF BILLS All members shall be billed monthly. All bills will include South Carolina sales

More information

Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009

Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009 Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009 Rebekah A. Z. Monson Pepper Hamilton LLP 215.981.4031 monsonr@pepperlaw.com

More information

Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016

Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016 Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions June 2016 Program Overview Regulatory Environment Who Needs a Privacy Program and Common Questions Components of a Comprehensive

More information

Compliance With the Red Flags Rules

Compliance With the Red Flags Rules For Audio Participation, Please Call 1.866.281.4322, *1382742* Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321

More information

AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE

AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE 3-950A AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE HISTORY In response to the growing threat of identity theft, the United States Congress passed the Fair and Accurate

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

TRAVELTOKENS SALE PRIVACY POLICY Last updated:

TRAVELTOKENS SALE PRIVACY POLICY Last updated: TRAVELTOKENS SALE PRIVACY POLICY Last updated: 23.11.2017 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0. Potential Verification for Onsite Audit

NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0. Potential Verification for Onsite Audit Page 1 of 24 NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0 (Glossary provided at end of document.) Information Security 1.1 Information Security

More information

Anti-Money Laundering and Counter Terrorism

Anti-Money Laundering and Counter Terrorism 1 Anti-Money Laundering and Counter Terrorism 1. INTRODUCTION SimpleFX Ltd. ( The Company ) aims to prevent, detect and not knowingly facilitate money laundering and terrorism financing activities. The

More information

Trans-Fast Remittance LLC. AML Compliance Training for Agents

Trans-Fast Remittance LLC. AML Compliance Training for Agents Trans-Fast Remittance LLC AML Compliance Training for Agents 2016 Trans-Fast expects all of its agents to adhere to the following: terms of agent agreement; establish AML Program as per Section 352 of

More information

The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments

The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments Health Law bulletin number 89 november 2008 The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments Jill Moore In November 2007, several federal agencies jointly issued a

More information

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704 RE: Identity Theft Claim You recently notified Fay Servicing, LLC that you are the victim of identity theft with respect to the above referenced loan (also referred to in this notice as the debt or account

More information

DATA PROCESSING AGREEMENT (GDPR, Privacy Shield, and Standard Contractual Clauses)

DATA PROCESSING AGREEMENT (GDPR, Privacy Shield, and Standard Contractual Clauses) DATA PROCESSING AGREEMENT (GDPR, Privacy Shield, and Standard Contractual Clauses) This Data Processing Agreement ("DPA") forms part of the Master Services and Subscription Agreement between Customer and

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information