How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations

Size: px
Start display at page:

Download "How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations"

Transcription

1 How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations 2017 BY: KAREN REDDICK NATIONAL CREDIT MANAGEMENT

2 WHAT DO THESE STARS HAVE IN COMMON? 2

3 Interesting Stats Identity theft is the fastest-growing crime in America Costing Americans $15.4 billion fraudulent charges Affecting 17.2 million people 19 people become victims of identity theft every minute 1 out of 6 people are victims #1 one consumer complaint to the U.S. Federal Trade Commission The average victim can expect to spend $500 dollars and 30 hours on average resolving each identity theft crime. The FTC estimates it takes victims months to clear their names 3

4 Interesting Stats Victims face higher interest rates, insurance rates, rejected loans, and/or unjust accusations of criminal conduct which require costly legal assistance to rectify $5.8 billion in Tax Fraud paid by the IRS 500,000 victims per year in Health Care Fraud 88% Non-Tech Related It is estimated that 13 percent of all victims reported a family member or relative as the person responsible for misusing their personal information 4

5 Interesting Stats 20 percent of identity theft victim information was misused through credit card fraud The second-highest incidence of identity theft occurred through government documents/benefits fraud, at 15% of all complaints 24 percent of identity theft victims were a part of the Y and Millennial Generations Lost or stolen laptops containing sensitive data can cost over $115,000 to a company in recovery efforts if a data breach goes undiscovered for at least a week 5

6 Interesting Stats 6

7 Interesting Stats 7

8 Stats By State 8

9 Education Is A Prime Target Education is most likely to be hacked 17 %of all reported data breaches, ranking second only to the medical industry with 27 percent Last year alone over 30 Colleges and Universities have had some sort of security breaches Main Source off Education/Campus Breaches Lost/stolen PCs, laptops and media Stolen wallets/purses/backpacks and personal financial information Dumpster Diving 9

10 Students are A Prime Target 90,000 complaints about identity theft filed last year 49 percent increase over the prior year. 18 to 24 were far more likely to experience identity theft. 22 percent of these were notified that they had been a victim of identity theft fraud after they were denied credit or contacted by a debt collector. 3 times higher then average fraud victims 4 times likely to be taken advantage of by someone they know compared with other consumers, according to the market researcher. Thief's use Low- and high-tech strategies Shoulder Surfing Bogus credit card offers 10

11 Educate our Students Guard all numbers Social Security Numbers ATM Codes Computer Passwords Never carry personal information on their persons Don t send important documents to dorms or apartments Avoid public Wi-Fi Be Savvy on social media Be careful sending important documents by mail. Don't send important documents to dormitories and off-campus apartments where mail might not be secure. 11

12 Social Engineering Social Media Obtain cell numbers, dorm address, private s Intelligence about friends and family Social Engineering Attacks to Watch Out For Phishing Pretexting Baiting Quid Pro Quo Tailgating 12

13 5 Scams Targeting Students Bogus Student Tax Tuition Scam Fake Credit Cards False Rental Listings Friendly Fraud 13

14 What To Protect Name Social Security # Date of Birth Address Credit Card# Bank Account # PIN s or Passwords 14

15 Types of Identity Theft 1. Financial ID Theft - Name and Social Security Number (telephone service, credit cards, loans, buy merchandise, lease cars and apartments). 2. Medical ID Theft A thief may use your name or health insurance numbers to see a doctor, get prescription drugs, file claims with your insurance provider, or get other care. 3. Criminal ID Theft - The imposter in this crime provides the victim s information instead of his own when stopped by law enforcement. 4. Identity Cloning - The imposter uses the victim s information to establish a new life. 5. Business Identity Theft - The perpetrator gets credit cards or checking accounts in the name of the business. 15

16 How To Protect Identity Opt out OPT-OUT or Remove your name from Credit Bureau Lists Good for 5 years To opt out permanently: You may begin the permanent Opt-Out process online at Monitor Your Credit Report and Your Children s (Under 18) ( Make copies of your credit cards and contents of wallet Protect personal items Do not use un secure wireless network Subscribe to AG No Call List Guard Your Social Security Number Zealously Do not carry social security numbers When someone asks for it: Why do you need? How do you protect it? How will it be used? What happens if I don t give it you? 16

17 Resources Credit Freeze In some states you can put a freeze on your credit file, so no one will have access to your information without your authorization. 17

18 Credit Freeze es/0497-credit-freeze-faqs#what 18

19 Equifax Breach 143 Million Consumers May-July 2017 Trusted ID Premier Removed Litigation Clause Information Compromised Social Security # Date of Birth 19

20 What To Do If Someone Is A Victim 1. Place a fraud alert on your credit reports and review your reports 2. Close the accounts that you know, or believe, have been tampered with or opened fraudulently 3. Demand several layers of security before establishing a new account 4. Report it to the Organization where your data was breached 5. File a report with your local police or the police in the community where the identity theft took place 6. File a complaint with the Federal Trade Commission 20

21 21

22 Tips To Remember Look at your physical environment Messy vs. clean desk Reports and files stored out of site Locking file cabinets and offices Passwords on post-it notes? USB drives easily available Flash Cards, CDs, and disk lying around in plan site Monitor location/desk direction Are visitors identified, challenged? Public access to business areas? Public Fax? Use Cross Cut Shredders 22

23 Tips To Remember Information Security Policy Do not store sensitive information on workstation or mobile device Written justification and approval for sensitive data storage Purge sensitive information as soon as its business need no longer exists Record retention schedules give useful life of each type of information Purge info-wipe, not delete Security File Deletion Utilities Cross cut shred, not store 23

24 IT Security Tips To Remember Secure wireless internet Anti-virus software that is up-to-date Personal firewall that offers both inbound and outbound permission-based monitoring Apply updates for all vendor software (Microsoft releases patches the second Tuesday of every month Do not access secure portals with sensitive information such as financial institution accounts even if the Web site starts with https Disable file and printer sharing 24

25 Tips To Remember Be aware of your environment If your office uses cubicles Play background music (white noise) Use fabric sound absorbing covers Authenticate Each Individual Don t use 2 Factor Authentication PIN/Passwords Assign PIN and after 2 nd authentication have student change one of their choosing KBA Authentication Knowledge Based Appropriate to secure most information Less intrusive 25

26 EXISTING LAWS THAT REGULATE STUDENT PRIVACY FERPA: Family Educational Rights and Privacy Act GLBA: Gramm-Leach-Bliley Privacy Act FACT-Red Flag Rules PCI ( We wont be covering this one today) 26

27 FERPA FERPA: Family Educational Rights and Privacy Act Statue: 20 U.S.C. 1232(g) Regulations: 34CFR Part 99 The intent of the Act is to protect the rights of students and to insure the privacy and accuracy of education records Those protected by FERPA are students and former students who have been in attendance at the institution Rights belong to the student 27

28 Solution Have all students sign a release of information form and identify which parties are privy to their information 28

29 GLBA GLBA: Gramm-Leach Bliley Act signed into law November Regulation: Privacy regulations issued by federal agencies (Compliance required as of 7/1/01) FTC PART 314-Standards for Safeguarding Customer Information (Effective 5/23/03) Scope: Regulates the sharing of: Nonpublic personal information about individuals who obtain financial products or services From financial institutions primarily for personal, family or household purposes 29

30 GLBA-Implementing the Safeguards Rule The Gramm Leach Bliley Act - Requires financial institutions to ensure the security and confidentiality of customer personal information. The Federal Trade Commission (FTC) implemented GLBA by issuing the Privacy Rule and the Safeguards Rule. Colleges and Universities are considered financial institutions primarily due to student loan making activities. 30

31 Solutions Design and implement a written security plan Select a group or committee to implement program Identify all foreseeable risks Training/Human Resources/Management Information Systems System Failures/Intrusions-Disaster Plans Put together a written program to control these risks Oversee service providers to make sure they are capable of maintaining appropriate safeguards and require by contract to implement and maintain such safeguards Evaluate program each year as environment changes 31

32 RED FLAG RULES Red Flag Requirements For Financial Institutions Require financial institutions to develop and implement written identity theft prevention programs as part of the Fair and Accurate Credit Transactions Act of 2003 Under the Rule, each institution must develop and implement a written Identity Theft Prevention Program designed to detect, prevent, and mitigate identity theft in connection with new or existing accounts Effective date was January 1, 2008 The FTC had delayed enforcement of the rule five times, most recently until December 31,

33 Three Identity Theft Rules Under 16 CFR Part 681 Rule # Duties of users of consumer reports regarding address discrepancies. This rule applies to users of consumer reports that are subject to administrative enforcement of FCRA. If you use consumer reports to extend credit, for skip tracing purposes, to report accounts or if your third party reports on your behalf then you would need to comply. If you or your third party servicer does not use consumer reports than you do not need to comply. 33

34 Rule #2 Three Identity Theft Rules Under 16 CFR Part Duties regarding the detection, prevention, and mitigation of identity theft-aka Red Flag Rules/Identity Theft Prevention Program. This applies to financial institutions and creditors that are subject to administrative duties. This would apply to all of us who extend credit in any means, i.e.: student loans, payment plans. All of us need to comply unless you are strictly cash and carry. 34

35 Rule #3 Three Identity Theft Rules Under 16 CFR Part Duties of card issuers regarding changes of address. This rule applies only to those who issue a debit or credit card. So unless you have a debit card/credit cards attached to the student IDs or purchasing cards then most schools would not have to comply. 35

36 RED FLAG RULES The program must provide for the identification, detection, and response to patterns, practices, or specific activities - known as red flags - that could indicate identity theft Under these new rules, institutions must develop a written program that identifies and detects the relevant warning signs (red flags) or identity theft Examples of these Warning Signs: Unusual account activity Fraud Alerts from Consumer Reporting Agencies Attempted use of suspicious account application documents Notice of ID Theft from the student It must also describe appropriate responses that would prevent and mitigate the crime and detail a plan to update the program Program must be managed by senior employees, include appropriate staff training, and provide for oversight of any service providers 36

37 Elements on How to Comply With Red Flag Requirements 4 Elements: 1. Identity patterns, practices or activities that indicate the possible existence of identity theft (red flags) 2. Detect Red Flags 3. Respond to detected Red Flags to prevent and mitigate identity theft 4. Update the Program periodically to reflect changes in risks to customers and the institution This initial plan needs to be approved by the institutions Board of Directors or Committee. 37

38 HOW TO IDENTIFY THESE RED FLAGS The FTC has identified 26 possible red flags 5 Categories Alerts, notifications, or warnings from a consumer reporting agency Suspicious documents Suspicious personally identifying information, such as suspicious address Unusual use of or suspicious activity relating to a covered account Notices from customers, victims of identity theft, law enforcement authorities, or other businesses about identity theft in connection with covered accounts 38

39 Solutions Verify Identity Authenticate Customers Monitor Transactions Verify Validity of Address Change 39

40 Respond Appropriately Monitor Accounts Contact Customer Change Passwords Close and Reopen Accounts Refuse to Open Accounts Don t Bill or Collect on the Account Notify Law Enforcement 40

41 Don t panic! Don t recreate the wheel So Now What? Evaluate your existing security plans (GLBA) and (Red Flags) If you have not developed one, incorporate these rules into your existing security plan The FTC says in Appendix J to Part 681, that you may incorporate as appropriate, existing policies, procedures and other arrangements that control reasonably foreseeable risks to customers or to the safety and soundness of the financial institutions or creditor from identity theft. Have your service providers incorporate these rules into your contracts and their existing plans Whether this law is relevant to Higher Education or not it is imperative to know how to prevent or mitigate identity theft Human Resources - Training is essential in any successful program Be proactive and have a plan to prevent future liability 41

42 Resources For Victims Free Credit Report To Report Identity Theft Identity Theft Resource Center (ITRC) US Department of Education Office of the Inspector General-Resource on Identity Theft U.S. Studentshttp://www2.ed.gov/about/offices/list/oig/misused/index.html 42

43 CREDIT BUREAU CONTACT INFORMATION Equifax Experian TransUnion

44 Resources For Implementation GLBA FERPA RED FLAG RULES 44

Identity Protection 101: Protect your good name from identity theft.

Identity Protection 101: Protect your good name from identity theft. Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

WHAT DO MANY OF US HAVE IN COMMON WITH. Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise

WHAT DO MANY OF US HAVE IN COMMON WITH. Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise WHAT DO MANY OF US HAVE IN COMMON WITH Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise IDENTITY THEFT: protecting ourselves and our clients Presented by: Eric Albert, Rhonda Davis, Kevin

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND The risk to Volunteer State Community College ( College ) its faculty, staff, students and other applicable constituents from data loss and

More information

IDENTITY THEFT DETECTION POLICY

IDENTITY THEFT DETECTION POLICY IDENTITY THEFT DETECTION POLICY PC 6.9 Date of Last Update: May 05, 2009 Approved By: President's Cabinet Responsible Office: Business and Finance POLICY STATEMENT Grand Valley State University (GVSU)

More information

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity Theft Prevention Program Lake Forest College Revision 1.0 Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:

More information

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft. PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity

More information

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010 I. Introduction THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART RED FLAGS IDENTITY THEFT PREVENTION PROGRAM A. Purpose February 24, 2010 The Cooper Union for the Advancement of Science and Art

More information

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution

More information

Identity Theft: Help Your Students Avoid This Epidemic

Identity Theft: Help Your Students Avoid This Epidemic Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity

More information

Drexel and FMFCU. Presented By

Drexel and FMFCU.   Presented By Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission

More information

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet:

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet: Before you start Telephone calls and other forms of direct communication: Use the worksheet included in this packet to keep a record of all conversations. When reporting fraud or communicating with law

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM PURPOSE AND SCOPE The Identity Theft Prevention Program was developed pursuant to the Federal Trade Commission s

More information

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Program Adoption Purpose Definitions Fitchburg State College (College) developed this Identity Theft Prevention Program to detect,

More information

UNIT 3-4 Preventing Identity Theft

UNIT 3-4 Preventing Identity Theft UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information

More information

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 8 Chapter 13,

More information

Identity theft can occur even if you have been careful about protecting your personal information.

Identity theft can occur even if you have been careful about protecting your personal information. Dear Customer, Identity theft can occur even if you have been careful about protecting your personal information. If you suspect you have been a victim of identity theft, a fraud, or a scam, we have prepared

More information

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS

More information

UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION

UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION Responsible Department: Provost and Business and Financial Affairs Recommended By: Provost, VC Business and Financial Affairs Approved By: Chancellor

More information

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),

More information

11/14/ FNBT FACT ACT

11/14/ FNBT FACT ACT 1 FNBT FACT ACT This class addresses the Fair Credit Reporting Act which governs the collection and use of information considered in connection with granting credit, providing insurance or offering employment.

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA

More information

Identity Theft Prevention. Red Flags. Training Program

Identity Theft Prevention. Red Flags. Training Program Identity Theft Prevention Red Flags Training Program 1 Red Flags Training Program Adoption Amendment passed in 2003 to the Fair Credit Reporting Act called The Fair and Accurate Credit Transactions Act

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

GREENPATH FINANCIAL WELLNESS SERIES

GREENPATH FINANCIAL WELLNESS SERIES GREENPATH FINANCIAL WELLNESS SERIES IDENTITY THEFT Empowering people to lead financially healthy lives. TABLE OF CONTENTS What is Identity Theft?...2 How Identity Theft Occurs...3 How Identity Thieves

More information

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions Barry Altland Director, Partner Engagement Who/What is FPP? A Thank You to

More information

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an

More information

Visa s Approach to Card Fraud and Identity Theft

Visa s Approach to Card Fraud and Identity Theft Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting

More information

B. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.

B. The College is considered a creditor under the Red Flags Rule because it defers payment for services rendered. COLLEGE of CENTRAL FLORIDA ADMINISTRATIVE PROCEDURE Title: Identity Theft Prevention Program Procedure Page 1 of 5 Implementing Procedure For Policy # # 2.04 Date Approved: 07/07/11 Division: Administration

More information

Identity Theft.

Identity Theft. Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.

More information

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM I. ADOPTION Michigan State University Identity Theft Prevention Program The Board of Trustees of Michigan State University adopted this Identity Theft Prevention

More information

Get the most out of your membership

Get the most out of your membership PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account

More information

Three D s of safeguarding your personal data

Three D s of safeguarding your personal data Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D

More information

Polson/ Ronan Ambulance Service Identity Theft Prevention Program

Polson/ Ronan Ambulance Service Identity Theft Prevention Program Purpose Polson/ Ronan Ambulance is committed to providing all aspects of our service and conducting our business operations in compliance with all applicable laws and regulations. This policy sets forth

More information

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal

More information

Clarion University Identity Theft Prevention Program

Clarion University Identity Theft Prevention Program Clarion University Identity Theft Prevention Program A) Purpose The purpose of the Identity Theft Prevention Program (Program) is to detect, prevent and mitigate identity theft in connection with any covered

More information

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity

More information

Ohio Conference of Payroll Professionals

Ohio Conference of Payroll Professionals Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number

More information

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You. Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing

More information

Understanding Identity Theft

Understanding Identity Theft Understanding Identity Theft Learn How to Protect Yourself and Your Business A FREE E-book by the Nations Authority on Collecting Money, Michelle Dunn Understanding Identity Theft, learn how to protect

More information

Note: Action items are italicized

Note: Action items are italicized BEREA COLLEGE Red Flag Rules/ Identity Theft Prevention Policy Document No. FIN002 Effective Date 05/2009 Revision Date Pages 1-7 Approval: On File in F/A Note: Action items are italicized 1.0 Background

More information

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No. DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box 777 - Lexington, Nebraska - 68850 Tel. No.- 308/324/2386 Fax No.-308/324/2907 CUSTOMER POLICY IDENTITY THEFT PREVENTION I. OBJECTIVE Page

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Identity Theft Prevention Program Procedure

Identity Theft Prevention Program Procedure Identity Theft Prevention Program Procedure Procedure Number 9.6P Effective Date 6/16/2010 1.0 PURPOSE The college shall operate an Identity Theft Prevention Program (Appendix A) according to the written

More information

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

UM Identity Theft Protection Policy

UM Identity Theft Protection Policy UM Identity Theft Protection Policy Summary/Purpose: The purpose of the UM Identify Theft Protection Policy is to establish an Identity Theft Prevention Program pursuant to the Federal Trade Commission

More information

PROCEDURE. This procedure is intended to identify third party arrangements and red flags involving College activities that will:

PROCEDURE. This procedure is intended to identify third party arrangements and red flags involving College activities that will: Subject Source PROCEDURE Identity Theft Prevention Vice President, Finance and Administrative Services Number: 1.07.02 Reference (Rule #) 6HX14-1.07 President s Approval/Date: 12/21/2017 POLICY: PURPOSE:

More information

Minnesota State Colleges and Universities Identity Theft Prevention Program

Minnesota State Colleges and Universities Identity Theft Prevention Program Effective 3-18-09 Identity Theft Prevention Program 1 This is the Minnesota State Colleges and Universities Identity Theft Prevention Program, including more detailed guidelines. The initial Program was

More information

30.17 Identity Theft Protection Policy October 2018

30.17 Identity Theft Protection Policy October 2018 30.17 Identity Theft Protection Policy October 2018 Preamble. The U.S. Congress has provided protection for consumers from identity theft by enacting the Fair and Accurate Credit Transactions Act ( FACTA

More information

NAU Police Department s Identity Theft Victim s Packet

NAU Police Department s Identity Theft Victim s Packet NAU Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted the NAU Police Department and obtained a police report number

More information

AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009

AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009 Item: AF: A-1 AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009 SUBJECT: REQUEST FOR APPROVAL OF FLORIDA ATLANTIC UNIVERSITY S IDENTITY THEFT PREVENTION PROGRAM. PROPOSED COMMITTEE ACTION Recommend

More information

AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE

AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE 3-950A AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE HISTORY In response to the growing threat of identity theft, the United States Congress passed the Fair and Accurate

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records; 3359-11-10.8 Identity theft detection, prevention and mitigation policy. (A) Introduction. (1) The university of Akron is committed to the detection, prevention and mitigation of identity theft associated

More information

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial DEVELOPING YOUR DEALERSHIP S WRITTEN PROGRAM TO DETECT, PREVENT, AND MITIGATE IDENTITY THEFT AS REQUIRED BY THE THE RED FLAG RULES AND TO RESPOND TO NOTICES OF ADDRESS DISCREPANCIES The Interagency Guidelines

More information

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan May 28, 2010 1.0 INTRODUCTION... 3 2.0 PURPOSE... 3 3.0 DEFINITIONS... 4 4.0 THE PROGRAM... 4 4.1. Program

More information

It s not going away. (c) 2014 huberis.net. Identity Theft

It s not going away. (c) 2014 huberis.net. Identity Theft It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity

More information

Eastpointe Community Credit Union Identity Theft and Deterrence Policy

Eastpointe Community Credit Union Identity Theft and Deterrence Policy Eastpointe Community Credit Union Identity Theft and Deterrence Policy Areas of Responsibility: Management/Operations Board Approval December 14, 2016 Board Review: December 14, 2016 Last Revision: December

More information

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009 Identity Theft Prevention Program Approved by the Board of Trustees on February 20, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules

More information

Middlebury Institute of International Studies Identity Theft Prevention Program

Middlebury Institute of International Studies Identity Theft Prevention Program Middlebury Institute of International Studies Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury Institute of International Studies, hereafter referred to as the Institute, has developed

More information

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Note: This sample identity theft prevention program is for informational purposes only. It may not be suitable for your district depending on its size, complexity and

More information

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance see} white paper see} white paper Red Flag! Now What? If you are a large bank, credit union or credit card issuer, you are well aware of

More information

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Policy Title: Identity Theft Prevention Program Policy Number: PS 992 Purpose of Policy: Applies to: To ensure compliance with federal mandates relating to identity theft. It requires creditors who have

More information

IDENTITY THEFT PROTECT YOUR MONEY

IDENTITY THEFT PROTECT YOUR MONEY IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that

More information

POLICY: Identity Theft Red Flag Prevention

POLICY: Identity Theft Red Flag Prevention POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information

More information

Today s Speakers. Lisa Weintraub Schifferle. Eva Velasquez. Attorney Federal Trade Commission (FTC) CEO & President Identity Theft Resource Center

Today s Speakers. Lisa Weintraub Schifferle. Eva Velasquez. Attorney Federal Trade Commission (FTC) CEO & President Identity Theft Resource Center Today s Speakers Lisa Weintraub Schifferle Attorney Federal Trade Commission (FTC) Eva Velasquez CEO & President Identity Theft Resource Center Overview What is identity theft? What is tax identity theft?

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Identity Theft Prevention Program In December 2008 the VSC Board of Trustees recognized that some activities of the VSC are subject to the provisions of the Fair and Accurate Credit Transactions Act (FACT

More information

Learn about identity theft. Investor education

Learn about identity theft. Investor education Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

Identity Theft Information for Tax Professionals. August 2017

Identity Theft Information for Tax Professionals. August 2017 Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!

More information

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM TITLE II ADMINISTRATIVE REGULATIONS CHAPTER 30 IDENTITY THEFT PREVENTION PROGRAM 30.01 Program The Town of Flower Mound, Texas, as a utility provider ( Utility ), has developed an Identity Theft Prevention

More information

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030 Christopher Newport University Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030 Executive Oversight: Executive Vice President Contact Office: Comptroller s Office

More information

GreenPath Financial Wellness Series

GreenPath Financial Wellness Series GreenPath Financial Wellness Series IDENTITY THEFT Through financial knowledge and expertise, we provide high-quality products and services that enable people to enjoy a better quality of life. Smart financial

More information

Middlebury College Identity Theft Prevention Program

Middlebury College Identity Theft Prevention Program Middlebury College Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury College has developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's Red

More information

The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments

The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments Health Law bulletin number 89 november 2008 The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments Jill Moore In November 2007, several federal agencies jointly issued a

More information

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW The Denver District Attorney's Office has been working closely with the Colorado Bureau of Investigations to provide you the most up-to-date information on the

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer Survey presented by RateWatch

Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer Survey presented by RateWatch Accurate Financial Data Since 1989 Security Breaches and Identity Theft Consumer Actions and Opinions Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Reno Police Department, complete a crime report and obtained a police report case number

More information

Financial Crime: Awareness & Prevention. Jon Jarosinski

Financial Crime: Awareness & Prevention. Jon Jarosinski Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit

More information

Identity Theft Prevention Program (DRAFT)

Identity Theft Prevention Program (DRAFT) Identity Theft Prevention Program (DRAFT) Subject: Revised: Effective date: Review date: Responsible Party: Financial Affairs N/A TBD Annually TBD MSU-Bozeman Vice President for Administration & Finance

More information

The FACT Act An Overview

The FACT Act An Overview The FACT Act An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney, Division of fprivacy and didentity Protection Federal

More information

ID Theft Security. Michael G. Solomon. CISSP PMP CISM

ID Theft Security. Michael G. Solomon. CISSP PMP CISM ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible

More information

Identity Theft Protection Plans

Identity Theft Protection Plans Identity Theft Protection Plans V E R I F Y P R O T E C T R E C O V E R IN 2017, DATA BREACHES REACHED ECONOMIC PROPORTIONS A victim may need to spend time at work trying to recover their good name and

More information

Protecting against and recovering from fraud and identity theft WHAT TO DO

Protecting against and recovering from fraud and identity theft WHAT TO DO Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls

More information

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft. 16 CFR 681.2 681.2 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and creditors that are subject to administrative

More information

Identity Theft. Protect Yourself from

Identity Theft. Protect Yourself from Protect Yourself from Identity Theft Helping you to better understand some of the common sources of identity theft, how to protect your information, how to detect it when there s a problem, and how to

More information

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting

More information

Red Flags Rule Identity Theft Training Program

Red Flags Rule Identity Theft Training Program Red Flags Rule Identity Theft Training Program October 2017 Purpose of Training The purpose of the UA Little Rock Identity Theft Prevention Program is to reduce the exposure of financial and personal loss

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Revised April 2010 Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso County Sheriff s Office and obtained a police report number

More information

Illinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College

Illinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College Illinois Eastern Community Colleges Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College Identity Theft Prevention Program Approved by the Cabinet: February 4, 2015

More information

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director pierson Technological advances of the

More information

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 Introduction: Under the Fair and Accurate Credit Transactions Act (FACT Act), financial institutions (and creditors) that offer or maintain covered accounts

More information