by: Stephen King, JD, AMLP

Size: px
Start display at page:

Download "by: Stephen King, JD, AMLP"

Transcription

1 Community Bank Audit Group Compliance Management Structure / Compliance Risk Assessment June 2, 2014 by: Stephen King, JD, AMLP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2010 Wolf & Company, P.C.

2 Compliance Management Structure OVERVIEW Elements of Compliance Risk Compliance Management Structure Examiner Expectations 2

3 Compliance Risks Compliance Risks include: Agency Actions Restitution Civil Money Penalties Enforcement Actions Civil Liability (RESPA, Fair Housing, Credit Protection) Reputation 3

4 Compliance Risks Increased Lending Scrutiny HMDA errors Flood Insurance coverage TILA / RESPA violations Servicing / Collections / Foreclosures UDAAP Violations Advertising Overdrafts BSA Violations 4

5 Compliance Management Structure I. Board and Management Oversight II. Compliance Program III. Compliance Audit Program 5

6 I. Board Responsibility Board Responsibility includes: Oversight of Compliance Program Leadership Participation 6

7 Board Oversight Adopt clear policy statements regarding the institution s compliance expectations; Appoint a Compliance Officer/Compliance Committee with authority, responsibility and accountability so as to be able to implement and enforce the Compliance Program throughout the institution; Allocate appropriate resources to effectuate compliance functions in both daily practices as well as monitoring and testing roles; 7

8 Board Oversight Approve policies that establish compliance procedures in all areas of the institution, reviewing such policies periodically for changes in both practice and regulatory requirements; Provide for periodic independent compliance audits and testing to ascertain institution s compliance performance; Create a reporting structure to allow the Compliance Officer/Compliance Committee access to communicate compliance concerns; 8

9 Board Oversight Review Examination reports and compliance audits including discussion of recommendations and adoption of corrective measures; and All Board members should regularly attend and actively participate in meetings. 9

10 Board Leadership Leadership on compliance by the Board and senior management sets the tone in an institution. The Board and senior management should regularly discuss compliance topics during their meetings. The Board must clearly communicate the compliance culture of the institution for all employees to respect and follow. 10

11 Board Participation Board and senior management must be active in leadership role. Board members must attend meetings and actively engage. The Board must clearly communicate the compliance culture of the institution for all employees to respect and follow. 11

12 Examination Expectations Compliance examinations start with a top-down, process-oriented, comprehensive review and analysis of an institution's compliance management system including: The Board s and Management s compliance knowledge level and attitude; and The Board s and Management's responsiveness to emerging issues and past or self-identified compliance deficiencies. The Board is responsible for ensuring that the daily operations of the institution are being run by qualified management. 12

13 Examination Expectations Examinations go beyond the mere transactional violation to determine: Has the Board and senior management worked to foster a positive climate for compliance? Has management responded appropriately to deficiencies noted and suggestions made at previous examinations and audits to implement corrective action? How do all levels of the institution keep informed of regulatory changes and developments to ensure continued compliance? 13

14 II. Compliance Program Policies and Procedures, Training, Consumer Complaint Response, Regulatory Change Management, and Monitoring. 14

15 Compliance Policies Formal policies and written procedures for each significant compliance area Policies and Procedures reflect actual processes and controls Policies and Procedures account for applicable state law as well as federal law Appropriate oversight of Policies 15

16 Compliance Training Formal compliance training program on required areas. Formal training tracking program to determine. Timely compliance training on new regulatory areas Education of an institution's Board, management, and staff commensurate with compliance responsibilities and job functions 16

17 Consumer Complaint Management Formal written Consumer Complaint Management policies and procedures detailing processes for addressing and resolving consumer complaints Education of staff commensurate with compliance responsibilities and job functions Evaluation and analysis of complaints for UDAAP and Fair Lending implications. Compliance Monitoring reviews at the transaction level during the normal, daily activities of employees in every operating unit of the institution. 17

18 Regulatory Change Management Formal process for identifying, implementing and testing regulatory changes Continued participation throughout institution Training prior to implementation Pre-Testing and Post-Implementation Monitoring 18

19 Compliance Monitoring Risk-based testing supplemental to Audit Program to focus on higher risk processes and controls Less Independence than audit, but more independence than control Documentation and Reporting 19

20 Examination Expectations Are the policies/procedures customized for the institution's specific products/services? Is the training comprehensive and revised to reflect changes / developments? Is the Consumer Complaint Program properly identifying and evaluating issues? Has Regulatory Change Mgmt flowed through all aspects of Institution? Is Monitoring Program scope substantiated by risk assessment? 20

21 III. Compliance Audit The Compliance Audit program is an independent review of an institution's compliance with consumer protection laws and regulations and adherence to internal policies and procedures. The Compliance audit is a comprehensive evaluation of the institution s activities to identify compliance risk conditions. Written compliance audit findings should be reported directly to the Board or a designated Board committee. 21

22 Examination Expectations Whether the Board reviews and approves all policies and subsequent changes Whether the institution s Compliance Audit Program is adequate based on: Audit independence Scope & frequency Auditor s expertise Institution's monitoring program Complexity of products offered Size of the institution 22

23 23

24 Compliance Risk Assessment OVERVIEW Objectives Scope Components Analysis Utilization within Audit and Monitoring Plans Maintenance Supplemental Assessments 24

25 Objectives The current regulatory compliance environment for financial institutions continues to be in flux. New and changed requirements as a result of Dodd- Frank and other laws come out at a furious pace and old requirements such as the Bank Secrecy Act and Flood continue to face heavy scrutiny. Many financial institutions are having great difficulty in allocating their resources (time, budget, staffing) properly as a result. 25

26 Objectives Performing a compliance risk assessment: Helps prioritize areas of focus within the compliance program Identifies where strong internal controls are warranted Permits appropriate dedication of resources to areas that need them most Assists in the development of the audit plan and compliance monitoring program Meets regulator expectations 26

27 Scope The compliance risk assessment should include within its scope all federal compliance laws and regulations that apply to the institution, as well as state laws and regulations, if applicable. A separate assessment of the risks and controls for each law and regulation is most beneficial. The compliance risk assessment should reflect overall risks for the industry, but more importantly should also reflect the institution s own unique risks as it pertains to the applicable regulations. 27

28 Scope The compliance risk assessment should include ALL operations of the institution. Each department should be involved in the assessment process for regulations impacting the department. Senior management and the Board should review the results of the assessment. 28

29 Components I. Quantity of Inherent Risk II. Quality of Mitigating Controls III. Residual Risk 29

30 Components The Quantity of Inherent Risk rating identifies the level of risk based on the likelihood of a loss or occurrence and the level of impact. Inherent risk should be determined under the assumption that there are no internal controls in place to mitigate the risk. The Quantity of Inherent Risk rating can be High, Moderate or Low. 30

31 Inherent Risk Rating Determination Level of Impact Low High Moderate High High Low Moderate High Low Low Moderate Low High Likelihood of Loss or Occurrence 31

32 Inherent Risk Rating Factors Factors that should be taken into consideration when determining the inherent risk include: Past issues/violations Violations or recommendations regarding the regulation cited in the most recent examination or audit, as well as any litigation that has occurred or complaints received Management/Institutional changes Changes that have occurred in the institution, relating to areas such as management, staffing, policies, vendors or other critical areas 32

33 Inherent Risk Rating Factors Factors that should be taken into consideration when determining the inherent risk include: Capacity The volume of transactions impacted by the regulation, as well as the volume of employees/departments at the institution that are impacted Complexity The degree of difficulty for understanding and complying with the regulation Outsourcing The degree to which the institution outsources compliance for the regulation to a third party outside of its control 33

34 Inherent Risk Rating Factors Factors that should be taken into consideration when determining the inherent risk include: Exposure/Penalties Whether the institution can be penalized for violations and the severity of the penalties Regulatory Environment The degree to which examiners and auditors are showing scrutiny towards the regulation Regulatory Changes Recent changes that have taken place with respect to the regulation (such as new or changed requirements or new interpretations) 34

35 Quality of Mitigating Controls Rating The existence of a strong control environment may be able to reduce the risk posed to the institution. The Quality of Mitigating Controls rating identifies the controls that have been implemented by the institution and the quality of those controls. The Quality of Mitigating Controls rating can be Weak, Adequate or Strong. Strong controls are most critical for areas where there is High inherent risk. For areas where the risk is Low, strong controls are not as critical. 35

36 Quality of Mitigating Controls Rating Factors that should be taken into consideration when determining the quality of mitigating controls include: Policies and Procedures Written policies and written procedures that have been implemented that document the institution s policies, and assist staff in understanding how to perform their tasks and comply Monitoring & Auditing Proactive independent testing performed by the institution (or a third party) that determines whether the institution is complying with the requirements and its internal policies 36

37 Quality of Mitigating Controls Rating Factors that should be taken into consideration when determining the quality of mitigating controls include: Training Steps taken to educate employees so they are aware of the regulatory requirements and how to comply with such requirements Board and Management Oversight The level to which the Board and management is involved with implementing compliance practices with respect to the regulation 37

38 Residual Risk Rating The Residual Risk Rating is the end result of the assessment on each regulation and incorporates both the Quantity of Inherent Risk rating and the Quality of Mitigating Controls rating. The Inherent Risk rating is the principal driver of this score, but strong mitigating controls can result in a Residual Risk rating that is less than the Inherent Risk rating. 38

39 Residual Risk Rating High The volume and complexity of activities related to the regulation expose the institution to significant risks such as litigation, penalties, enforcement actions and damage to reputation. There may be evidence that internal controls are ineffective and may impact operations. Moderate The volume and complexity of activities related to the regulation expose the institution to a degree of risk. There is possible risk of litigation, penalties, enforcement actions and damage to reputation, but they are either not severe, or are mitigated by the presence of strong mitigating controls. Low The volume and complexity of activities related to the regulation is low. There is possible risk of litigation, penalties, enforcement actions or damage to reputation, but it is slight, or are significantly mitigated by the presence of strong mitigating controls. 39

40 Residual Risk Rating Determination Quality of Mitigating Controls Weak Low Moderate High Adequate Low Moderate High Strong Low Low Moderate Low Moderate High Quantity of Inherent Risk 40

41 Analysis Quantity of Inherent Risks Analyzing the risk assessment categories by defining individual requirements will assist in detailing the risk associated with each area, as well as permit the usage of this information for monitoring purposes. Usage of commentary or supporting explanations will be key for discussing why certain answers or ratings were used. 41

42 Analysis Example EFT Inherent Risks 42

43 Analysis Quality of Mitigating Controls Usage of commentary or supporting explanations continues to be extremely important when documenting controls. Audits will ultimately test the effectiveness of the controls relied upon; major issues will warrant a lowering of the control ratings. 43

44 Analysis Example EFT Controls 44

45 Analysis Once the Inherent Risk and the Quality of Mitigating Controls rating has been determined for each category, determine the overall Quantity of Inherent Risk and Quality of Mitigating Controls ratings. Risk weight certain areas as necessary to reflect which areas are more critical than others. These overall ratings should then be combined to determine the Residual Risk rating. 45

46 Analysis Example - Residual Risk Regulation Inherent Risk Quality of Mitigating Controls Residual Risk Bank Secrecy Act High Adequate High Truth-in-Savings Act Moderate Adequate Moderate Right to Financial Privacy Act Low Weak Low Truth-in-Lending Act High Weak High Home Mortgage Disclosure Act High Strong Moderate Electronic Fund Transfers Act Moderate Strong Low 46

47 Results The results of the compliance risk assessment should undergo a final review from the Compliance Officer/Department, as well as senior management of the institution. Things to look out for as part of a review include: Proper understanding of assessment methodology Sufficient documentation of ratings and conclusions Consistent approach throughout entire assessment Assessment of controls in place is accurate 47

48 Results The compliance risk assessment should be presented to the Board for final approval and acceptance of the results. The results should be available throughout the institution when necessary. 48

49 Utilization Audits and Monitoring Any auditing and monitoring performed by or on behalf of the institution should be based on the risk posed. The institution should utilize the inherent risk rating from the assessment to determine the audit schedule for each regulation and monitoring schedule for each requirement. A sample schedule follows: Inherent Risk Rating High Moderate Low Audit Frequency 6 12 months months months 49

50 Utilization - Compliance Audit Plan Regulation Rating Last Audit Next Audit Bank Secrecy Act High January 2011 January 2012 Truth-in-Savings Act Moderate October 2010 April 2012 Right to Financial Privacy Act Low September 2011 September 2013 Truth-in-Lending Act High August 2011 August 2012 Home Mortgage Moderate June 2011 December 2012 Disclosure Act Electronic Fund Transfers Act Low May 2010 May

51 Utilization - Compliance Monitoring Plan Requirement Rating Monitoring Frequency Disclosures Low Annually Periodic Statements Low Annually Receipts Low Annually Pre-Authorized Transfers Low + Semi-Annually Stop Payments Moderate Quarterly Error Resolution High Monthly Overdrafts High - Bi-Monthly 51

52 Maintenance The institution should take steps to ensure that its compliance risk assessment is always up to date. Instances that may warrant updates include: Significant changes to laws and regulations Significant changes in the nature of the institution (acquisitions, major new products or services) Completion of a regulatory examination or major compliance audits At the very least, the institution should review and update its risk assessment annually. 52

53 Supplemental Assessments In addition to an overall compliance program risk assessment, there are some specific regulations or areas to consider implementing supplemental risk assessments. These are areas where there are typically regulatory requirements, examiner expectations or other concerns. 53

54 Supplemental Assessments I. Bank Secrecy Act ( BSA )/Anti-Money Laundering ( AML )/OFAC II. Identity Theft Red Flags III. Fair Lending IV. Unfair, Deceptive and Abusive Acts and Practices ( UDAAP ) 54

55 BSA/AML/OFAC The FFIEC BSA Examination Manual requires a Bank Secrecy Act/Anti-Money Laundering/OFAC risk assessment covering the institution s: Products and Services Customers and Entities Geographic Locations There is no official format for such an assessment and institutions can develop such assessments as they see fit as long as the above areas are covered. 55

56 BSA/AML/OFAC One possible approach: 1. List out all of the institution s products/services, customers/entities and geographic locations. 2. Identify the risks (ex. volume, nature of customers, etc ) and the controls in place for each item identified. 3. Based on the risks and controls described, assign a risk rating to each product/service, customer/entity and geographic location. 56

57 BSA/AML/OFAC BSA/AML/OFAC Risk Assessment highlights and best practices: This risk assessment should be amended on at least an annual basis, or as major changes occur such as: o New products and services o Mergers or acquisitions o Significant examination or audit findings The Risk Assessment should reference data as necessary to support its conclusions; back up for these figures should be maintained in some form (ex. data on volume, number of high risk customers, etc ) 57

58 BSA/AML/OFAC BSA/AML/OFAC Risk Assessment highlights and best practices: The risk assessment should contain an overall rating for the BSA/AML and OFAC programs. Overall ratings for products/services, customers/entities and geography is also a good practice. The Risk Assessment should be presented to the Board for approval. Areas where the institution accepts the risk of not having certain controls in place should be included in the risk assessment so as to receive approval of accepting such risk from the Board. 58

59 BSA/AML/OFAC Examples of areas where the institution may be accepting risk includes dollar thresholds for performing OFAC verification and logging cash activity (ex. currency exchanges or ATM deposits). The risk assessment should include appropriate documentation supporting the risk-based reasoning behind any dollar thresholds utilizes. Institutions should maintain back up documentation supporting their conclusions. 59

60 Sample BSA/AML/OFAC Assessment Section 60

61 Identity Theft Red Flags The Identity Theft Red Flag regulation requires institutions to establish a risk assessment of their covered accounts. The risk assessment must: Identify the covered accounts that apply to the institution; Identify the account opening and account access methods for these accounts; and Identify the institution s previous history with identity theft. 61

62 Identity Theft Red Flags One possible approach: 1. List out all of the account products offered by the institution. 2. List out any possible account opening method and access method that the institution permits for each specific account, then (involving business lines as applicable) ensure that the opening and access methods are accurate for each account. 3. List out previous identity theft history, either for each specific account, or in general for the institution if such incidents are rare. 62

63 Identity Theft Red Flags The Identity Theft Red Flag Risk Assessment highlights and best practices: Ensure that business lines are involved in the creation and upkeep of this document, since they will best know account opening & access methods as well as identity theft that occurs. The regulation does not require the institution to risk rate covered accounts; including ratings is optional. Likewise, identifying all red flags that apply to the covered accounts is not required, although it is a good practice. 63

64 Sample ID Theft Red Flags Assessment Account Opening Methods Account Access Methods Covered Account: Consumer Checking Account In Person Mail Online In Person Checks ATM & Debit Cards ACH & Preauthorized Transfers Online Banking Telephone Banking Remote Deposit Capture Wire Transfer Previous Identity Theft Experience Fraudulent check cashing Unauthorized electronic funds transfers Stolen cards Fraudulent account opening Unauthorized address changes Employee fraud by an employee adding their name as an authorized user on the account. 64

65 Sample ID Theft Red Flags Assessment Red Flag Identity Theft Red Flag Procedure Procedure Applies 1. Alerts, Notifications or Warnings from a Consumer Reporting Agency A fraud or active duty alert is included with a consumer report. 2. Suspicious Documents Documents provided for identification appear to have been altered or forged. 3. Suspicious Personal Identifying Information Personal identifying information provided is inconsistent when compared against external information sources used by the organization. Yes Yes Yes Covered Account: Consumer Checking Account Preventative/Mitigating Control Description Credit Reports are reviewed for all new applications. This is documented in the ID Theft Red Flags Program. CIP Policy requires the Organization to verify identity, and compare identification to the actual person and/or existing customer profile. CIP Policy requires the Organization to verify identity, and compare identification to the actual person and/or existing customer profile. The Policy also requires the Organization to verify the accuracy of other information provided. Response if the Red Flag Event Occurs Contact the customer to verify information Determine whether a new acct should be opened or an existing acct suspended. Determine whether a SAR should be filed. If deciding to proceed with the application, obtain additional verification and run additional checks to verify the identity of the applicant. Determine whether a new acct should be opened or an existing account suspended. Determine whether a SAR should be filed. If deciding to proceed with the application, obtain additional verification and run additional checks to verify the identity of the applicant. 4. Unusual Use of, or Suspicious Activity Related Shortly following the notice of a change of address for a covered account, the organization receives a request for a new, additional, or replacement card, Yes or for the addition of authorized users on the account. ID Theft Red Flags Program documents controls over changing customer details. Management reviews file maintenance change reports daily and ties back to supporting documentation. Contact the customer to verify the current information on file. Review activity on any other accounts. 5. Notice from Customers, Victims of ID Theft, Law Enforcement Authorities, or Other s Regarding Possible ID Theft in Connection With a Covered Account Held by the Organization The organization is notified by a customer, a victim of identity theft, a law enforcement authority, or any other person that it has opened a fraudulent Yes account for a person engaged in identity theft. 6. Other Red Flags Electronic messages are returned to mail servers of the Organization that it did not originally send, indicating that its customers/members may have been asked to provide information to a fraudulent Yes webiste that looks very similar, if not identical, to the Organization's website. Organization's existing Policies and procedures document controls over customer and information verification. Review original documentation and account history. Freeze the account and contact the customer. Determine whether a SAR should be filed. The Organization's Privacy Policy is sent to all customers/members annually, and includes a reminder that the organization will not ask for Contact customers and review account history for personal information via the website. The Organization's IT any suspicious activity. Determine whether a SAR Department employs a web monitoring service to scan for fake should be filed. websites. 65

66 UDAAP With the heightened scrutiny in the industry regarding Unfair, Deceptive and Abusive Acts and Practices ( UDAAP ), performing an assessment will assist the institution in avoiding and addressing UDAAP concerns. UDAAP requirements are vague and subject to interpretation, and as such there is no one specific UDAAP risk assessment format that it is required to be in. An approach similar to that done for Fair Lending, but more global in nature may be helpful. 66

67 UDAAP Risks and controls to consider include: Nature of products and services Product development Marketing & Advertising Initial & Subsequent Disclosures Availability of Credit Servicing & Collections Conduct of Employees & Third Parties Consumer Complaint History Supervisory/Examination History 67

68 UDAAP Risks and controls to consider include: Board and Management Involvement Authority and Accountability Compliance Program and Oversight Policies and Procedures Training Monitoring & Audits 68

69 UDAAP UDAAP Risk Assessment highlights and best practices: UDAAP risks may best be approached from a product/service standpoint. Both business line personnel and compliance personnel should be involved in assessing the product. Take into account both the inherent risk of the product and the quality of controls that are in place. Ensure periodic updates take place as nature of products or regulatory environment changes 69

70 Sample UDAAP Risk Assessment PRODUCT: Rewards Checking Accounts Risk Category Risk Rating Risk Category Risk Rating 1. Nature of Product High 9. Supervisor & Examination Moderate History 2. Product Development High 10. Board & Management Moderate Involvement 3. Marketing & Advertising High 11. Authority & Low Accountability for Compliance 4. Initial & Subsequent Disclosures High 12. Compliance Program & Oversight Moderate 5. Availability of Credit N/A 13. Policies & Procedures Low 6. Servicing & Collections N/A 14. Training Low 7. Employees & Third Parties Moderate 15. Consumer Complaint Low Management 8. Consumer Complaints Moderate Overall Risk Rating MODERATE Next Steps: Use the risk ratings as a basis to evaluate additional controls for high risk areas, and for monitoring adherence to regulations and internal policies and procedures. 70

71 Final Thoughts Expect the best. Prepare for the worst. Capitalize on what comes. - Zig Ziglar Big pay and little responsibility are circumstances seldom found together. - Napoleon Hill When you come to a fork in the road, take it. Yogi Berra 71

72 Thank You Stephen R. King, JD, AMLP Director, Regulatory Compliance Services

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity Theft Prevention Program Lake Forest College Revision 1.0 Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:

More information

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030 Christopher Newport University Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030 Executive Oversight: Executive Vice President Contact Office: Comptroller s Office

More information

IDENTITY THEFT DETECTION POLICY

IDENTITY THEFT DETECTION POLICY IDENTITY THEFT DETECTION POLICY PC 6.9 Date of Last Update: May 05, 2009 Approved By: President's Cabinet Responsible Office: Business and Finance POLICY STATEMENT Grand Valley State University (GVSU)

More information

COMPLIANCE MANAGEMENT: THE ART OF BOARD REPORTING

COMPLIANCE MANAGEMENT: THE ART OF BOARD REPORTING COMPLIANCE MANAGEMENT: THE ART OF BOARD REPORTING 2015 Temenos USA, Inc. All rights reserved. Leah M. Hamilton Chief Compliance Officer, TriComply Services WHAT YOU WILL LEARN: 2 How to write a Board Report

More information

Middlebury Institute of International Studies Identity Theft Prevention Program

Middlebury Institute of International Studies Identity Theft Prevention Program Middlebury Institute of International Studies Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury Institute of International Studies, hereafter referred to as the Institute, has developed

More information

Middlebury College Identity Theft Prevention Program

Middlebury College Identity Theft Prevention Program Middlebury College Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury College has developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's Red

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Identity Theft Prevention Program In December 2008 the VSC Board of Trustees recognized that some activities of the VSC are subject to the provisions of the Fair and Accurate Credit Transactions Act (FACT

More information

Regulatory Compliance Update

Regulatory Compliance Update Regulatory Compliance Update ACUIA Region 6 Conference Presented By: Kristie Kenney Hoover, NCCO Internal Audit Manager, Doeren Mayhew Florida Michigan North Carolina Texas Insight. Oversight. Foresight.

More information

How to Ace Your BSA Exam & Risk Assessment

How to Ace Your BSA Exam & Risk Assessment How to Ace Your BSA Exam & Risk Assessment LeVar Anderson, CAMS, AAP Auditor, Carolinas Credit Union League Agenda NCUA Examiners review compliance with BSA as part of every exam cycle using examination

More information

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM I. ADOPTION Michigan State University Identity Theft Prevention Program The Board of Trustees of Michigan State University adopted this Identity Theft Prevention

More information

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 8 Chapter 13,

More information

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM TITLE II ADMINISTRATIVE REGULATIONS CHAPTER 30 IDENTITY THEFT PREVENTION PROGRAM 30.01 Program The Town of Flower Mound, Texas, as a utility provider ( Utility ), has developed an Identity Theft Prevention

More information

Bank Secrecy Act Errors & Exceptions: How Does Your Credit Union Compare?

Bank Secrecy Act Errors & Exceptions: How Does Your Credit Union Compare? 2018 Conference & Expo Louisville, Kentucky June 14, 2018 Bank Secrecy Act Errors & Exceptions: How Does Your Credit Union Compare? Presented By: Joseph A. Zito, CPA, MBA Shareholder, Doeren Mayhew 1 Michigan

More information

Minnesota State Colleges and Universities Identity Theft Prevention Program

Minnesota State Colleges and Universities Identity Theft Prevention Program Effective 3-18-09 Identity Theft Prevention Program 1 This is the Minnesota State Colleges and Universities Identity Theft Prevention Program, including more detailed guidelines. The initial Program was

More information

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),

More information

FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. ) ) ) ) ) ) ) ) ) )

FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. ) ) ) ) ) ) ) ) ) ) FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. IN THE MATTER OF SHINHAN BANK AMERICA NEW YORK, NEW YORK (INSURED STATE NONMEMBER BANK CONSENT ORDER FDIC-16-0237b The Federal Deposit Insurance Corporation

More information

LENDING (LEND) Division

LENDING (LEND) Division AFSA University Course List As of 4/1/2017 Lesson Name Lesson ID Module Duration Test Duration (Total mins. LENDING (LEND) Division General Vendor Management AFSA1001 30 10 40 Anti-Predatory Lending (with

More information

The Compliance Challenges of Credit Union Collections. Collections and Compliance?

The Compliance Challenges of Credit Union Collections. Collections and Compliance? The Compliance Challenges of Credit Union Collections Presented by Maria Peyton NSWC Federal Credit Union Collections and Compliance? Yes! It is about more than just collecting a debt Collectors must be

More information

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft. 16 CFR 681.2 681.2 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and creditors that are subject to administrative

More information

Jack Byrne Ford & Mercury Identity Theft Program (ITPP)

Jack Byrne Ford & Mercury Identity Theft Program (ITPP) Jack Byrne Ford & Mercury Identity Theft Program (ITPP) PART ONE BACKGROUND 1. Effective Date All affected employees of Jack Byrne Ford & Mercury ( Dealership ) must comply with the terms of this policy

More information

Hosted By Mike Gallagher October 2017

Hosted By Mike Gallagher October 2017 Risk Management, Compliance and CRA Hosted By Mike Gallagher October 2017 Today s Agenda Risk Management Risk governance Enterprise Risk Management Operational Risk Management Categories of Risk Compliance

More information

UM Identity Theft Protection Policy

UM Identity Theft Protection Policy UM Identity Theft Protection Policy Summary/Purpose: The purpose of the UM Identify Theft Protection Policy is to establish an Identity Theft Prevention Program pursuant to the Federal Trade Commission

More information

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial DEVELOPING YOUR DEALERSHIP S WRITTEN PROGRAM TO DETECT, PREVENT, AND MITIGATE IDENTITY THEFT AS REQUIRED BY THE THE RED FLAG RULES AND TO RESPOND TO NOTICES OF ADDRESS DISCREPANCIES The Interagency Guidelines

More information

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009 Identity Theft Prevention Program Approved by the Board of Trustees on February 20, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Policy Title: Identity Theft Prevention Program Policy Number: PS 992 Purpose of Policy: Applies to: To ensure compliance with federal mandates relating to identity theft. It requires creditors who have

More information

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No. DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box 777 - Lexington, Nebraska - 68850 Tel. No.- 308/324/2386 Fax No.-308/324/2907 CUSTOMER POLICY IDENTITY THEFT PREVENTION I. OBJECTIVE Page

More information

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan May 28, 2010 1.0 INTRODUCTION... 3 2.0 PURPOSE... 3 3.0 DEFINITIONS... 4 4.0 THE PROGRAM... 4 4.1. Program

More information

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Princeton University employees are responsible for detecting Red Flags consistent with

More information

Definitions AML/BSA Risks Assess Your Risks Identify the Risks Mitigate the Risks Scenario Questions?

Definitions AML/BSA Risks Assess Your Risks Identify the Risks Mitigate the Risks Scenario Questions? Definitions AML/BSA Risks Assess Your Risks Identify the Risks Mitigate the Risks Scenario Questions? 2 BSA Bank Secrecy Act Currency and Foreign Transactions Reporting Act, is legislation passed by the

More information

Attachment to Identity Theft Prevention Service Provider Attestation

Attachment to Identity Theft Prevention Service Provider Attestation Attachment to Identity Theft Prevention Service Provider Attestation Identify Theft Prevention Policy Effective January 1, 2011 Identity Theft is a crime in which an individual wrongfully obtains and uses

More information

Polson/ Ronan Ambulance Service Identity Theft Prevention Program

Polson/ Ronan Ambulance Service Identity Theft Prevention Program Purpose Polson/ Ronan Ambulance is committed to providing all aspects of our service and conducting our business operations in compliance with all applicable laws and regulations. This policy sets forth

More information

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 Introduction: Under the Fair and Accurate Credit Transactions Act (FACT Act), financial institutions (and creditors) that offer or maintain covered accounts

More information

ABA Compliance School Foundational

ABA Compliance School Foundational ABA Compliance School Foundational Deposit/Operations Module March 10 13, 2018 Grand Hyatt Denver Denver, Colorado COURSE CATALOG aba.com 1-800-BANKERS October 2014 Session Emory Conference Center and

More information

ABA Compliance School - Intermediate

ABA Compliance School - Intermediate ABA Compliance School - Intermediate March 14 16, 2018 Grand Hyatt Denver Denver, Colorado COURSE CATALOG aba.com 1-800-BANKERS October 2014 Session Emory Conference Center and Hotel Atlanta, GA aba.com

More information

Bank Secrecy Act and OFAC Compliance Board of Directors Training

Bank Secrecy Act and OFAC Compliance Board of Directors Training Bank Secrecy Act and OFAC Compliance Board of Directors Training Introduction Today s presenters: Karen M. Janota Assurance Manager Disclaimer: The contents of this presentation are intended to provide

More information

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM PURPOSE AND SCOPE The Identity Theft Prevention Program was developed pursuant to the Federal Trade Commission s

More information

Identity Theft Prevention. Red Flags. Training Program

Identity Theft Prevention. Red Flags. Training Program Identity Theft Prevention Red Flags Training Program 1 Red Flags Training Program Adoption Amendment passed in 2003 to the Fair Credit Reporting Act called The Fair and Accurate Credit Transactions Act

More information

Secure Opening Plus Requirements for the Identity Theft Red Flag Program

Secure Opening Plus Requirements for the Identity Theft Red Flag Program Secure Opening Plus Requirements for the Identity Theft Red Flag Program Secure Opening Plus is a solution that assists financial institutions in obtaining identifying information and opening accounts

More information

Eastpointe Community Credit Union Identity Theft and Deterrence Policy

Eastpointe Community Credit Union Identity Theft and Deterrence Policy Eastpointe Community Credit Union Identity Theft and Deterrence Policy Areas of Responsibility: Management/Operations Board Approval December 14, 2016 Board Review: December 14, 2016 Last Revision: December

More information

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records; 3359-11-10.8 Identity theft detection, prevention and mitigation policy. (A) Introduction. (1) The university of Akron is committed to the detection, prevention and mitigation of identity theft associated

More information

CITIZENS, INC. BANK SECRECY ACT/ ANTI-MONEY LAUNDERING POLICY AND PROGRAM

CITIZENS, INC. BANK SECRECY ACT/ ANTI-MONEY LAUNDERING POLICY AND PROGRAM I. Introduction CITIZENS, INC. BANK SECRECY ACT/ ANTI-MONEY LAUNDERING POLICY AND PROGRAM The Bank Secrecy Act/Anti-Money Laundering Responsibilities of Insurance Companies U.S. insurance companies have

More information

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54 Rule on Identity Theft Detection and Prevention Program Section 1. General 1.1 Purpose: The purpose of this policy is to establish an Identity Theft

More information

The National Association of Community Health Centers, Inc. Issue Brief on. Complying with the FTC s Red Flag Rules. February, 2009

The National Association of Community Health Centers, Inc. Issue Brief on. Complying with the FTC s Red Flag Rules. February, 2009 1/28/2009 The National Association of Community Health Centers, Inc. Issue Brief on Complying with the FTC s Red Flag Rules February, 2009 Prepared for NACHC by: Michael Glomb Feldesman Tucker Leifer Fidell,

More information

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Note: This sample identity theft prevention program is for informational purposes only. It may not be suitable for your district depending on its size, complexity and

More information

ANTI-MONEY LAUNDERING ( AML ) POLICY OF BullM Global Limited

ANTI-MONEY LAUNDERING ( AML ) POLICY OF BullM Global Limited ANTI-MONEY LAUNDERING ( AML ) POLICY OF BullM Global Limited POLICY STATEMENT AND PRINCIPLES BullM Global Limited ( BULLM ) has adopted an Anti-Money Laundering (AML) compliance policy ( Policy ) according

More information

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag Page 1 Austin Peay State University Identity Theft Prevention POLICIES Issued: March 25, 2017 Responsible Official: Vice President for Finance and Administration Responsible Office: Information Technology

More information

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS I. Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention Program (ITPP) is to control reasonably

More information

Financial Transaction

Financial Transaction Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transaction I. The Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention Program

More information

UNITED STATES OF AMERICA DEPARTMENT OF THE TREASURY FINANCIAL CRIMES ENFORCEMENT NETWORK

UNITED STATES OF AMERICA DEPARTMENT OF THE TREASURY FINANCIAL CRIMES ENFORCEMENT NETWORK UNITED STATES OF AMERICA DEPARTMENT OF THE TREASURY FINANCIAL CRIMES ENFORCEMENT NETWORK ZIONS FIRST NATIONAL BANK SAL T LAKE CITY, UTAH Under the authority of the Bank Secrecy Act ("BSA") and regulations

More information

Practical Suggestions for an Effective AML/OFAC Compliance Function

Practical Suggestions for an Effective AML/OFAC Compliance Function Practical Suggestions for an Effective AML/OFAC Compliance Function Institute of International Bankers 2013 Annual Anti-Money Laundering Seminar Paul S. Pilecki May 7, 2013 2013 Kilpatrick Townsend Recent

More information

DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C.

DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. ) In the Matter of ) ) THE BANK OF PRINCETON ) PRINCETON, NEW JERSEY ) ) (INSURED STATE NONMEMBER BANK) ) STIPULATION AND CONSENT TO THE ISSUANCE

More information

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Last Reviewed May 24, 2016 AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Reference: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA))

More information

OCC Policy Statement on Tax Refund-Related Products

OCC Policy Statement on Tax Refund-Related Products OCC Policy Statement on Tax Refund-Related Products The Office of the Comptroller of the Currency (OCC) is issuing the following policy statement setting forth the measures national banks are expected

More information

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS References: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA)) I. The Purpose of the Identity

More information

FXPRIMUS ANTI-MONEY LAUNDERING ("AML") POLICY

FXPRIMUS ANTI-MONEY LAUNDERING (AML) POLICY FXPRIMUS ANTI-MONEY LAUNDERING ("AML") POLICY POLICY STATEMENT AND PRINCIPLES In compliance with The Financial Intelligence and Anti-Money Laundering Act 2002 (FIAMLA 2002), the Prevention of Corruption

More information

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND The risk to Volunteer State Community College ( College ) its faculty, staff, students and other applicable constituents from data loss and

More information

Chapter 3. Identifying Red Flags. 3:1 Overview

Chapter 3. Identifying Red Flags. 3:1 Overview Chapter 3 Identifying Red Flags 3:1 Overview 3:1.1 Identity Theft 3:1.2 Red Flag 3:2 Conducting an Initial Risk Assessment 3:2.1 Practical Considerations 3:2.2 Risk Factors to Consider 3:2.3 Other Sources

More information

How to Use This Service

How to Use This Service BANKER S GUIDE TO COMPLIANCE How to Use This Service The Banker s Guide to Compliance is written in bankers language and intended for use by bankers. You need not be a lawyer or compliance expert to use

More information

Prevention of Identity Theft in Student Financial Transactions

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Prevention of Identity Theft in Student Financial Transactions 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA)) Date Issued: November 5,

More information

Anti-Money Laundering and Counter Terrorism

Anti-Money Laundering and Counter Terrorism 1 Anti-Money Laundering and Counter Terrorism 1. INTRODUCTION SimpleFX Ltd. ( The Company ) aims to prevent, detect and not knowingly facilitate money laundering and terrorism financing activities. The

More information

FFIEC REMOTE DEPOSIT GUIDANCE. Presented by: PAUL A. CARRUBBA Adams and Reese LLP Phone: (601)

FFIEC REMOTE DEPOSIT GUIDANCE. Presented by: PAUL A. CARRUBBA Adams and Reese LLP Phone: (601) FFIEC REMOTE DEPOSIT GUIDANCE Presented by: PAUL A. CARRUBBA Adams and Reese LLP Phone: (601) 292-0788 E-Mail: paul.carrubba@arlaw.com Paul Carrubba 2 Paul is a partner in the law firm of Adams and Reese

More information

POLICY: Identity Theft Red Flag Prevention

POLICY: Identity Theft Red Flag Prevention POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information

More information

Audit Planning PRESENTED BY: MICHAEL L. FORTMAN, CPA SENIOR MANAGER BROK A. LAHRMAN, CPA SENIOR MANAGER

Audit Planning PRESENTED BY: MICHAEL L. FORTMAN, CPA SENIOR MANAGER BROK A. LAHRMAN, CPA SENIOR MANAGER Audit Planning PRESENTED BY: MICHAEL L. FORTMAN, CPA SENIOR MANAGER BROK A. LAHRMAN, CPA SENIOR MANAGER INTRODUCTIONS Michael L. Fortman, CPA Senior Manager Indianapolis, Indiana Brok A. Lahrman, CPA Senior

More information

UNITED STATES OF AMERICA DEPARTMENT OF THE TREASURY FINANCIAL CRIMES ENFORCEMENT NETWORK

UNITED STATES OF AMERICA DEPARTMENT OF THE TREASURY FINANCIAL CRIMES ENFORCEMENT NETWORK UNITED STATES OF AMERICA DEPARTMENT OF THE TREASURY FINANCIAL CRIMES ENFORCEMENT NETWORK IN THE MATTER OF: ) ) ) Number 2018-03 UBS Financial Services Inc. ) Weehawken, NJ ) ASSESSMENT OF CIVIL MONEY PENALTY

More information

UNITED STATES OF AMERICA DEPARTMENT OF THE TREASURY COMPTROLLER OF THE CURRENCY CONSENT ORDER

UNITED STATES OF AMERICA DEPARTMENT OF THE TREASURY COMPTROLLER OF THE CURRENCY CONSENT ORDER EX-99.2 3 wafd8-kexhibit992order.htm EXHIBIT 99.2 Exhibit 99.2 UNITED STATES OF AMERICA DEPARTMENT OF THE TREASURY COMPTROLLER OF THE CURRENCY In the Matter of: Washington Federal, National Association

More information

Driven. FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 L50

Driven. FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 L50 Driven NADA Management series L50 A Dealer Guide to THE FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 The National Automobile Dealers Association (NADA) has prepared

More information

UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION

UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION Responsible Department: Provost and Business and Financial Affairs Recommended By: Provost, VC Business and Financial Affairs Approved By: Chancellor

More information

CITY OF ISSAQUAH. Identity Theft Prevention Program

CITY OF ISSAQUAH. Identity Theft Prevention Program Attachment A CITY OF ISSAQUAH Identity Theft Prevention Program Effective beginning May 1, 2009 Page 1 of 6 I. PROGRAM ADOPTION The City of Issaquah ( Utility ) developed this Identity Theft Prevention

More information

Clarion University Identity Theft Prevention Program

Clarion University Identity Theft Prevention Program Clarion University Identity Theft Prevention Program A) Purpose The purpose of the Identity Theft Prevention Program (Program) is to detect, prevent and mitigate identity theft in connection with any covered

More information

BSA Excellence: Officer Training

BSA Excellence: Officer Training Welcome to BSA Excellence: Officer Training 1 Compliance Outsourcing Partnership Solutions The Karen I. Martino Group COPS A Partner Only Firm Specializing in: BSA Independent Third Party Audits Compliance

More information

CoreLogic Credco First American Way Poway, CA (800)

CoreLogic Credco First American Way Poway, CA (800) Red Flag Regulation WHAT IT IS The Red Flag Regulation implements Sections 114 and 315 of the FACT Act. It finalizes three distinct requirements two of which are relevant to automotive, RV and marine dealers,

More information

The Commercial Real Estate Lending Decision Process Series (RMA)

The Commercial Real Estate Lending Decision Process Series (RMA) Business Banking & Commercial Lending Analyzing Business Financial Statements and Tax Returns Analyzing Financial Statements Analyzing Personal Financial Statements and Tax Returns Certificate in Business

More information

BSA/AML & OFAC Volunteer Compliance Training. Agenda

BSA/AML & OFAC Volunteer Compliance Training. Agenda Ideas + Solutions = Success BSA/AML & OFAC Volunteer Compliance Training Ideas + Solutions = Success Presented by Dorie Fitchett HCUL Regulatory Officer May 17, 2018 Agenda 1. Bank Secrecy Act 2. Office

More information

Bank Secrecy Act. The board establishes adequate policies and procedures in accordance with anti-money laundering laws and regulations.

Bank Secrecy Act. The board establishes adequate policies and procedures in accordance with anti-money laundering laws and regulations. Bank Secrecy Act Standards Examiners should evaluate the above-captioned function against the following control and performance standards. The Standards represent control and performance objectives that

More information

Bank Secrecy Act. CUNA Must Know Mondays. November 17, 2014

Bank Secrecy Act. CUNA Must Know Mondays. November 17, 2014 Bank Secrecy Act CUNA Must Know Mondays November 17, 2014 1 David A. Reed Attorney at Law Reed & Jolly, PLLC Fairfax, Virginia david@reedandjolly.com (703) 675-9578 2 2 The contents of this presentation

More information

ANTI-MONEY LAUNDERING IN

ANTI-MONEY LAUNDERING IN ANTI-MONEY LAUNDERING IN THE ACQUIRING INDUSTRY Presented by Laura H. Goldzung, CAMS, CCFE, CFCF, CCRP AML Audit Services, LLC March 8, 2016 AGENDA AML Regulatory Overview OFAC Regulatory Overview AML

More information

Third party risk management: Friend or foe?

Third party risk management: Friend or foe? Third party risk management: Friend or foe? Leah M. Hamilton, Chief Compliance Officer 1 2016 Temenos USA. All rights reserved. What You Will Learn: Vendor Management Why use? Potential risks Compliance

More information

Managing Third Party Risk in the ACH Network

Managing Third Party Risk in the ACH Network Managing Third Party Risk in the ACH Network Tony DaSilva, AAP, CISA Senior Examiner Federal Reserve Bank of Atlanta Paul A. Carrubba Partner Adams and Reese LLP Disclaimer THE VIEWS AND OPINIONS EXPRESSED

More information

University of Connecticut IDENTITY THEFT PREVENTION PROGRAM

University of Connecticut IDENTITY THEFT PREVENTION PROGRAM University of Connecticut IDENTITY THEFT PREVENTION PROGRAM I. BACKGROUND II. III. IV. PURPOSE AND SCOPE DEFINITIONS IDENTIFICATION & DETECTION OF RED FLAGS V. APPROPRIATELY RESPONDING WHEN RED FLAGS ARE

More information

Circle Markets AML & KYC

Circle Markets AML & KYC Circle Markets AML & KYC 2018 AML & KYC POLICY Circle Markets VU Limited (we/us/the Company) is committed to the highest standards of the Anti-Money Laundering (AML) compliance and Anti-Terrorist Financing

More information

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS The purpose of this Identity Theft Prevention Program (ITPP) is to control

More information

CU PolicyPro Alphabetical Policy Listing

CU PolicyPro Alphabetical Policy Listing A 3160 2235 7332 2222 2215 3000 6120 8110 2210 3105 2216 2214 2212 2210 2213 11003 2610 2612 2611 1000 11005 9430 11016 5100 5110 7615 9500 Abandoned Property (Unclaimed Property) Abusive Member (Member

More information

LexisNexis Developing an Effective Red Flags Rule Program

LexisNexis Developing an Effective Red Flags Rule Program LexisNexis Developing an Effective Red Flags Rule Program Program Checklist R O I : R E T U R N O N I N F O R M AT I O N S O LU T I O N S Customer Development Authentication & Screening Fraud Prevention

More information

30.17 Identity Theft Protection Policy October 2018

30.17 Identity Theft Protection Policy October 2018 30.17 Identity Theft Protection Policy October 2018 Preamble. The U.S. Congress has provided protection for consumers from identity theft by enacting the Fair and Accurate Credit Transactions Act ( FACTA

More information

SAMPLE. 1 Bank Secrecy Act / Anti-Money Laundering. 2 E-Sign Act / Electronic Funds Transfer Act

SAMPLE. 1 Bank Secrecy Act / Anti-Money Laundering. 2 E-Sign Act / Electronic Funds Transfer Act 1 Bank Secrecy Act / Anti-Money Laundering Summary 1 1 Purpose and History of the BSA 1 1 General Requirements of the BSA/AML Compliance Program 1 3 Money Laundering Defined 1 4 BSA / AML Violations 1

More information

Truth in Savings Advertising Requirements Impacting Social Media

Truth in Savings Advertising Requirements Impacting Social Media Truth in Savings Advertising Requirements Impacting Social Media John Zasada Principal 218 790 1086 1 1 Credit Union Compliance Practice Review advertisements, websites and social media for compliance

More information

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance see} white paper see} white paper Red Flag! Now What? If you are a large bank, credit union or credit card issuer, you are well aware of

More information

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 1 STUDENT SERVICES 2 3 AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 References: Fair

More information

AML POLICY OTM CAPITAL (OTM VENTURES INC) ANTI-MONEY LAUNDERING ("AML") POLICY STATEMENT AND PRINCIPLES SCOPE OF POLICY

AML POLICY OTM CAPITAL (OTM VENTURES INC) ANTI-MONEY LAUNDERING (AML) POLICY STATEMENT AND PRINCIPLES SCOPE OF POLICY AML POLICY OTM CAPITAL (OTM VENTURES INC) ANTI-MONEY LAUNDERING ("AML") POLICY STATEMENT AND PRINCIPLES SCOPE OF POLICY This policy applies to all OTM CAPITAL officers, employees, appointed producers and

More information

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Reference: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA)) I. The Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention

More information

Equifax Data Breach: Your Vital Next Steps

Equifax Data Breach: Your Vital Next Steps Equifax Data Breach: Your Vital Next Steps David A. Reed Partner, Ann Davidson Vice President Risk Consulting/ Bond Division Allied Solutions, LLC Do You Remember When this Was the Biggest Threat to Data

More information

Note: Action items are italicized

Note: Action items are italicized BEREA COLLEGE Red Flag Rules/ Identity Theft Prevention Policy Document No. FIN002 Effective Date 05/2009 Revision Date Pages 1-7 Approval: On File in F/A Note: Action items are italicized 1.0 Background

More information

BSA/AML Excellence and the Role of Governance NEW JERSEY BANKERS ASSOCIATION ANNUAL CONFERENCE MAY 2017

BSA/AML Excellence and the Role of Governance NEW JERSEY BANKERS ASSOCIATION ANNUAL CONFERENCE MAY 2017 BSA/AML Excellence and the Role of Governance NEW JERSEY BANKERS ASSOCIATION ANNUAL CONFERENCE MAY 2017 Your Presenters Asaad Faquir, MBA, MBS Director, RSK Compliance Solutions, LLC Salvatore Zerilli,

More information

Identity Theft Prevention Program (DRAFT)

Identity Theft Prevention Program (DRAFT) Identity Theft Prevention Program (DRAFT) Subject: Revised: Effective date: Review date: Responsible Party: Financial Affairs N/A TBD Annually TBD MSU-Bozeman Vice President for Administration & Finance

More information

UNITED STATES OF AMERICA DEPARTMENT OF THE TREASURY FINANCIAL CRIMES ENFORCEMENT NETWORK ASSESSMENT OF CIVIL MONEY PENALTY

UNITED STATES OF AMERICA DEPARTMENT OF THE TREASURY FINANCIAL CRIMES ENFORCEMENT NETWORK ASSESSMENT OF CIVIL MONEY PENALTY UNITED STATES OF AMERICA DEPARTMENT OF THE TREASURY FINANCIAL CRIMES ENFORCEMENT NETWORK IN THE MATTER OF: ) ) ) ) Number 2017-02 Merchants Bank of California, N.A. ) Carson, California ) ASSESSMENT OF

More information

The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments

The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments Health Law bulletin number 89 november 2008 The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments Jill Moore In November 2007, several federal agencies jointly issued a

More information

ACFE and ACAMS South Florida Chapter 2015 AML/Fraud Conference

ACFE and ACAMS South Florida Chapter 2015 AML/Fraud Conference ACFE and ACAMS South Florida Chapter 2015 AML/Fraud Conference Marc Benson Director, Global Investigations & Compliance Navigant Consulting Inc. Salvatore LaScala Managing Director, Global Investigations

More information

Risk Alert Navy FCU Consent Order

Risk Alert Navy FCU Consent Order direct dial: 248.723.0521 Steve Van Beek Attorney and Counselor email: svb@h2law.com Risk Alert Navy FCU Consent Order Re: CFPB Consent Order for Collection Practices and Account Restrictions On October

More information

Consumer Compliance Hot Topics

Consumer Compliance Hot Topics Consumer Compliance Hot Topics Agenda Regulatory Timeline: Issued in 2014 On the Horizon for 2015 Areas of Supervisory Focus: Fair Lending Unfair or Deceptive Acts or Practices (UDAP) Flood Vendor Management

More information