2018 ERO Compliance Training RETURNING CLIENTS FEE COLLECT

Size: px
Start display at page:

Download "2018 ERO Compliance Training RETURNING CLIENTS FEE COLLECT"

Transcription

1 07/13/2017 Version ERO Compliance Training RETURNING CLIENTS FEE COLLECT B

2 SECTION ONE: 2018 Fee Collect Program In partnership with your software provider and Santa Barbara Tax Products Group (TPG), you have elected to provide Fee Collect options to your clients. Our portfolio of financial services and our commitment to customer service will help you grow your business. We have summarized the Fee Collect Program below, but please refer to your software website for additional detailed information. The Fee Collect program offers a client product in which you can collect your fees directly from the taxpayer refund. Your client will get their refund faster and you can rest easy knowing that you will get paid at the same time they get their refund. This product is not a loan or a refund transfer. All you have to do is file the return electronically and have the client sign a simple authorization allowing you to take out your fees. Based upon our instructions, the bank does the rest, depositing your fees directly to your designated bank account and depositing the remainder of the refund directly to the client s account. It doesn t get any easier or any more automatic. And best of all, you pay a flat rate per tax return for this service far less than it would cost you to collect your fees from a slow-paying client. This is not a loan. The funds are deposited only when the IRS pays the refund, which is normally less than 21 days of filing the return. If the IRS withholds the refund for some reason, then you don t pay for the Fee Collect service. What's in it for you? Business Growth: Accept more clients, including those you would typically turn away. Payment Assurance: Lower risk of slow or no pays by having your fees taken out of the refund. Fast Collections: Save time by eliminating collections work. Improved Cash Flow: Receive payment when your client gets their refund. Nominal Fee: Flat fee per transaction is a fraction of the cost of doing collections. What's in it for your clients? Fast Refund: Get refund sooner than traditional mail. Financial Convenience: No out-of-pocket cost to get return done. Trusted Accuracy: Confidence because you prepared their return. Offer the Fee Collect Product Fairly

3 Explain the timing and costs associated with the fee collect product in comparison to the IRS options. It is your responsibility to ensure that the taxpayer understands the IRS disbursement options, in which the taxpayer can have their refund deposited directly into their personal bank account or as a check mailed to their home for FREE with paid tax preparation. Explain that taxpayers generally choose a fee collect product so they can have their taxes professionally prepared and pay tax preparation fees with their refund money. Filing Method Tax product Disbursement Estimated Availability of Funds** Deposit Product Fee Paper Return None IRS Direct Deposit or IRS Issued Check 5 to 7 weeks None E-File None IRS Direct Deposit Less than 21 days None E-File None IRS issued Check 21 to 28 days None E-File Fee Collect* Direct Deposit Less than 21 days None * Only a Fee Collect allows the tax preparer s fees to be paid from the refund. The IRS cannot process tax preparer s fees. **The PATH Act (Protecting Americans from Tax Hikes) legislation may create funding delays of up to six weeks or more for taxpayers filing at the beginning of the tax season. Please remember to explain all fees clearly and ensure that the taxpayer understands that the preparation fee will be deducted from the proceeds of their refund. BE FAIR AND CLEAR. Please remember to explain all options available to the taxpayer. 1. Do not pressure the taxpayer(s) into choosing a particular product. 2. Do not ask the taxpayer(s) what option they want before explaining all of the options available to them. 3. Do not pick any option or options for the taxpayer(s). 4. Do not encourage or discourage an applicant from using the Fee Collect product only present the information and allow the customer to make their own decisions.

4 Please utilize our translated product forms when explaining product details to Spanish speaking clients. These forms are available for download by going to the website ( Spanish translations of product forms are provided for your and your clients convenience. All contracts are in the English language, and English is the controlling language in all contracts. Any non-english translation provided may not accurately represent the information in the original English. MAKE SURE WE CAN CONTACT YOU. From time to time, TPG personnel may need to reach you regarding new products available to you, compliance-related matters, or for other business reasons. Please ensure that your contact information is up to date, including phone number and address, so that if we need to reach you we can.

5 Question 1: Is the following statement True or False? If the taxpayer chooses to use the Fee Collect on a refund due return, they will NOT have to pay the tax preparer s fees out-of-pocket as TPG will deduct them from their tax refund. a) True Correct. The Fee Collect product allows the taxpayer to pay for their tax preparation fee out of their tax refund. b) False Question 2: Before accepting a customer s decision to use a Fee Collect, you are required to explain all options available to the customer. These options include IRS Free options. According to the financial services agreement, you agree to present all disbursement options, including free options available with the IRS, to the tax payer. You should also do which of the following when explaining the Fee Collect product to taxpayers? a) Highlight the positive features of the Fee Collect Product and encourage the taxpayer to use this option. I will not recommend the IRS options since they are already posted on the IRS website. b) I will properly explain all options, including the IRS free filing options, to the taxpayer. I will not pressure, encourage or discourage a customer into using a Fee Collect product. I will only present the information and will allow the taxpayer(s) to make their own decision. Correct. The Financial Services Agreement requires that all options are provided to the taxpayer(s).

6 Question 3: As stated in the Financial Services Agreement, you confirm that you will provide the taxpayer the proper product forms associated with using a Fee Collect product and will retain signed copies on file in your office for TPG review, if requested. The product forms include the following: Fee Collect Deposit and Payment Authorization Form and the IRS 7216 use and disclosure forms. Which of the following statements are true? a) I am required to explain all product options to the taxpayer before proceeding with the Fee Collect product. This includes description for free product options. I am also required to retain signed documentation, such as the Fee Collect Deposit and Payment Authorization Form. I will be required to submit this to TPG if requested. Correct. The Financial Services Agreement requires that you provide the taxpayer all product options (including free product filing options) before proceeding with a tax product. Additionally, you are required to retain signed customer forms. b) I am required to explain all product options to the taxpayer before proceeding with the Fee Collect product. This includes description for free product options. I am also required to obtain signed documentation; however, I do not need to retain this on file.

7 Question 4: You are responsible for insuring that each taxpayer has had ample opportunity to read the product documentation and the disclosures before the tax return is submitted. Do not steer or pressure the customer into using a Fee Collect product. Please also ensure that the taxpayer signs all tax product documentation. When should taxpayers sign the documentation? a) After the Fee Collect Deposit and Payment Authorization form has been transmitted. b) After the tax return has been transmitted. c) After they have reviewed all the documentation but before the tax return and Fee Collect Deposit and Payment Authorization form are transmitted. Correct. The tax professional is required to obtain taxpayer signatures on the Fee Collect Deposit and Payment Authorization form before the forms are transmitted for processing. The tax professional should insure that the taxpayer has had ample time to read through the documentation and disclosures. d) Before they leave your office.

8 SECTION TWO: General Best Practices We are excited to partner with you in the coming tax season and we have provided a few tips to help your office stay current with general policies and procedures. Please take extra precaution to guard your office from unauthorized access. Guard access to the office. Remember that the office contains confidential information about taxpayers. Take the necessary precautions to make sure unauthorized access does not occur. All office and access doors MUST be locked when employees are offsite. As a standard practice, do not leave office keys in visible view and limit office access. When guests are onsite, please use monitoring practices, such as use of a guest pass or visitor log. Never allow guests to freely roam the office while unattended. If an employee is terminated during tax season, the locks and any IDs or passwords should be changed to prevent unauthorized access to the office(s).

9 Protect Your Customers Information The Gramm-Leach-Bliley Act of 1999 (GLBA) sets forth standards to protect customer information stored in electronic form as well as paper-based records. As part of regulatory compliance and TPG Best Practices, you should take every precaution reasonably necessary to safeguard taxpayer confidential information. Confidential information includes, but is not limited to, the following: Taxpayer Names Social Security Numbers Dates of birth Addresses Phone numbers Financial information such as loans and/or bank accounts Employer names and phone numbers Tax information Bankruptcy information The TPG User Guide identifies the following Best Practice recommendations to safeguard electronic and physical client information: To Protect Electronic Documentation: Password protect all computers that store client information Use complex passwords and keep confidential (i.e. do not share passwords among staff). Limit computers storing customer information to authorized users. Set up computer screens away from public view. If utilizing portable media use encryption. Lock computers when not in use or when not monitored. All computers used in the preparation of customer tax returns must run a regularly updated anti-virus software program (e.g. Symantec, McAfee, and Microsoft Security Essentials). All computers used in the preparation of customer tax returns must be protected by a hardware or software firewall (e.g. router, Windows Firewall, Zone Alarm). All computers used in the preparation of customer tax returns must store customer data in an encrypted format.

10 All computers used in the preparation of customer tax returns must provide secure file transfer capability (e.g. HTTPS, SFTP, FTPS). To Protect Physical Documentation: Safeguard physical customer files by utilizing a locked storage cabinet or drawer. Do not leave customer information lying in plain sight. Monitor visitors while onsite. Shred all confidential documentation before trashing. Whether you re handing over paperwork, or providing taxpayer information over the phone, it s important to verify you re talking to the actual taxpayer before doing so. Obtain information about the customer before releasing any confidential information. Additionally, before releasing documentation, you are required to reverify the taxpayer through photo identification. In today s technology-saturated world, it becomes increasingly important to know how to recognize phishing schemes. Phishing is a method fraudsters use to steal information by posing as a legitimate organization, often over the phone or via . For your protection and the protection of your clients, use the following tips to help ensure you don t become a victim: Never give out sensitive information under pressure if the source seems untrustworthy. If an , call, or piece of mail is received that seems suspicious, question its source. When in doubt, contact the correct company directly and confirm if the request was real. The following are qualities that may indicate a phishing attempt: o An or call that seems generic or not personalized, for example failing to reference an account you have o A piece of communication received requests personal passwords o An is poorly written or contains low quality images of a company s logos Do not click on links or download attachments from unknown or suspicious seeming s. Keep your computer protected with an antivirus to block cyber-attacks. Keep up-to-date with the latest industry trends on this topic through the IRS and news sources. Notify TPG and Affected Customers

11 If a customer s information becomes compromised in any way, you are required to notify TPG immediately and the affected customers. If you think an unauthorized person has obtained, or is attempting to obtain taxpayer information, it is important to respond quickly. Contact TPG immediately. If confidential information was compromised, you need to contact those customers who were affected. In accordance with the Financial Services Agreement, you should implement the procedures and controls described in IRS Publication 4600 Safeguarding Taxpayer Data: A Guide for Your Business available on the IRS website.

12 Question 5: As referenced in the TPG User Manual, you agree that you will take every reasonable precaution to safeguard electronic and physical customer information. This supports the requirements specified in the regulation called the Gramm-Leach Bliley Act of 1999 (GLBA). Which of the processes below describe and support procedures that could be used to protect client information? a) Utilize secured storage options to file physical customer information, such as locked drawers or cabinets. b) Monitor visitors while they are onsite. c) Encrypt and password protect all computers or electronic media devices which store electronic customer information and do not share passwords. d) Use regularly updated anti-virus and firewalls for software and hardware storing confidential client information. e) All of the above procedures will help to protect customer information. Correct. All of the above precautions are best practices which can be utilized to protect customer information.

13 Question 6: In the event of a data breach, such as unauthorized access to your computer or lost physical files or media devices, you agree to implement the procedures and controls described in IRS Publication 4600 Safeguarding Taxpayer Data: A Guide for Your Business, which is available on the IRS website. Additionally, you agree to take which of the following actions? a) Do not alert anyone until you have proof of fraudulent activity, such as confirmed identity theft. b) Immediately contact TPG and those customers that were affected. Correct. The TPG User Manual requires that you notify TPG and all customers that were affected by the data breach. This is required in addition to implementing the procedures and controls described in IRS Publication c) None of the above procedures are correct. d) All of the above procedures are correct.

14 Question 7: Before providing confidential client information via telephone you are required to validate the caller. Additionally, if the taxpayer comes back to the office to pick up their refund check, you agree to validate the taxpayer s identity before distributing the refund check. a) The Statement is True Correct. You must validate the client identity before releasing any information via telephone. Additionally, you must validate the customer before releasing payment. This can be accomplished by viewing the photo identification of the taxpayer. b) The Statement is False

15 SECTION THREE: Identify the Taxpayer before Filing the Tax Return YOU ARE RESPONSIBLE TO KNOW YOUR CUSTOMER TPG is committed to ensuring that neither we nor you as an ERO participate in the submission of fraudulent tax returns to the IRS. It is essential, therefore, that you undertake reasonable efforts to ensure that the taxpayer whose refunds you will be submitting via TPG and its Banks, is, in fact, the correct taxpayer to be submitting the return, and that the return is accurate, and that you reasonable have identified and verified the identity of the taxpayer using your service. FRAUD/ANTI-MONEY LAUNDERING CONTROLS You should not file a tax return if you suspect fraudulent activity. The number of fraudulent tax returns filed electronically continues to increase each year. Below is a list of possible fraud indicators. This is not intended to imply that every return with one or more of the following characteristics is fraudulent. It will be considered good business practice, however, to verify or validate data that might be considered questionable. Taxpayers are disqualified from applying for financial products if the tax preparer cannot obtain or verify the required information. Possible Taxpayer Fraud Indicators: Documents provided for identification appear to have been altered or forged. Photograph or physical description on the identification is not consistent with the appearance of the applicant or customer presenting the identification. Other information on the identification is not consistent with information given for tax return preparation. Taxpayer cannot be reached at the phone number given. Taxpayer cannot produce any mail or written documentation with their reported name and address. Taxpayer appears to be following a script. Suspicious person accompanying filer and observed on previous occasions. Possible Social Security Card Fraud Indicators: Social Security number that has any of the three groups all zeros

16 Social Security number that has the first three numbers above 900 Social Security number that has the first three numbers of 666 Possible Forms W-2, Forms 1099 and Forms 4852 Fraud Indicators: Forms that are typed, with strikeouts, erasures, white outs or type-overs Forms that are handwritten or photocopied Forms that are incomplete or altered Forms that contain errors in income or SSN Taxpayer presents employer s copy of W-2 Employer Identification Number (EIN) is not nine digits or is missing Dollar signs used on the W-2s or 1099s No cents are indicated (e.g. 5,000 is shown, instead of ) Federal Withholding is greater than 20% of W-2 box 1 wages W-2s for a firm in the area differs from other W-2s issued from the same firm Possible Tax Return Fraud Indicators: Maximum EITC is claimed but taxpayer is unable to supply required information on dependent or spouse/other parent Claiming dependents other than their own children or grandchildren with no supporting documents An unusually high number of dependents born during the year A high number of returns claiming almost the maximum Earned Income Credit An unusually high number of refunds over $2000 Many returns with identical income, withholding, refunds, or EINs on multiple W-2s The definition of Money Laundering is: The process of converting illegally-obtained funds into clean funds. A primary method utilized by money launderers is introducing the illicit funds into the mainstream financial system and moving the funds via a variety of techniques to make them appear clean The risk of introducing illegally obtained funds into the banking system can be identified in our program as identity theft and tax return fraud. Below are the steps you must take to properly identify the customer and to prevent fraud.

17 To protect yourself from processing invalid tax returns, you are responsible to validate the identity of your client before filing a tax return. Best practice processes to verify your customer s identity can be accomplished through the following procedures: Collect customer demographic information: - Name - Physical address - Tax Identification Number and - Date of birth Verify the information through documentation: - Unexpired government issued photo identification - Supporting documents for the Tax Identification Number (i.e. social security cards) - Tax documentation such as W-2s or 1099s The identity of each taxpayer and dependent should be verified to a reasonable and practical extent. If you are suspicious of the client s identity, perform additional due diligence by asking to see additional information. As part of the financial services agreement, you agree to carefully review the identity of each taxpayer before filing the tax return. Employees and business partners responsible for filing tax returns need to be aware of these due diligence procedures. You should not file the tax return if you cannot verify the taxpayer s identity. a) Question 8: To ensure you are not facilitating possible fraud and/or money laundering, you agree to create and implement the following: A Taxpayer identification program to identify and validate the identity of each taxpayer and dependent. Identity will be validated through documentary and non-documentary methods for each member listed on the return. Correct..

18 b) A Taxpayer Identification Program to validate the identity of each taxpayer and dependent. Identity should be validated by reviewing the taxpayer (and any dependent s) government issued identification. This identification does not need to include a photograph. c) A Taxpayer Identification Program to validate the identity of each taxpayer and dependent. Identity should be validated by reviewing the social security cards for each applicant. No other information should be validated.

19 Question 9: As part of your financial services agreement, you agree that you will collect and validate which of the following pieces of taxpayer information before filing the tax return? a) Ask the taxpayer for their name, address, telephone number, and W-2 forms; b) Review the taxpayer (and any dependent s) expired government issued identification to validate their identity; c) At minimum, the taxpayer should provide their name, physical address, tax identification number, and date of birth. The tax professional must validate this information by reviewing at least one form of unexpired government issued photo identification. Additionally, the tax professional must review the social security cards for the primary and secondary filers, as well as all dependent children listed on the tax return. Correct. To properly validate the identity of your client, you should collect the name, physical address, tax identification number, and date of birth. Additionally, you should review at least one unexpired government issued photo identification and the social security cards for each individual listed on the tax return.

20 Question 10: If you are presented fraudulent or suspicious documentation and cannot reasonably confirm the identity of the taxpayer, you agree that you will do which of the following? a) Perform additional due diligence by asking for additional verification, such as asking for utility bills, credit cards, or personal references. You should also verify sources of income and validate data that looks questionable. b) If you suspect fraud, you should refuse to file the return. c) All of the above answers are correct. Correct. If you are suspicious of the identity of the client, ask for additional verification such as utility bills, credit cards or personal references. You should also scrutinize income documentation such as W-2s and other subjective or non-verifiable data used on forms and schedules. If the tax return information looks suspicious, verify sources of income and validate data that looks questionable. You can also contact TPG and ask to speak with our risk department. If you suspect fraud, you should not file the return. Filing a return when you suspect fraud could result in your being inactivated from our program.

21 SECTION FOUR: Certification In order for Enrollment to be activated, please have ALL employees, contractors or others under your EFIN, who will be offering or discussing tax products with customers to successfully complete the online compliance training. I CERTIFY THAT I HAVE READ, UNDERSTAND AND AGREE TO ABIDE BY THE TERMS PROVIDED TO ME IN THE COMPLIANCE TRAINING. Yes No

22 [Pop Up Hint:] **Applies to Questions #1-4 What methods should I use to offer taxpayers the Fee Collect product? You should present all options to the taxpayer, including the free options provided by the IRS. Explain that taxpayers generally choose a Fee Collect product so they can have their taxes professionally prepared and pay tax preparation fees with their refund money. Additionally, a Fee Collect product allows unbanked customers the benefit of having their refund direct deposited rather than receiving a check in the mail from the IRS in 21 to 28 days. Please remember to ensure that each taxpayer has had ample opportunity to read the product Application and the disclosures before the tax return is submitted. Do not steer or pressure the customer into purchasing a tax product. Please also ensure that the taxpayer signs all tax product documentation. What is the timing difference related to using a Fee Collect product versus using the IRS options? Filing Method Tax product Disbursement Estimated Availability of Funds** Deposit Product Fee Paper Return None IRS Direct Deposit or IRS Issued Check 5 to 7 weeks None E-File None IRS Direct Deposit 10 to 21 days None E-File None IRS issued Check 21 to 28 days None E-File Fee Collect* Direct Deposit 10 to 21 days None * Only a Fee Collect allows the tax preparer s fees to be paid from the refund. The IRS cannot process tax preparer s fees. **The PATH Act (Protecting Americans from Tax Hikes) legislation may create funding delays of up to six weeks or more for taxpayers filing at the beginning of the tax season.

23 Do I need to give the taxpayer copies of the Fee Collect forms? Yes; you are supposed to provide the taxpayer a copy of the signed Fee Collect Deposit and Payment Authorization Form, together with any other supporting product documents (i.e. the tax return and 7216 consents to use and disclose forms). What documentation does TPG require that I retain? The Financial Services Agreement requires that you retain, with respect to each Customer: A paper or electronic copy of the Customer s signed Fee Collect product forms Copies of all the tax returns, W-2s, and (to the extent feasible) taxpayer identifications. Note: In some states retaining copies of identification is illegal, so please abide by your state legislation. How long do I need to retain the tax product documentation? We ask that you retain the tax product related documentation for a period of five (5) years. Upon request, the Financial Services Agreement requires that you deliver this tax product documentation to TPG within 48 hours. [Pop Up Hint:] **Applies to Questions #5-7 It is important that we work together to ensure that confidential taxpayer information is protected from unauthorized access by third parties. Tax professionals should utilize proper physical and electronic storage options to ensure that taxpayer information is restricted from unauthorized access. What is confidential client information? Confidential information includes, but is not limited to, the following: Taxpayer Names Social Security Numbers Dates of birth Addresses

24 Phone numbers Financial information such as loans and/or bank accounts Employer names and phone numbers Tax information Bankruptcy information How can I reasonably protect my client s physical information? Stay organized and make certain taxpayer paperwork is stored security away from public view. In order for paperwork to be secure in storage, it should be under lock and key. Always put away a customer s files before you begin working on another customer s account. Make sure that customers do not have access to areas where confidential information is stored. If transported between offices, files should be secured during transport (e.g. a car trunk). Make sure all paperwork is completely shredded before discarding. How can I reasonably protect my client s electronic information? Have safeguards in place to protect the files that are generated and stored on the computer. It is important to follow them and not deviate from policy when dealing with computers to prevent an unauthorized person from gaining access to or stealing the data on your computers. The following are standard practices adopted by most users: All computers used in the preparation of customer tax returns must require users to login to the operating system with a unique user ID and complex password before gaining access to the computer or tax preparation software. Do not share your passwords and make sure to log out of computers when you walk away from them. All laptop computers should utilize a cable lock for security. All computers used in the preparation of customer tax returns must run a regularly updated anti-virus software program (e.g. Symantec, McAfee, or Microsoft Security Essentials). All computers used in the preparation of customer tax returns must be protected by a hardware or software firewall (e.g. router, Windows Firewall, Zone Alarm). All computers used in the preparation of customer tax returns must store customer data in an encrypted format. All computers used in the preparation of customer tax returns must provide secure file transfer capability (e.g. HTTPS, SFTP, FTPS). What other safeguards can help protect the taxpayer?

25 Be aware of your surroundings before discussing a taxpayer s personal and confidential information whether in face to face settings or during phone calls. Create an environment in your office which allows for customer privacy. Best practice would be to have sound barriers in between customers so as to ensure privacy of conversation. Whether you re handing over paperwork or providing taxpayer information over the phone, it s important to verify you re talking to the actual taxpayer before doing so. Obtain a photo ID before turning any information over to the customer. Guard access to the office. Remember that the office contains confidential information about taxpayers. Take the necessary precautions to make sure unauthorized access does not occur. All office and access doors MUST be locked when employees are offsite. If an employee is terminated during tax season, the locks and any IDs or passwords should be changed to prevent unauthorized access to the office(s). What do I do in the event of a data breach? If you think an unauthorized person has obtained, or is attempting to obtain taxpayer information, it is important to respond quickly. Contact TPG immediately. If confidential information was compromised, you need to contact those customers who were affected. Federal laws are in place to ensure that the identity of individuals who open accounts with financial institutions can be verified and that unusual banking transactions are reported to the proper authorities. In accordance with the Financial Services Agreement, you should implement the procedures and controls described in IRS Publication 4600 Safeguarding Taxpayer Data: A Guide for Your Business available on the IRS website. [Pop Up Hint:] **Applies to Questions #8-10 The Taxpayer Identification Program is intended to provide a reasonable belief about the true identity of the applying customer. What do I need to collect? At minimum, the tax professional should collect the following identifying information from each customer before applying for a tax product:

26 Name Date of Birth Physical Address Tax Identification Number What is my responsibility? Client identity should be verified by the tax professional before proceeding with the transaction. Verification can be accomplished by viewing the following documentation: Unexpired government issued photo identification for each individual listed on the return (taxpayer and dependents) Verification of Tax ID Number, such as viewing the taxpayer s social security card Tax forms, such as W-2s and 1099 forms. Photocopies of the picture identification and SSNs should be made and kept as part of the taxpayer s file where allowable by law. Please check your state legislation to ensure you are allowed to maintain copies of client information. What do I do if I am suspicious of the identity of a client? If you are suspicious of the identity of the client, ask for additional verification such as utility bills, credit cards or personal references. You should also scrutinize income documentation such as W-2s and other subjective or non-verifiable data used on forms and schedules. If the tax return information looks suspicious, verify sources of income and validate data that looks questionable. You can also contact TPG and ask to speak with our risk department. If you suspect fraud, you should not file the return. Filing a return when you suspect fraud could result in your being inactivated from our program.

2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER

2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER 07/13/2017 Version 2 2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER 2018-2B SECTION ONE: 2018 Product Suite Our portfolio of financial services and our commitment to customer service will

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No. DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box 777 - Lexington, Nebraska - 68850 Tel. No.- 308/324/2386 Fax No.-308/324/2907 CUSTOMER POLICY IDENTITY THEFT PREVENTION I. OBJECTIVE Page

More information

Identity Theft Information for Tax Professionals. August 2017

Identity Theft Information for Tax Professionals. August 2017 Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!

More information

AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE

AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE 3-950A AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE HISTORY In response to the growing threat of identity theft, the United States Congress passed the Fair and Accurate

More information

Identity Protection Services

Identity Protection Services Identity Protection Services Overview Why are identity protection services being provided? We believe your personal information should stay that way personal. That s why we re taking industry- leading

More information

Red Flags Rule Identity Theft Training Program

Red Flags Rule Identity Theft Training Program Red Flags Rule Identity Theft Training Program October 2017 Purpose of Training The purpose of the UA Little Rock Identity Theft Prevention Program is to reduce the exposure of financial and personal loss

More information

Ball State University

Ball State University PCI Data Security Awareness Training Agenda What is PCI-DSS PCI-DDS Standards Training Definitions Compliance 6 Goals 12 Security Requirements Card Identification Basic Rules to Follow Myths 1 What is

More information

Identity Theft Prevention Program Procedure

Identity Theft Prevention Program Procedure Identity Theft Prevention Program Procedure Procedure Number 9.6P Effective Date 6/16/2010 1.0 PURPOSE The college shall operate an Identity Theft Prevention Program (Appendix A) according to the written

More information

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND The risk to Volunteer State Community College ( College ) its faculty, staff, students and other applicable constituents from data loss and

More information

Effective Date: 4/3/17

Effective Date: 4/3/17 HIPAA AND HITECH ADM 067.4 Attachment D Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and Security Rule Health Information Technology for Economic and Clinical Health (HITECH)

More information

Ohio Conference of Payroll Professionals

Ohio Conference of Payroll Professionals Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number

More information

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS

More information

Record Management & Retention Policy

Record Management & Retention Policy POLICY TYPE: Corporate Divisional EFFECTIVE DATE: INITIAL APPROVAL DATE: NEXT REVIEW DATE: POLICY NUMBER: May 15, 2010 May - 2010 March 2015 REVISION APPROVAL DATE: 5/10, 3/11, 5/12, 9/13, 4/14, 11/14

More information

Electronic Funds Transfers (EFTs)

Electronic Funds Transfers (EFTs) Electronic Funds Transfers (EFTs) S. Rajeshwar, M. Naveen Kumar, B. Nehru and V. Biksham,Syed Shah M. and Farooq Javed Sri Indu College of Engineering and Technology Abstract: EFT stands for "Electronic

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

How to combat card fraud. A guide to detecting and preventing card fraud

How to combat card fraud. A guide to detecting and preventing card fraud How to combat card fraud A guide to detecting and preventing card fraud Contents Introduction 3 Card Present fraud 4 Card Not Present fraud 6 Payment card industry data security standards Your guide to

More information

Santa Barbara Tax Products Group (TPG)

Santa Barbara Tax Products Group (TPG) Santa Barbara Tax Products Group (TPG) REFUND PROCESSING PROGRAM USER MANUAL 2018 User Manual, 2018-2B, January 2018 Contents IMPORTANT NOTE REGARDING PROGRAM AVAILABILITY... 4 PROGRAM OVERVIEW... 4 A)

More information

Visa s Approach to Card Fraud and Identity Theft

Visa s Approach to Card Fraud and Identity Theft Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting

More information

2017 ERO Compliance Training

2017 ERO Compliance Training 2017 ERO Compliance Training Purpose of Compliance Training The purpose of the Refundo Compliance Training is to ensure adequate training, monitoring and supervision of tax preparers in the performance

More information

Note: Action items are italicized

Note: Action items are italicized BEREA COLLEGE Red Flag Rules/ Identity Theft Prevention Policy Document No. FIN002 Effective Date 05/2009 Revision Date Pages 1-7 Approval: On File in F/A Note: Action items are italicized 1.0 Background

More information

Just the facts about proving your identity.

Just the facts about proving your identity. July 2007 Our guides here to help you This guide is part of our Everyday money series. About the Financial Services Authority. Buying a home. Saving Pensions and andpensions andif things investing. retirement.

More information

University of Illinois Community Credit Union Consumer Remote Deposit Anywhere Terms & Conditions

University of Illinois Community Credit Union Consumer Remote Deposit Anywhere Terms & Conditions Description: University of Illinois Community Credit Union Consumer Remote Deposit Anywhere Terms & Conditions The remote deposit capture services ("Mobile Deposit" or "Services") are designed to allow

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

Data Thefts and Protecting Client Tax Information

Data Thefts and Protecting Client Tax Information Data Thefts and Protecting Client Tax Information October 20, 2015 The information contained in this presentation is current as of the date it was presented. It should not be considered official guidance.

More information

SureRent 2020 Private Landlord Tenant Screening Application Package

SureRent 2020 Private Landlord Tenant Screening Application Package Page 1 of 9 SureRent 2020 Private Landlord Tenant Screening Application Package Welcome to Alliance 2020. Your membership packet includes several forms that you must complete before service can be started,

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity Theft Prevention Program Lake Forest College Revision 1.0 Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:

More information

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Princeton University employees are responsible for detecting Red Flags consistent with

More information

FINANCIALLY FIT IN 2017

FINANCIALLY FIT IN 2017 FINANCIALLY FIT IN 2017 Month by Month Calendar People who explicitly make resolutions are 10 times more likely to attain their goals than people who don t. Here s a financial tip or topic to focus on

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

Cyber Risk Proposal Form

Cyber Risk Proposal Form Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information

More information

Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide

Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide Compliance Program Creation Guide January 2015 1 Compliance Program Creation Guide January 2015 2 Insert Business

More information

Eastpointe Community Credit Union Identity Theft and Deterrence Policy

Eastpointe Community Credit Union Identity Theft and Deterrence Policy Eastpointe Community Credit Union Identity Theft and Deterrence Policy Areas of Responsibility: Management/Operations Board Approval December 14, 2016 Board Review: December 14, 2016 Last Revision: December

More information

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Revised December 6, 2017 Table of Contents Statement of Policy 3 Reason for Policy 3 HIPAA Liaison 3 Individuals and Entities Affected

More information

Operating Procedures/Guide

Operating Procedures/Guide HOME SPECIALTY STANDARD OPERATING PROCEDURES Operating Procedures/Guide Effective Date 8/19/2014 Credit is extended by Synchrony Bank. Table of Contents Introduction......................................

More information

Information on Identity Theft for Business, Partnerships and Estate and Trusts

Information on Identity Theft for Business, Partnerships and Estate and Trusts Page 1 of 5 HELP MENU Home News Fact Sheets Information on Identity Theft for Business Partnerships and Estate and Trusts Information on Identity Theft for Business, Partnerships and Estate and Trusts

More information

Identity Theft Prevention. Red Flags. Training Program

Identity Theft Prevention. Red Flags. Training Program Identity Theft Prevention Red Flags Training Program 1 Red Flags Training Program Adoption Amendment passed in 2003 to the Fair Credit Reporting Act called The Fair and Accurate Credit Transactions Act

More information

Proper management of your account will safeguard both your finances and those of the wider community

Proper management of your account will safeguard both your finances and those of the wider community Introduction 02 Proper management of your account will safeguard both your finances and those of the wider community Our business customers often also hold a personal account with us. Our best advice is

More information

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Program Adoption Purpose Definitions Fitchburg State College (College) developed this Identity Theft Prevention Program to detect,

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Financial Literacy Course. East High School Module 9

Financial Literacy Course. East High School Module 9 Financial Literacy Course East High School Module 9 What will you learn about? Identity Theft and Consumer Fraud Protecting Against and Identity Theft and Consumer Fraud Fair Debt Collection Practices

More information

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Note: This sample identity theft prevention program is for informational purposes only. It may not be suitable for your district depending on its size, complexity and

More information

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM TITLE II ADMINISTRATIVE REGULATIONS CHAPTER 30 IDENTITY THEFT PREVENTION PROGRAM 30.01 Program The Town of Flower Mound, Texas, as a utility provider ( Utility ), has developed an Identity Theft Prevention

More information

AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009

AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009 Item: AF: A-1 AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009 SUBJECT: REQUEST FOR APPROVAL OF FLORIDA ATLANTIC UNIVERSITY S IDENTITY THEFT PREVENTION PROGRAM. PROPOSED COMMITTEE ACTION Recommend

More information

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030 Christopher Newport University Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030 Executive Oversight: Executive Vice President Contact Office: Comptroller s Office

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Slide 1 Identity Theft Prevention Program Welcome to the Identity Theft Prevention Program annual training course. Your personal identification information can be used by individuals seeking to use your

More information

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 1 STUDENT SERVICES 2 3 AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 References: Fair

More information

c» BALANCE C:» Financially Empowering You The World of Credit Reports Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You The World of Credit Reports Podcast [Music plays] Nikki: The World of Credit Reports Podcast [Music plays] Nikki: You re listening to world of credit. Hi, I m Nikki, your host for today s podcast. Credit reports and credit scores influence our lives in many

More information

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) Delhaize America, LLC Pharmacies and Welfare Benefit Plan 2013 Health Information Security and Procedures (As

More information

Privacy and Security Standards

Privacy and Security Standards Contents Privacy and Security Standards... 3 Introduction... 3 Course Objectives... 3 Privacy vs. Security... 4 Definition of Personally Identifiable Information... 4 Agent and Broker Handling of Federal

More information

Jack Byrne Ford & Mercury Identity Theft Program (ITPP)

Jack Byrne Ford & Mercury Identity Theft Program (ITPP) Jack Byrne Ford & Mercury Identity Theft Program (ITPP) PART ONE BACKGROUND 1. Effective Date All affected employees of Jack Byrne Ford & Mercury ( Dealership ) must comply with the terms of this policy

More information

ADDENDUM #1 RFP# DBE/ACDBE Consultant January 19, 2015

ADDENDUM #1 RFP# DBE/ACDBE Consultant January 19, 2015 ADDENDUM #1 RFP# 2016-01-001 DBE/ACDBE Consultant January 19, 2015 1. Does the RFP apply to Right of Way Consultant Firms? No 2. What is the expected level of effort required to address the supplemental

More information

Loaded Everyday card terms and conditions

Loaded Everyday card terms and conditions Loaded Everyday card terms and conditions Posted Online: 1 October 2013 Effective: 15 October 2013 The Loaded TM range of cards is issued by Kiwibank Limited and distributed by various organisations, including

More information

ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS

ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS June 2015 Purpose The Electronic Signatures in Global and National Commerce (ESIGN) Act (15 U.S.C. 7001-7006), enacted in 2000, permits, but does not require,

More information

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft. PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity

More information

U.S. Eagle Federal Credit Union Mobile Banking Agreement

U.S. Eagle Federal Credit Union Mobile Banking Agreement U.S. Eagle Federal Credit Union Mobile Banking Agreement Please read these Agreements carefully before accessing or using this service. By accessing or using the service, you agree to be bound by the terms

More information

PAI Secure Program Guide

PAI Secure Program Guide PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS

More information

Online and Electronic Banking Services Agreement

Online and Electronic Banking Services Agreement Online and Electronic Banking Services Agreement January 14, 2015 In this Agreement, the words "you" or "your" mean the member or business that has enrolled in Evergreen Credit Union's Online and Electronic

More information

If you cannot recall your User ID you will want to contact us at option 3and we will be able to provide your User ID.

If you cannot recall your User ID you will want to contact us at option 3and we will be able to provide your User ID. Frequently Asked Questions Logging In/Navigating Online Banking What if I can't remember my User ID? If you cannot recall your User ID you will want to contact us at 319-393-9000 option 3and we will be

More information

e Services Agreement Disclosures

e Services Agreement Disclosures e Services Agreement Disclosures 1. Introduction. This Agreement is the contract which covers your and our rights and responsibilities concerning e Services ( e services ) offered to you by Teaneck Federal

More information

Terms and Conditions Governing Electronic Banking Service

Terms and Conditions Governing Electronic Banking Service Terms and Conditions Governing Electronic Banking Service TERMS AND CONDITIONS GOVERNING ACCOUNTS PART E. TERMS AND CONDITIONS GOVERNING ELECTRONIC BANKING SERVICES Please read these Terms carefully before

More information

Itasca Bank Mobile Deposit FAQ

Itasca Bank Mobile Deposit FAQ Itasca Bank Mobile Deposit FAQ We have collected answers to the most frequently asked questions for you to refer to. But if you do not find what you are looking for here, or need additional information,

More information

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT

More information

Card and Account Security. Important information about your card and account.

Card and Account Security. Important information about your card and account. Card and Account Security. Important information about your card and account. Card and Account Security 1. Peace of mind As a Bendigo Bank customer you can bank with confidence knowing that, if you take

More information

Polson/ Ronan Ambulance Service Identity Theft Prevention Program

Polson/ Ronan Ambulance Service Identity Theft Prevention Program Purpose Polson/ Ronan Ambulance is committed to providing all aspects of our service and conducting our business operations in compliance with all applicable laws and regulations. This policy sets forth

More information

EXCERPT. Do the Right Thing R1112 P1112

EXCERPT. Do the Right Thing R1112 P1112 MD A n d e r s o n s S t a n d a r d s O f C o n d u c t: EXCERPT Do the Right Thing R1112 P1112 Privacy and Confidentiality At MD Anderson, we are committed to safeguarding the privacy of our patients

More information

Number: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance

Number: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance POLICY USF System USF USFSP USFSM Number: 0-109 Title: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance Date of Origin: 1-11-11 Date Last Amended: Date Last Reviewed:

More information

The Savings Bank's Online Banking Electronic Service Agreement and Disclosure

The Savings Bank's Online Banking Electronic Service Agreement and Disclosure The Savings Bank's Online Banking Electronic Service Agreement and Disclosure This Agreement between you and The Savings Bank ("TSB") governs the use of Online Banking services provided by TSB. These services

More information

Bank of Wisconsin Dells Personal Online Banking Agreement and Disclosures (05/2017)

Bank of Wisconsin Dells Personal Online Banking Agreement and Disclosures (05/2017) Bank of Wisconsin Dells Personal Online Banking Agreement and Disclosures (05/2017) 1. Coverage. This Agreement applies to your use of the Bank of Wisconsin Dells Online Banking Service which permits you

More information

Tax-Related Identity Theft

Tax-Related Identity Theft Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman

More information

Jason B. Freeman, J.D., CPA

Jason B. Freeman, J.D., CPA Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman

More information

IDENTITY THEFT DETECTION POLICY

IDENTITY THEFT DETECTION POLICY IDENTITY THEFT DETECTION POLICY PC 6.9 Date of Last Update: May 05, 2009 Approved By: President's Cabinet Responsible Office: Business and Finance POLICY STATEMENT Grand Valley State University (GVSU)

More information

Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM Cards

Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM Cards Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM s Terms and Conditions effective 04/24/2017. Introduction page 1 Using Your page 2 Using Your Through a Mobile Device page 4 One-Time

More information

Banks Sheridan Limited Data Protection Privacy Policy 19 May 2018

Banks Sheridan Limited Data Protection Privacy Policy 19 May 2018 Banks Sheridan Limited Data Protection Privacy Policy 19 May 2018 1. Introduction This Policy sets out the obligations of Banks Sheridan Limited ( the Company ) regarding data protection and the rights

More information

PO Box Providence, RI Toll Free Phone: ONLINE BANKING DISCLOSURE & AGREEMENT

PO Box Providence, RI Toll Free Phone: ONLINE BANKING DISCLOSURE & AGREEMENT PO Box 6808 - Providence, RI 02940 Toll Free Phone: 1-800-398-8472 ONLINE BANKING DISCLOSURE & AGREEMENT General Online Banking: You may: Perform account inquiries on checking, savings, certificate and

More information

Permitted Mobile Banking Transfers Mobile Deposit Capture

Permitted Mobile Banking Transfers Mobile Deposit Capture TERMS AND CONSENT APPLICABLE TO ONLINE BANKING, ELECTRONIC SIGNATURES, EMAIL, FACSIMILE, AND OTHER ELECTRONIC SERVICES, COMMUNICATIONS, AND TRANSACTIONS Introduction The use of Patriot Federal Credit Union

More information

Quick Reference Guide Welcome TEST USER

Quick Reference Guide Welcome TEST USER Welcome TEST USER HELP RETIREMENT MANAGER DEMO FEEDBACK VersionE_000 Getting Started This Retirement Manager participant website Quick Reference Guide will assist you to easily navigate and complete important

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

Important Information on Security Regarding Electronic Account Access and Regular Payment Arrangements

Important Information on Security Regarding Electronic Account Access and Regular Payment Arrangements Important Information on Security Regarding Electronic Account Access and Regular Payment Arrangements This booklet should be read in conjunction with the Terms and Conditions contained in the Financial

More information

EXCEL FEDERAL CREDIT UNION S Online Banking External Transfer Authorization and Service Agreement

EXCEL FEDERAL CREDIT UNION S Online Banking External Transfer Authorization and Service Agreement EXCEL FEDERAL CREDIT UNION S Online Banking External Transfer Authorization and Service Agreement This Online Banking External Transfer Authorization and Service Agreement ( Agreement ) states the terms

More information

Terms and Conditions for the paysafecard Mastercard Card

Terms and Conditions for the paysafecard Mastercard Card Terms and Conditions for the paysafecard Mastercard Card Version: January 2018/UK In accordance with these terms and conditions (the "T&Cs"), customers who have a valid contract relating to the use of

More information

Selected Terms & Conditions for Wells Fargo Business Debit, ATM and Deposit Cards

Selected Terms & Conditions for Wells Fargo Business Debit, ATM and Deposit Cards Selected Terms & Conditions for Wells Fargo Debit, ATM and Deposit Cards Terms and Conditions effective 04/24/2017. Introduction page 1 Using Your Card page 2 Using Your Card Through a Mobile Device page

More information

Middlebury Institute of International Studies Identity Theft Prevention Program

Middlebury Institute of International Studies Identity Theft Prevention Program Middlebury Institute of International Studies Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury Institute of International Studies, hereafter referred to as the Institute, has developed

More information

Three D s of safeguarding your personal data

Three D s of safeguarding your personal data Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D

More information

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution

More information

Sussex Bank Online Banking Agreement. Our Agreement

Sussex Bank Online Banking Agreement. Our Agreement Sussex Bank Online Banking Agreement Our Agreement This Online Banking Agreement and Disclosure Statement (the "Agreement") provides the terms and conditions governing the use of online banking service

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Identity Theft Prevention Program In December 2008 the VSC Board of Trustees recognized that some activities of the VSC are subject to the provisions of the Fair and Accurate Credit Transactions Act (FACT

More information

"HIPAA RULES AND COMPLIANCE"

HIPAA RULES AND COMPLIANCE PRESENTER'S GUIDE "HIPAA RULES AND COMPLIANCE" Training for HIPAA REGULATIONS Quality Safety and Health Products, for Today...and Tomorrow OUTLINE OF MAJOR PROGRAM POINTS OUTLINE OF MAJOR PROGRAM POINTS

More information

FIRST NORTHERN BANK & TRUST ONLINE BANKING AGREEMENT

FIRST NORTHERN BANK & TRUST ONLINE BANKING AGREEMENT FIRST NORTHERN BANK & TRUST ONLINE BANKING AGREEMENT Definitions In this Agreement, the words: Authorized Account Owner means Primary Owner or Joint Owner, as applicable. Account means any Personal Checking

More information

ATTENTION: SECTION 8 CLIENTS WHO RECEIVE UTILITY ASSISTANCE PAYMENT Posted: November 2017

ATTENTION: SECTION 8 CLIENTS WHO RECEIVE UTILITY ASSISTANCE PAYMENT Posted: November 2017 ATTENTION: SECTION 8 CLIENTS WHO RECEIVE UTILITY ASSISTANCE PAYMENT Posted: November 2017 Housing Authority of Yamhill County is now offering a fast and convenient way for you to instantly receive your

More information

Old Dominion National Bank Consumer ebanking Access Agreement and Electronic Fund Transfer Act Disclosure

Old Dominion National Bank Consumer ebanking Access Agreement and Electronic Fund Transfer Act Disclosure Old Dominion National Bank Consumer ebanking Access Agreement and Electronic Fund Transfer Act Disclosure Agreement This Agreement is a contract which establishes the rules which cover your electronic

More information

Verification Worksheet for Dependent Students

Verification Worksheet for Dependent Students ANTELOPE VALLEY COLLEGE Financial Aid Office V1 Standard (V1D_17) 2016-2017 Verification Worksheet for Dependent Students Your 2016 2017 Free Application for Federal Student Aid (FAFSA) was selected for

More information

Identity Theft: Help Your Students Avoid This Epidemic

Identity Theft: Help Your Students Avoid This Epidemic Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity

More information

Payment Card Industry (PCI) Data Security Standard Validation Requirements

Payment Card Industry (PCI) Data Security Standard Validation Requirements Payment Card Industry (PCI) Data Security Standard Validation Requirements For Qualified Security Assessors (QSA) Version 1.2 October 2008 Document Changes Date Version Description October 2008 1.2 To

More information

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You. Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing

More information

NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0. Potential Verification for Onsite Audit

NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0. Potential Verification for Onsite Audit Page 1 of 24 NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0 (Glossary provided at end of document.) Information Security 1.1 Information Security

More information