How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations
|
|
- Lily Opal Montgomery
- 6 years ago
- Views:
Transcription
1 How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations 2017 BY: KAREN REDDICK NATIONAL CREDIT MANAGEMENT
2 WHAT DO THESE STARS HAVE IN COMMON? 2
3 Interesting Stats Identity theft is the fastest-growing crime in America Costing Americans $15.4 billion fraudulent charges Affecting 17.2 million people 19 people become victims of identity theft every minute 1 out of 6 people are victims #1 one consumer complaint to the U.S. Federal Trade Commission The average victim can expect to spend $500 dollars and 30 hours on average resolving each identity theft crime. The FTC estimates it takes victims months to clear their names 3
4 Interesting Stats Victims face higher interest rates, insurance rates, rejected loans, and/or unjust accusations of criminal conduct which require costly legal assistance to rectify $5.8 billion in Tax Fraud paid by the IRS 500,000 victims per year in Health Care Fraud 88% Non-Tech Related It is estimated that 13 percent of all victims reported a family member or relative as the person responsible for misusing their personal information 4
5 Interesting Stats 20 percent of identity theft victim information was misused through credit card fraud The second-highest incidence of identity theft occurred through government documents/benefits fraud, at 15% of all complaints 24 percent of identity theft victims were a part of the Y and Millennial Generations Lost or stolen laptops containing sensitive data can cost over $115,000 to a company in recovery efforts if a data breach goes undiscovered for at least a week 5
6 Interesting Stats 6
7 Interesting Stats 7
8 Stats By State 8
9 Education Is A Prime Target Education is most likely to be hacked 17 %of all reported data breaches, ranking second only to the medical industry with 27 percent Last year alone over 30 Colleges and Universities have had some sort of security breaches Main Source off Education/Campus Breaches Lost/stolen PCs, laptops and media Stolen wallets/purses/backpacks and personal financial information Dumpster Diving 9
10 Students are A Prime Target 90,000 complaints about identity theft filed last year 49 percent increase over the prior year. 18 to 24 were far more likely to experience identity theft. 22 percent of these were notified that they had been a victim of identity theft fraud after they were denied credit or contacted by a debt collector. 3 times higher then average fraud victims 4 times likely to be taken advantage of by someone they know compared with other consumers, according to the market researcher. Thief's use Low- and high-tech strategies Shoulder Surfing Bogus credit card offers 10
11 Educate our Students Guard all numbers Social Security Numbers ATM Codes Computer Passwords Never carry personal information on their persons Don t send important documents to dorms or apartments Avoid public Wi-Fi Be Savvy on social media Be careful sending important documents by mail. Don't send important documents to dormitories and off-campus apartments where mail might not be secure. 11
12 Social Engineering Social Media Obtain cell numbers, dorm address, private s Intelligence about friends and family Social Engineering Attacks to Watch Out For Phishing Pretexting Baiting Quid Pro Quo Tailgating 12
13 5 Scams Targeting Students Bogus Student Tax Tuition Scam Fake Credit Cards False Rental Listings Friendly Fraud 13
14 What To Protect Name Social Security # Date of Birth Address Credit Card# Bank Account # PIN s or Passwords 14
15 Types of Identity Theft 1. Financial ID Theft - Name and Social Security Number (telephone service, credit cards, loans, buy merchandise, lease cars and apartments). 2. Medical ID Theft A thief may use your name or health insurance numbers to see a doctor, get prescription drugs, file claims with your insurance provider, or get other care. 3. Criminal ID Theft - The imposter in this crime provides the victim s information instead of his own when stopped by law enforcement. 4. Identity Cloning - The imposter uses the victim s information to establish a new life. 5. Business Identity Theft - The perpetrator gets credit cards or checking accounts in the name of the business. 15
16 How To Protect Identity Opt out OPT-OUT or Remove your name from Credit Bureau Lists Good for 5 years To opt out permanently: You may begin the permanent Opt-Out process online at Monitor Your Credit Report and Your Children s (Under 18) ( Make copies of your credit cards and contents of wallet Protect personal items Do not use un secure wireless network Subscribe to AG No Call List Guard Your Social Security Number Zealously Do not carry social security numbers When someone asks for it: Why do you need? How do you protect it? How will it be used? What happens if I don t give it you? 16
17 Resources Credit Freeze In some states you can put a freeze on your credit file, so no one will have access to your information without your authorization. 17
18 Credit Freeze es/0497-credit-freeze-faqs#what 18
19 Equifax Breach 143 Million Consumers May-July 2017 Trusted ID Premier Removed Litigation Clause Information Compromised Social Security # Date of Birth 19
20 What To Do If Someone Is A Victim 1. Place a fraud alert on your credit reports and review your reports 2. Close the accounts that you know, or believe, have been tampered with or opened fraudulently 3. Demand several layers of security before establishing a new account 4. Report it to the Organization where your data was breached 5. File a report with your local police or the police in the community where the identity theft took place 6. File a complaint with the Federal Trade Commission 20
21 21
22 Tips To Remember Look at your physical environment Messy vs. clean desk Reports and files stored out of site Locking file cabinets and offices Passwords on post-it notes? USB drives easily available Flash Cards, CDs, and disk lying around in plan site Monitor location/desk direction Are visitors identified, challenged? Public access to business areas? Public Fax? Use Cross Cut Shredders 22
23 Tips To Remember Information Security Policy Do not store sensitive information on workstation or mobile device Written justification and approval for sensitive data storage Purge sensitive information as soon as its business need no longer exists Record retention schedules give useful life of each type of information Purge info-wipe, not delete Security File Deletion Utilities Cross cut shred, not store 23
24 IT Security Tips To Remember Secure wireless internet Anti-virus software that is up-to-date Personal firewall that offers both inbound and outbound permission-based monitoring Apply updates for all vendor software (Microsoft releases patches the second Tuesday of every month Do not access secure portals with sensitive information such as financial institution accounts even if the Web site starts with https Disable file and printer sharing 24
25 Tips To Remember Be aware of your environment If your office uses cubicles Play background music (white noise) Use fabric sound absorbing covers Authenticate Each Individual Don t use 2 Factor Authentication PIN/Passwords Assign PIN and after 2 nd authentication have student change one of their choosing KBA Authentication Knowledge Based Appropriate to secure most information Less intrusive 25
26 EXISTING LAWS THAT REGULATE STUDENT PRIVACY FERPA: Family Educational Rights and Privacy Act GLBA: Gramm-Leach-Bliley Privacy Act FACT-Red Flag Rules PCI ( We wont be covering this one today) 26
27 FERPA FERPA: Family Educational Rights and Privacy Act Statue: 20 U.S.C. 1232(g) Regulations: 34CFR Part 99 The intent of the Act is to protect the rights of students and to insure the privacy and accuracy of education records Those protected by FERPA are students and former students who have been in attendance at the institution Rights belong to the student 27
28 Solution Have all students sign a release of information form and identify which parties are privy to their information 28
29 GLBA GLBA: Gramm-Leach Bliley Act signed into law November Regulation: Privacy regulations issued by federal agencies (Compliance required as of 7/1/01) FTC PART 314-Standards for Safeguarding Customer Information (Effective 5/23/03) Scope: Regulates the sharing of: Nonpublic personal information about individuals who obtain financial products or services From financial institutions primarily for personal, family or household purposes 29
30 GLBA-Implementing the Safeguards Rule The Gramm Leach Bliley Act - Requires financial institutions to ensure the security and confidentiality of customer personal information. The Federal Trade Commission (FTC) implemented GLBA by issuing the Privacy Rule and the Safeguards Rule. Colleges and Universities are considered financial institutions primarily due to student loan making activities. 30
31 Solutions Design and implement a written security plan Select a group or committee to implement program Identify all foreseeable risks Training/Human Resources/Management Information Systems System Failures/Intrusions-Disaster Plans Put together a written program to control these risks Oversee service providers to make sure they are capable of maintaining appropriate safeguards and require by contract to implement and maintain such safeguards Evaluate program each year as environment changes 31
32 RED FLAG RULES Red Flag Requirements For Financial Institutions Require financial institutions to develop and implement written identity theft prevention programs as part of the Fair and Accurate Credit Transactions Act of 2003 Under the Rule, each institution must develop and implement a written Identity Theft Prevention Program designed to detect, prevent, and mitigate identity theft in connection with new or existing accounts Effective date was January 1, 2008 The FTC had delayed enforcement of the rule five times, most recently until December 31,
33 Three Identity Theft Rules Under 16 CFR Part 681 Rule # Duties of users of consumer reports regarding address discrepancies. This rule applies to users of consumer reports that are subject to administrative enforcement of FCRA. If you use consumer reports to extend credit, for skip tracing purposes, to report accounts or if your third party reports on your behalf then you would need to comply. If you or your third party servicer does not use consumer reports than you do not need to comply. 33
34 Rule #2 Three Identity Theft Rules Under 16 CFR Part Duties regarding the detection, prevention, and mitigation of identity theft-aka Red Flag Rules/Identity Theft Prevention Program. This applies to financial institutions and creditors that are subject to administrative duties. This would apply to all of us who extend credit in any means, i.e.: student loans, payment plans. All of us need to comply unless you are strictly cash and carry. 34
35 Rule #3 Three Identity Theft Rules Under 16 CFR Part Duties of card issuers regarding changes of address. This rule applies only to those who issue a debit or credit card. So unless you have a debit card/credit cards attached to the student IDs or purchasing cards then most schools would not have to comply. 35
36 RED FLAG RULES The program must provide for the identification, detection, and response to patterns, practices, or specific activities - known as red flags - that could indicate identity theft Under these new rules, institutions must develop a written program that identifies and detects the relevant warning signs (red flags) or identity theft Examples of these Warning Signs: Unusual account activity Fraud Alerts from Consumer Reporting Agencies Attempted use of suspicious account application documents Notice of ID Theft from the student It must also describe appropriate responses that would prevent and mitigate the crime and detail a plan to update the program Program must be managed by senior employees, include appropriate staff training, and provide for oversight of any service providers 36
37 Elements on How to Comply With Red Flag Requirements 4 Elements: 1. Identity patterns, practices or activities that indicate the possible existence of identity theft (red flags) 2. Detect Red Flags 3. Respond to detected Red Flags to prevent and mitigate identity theft 4. Update the Program periodically to reflect changes in risks to customers and the institution This initial plan needs to be approved by the institutions Board of Directors or Committee. 37
38 HOW TO IDENTIFY THESE RED FLAGS The FTC has identified 26 possible red flags 5 Categories Alerts, notifications, or warnings from a consumer reporting agency Suspicious documents Suspicious personally identifying information, such as suspicious address Unusual use of or suspicious activity relating to a covered account Notices from customers, victims of identity theft, law enforcement authorities, or other businesses about identity theft in connection with covered accounts 38
39 Solutions Verify Identity Authenticate Customers Monitor Transactions Verify Validity of Address Change 39
40 Respond Appropriately Monitor Accounts Contact Customer Change Passwords Close and Reopen Accounts Refuse to Open Accounts Don t Bill or Collect on the Account Notify Law Enforcement 40
41 Don t panic! Don t recreate the wheel So Now What? Evaluate your existing security plans (GLBA) and (Red Flags) If you have not developed one, incorporate these rules into your existing security plan The FTC says in Appendix J to Part 681, that you may incorporate as appropriate, existing policies, procedures and other arrangements that control reasonably foreseeable risks to customers or to the safety and soundness of the financial institutions or creditor from identity theft. Have your service providers incorporate these rules into your contracts and their existing plans Whether this law is relevant to Higher Education or not it is imperative to know how to prevent or mitigate identity theft Human Resources - Training is essential in any successful program Be proactive and have a plan to prevent future liability 41
42 Resources For Victims Free Credit Report To Report Identity Theft Identity Theft Resource Center (ITRC) US Department of Education Office of the Inspector General-Resource on Identity Theft U.S. Studentshttp://www2.ed.gov/about/offices/list/oig/misused/index.html 42
43 CREDIT BUREAU CONTACT INFORMATION Equifax Experian TransUnion
44 Resources For Implementation GLBA FERPA RED FLAG RULES 44
Identity Protection 101: Protect your good name from identity theft.
Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social
More informationIdentity thieves use a variety of ways to gain access to your personal information:
How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into
More informationSAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
More information10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office
Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing
More informationIdentity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office
Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission
More informationIDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018
IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,
More informationProtect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently
Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity
More informationWHAT DO MANY OF US HAVE IN COMMON WITH. Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise
WHAT DO MANY OF US HAVE IN COMMON WITH Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise IDENTITY THEFT: protecting ourselves and our clients Presented by: Eric Albert, Rhonda Davis, Kevin
More informationc» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:
Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security
More informationIV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND
IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND The risk to Volunteer State Community College ( College ) its faculty, staff, students and other applicable constituents from data loss and
More informationIDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY PC 6.9 Date of Last Update: May 05, 2009 Approved By: President's Cabinet Responsible Office: Business and Finance POLICY STATEMENT Grand Valley State University (GVSU)
More informationIdentity Theft Prevention Program Lake Forest College Revision 1.0
Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:
More informationPRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.
PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity
More informationTHE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010
I. Introduction THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART RED FLAGS IDENTITY THEFT PREVENTION PROGRAM A. Purpose February 24, 2010 The Cooper Union for the Advancement of Science and Art
More informationIdentity Theft. Help Your Students Avoid This Epidemic Sun Ow
Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution
More informationIdentity Theft: Help Your Students Avoid This Epidemic
Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity
More informationDrexel and FMFCU. Presented By
Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission
More informationEquifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet:
Before you start Telephone calls and other forms of direct communication: Use the worksheet included in this packet to keep a record of all conversations. When reporting fraud or communicating with law
More informationIdentity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.
Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should
More informationWASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM
WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM PURPOSE AND SCOPE The Identity Theft Prevention Program was developed pursuant to the Federal Trade Commission s
More informationFitchburg State College Identity Theft Prevention Program updated 11/17/09
Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Program Adoption Purpose Definitions Fitchburg State College (College) developed this Identity Theft Prevention Program to detect,
More informationUNIT 3-4 Preventing Identity Theft
UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information
More informationNEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 8 Chapter 13,
More informationIdentity theft can occur even if you have been careful about protecting your personal information.
Dear Customer, Identity theft can occur even if you have been careful about protecting your personal information. If you suspect you have been a victim of identity theft, a fraud, or a scam, we have prepared
More informationOLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE
OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS
More informationUNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION
UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION Responsible Department: Provost and Business and Financial Affairs Recommended By: Provost, VC Business and Financial Affairs Approved By: Chancellor
More informationSubject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New
Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),
More information11/14/ FNBT FACT ACT
1 FNBT FACT ACT This class addresses the Fair Credit Reporting Act which governs the collection and use of information considered in connection with granting credit, providing insurance or offering employment.
More informationIdentity Theft: Protecting, Monitoring and Resolving
Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA
More informationIdentity Theft Prevention. Red Flags. Training Program
Identity Theft Prevention Red Flags Training Program 1 Red Flags Training Program Adoption Amendment passed in 2003 to the Fair Credit Reporting Act called The Fair and Accurate Credit Transactions Act
More informationSlide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?
Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is
More informationGREENPATH FINANCIAL WELLNESS SERIES
GREENPATH FINANCIAL WELLNESS SERIES IDENTITY THEFT Empowering people to lead financially healthy lives. TABLE OF CONTENTS What is Identity Theft?...2 How Identity Theft Occurs...3 How Identity Thieves
More informationFPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions
FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions Barry Altland Director, Partner Engagement Who/What is FPP? A Thank You to
More informationIdentity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation
Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an
More informationVisa s Approach to Card Fraud and Identity Theft
Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting
More informationB. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.
COLLEGE of CENTRAL FLORIDA ADMINISTRATIVE PROCEDURE Title: Identity Theft Prevention Program Procedure Page 1 of 5 Implementing Procedure For Policy # # 2.04 Date Approved: 07/07/11 Division: Administration
More informationIdentity Theft.
Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.
More informationEXHIBIT A IDENTITY THEFT PREVENTION PROGRAM
EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM I. ADOPTION Michigan State University Identity Theft Prevention Program The Board of Trustees of Michigan State University adopted this Identity Theft Prevention
More informationGet the most out of your membership
PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account
More informationThree D s of safeguarding your personal data
Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D
More informationPolson/ Ronan Ambulance Service Identity Theft Prevention Program
Purpose Polson/ Ronan Ambulance is committed to providing all aspects of our service and conducting our business operations in compliance with all applicable laws and regulations. This policy sets forth
More informationHere is some more information on the Equifax Breach and how you may protect yourself in the aftermath...
UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal
More informationClarion University Identity Theft Prevention Program
Clarion University Identity Theft Prevention Program A) Purpose The purpose of the Identity Theft Prevention Program (Program) is to detect, prevent and mitigate identity theft in connection with any covered
More informationTAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT
TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity
More informationOhio Conference of Payroll Professionals
Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number
More informationContents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.
Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing
More informationUnderstanding Identity Theft
Understanding Identity Theft Learn How to Protect Yourself and Your Business A FREE E-book by the Nations Authority on Collecting Money, Michelle Dunn Understanding Identity Theft, learn how to protect
More informationNote: Action items are italicized
BEREA COLLEGE Red Flag Rules/ Identity Theft Prevention Policy Document No. FIN002 Effective Date 05/2009 Revision Date Pages 1-7 Approval: On File in F/A Note: Action items are italicized 1.0 Background
More informationDAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.
DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box 777 - Lexington, Nebraska - 68850 Tel. No.- 308/324/2386 Fax No.-308/324/2907 CUSTOMER POLICY IDENTITY THEFT PREVENTION I. OBJECTIVE Page
More informationID Theft Toolkit and Affidavit
ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information
More informationIdentity Theft Prevention Program Procedure
Identity Theft Prevention Program Procedure Procedure Number 9.6P Effective Date 6/16/2010 1.0 PURPOSE The college shall operate an Identity Theft Prevention Program (Appendix A) according to the written
More informationUniversity of Cincinnati FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
More informationUM Identity Theft Protection Policy
UM Identity Theft Protection Policy Summary/Purpose: The purpose of the UM Identify Theft Protection Policy is to establish an Identity Theft Prevention Program pursuant to the Federal Trade Commission
More informationPROCEDURE. This procedure is intended to identify third party arrangements and red flags involving College activities that will:
Subject Source PROCEDURE Identity Theft Prevention Vice President, Finance and Administrative Services Number: 1.07.02 Reference (Rule #) 6HX14-1.07 President s Approval/Date: 12/21/2017 POLICY: PURPOSE:
More informationMinnesota State Colleges and Universities Identity Theft Prevention Program
Effective 3-18-09 Identity Theft Prevention Program 1 This is the Minnesota State Colleges and Universities Identity Theft Prevention Program, including more detailed guidelines. The initial Program was
More information30.17 Identity Theft Protection Policy October 2018
30.17 Identity Theft Protection Policy October 2018 Preamble. The U.S. Congress has provided protection for consumers from identity theft by enacting the Fair and Accurate Credit Transactions Act ( FACTA
More informationNAU Police Department s Identity Theft Victim s Packet
NAU Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted the NAU Police Department and obtained a police report number
More informationAUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009
Item: AF: A-1 AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009 SUBJECT: REQUEST FOR APPROVAL OF FLORIDA ATLANTIC UNIVERSITY S IDENTITY THEFT PREVENTION PROGRAM. PROPOSED COMMITTEE ACTION Recommend
More informationAIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE
3-950A AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE HISTORY In response to the growing threat of identity theft, the United States Congress passed the Fair and Accurate
More informationWHEN BAD THINGS HAPPEN TO YOUR GOOD NAME
WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card
More informationIdentity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;
3359-11-10.8 Identity theft detection, prevention and mitigation policy. (A) Introduction. (1) The university of Akron is committed to the detection, prevention and mitigation of identity theft associated
More informationThe Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial
DEVELOPING YOUR DEALERSHIP S WRITTEN PROGRAM TO DETECT, PREVENT, AND MITIGATE IDENTITY THEFT AS REQUIRED BY THE THE RED FLAG RULES AND TO RESPOND TO NOTICES OF ADDRESS DISCREPANCIES The Interagency Guidelines
More informationCalifornia State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan
California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan May 28, 2010 1.0 INTRODUCTION... 3 2.0 PURPOSE... 3 3.0 DEFINITIONS... 4 4.0 THE PROGRAM... 4 4.1. Program
More informationIt s not going away. (c) 2014 huberis.net. Identity Theft
It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity
More informationEastpointe Community Credit Union Identity Theft and Deterrence Policy
Eastpointe Community Credit Union Identity Theft and Deterrence Policy Areas of Responsibility: Management/Operations Board Approval December 14, 2016 Board Review: December 14, 2016 Last Revision: December
More informationIdentity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009
Identity Theft Prevention Program Approved by the Board of Trustees on February 20, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules
More informationMiddlebury Institute of International Studies Identity Theft Prevention Program
Middlebury Institute of International Studies Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury Institute of International Studies, hereafter referred to as the Institute, has developed
More informationWashington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM Note: This sample identity theft prevention program is for informational purposes only. It may not be suitable for your district depending on its size, complexity and
More informationRed Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper
Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance see} white paper see} white paper Red Flag! Now What? If you are a large bank, credit union or credit card issuer, you are well aware of
More informationNATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE
NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance
More informationIdentity Theft Prevention Program
Policy Title: Identity Theft Prevention Program Policy Number: PS 992 Purpose of Policy: Applies to: To ensure compliance with federal mandates relating to identity theft. It requires creditors who have
More informationIDENTITY THEFT PROTECT YOUR MONEY
IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that
More informationPOLICY: Identity Theft Red Flag Prevention
POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information
More informationToday s Speakers. Lisa Weintraub Schifferle. Eva Velasquez. Attorney Federal Trade Commission (FTC) CEO & President Identity Theft Resource Center
Today s Speakers Lisa Weintraub Schifferle Attorney Federal Trade Commission (FTC) Eva Velasquez CEO & President Identity Theft Resource Center Overview What is identity theft? What is tax identity theft?
More informationIdentity Theft Prevention Program
Identity Theft Prevention Program In December 2008 the VSC Board of Trustees recognized that some activities of the VSC are subject to the provisions of the Fair and Accurate Credit Transactions Act (FACT
More informationLearn about identity theft. Investor education
Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the
More informationIdentity Theft Information for Tax Professionals. August 2017
Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!
More informationTITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM
TITLE II ADMINISTRATIVE REGULATIONS CHAPTER 30 IDENTITY THEFT PREVENTION PROGRAM 30.01 Program The Town of Flower Mound, Texas, as a utility provider ( Utility ), has developed an Identity Theft Prevention
More informationChristopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030
Christopher Newport University Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030 Executive Oversight: Executive Vice President Contact Office: Comptroller s Office
More informationGreenPath Financial Wellness Series
GreenPath Financial Wellness Series IDENTITY THEFT Through financial knowledge and expertise, we provide high-quality products and services that enable people to enjoy a better quality of life. Smart financial
More informationMiddlebury College Identity Theft Prevention Program
Middlebury College Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury College has developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's Red
More informationThe Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments
Health Law bulletin number 89 november 2008 The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments Jill Moore In November 2007, several federal agencies jointly issued a
More informationEQUIFAX DATA BREACH WHAT YOU NEED TO KNOW
EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW The Denver District Attorney's Office has been working closely with the Colorado Bureau of Investigations to provide you the most up-to-date information on the
More informationRecognizing Credit Card Fraud
1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended
More informationProvided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer Survey presented by RateWatch
Accurate Financial Data Since 1989 Security Breaches and Identity Theft Consumer Actions and Opinions Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer
More informationIdentity Theft Victim s Packet
Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Reno Police Department, complete a crime report and obtained a police report case number
More informationFinancial Crime: Awareness & Prevention. Jon Jarosinski
Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit
More informationIdentity Theft Prevention Program (DRAFT)
Identity Theft Prevention Program (DRAFT) Subject: Revised: Effective date: Review date: Responsible Party: Financial Affairs N/A TBD Annually TBD MSU-Bozeman Vice President for Administration & Finance
More informationThe FACT Act An Overview
The FACT Act An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney, Division of fprivacy and didentity Protection Federal
More informationID Theft Security. Michael G. Solomon. CISSP PMP CISM
ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible
More informationIdentity Theft Protection Plans
Identity Theft Protection Plans V E R I F Y P R O T E C T R E C O V E R IN 2017, DATA BREACHES REACHED ECONOMIC PROPORTIONS A victim may need to spend time at work trying to recover their good name and
More informationProtecting against and recovering from fraud and identity theft WHAT TO DO
Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls
More information16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.
16 CFR 681.2 681.2 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and creditors that are subject to administrative
More informationIdentity Theft. Protect Yourself from
Protect Yourself from Identity Theft Helping you to better understand some of the common sources of identity theft, how to protect your information, how to detect it when there s a problem, and how to
More informationFRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools
FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting
More informationRed Flags Rule Identity Theft Training Program
Red Flags Rule Identity Theft Training Program October 2017 Purpose of Training The purpose of the UA Little Rock Identity Theft Prevention Program is to reduce the exposure of financial and personal loss
More informationIdentity Theft Victim s Packet
Revised April 2010 Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso County Sheriff s Office and obtained a police report number
More informationIllinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College
Illinois Eastern Community Colleges Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College Identity Theft Prevention Program Approved by the Cabinet: February 4, 2015
More informationv ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service
www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director pierson Technological advances of the
More informationIDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008
IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 Introduction: Under the Fair and Accurate Credit Transactions Act (FACT Act), financial institutions (and creditors) that offer or maintain covered accounts
More information