Middlebury Institute of International Studies Identity Theft Prevention Program

Similar documents
Middlebury College Identity Theft Prevention Program

Minnesota State Colleges and Universities Identity Theft Prevention Program

Identity Theft Prevention Program

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT DETECTION POLICY

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM

CITY OF ISSAQUAH. Identity Theft Prevention Program

Identity Theft Prevention. Red Flags. Training Program

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag

UM Identity Theft Protection Policy

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program

30.17 Identity Theft Protection Policy October 2018

Financial Transaction

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Identity Theft Prevention Program

University Identity Theft and Detection Program

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

Identity Theft Prevention Program

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Illinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College

Prevention of Identity Theft in Student Financial Transactions

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM

Clarion University Identity Theft Prevention Program

Identity Theft Prevention Program Procedure

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

POLICY: Identity Theft Red Flag Prevention

Identity Theft Prevention Program (DRAFT)

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial

Riverside Community College District Policy No Student Services PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Olivet Nazarene University Identity Theft Prevention Program

UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION

Note: Action items are italicized

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan

University of Connecticut IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010

AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE

AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009

LOUISIANA COMMUNITY & TECHNICAL COLLEGE SYSTEM Policy # Title: IDENTITY THEFT PREVENTION PROGRAM

CoreLogic Credco First American Way Poway, CA (800)

IDENTITY THEFT RED FLAGS AND RESPONSES

ORGANIZATIONAL MANUAL

Number: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance

Attachment to Identity Theft Prevention Service Provider Attestation

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper

Chapter 3. Identifying Red Flags. 3:1 Overview

ADMINISTRATIVE POLICY STATEMENT

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

Jack Byrne Ford & Mercury Identity Theft Program (ITPP)

Polson/ Ronan Ambulance Service Identity Theft Prevention Program

LexisNexis Developing an Effective Red Flags Rule Program

Identity Theft Prevention Program Lake Forest College Revision 1.0

The New England College of Optometry Identity Theft Prevention Program October 30, 2009 _

Red Flags Rule Identity Theft Training Program

Secure Opening Plus Requirements for the Identity Theft Red Flag Program

Eastpointe Community Credit Union Identity Theft and Deterrence Policy

Procedure for Identity Theft Prevention Program

RED FLAGS IDENTITY THEFT PREVENTION PROGRAM. Raleigh Radiology, LLC. Raleigh Radiology Associates. January 21, 2009

RED FLAG RULES ANNUAL REPORT TO MAYOR AND COUNCIL

The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments

B. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.

The National Association of Community Health Centers, Inc. Issue Brief on. Complying with the FTC s Red Flag Rules. February, 2009

Identity Theft Prevention Program

PROCEDURE. This procedure is intended to identify third party arrangements and red flags involving College activities that will:

Templeton Municipal Light and Water Plant

MID-CAROLINA ELECTRIC COOPERATIVE, INC. SERVICE RULES AND REGULATIONS

POLICY SUMMARY FORM. Unit(s) Responsible for Policy Implementation: Vice President for Finance and Administration

The FACT Act An Overview

Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009

MEMORANDUM. Red Flag Identity Theft Regulations: Implications for Nursing Facilities and Assisted Living Facilities 1

Medical Identity Theft Prevention Policy

RED FLAG LAW made EASY! HIPAA made EASY. Training, Implementation & Sign-off Sheets

CHAPTER 22 MANDATED POLICIES ARTICLE I IDENTITY THEFT PREVENTION POLICY

CENTRAL MICHIGAN UNIVERSITY CHAPTER 13

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

FOX VALLEY ORTHOPEDICS. Identity Compliance Program

Identity Theft Prevention Program Red Flag Rule

(2) Detect red flags that have been incorporated into the program;

THE CHILDREN'S MERCY HOSPITAL ADMINISTRATIVE POLICY

SCOPE AND APPLICABILITY: This policy is applicable to all University faculty and staff.

Red Flags Identity Theft Plan Bay Equity LLC Table of Contents Section 1 Overview of the Compliance Program... 5 Section 2 Terminology...

Driven. FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 L50

ADDENDUM #1 RFP# DBE/ACDBE Consultant January 19, 2015

Anti-Money Laundering and Counter Terrorism

by: Stephen King, JD, AMLP

Compliance With the Red Flags Rules

CLIENT UPDATE SEC AND CFTC ISSUE FINAL RULES ON IDENTITY THEFT PROTECTION

Transcription:

Middlebury Institute of International Studies Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury Institute of International Studies, hereafter referred to as the Institute, has developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's Rule ( Rule ), which implements Section 114 of the Fair and Accurate Credit Transactions Act of 2003. See 16 C. F. R. 681.2. The Institute s Executive Director of Finance (referred to in this Program as the Program Administrator ) was responsible for the development of this Program, in consultation with appropriate Institute administrators and staff members. After consideration of the size and complexity of Institute s operations and account systems, and the nature and scope of the Institute s activities, it was determined that this Program was appropriate for the Institute. This Program has been approved initially by the Audit Committee of the Board. The Audit Committee has delegated further responsibility for administration and periodic review of this Program to the Program Administrator. II. PROGRAM PURPOSE AND DEFINITIONS A. Fulfilling requirements of the Rule This Program has been tailored to the size, complexity and the nature of the Institute s operations. The Program contains reasonable policies and procedures designed to: 1. Identify relevant for new and existing covered accounts and incorporate those into the Program; 2. Detect that have been incorporated into the Program; 3. Respond appropriately to any that are detected to prevent and mitigate Identity Theft; and 4. Ensure the Program is updated periodically, to reflect changes in risks to individuals or to the safety and soundness of the Institute from Identity Theft. B. Rule definitions used in this Program The Rule defines Identity Theft as fraud committed using the identifying information of another person without authority and a Red Flag as a pattern, practice, or specific activity that indicates the possible existence of Identity Theft. The Rule defines a creditor is "any person or business who arranges for the extension, renewal, or continuation of credit" with a "covered account." Covered accounts at the Institute includes, but are not limited to: The Federal Perkins Loan Program; The Fletcher Jones Loan Program; Emergency Loan Fund; Student Tuition & Fee accounts; and banking information entrusted to the Institute for payments.

If the covered account is provisioned by or processed by a third party, then the guidance regarding third parties may apply (see section VII C). Where it is unclear whether an activity constitutes a covered account, the department should consult with the Program Administrator or designee(s).. Identifying information is defined under the Rule as any name or number that may be used, alone or in conjunction with any other information, to identify a specific person, including but not limited to: name, address, telephone number, social security number, date of birth, government issued driver s license or identification number, alien registration number, government passport number, employer or taxpayer identification number. A consumer report as discussed below includes a criminal background check, credit check or other background check performed at the Institute s request by a third-party consumer reporting agency regarding a job applicant or prospective volunteer. III. IDENTIFICATION OF RED FLAGS In order to identify relevant, the Institute considers the types of accounts that it offers and maintains the methods it provides to open its accounts, the methods it provides to access its accounts, the usage of credit reports, and its previous experiences with Identity Theft. The Institute identifies the following red flags, in each of the listed categories: A. Notifications and Warnings From Credit Reporting Agencies 1. Report of fraud accompanying a credit report; 2. Notice or report from a credit agency of a credit freeze on an individual; 3. Notice or report from a credit agency of an active duty alert for an individual; 4. Receipt of a notice of address discrepancy from a consumer reporting agency from which the Institute has obtained a consumer report (e.g., a criminal background check or credit check done with a job applicant s or prospective volunteer s consent); and 5. Indication from a credit report of activity that is inconsistent with an individual s usual pattern or activity. B. Suspicious Documents 1. Identification document or card that appears to be forged, altered or inauthentic; 2. Identification document or card on which a person s photograph or physical description is not consistent with the person presenting the document; 3. Other document with information that is not consistent with existing personal information (such as if a person s signature on a check appears forged, or a parent s signature does not match between different documents); and 2

4. Application for loan that appears to have been altered or forged. C. Suspicious Personal Identifying Information 1. Identifying information presented that is inconsistent with other information the individual provides (example: inconsistent birth dates); 2. Identifying information presented that is inconsistent with other sources of information (for instance, an address not matching an address on a credit report); 3. Identifying information or phone number presented that is the same as information shown on other applications that were found to be fraudulent; 4. Identifying information presented that is consistent with fraudulent activity (such as an invalid phone number or fictitious billing address); 5. Social security number presented that is the same as one given by another individual; 6. An address or phone number presented that is the same as that of another person; 7. A person fails to provide complete personal identifying information on an application when reminded to do so (however, by law social security numbers must not be required); and 8. A person s identifying information is not consistent with the information that is on file for the individual. D. Suspicious Account Activity or Unusual Use of Account 1. Change of address for an account followed by a request to change the account holder's name; 2. Payments stop on an otherwise consistently up-to-date account; 3. Mail sent to the account holder is repeatedly returned as undeliverable; 4. Notice to the Institute that the individual is not receiving mail sent by the Institute; 5. Notice to the Institute that an account has unauthorized activity; 6. Breach in the Institute s computer system security; and 7. Unauthorized access to or use of individual account information. Red Flag E. Alerts from Others 1. Notice to the Institute from an individual, identity theft victim, law enforcement or other person that it has opened or is maintaining a fraudulent account for a person engaged in Identity Theft. 3

IV. DETECTING RED FLAGS A. New Accounts In order to detect any of the identified above associated with the opening of a new account (e.g., enrollment of a new student), the Institute personnel will take the following steps to obtain and verify the identity of the person opening the account: Detect 1. Require certain identifying information such as name, date of birth, address, driver's license, Institute ID, or other identification; 2. Verify the identity (for instance, examine the Institute ID card); 3. Independently contact the purported individual, using contact information already on file in the Institute s systems. B. Existing Accounts In order to detect any of the identified above for an existing account, the Institute personnel will take the following steps to monitor transactions with an account: Detect 1. Verify the identification of individuals who request information (in person, via telephone, via facsimile, via email); 2. Verify the validity of requests to change billing addresses; and 3. Verify changes in banking information given for billing and payment purposes. C. Consumer Report Requests In order to deal with notices of address discrepancies received by the Institute from consumer reporting agencies from which the Institute has obtained consumer reports (e.g., a criminal background check or credit check done with a job applicant s or prospective volunteer s consent), the Institute has adopted the following policy and procedures. 1. The Institute will require written verification from any applicant that the address provided by the applicant is accurate at the time the request for the consumer report is made to the consumer reporting agency; and 2. In the event that notice of an address discrepancy is received by the Institute from the consumer reporting agency, the Institute will verify that the consumer report pertains to the applicant or prospective volunteer for whom the report was made (by, for example, comparing the information in the consumer report with information that the Institute maintains in its own records or obtains from third-party sources, and/or consulting with the applicant or prospective volunteer), and report to the consumer reporting agency an address 4

for the applicant or prospective volunteer that the Institute has reasonably confirmed is accurate. V. PREVENTING AND MITIGATING IDENTITY THEFT In the event the Institute personnel detect any identified, such personnel shall take one or more of the following steps, after consulting with department management and depending on the degree of risk posed by the Red Flag: Prevent and Mitigate 1. Contact the Program Administrator or designee(s) for advice as to how to proceed; 2. Contact the individual; 3. Change any passwords or other security devices that permit access to accounts; 4. Continue to monitor an account for evidence of Identity Theft; 5. Not open a new account; 6. Close an existing account; 7. Reopen an account with a new number; 8. Contact law enforcement; and/or 9. Determine that no response is warranted under the particular circumstances. Protect personally identifying information The Institute maintains a comprehensive written information security plan. VI. PROGRAM ADMINISTRATION A. Oversight of the Program The Program Administrator was responsible for developing, and will be responsible for implementing and updating, this Program. The Program Administrator will be responsible for the Program administration, for ensuring appropriate training of the Institute staff on the Program, for reviewing any staff reports regarding the detection of and the steps for preventing and mitigating Identity Theft, for determining (personally or through designees) which steps of prevention and mitigation should be taken in particular circumstances, and for considering periodic changes to the Program. The Program Administrator may appoint two or more Institute administrators or staff members to an Identity Theft Prevention Committee ( Committee ) chaired by the Program Administrator, which Committee may assist the Program Administrator in carrying out such duties. The Program Administrator will, nonetheless, retain ultimate responsibility for such duties. 5

B. Updating the Program This Program will be periodically reviewed and updated to reflect changes in risks to individuals and the soundness of the Institute s plan to protect individuals from Identity Theft. At least annually, the Program Administrator will consider the Institute's experiences with Identity Theft situations, changes in Identity Theft methods, changes in Identity Theft detection and prevention methods, changes in types of accounts that the Institute maintains, and changes in the Institute s business arrangements with other entities. After considering these factors, the Program Administrator will determine whether changes to the Program, including the listing of, are warranted. In carrying out these duties, the Program Administrator may consult with and/or gather information from the Committee, Institute administrators, staff, vendors and other individuals or firms as appropriate and necessary. C. Staff Training The Institute staff members responsible for implementing the Program shall be trained by the Program Administrator, Committee members and/or designees in the detection of and the responsive steps to be taken when a Red Flag is detected. Training will be done as necessary to effectively implement the program. D. Service Provider Arrangements In the event that the Institute engages a service provider to perform an activity in connection with one or more covered accounts, the Institute will take the following steps to ensure the service provider performs its activity in accordance with reasonable policies and procedures designed to detect, prevent, and mitigate the risk of Identity Theft: 1. Require, by contract, that service providers have such policies and procedures in place; and 2. Require, by contract, that service provider s review the Institute s Program and report any to the Institute s Program Administrator or designee(s), and/or take appropriate steps to prevent or mitigate identity theft. 3. The Institute will in turn report any to service providers so they can take the appropriate steps to prevent or mitigate identity theft. 6