Identity Theft Prevention. Red Flags. Training Program

Similar documents
Minnesota State Colleges and Universities Identity Theft Prevention Program

IDENTITY THEFT DETECTION POLICY

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030

Middlebury Institute of International Studies Identity Theft Prevention Program

Middlebury College Identity Theft Prevention Program

Identity Theft Prevention Program

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM

30.17 Identity Theft Protection Policy October 2018

UM Identity Theft Protection Policy

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program

CITY OF ISSAQUAH. Identity Theft Prevention Program

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

Financial Transaction

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT

Identity Theft Prevention Program Procedure

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Identity Theft Prevention Program

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Prevention of Identity Theft in Student Financial Transactions

Illinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

University Identity Theft and Detection Program

Note: Action items are italicized

AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

POLICY: Identity Theft Red Flag Prevention

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial

Clarion University Identity Theft Prevention Program

Identity Theft Prevention Program

Red Flags Rule Identity Theft Training Program

Identity Theft Prevention Program (DRAFT)

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;

Riverside Community College District Policy No Student Services PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008

AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

University of Connecticut IDENTITY THEFT PREVENTION PROGRAM

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan

Number: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance

Jack Byrne Ford & Mercury Identity Theft Program (ITPP)

ORGANIZATIONAL MANUAL

UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION

IDENTITY THEFT RED FLAGS AND RESPONSES

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.

LOUISIANA COMMUNITY & TECHNICAL COLLEGE SYSTEM Policy # Title: IDENTITY THEFT PREVENTION PROGRAM

Olivet Nazarene University Identity Theft Prevention Program

Attachment to Identity Theft Prevention Service Provider Attestation

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010

Polson/ Ronan Ambulance Service Identity Theft Prevention Program

Procedure for Identity Theft Prevention Program

CoreLogic Credco First American Way Poway, CA (800)

ADMINISTRATIVE POLICY STATEMENT

Chapter 3. Identifying Red Flags. 3:1 Overview

LexisNexis Developing an Effective Red Flags Rule Program

RED FLAGS IDENTITY THEFT PREVENTION PROGRAM. Raleigh Radiology, LLC. Raleigh Radiology Associates. January 21, 2009

Identity Theft Prevention Program Lake Forest College Revision 1.0

Templeton Municipal Light and Water Plant

Eastpointe Community Credit Union Identity Theft and Deterrence Policy

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper

Secure Opening Plus Requirements for the Identity Theft Red Flag Program

Identity Theft Prevention Program

The New England College of Optometry Identity Theft Prevention Program October 30, 2009 _

The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments

RED FLAG RULES ANNUAL REPORT TO MAYOR AND COUNCIL

Medical Identity Theft Prevention Policy

B. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.

POLICY SUMMARY FORM. Unit(s) Responsible for Policy Implementation: Vice President for Finance and Administration

PROCEDURE. This procedure is intended to identify third party arrangements and red flags involving College activities that will:

MID-CAROLINA ELECTRIC COOPERATIVE, INC. SERVICE RULES AND REGULATIONS

The National Association of Community Health Centers, Inc. Issue Brief on. Complying with the FTC s Red Flag Rules. February, 2009

THE CHILDREN'S MERCY HOSPITAL ADMINISTRATIVE POLICY

CENTRAL MICHIGAN UNIVERSITY CHAPTER 13

MEMORANDUM. Red Flag Identity Theft Regulations: Implications for Nursing Facilities and Assisted Living Facilities 1

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

The FACT Act An Overview

CHAPTER 22 MANDATED POLICIES ARTICLE I IDENTITY THEFT PREVENTION POLICY

Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009

SCOPE AND APPLICABILITY: This policy is applicable to all University faculty and staff.

Identity Theft Prevention Program Red Flag Rule

(2) Detect red flags that have been incorporated into the program;

Identity Theft Prevention Program. FY17 Core Training

RED FLAG LAW made EASY! HIPAA made EASY. Training, Implementation & Sign-off Sheets

2016 Business Associate Workforce Member HIPAA Training Handbook

Red Flags Identity Theft Plan Bay Equity LLC Table of Contents Section 1 Overview of the Compliance Program... 5 Section 2 Terminology...

ADDENDUM #1 RFP# DBE/ACDBE Consultant January 19, 2015

University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim)

FOX VALLEY ORTHOPEDICS. Identity Compliance Program

Driven. FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 L50

NAU Police Department s Identity Theft Victim s Packet

Transcription:

Identity Theft Prevention Red Flags Training Program 1

Red Flags Training Program Adoption Amendment passed in 2003 to the Fair Credit Reporting Act called The Fair and Accurate Credit Transactions Act of 2003 Required the Federal Trade Commission (FTC), together with other regulatory agencies, to issue and enact regulations requiring financial institutions and creditors to develop and implement written identity theft prevention programs Meant to detect, prevent and mitigate identity theft in connection with the opening of certain accounts or certain existing accounts. 2

Identity Theft Prevention Program Training is Required On an Annual Basis As part of the UAFS Identity Theft Red Flags Training Program To help staff detect, prevent and mitigate theft of personally identifiable financial information of UAFS customers, as much as reasonably possible 3

Definitions Identity Theft A fraud committed or attempted using the identifying information of another person without authority Red Flag A pattern, practice, or specific activity that indicates the possible existence of identity theft 4

Definitions Covered Account Any account designated to permit multiple payments or transactions or one for which there is a foreseeable risk of Identity Theft Examples include: Student accounts or loans that are administered through the University. Treat every University account as a covered account. 5

Definitions Identifying Information Any name or number that may be used alone or in conjunction with any other information to identify a specific person. Examples include: Name, address, date of birth, social security number, government passport number, student identification number, computer IP address or taxpayer identification number. 6

Identification of Red Flags The University identifies the following Red Flag categories: Five Categories of Red Flags Notification and Warnings from Credit Reporting Agencies Suspicious Documents Suspicious Personal Identifying Information Suspicious Covered Account Activity or Unusual Use of Account Alerts from Others 7

Identification of Red Flags s Notifications and Warnings from Credit Reporting Agencies Report of fraud accompanying a credit report Notice or report from a credit agency or report of a credit freeze on an applicant Notice or report from a credit agency of an active duty alert for an applicant Receipt of a notice of address discrepancy in response to a credit report request Indication from a credit report of activity that is inconsistent with an applicant s usual pattern or activity 8

Identification of Red Flags Suspicious Documents Identification document or card that appears to be forged, altered or inauthentic Identification document or card on which a person s photograph or physical description is not consistent with the person presenting the document Other document with information that is not consistent with existing student information Application for service that appears to have been altered or forged 9

Identification of Red Flags Suspicious Personal Identifying Information Identifying information presented that is inconsistent with other information the student provides (i.e. inconsistent birth dates or address not matching the address on a loan application) Identifying information presented that is the same as information shown on other applications that were found to be fraudulent Identifying information presented that is consistent with fraudulent activity, such as an invalid phone number or fictitious billing address 10

Identification of Red Flags Suspicious Personal Identifying Information (continued) Social security number presented that is the same as one given by another student An address or phone number presented that is the same as that of another person A person fails to provide complete personal identifying information on an application when reminded to do so A person s identifying information is not consistent with the information that is on file for the student 11

Identification of Red Flags Suspicious Covered Account Activity or Unusual Use of an Account Change of address for an account followed by a request to change the student s name Payments stop on an otherwise consistently up-to-date account Account used in a way that is not consistent with prior use Mail sent to the student is repeatedly returned as undeliverable 12

Identification of Red Flags Suspicious Covered Account Activity or Unusual Use of an Account (continued) Notice to the University that a student is not receiving mail sent by the University Notice to the University that an account has unauthorized activity Breach in the University s computer system security Unauthorized access to or use of student account information 13

Identification of Red Flags Alerts from Others Notice to the University from a student, identity theft victim, law enforcement or other person that the University has opened or is maintaining a fraudulent account for a person engaged in identity theft 14

Detecting Red Flags University employees should be on the lookout for possible red flags when dealing with: New Enrollment Existing Accounts Consumer Credit Report Requests 15

Detecting Red Flags New Enrollment Verify the following steps to obtain and verify the identity of the person opening the account Require identifying information, such as: Name, Home Address, Date of Birth, Academic Records or Other Identification Verify the Student s Identity at the time of issuing Student Identification by reviewing Drivers License or Other Government-Issued Photo ID 16

Detecting Red Flags Existing Accounts Monitor transactions on existing accounts: Verify the identity of students if they request information (in person, via telephone, fax or e-mail) Verify the validity of requests to change billing addresses by mail or e-mail and provide the student a reasonable means of promptly reporting incorrect billing address changes Verify changes in banking information given for billing and payment purposes 17

Detecting Red Flags Consumer Credit Report Requests Background or Credit Checks (HR only employment or volunteer positions) Require written verification that the address provided is accurate at the time of the request If an address discrepancy is received, verify that the credit report pertains to the applicant for whom the request was made and report to the consumer credit reporting agency an address for the applicant that the University has reasonably confirmed is accurate 18

Preventing and Mitigating Identity Theft Prevent and Mitigate 1. If a red flag is detected, notify your immediate supervisor, and keep the matter strictly confidential. You and your supervisor should evaluate the risk and take one or more of the following steps, based on the level of risk: a. Continue to monitor the account for evidence of identity theft b. Contact the student or applicant (for which a credit report was run) 19

Preventing and Mitigating Identity Theft c. Change any passwords or other security devices that permit access to the account d. Do not open a new account e. Provide the student with a new student identification number f. Contact the Program Administrator immediately for questions or guidance on the appropriate next steps g. Notify law enforcement (the Program Administrator should be notified prior to involving law enforcement) 20

Preventing and Mitigating Identity Theft Protect Student Identifying Information Ensure that all computer files containing identifying information are password protected Log off of your computer when you are away from your desk Make sure that all paper documents are in a secure location and shred identifying information when no longer needed. If you do not have access to a shredder, use locked receptacles for disposal of documents Avoid the use of Social Security Numbers whenever possible 21

Conclusion The information that has been presented to you serves only as a guide and is not an all-inclusive list of how identity theft can occur Be aware that identity theft does occur Use caution when setting up new accounts, giving out information on existing accounts, or updating existing accounts 22

Reminder... Annual training is required. Please sign and date the Acknowledgement of Training and Compliance Form. Submit your Acknowledgement to the Program Coordinator (send hard copy to Fullerton 109, or email the form to Helen.Seibold@uafs.edu). 23

UAFS Identity Theft Prevention Program Committee Members Mr. Brad Sheriff Program Administrator Phone: 788-7035 Dr. Lee Krehbiel Program Coordinator Phone: 788-7304 Helen Seibold Program Coordinator Phone: 788-7036 24