POLICY SUMMARY FORM. Unit(s) Responsible for Policy Implementation: Vice President for Finance and Administration

Similar documents
UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION

(2) Detect red flags that have been incorporated into the program;

University of Connecticut IDENTITY THEFT PREVENTION PROGRAM

SCOPE AND APPLICABILITY: This policy is applicable to all University faculty and staff.

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009

Number: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM

IDENTITY THEFT DETECTION POLICY

Prevention of Identity Theft in Student Financial Transactions

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag

Minnesota State Colleges and Universities Identity Theft Prevention Program

AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND

Financial Transaction

LOUISIANA COMMUNITY & TECHNICAL COLLEGE SYSTEM Policy # Title: IDENTITY THEFT PREVENTION PROGRAM

Identity Theft Prevention Program

30.17 Identity Theft Protection Policy October 2018

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Identity Theft Prevention Program (DRAFT)

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Attachment to Identity Theft Prevention Service Provider Attestation

Clarion University Identity Theft Prevention Program

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT

Riverside Community College District Policy No Student Services PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Middlebury College Identity Theft Prevention Program

Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009

ADMINISTRATIVE POLICY STATEMENT

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program

Identity Theft Prevention Program Red Flag Rule

Identity Theft Prevention Program

NEW FTC RED FLAG REQUIREMENTS AS APPLICABLE TO CREDITORS AND COVERED ACCOUNTS

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Middlebury Institute of International Studies Identity Theft Prevention Program

Jack Byrne Ford & Mercury Identity Theft Program (ITPP)

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.

Identity Theft Prevention. Red Flags. Training Program

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program

The National Association of Community Health Centers, Inc. Issue Brief on. Complying with the FTC s Red Flag Rules. February, 2009

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

Note: Action items are italicized

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010

LexisNexis Developing an Effective Red Flags Rule Program

University Identity Theft and Detection Program

PROCEDURE. This procedure is intended to identify third party arrangements and red flags involving College activities that will:

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008

B. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.

ORGANIZATIONAL MANUAL

Procedure for Identity Theft Prevention Program

UM Identity Theft Protection Policy

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity Theft Prevention Program Procedure

The New England College of Optometry Identity Theft Prevention Program October 30, 2009 _

Identity Theft Prevention Program

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE

CoreLogic Credco First American Way Poway, CA (800)

CITY OF ISSAQUAH. Identity Theft Prevention Program

POLICY: Identity Theft Red Flag Prevention

Polson/ Ronan Ambulance Service Identity Theft Prevention Program

The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments

Olivet Nazarene University Identity Theft Prevention Program

Illinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan

RED FLAGS IDENTITY THEFT PREVENTION PROGRAM. Raleigh Radiology, LLC. Raleigh Radiology Associates. January 21, 2009

Templeton Municipal Light and Water Plant

Identity Theft Prevention Program

Medical Identity Theft Prevention Policy

Driven. FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 L50

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

Chapter 3. Identifying Red Flags. 3:1 Overview

The FACT Act An Overview

IDENTITY THEFT RED FLAGS AND RESPONSES

CLIENT UPDATE SEC AND CFTC ISSUE FINAL RULES ON IDENTITY THEFT PROTECTION

Red Flags Rule Identity Theft Training Program

FOX VALLEY ORTHOPEDICS. Identity Compliance Program

CENTRAL MICHIGAN UNIVERSITY CHAPTER 13

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper

RED FLAG RULES ANNUAL REPORT TO MAYOR AND COUNCIL

Compliance With the Red Flags Rules

Eastpointe Community Credit Union Identity Theft and Deterrence Policy

Secure Opening Plus Requirements for the Identity Theft Red Flag Program

MEMORANDUM. Red Flag Identity Theft Regulations: Implications for Nursing Facilities and Assisted Living Facilities 1

MID-CAROLINA ELECTRIC COOPERATIVE, INC. SERVICE RULES AND REGULATIONS

POLICY SUMMARY FORM. Unit(s) Responsible for Policy Implementation: Vice President for Finance and Administration

THE CHILDREN'S MERCY HOSPITAL ADMINISTRATIVE POLICY

POLICY SUMMARY FORM. Unit(s) Responsible for Policy Implementation: Vice President for Finance and Administration

CHAPTER 22 MANDATED POLICIES ARTICLE I IDENTITY THEFT PREVENTION POLICY

Identity Theft Prevention Program. FY17 Core Training

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016

Transcription:

POLICY SUMMARY FORM Policy Name: Identity Theft Prevention Policy Number: 14.5 Is this policy new, being reviewed/revised, or deleted? Review/Revise Date of last revision, if applicable: April 14, 2015 Unit(s) Responsible for Policy Implementation: Vice President for Finance and Administration Purpose of Policy (what does it do): Establish an identity theft programs in order to detect, prevent and mitigate identity theft. Reason for the addition, revision, or deletion (check all that apply): Scheduled Review Change in law Response to audit finding Internal Review Other, please explain: Please complete the appropriate section: Specific rationale for new policy: Specific rationale for each substantive revision: No substantive changes Specific rationale for deletion of policy: Additional Comments: Reviewers: Judith Kruwell, Director of Financial Services Michaelyn Greene, Director of Administrative Services Danny Gallant, Vice President for Finance and Administration

Identity Theft Prevention Original Implementation: April 21, 2009 Last Revision: April 14, 2015April 24, 2018 Purpose The purpose of this policy is to establish an Identity Theft Program ( program ) designed to detect, prevent and mitigate identity theft in connection with covered accounts and to provide continued administration of the program in compliance with applicable regulations. The program will include reasonable procedures to: 1. Identify risks that signify potentially fraudulent activity within new or existing covered accounts; 2. Detect risks when they occur in covered accounts; 3. Respond to risks if fraudulent activity has occurred and act if fraud has been attempted or committed; and 4. Update the program periodically to reflect changes in risks to students, covered accounts and previous experience with identity theft. This policy is in addition to any other information security policies currently at Stephen F. Austin State University. Definitions Identity Theft means fraud committed or attempted using the identifying information of another person without authority. Covered account means: 1. An account that the university offers or maintains, primarily for personal, family, or household purposes, that involves or is designed to permit multiple payments or transactions; and 2. Any other account that the university offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the financial institution or creditor from identity theft, including financial, operational, compliance, reputation, or litigation risks. Red Flag means a pattern, practice, or specific activity that indicates the possible existence of identity theft. Red Flag Rules are rules issued by the Federal Trade Commission (FTC) on November 7, 2007 regarding identity theft. These rules implement Sections 114 and 115 of the Fair and Accurate 14.5 Identity Theft Prevention Page 1 of 4

Credit Transactions Act and require certain policies and procedures be developed that are designed to detect, prevent and mitigate identity theft. Service Provider means a person that provides a service directly to the university. Elements oof tthe Pprogram Identification of Red Flags The program includes relevant red flags from the following categories as appropriate: 1. Alerts, notifications, or warnings from a credit reporting agencies; 2. The presentation of suspicious documents; 3. The presentation of suspicious personal identifying information; 4. Unusual use of, or suspicious activity related to, the covered account. Detecting Red Flags The program addresses the detection of red flags in connection with the opening of covered accounts and existing covered accounts by: 1. Obtaining identifying information about, and verifying the identity of, a person opening a covered account; and 2. Authenticating customers, monitoring transactions, and verifying the validity of change of address requests in the case of existing covered accounts. Responding to Fraudulent Activity Once potentially fraudulent activity is detected, an employee must act quickly, as a rapid appropriate response can protect employees, students, and the university from damages and loss. 1. The employee will gather all related documentation and present this information to his/her immediate supervisor. 2. The supervisor will complete additional authentication to determine whether the attempted transaction was fraudulent or authentic, and will respond appropriately. 3. If the activity is deemed fraudulent, procedures as outlined in the university Fraud Policy (2.7) will be followed. Periodic Updates to Program At periodic intervals established in the program, or as required, the program will be re-evaluated to determine whether all aspects of the program are up to date and applicable in the current 14.5 Identity Theft Prevention Page 2 of 4

business environment. Periodic reviews may include an assessment of: 1. The types of covered accounts offered or maintained; 2. The methods provided to open covered accounts; 3. The methods provided to access covered accounts; 4. Previous experience with identity theft; 5. Red flags as identified above and the need to define new red flags; and 6. Response procedures defined above and their efficacy to reduce damage to the university and its customers. Program Administration Oversight of the Program Oversight of the program will lie with the vice president forof finance and administration. The vice president for finance and administration will be responsible for appointing a program officer with the specific responsibility for the program s development, implementation, and administration; reviewing reports prepared by staff regarding compliance with red flag rules; and approving material changes to the program as necessary to address changing identity theft risks. Reports The program officer responsible for the development, implementation, and administration of the program will report, in writing, to the vice president for finance and administration at least annually on program compliance. The report should address such issues as: the effectiveness of the policy and procedures in addressing the risk of identity theft in connection with covered accounts; service provider arrangements; significant incidents involving identity theft and management s response and recommendations for material changes to the program. Staff Training Staff, officials, and contractors for whom it is reasonably foreseeable may come into contact with covered accounts or personally identifiable information that may constitute a risk to the university or its customers must complete the red flag training to ensure compliance with the identity theft prevention policy. Oversight of Service Provider Arrangements It is the responsibility of the university to ensure that the activities of all service providers are conducted in accordance with reasonable policies and procedures designed to detect, prevent, and mitigate the risk of identity theft. Contractual arrangements with service providers should 14.5 Identity Theft Prevention Page 3 of 4

specifically require the service provider to maintain its own identity theft prevention program consistent with the guidance of the red flag rules. Cross Reference: Fair and Accurate Credit Transactions Act of 2003; 16 CFR 681; Fraud (2.7) Responsible for Implementation: Vice President for Finance and Administration Contact for Revision: Vice President for Finance and Administration Forms: None Board Committee Assignment: Finance and Audit 14.5 Identity Theft Prevention Page 4 of 4