UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION

Similar documents
LOUISIANA COMMUNITY & TECHNICAL COLLEGE SYSTEM Policy # Title: IDENTITY THEFT PREVENTION PROGRAM

Minnesota State Colleges and Universities Identity Theft Prevention Program

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

IDENTITY THEFT DETECTION POLICY

Identity Theft Prevention Program

30.17 Identity Theft Protection Policy October 2018

(2) Detect red flags that have been incorporated into the program;

Middlebury Institute of International Studies Identity Theft Prevention Program

POLICY SUMMARY FORM. Unit(s) Responsible for Policy Implementation: Vice President for Finance and Administration

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030

Financial Transaction

Middlebury College Identity Theft Prevention Program

Prevention of Identity Theft in Student Financial Transactions

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT

The New England College of Optometry Identity Theft Prevention Program October 30, 2009 _

Identity Theft Prevention Program

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program

Olivet Nazarene University Identity Theft Prevention Program

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Identity Theft Prevention Program Procedure

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag

Note: Action items are italicized

Riverside Community College District Policy No Student Services PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial

Clarion University Identity Theft Prevention Program

University of Connecticut IDENTITY THEFT PREVENTION PROGRAM

Attachment to Identity Theft Prevention Service Provider Attestation

Identity Theft Prevention Program (DRAFT)

ORGANIZATIONAL MANUAL

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program

Identity Theft Prevention Program

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE

Identity Theft Prevention. Red Flags. Training Program

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;

UM Identity Theft Protection Policy

POLICY: Identity Theft Red Flag Prevention

Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.

AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009

Procedure for Identity Theft Prevention Program

University Identity Theft and Detection Program

Illinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College

The National Association of Community Health Centers, Inc. Issue Brief on. Complying with the FTC s Red Flag Rules. February, 2009

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM

Jack Byrne Ford & Mercury Identity Theft Program (ITPP)

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

CENTRAL MICHIGAN UNIVERSITY CHAPTER 13

Number: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance

Red Flags Rule Identity Theft Training Program

SCOPE AND APPLICABILITY: This policy is applicable to all University faculty and staff.

The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments

NEW FTC RED FLAG REQUIREMENTS AS APPLICABLE TO CREDITORS AND COVERED ACCOUNTS

B. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.

CITY OF ISSAQUAH. Identity Theft Prevention Program

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008

Identity Theft Prevention Program Lake Forest College Revision 1.0

The FACT Act An Overview

LexisNexis Developing an Effective Red Flags Rule Program

Polson/ Ronan Ambulance Service Identity Theft Prevention Program

PROCEDURE. This procedure is intended to identify third party arrangements and red flags involving College activities that will:

Identity Theft Prevention Program Red Flag Rule

CoreLogic Credco First American Way Poway, CA (800)

ADMINISTRATIVE POLICY STATEMENT

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

RED FLAGS IDENTITY THEFT PREVENTION PROGRAM. Raleigh Radiology, LLC. Raleigh Radiology Associates. January 21, 2009

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper

FOX VALLEY ORTHOPEDICS. Identity Compliance Program

Eastpointe Community Credit Union Identity Theft and Deterrence Policy

Chapter 3. Identifying Red Flags. 3:1 Overview

Identity Theft Prevention Program

IDENTITY THEFT RED FLAGS AND RESPONSES

Driven. FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 L50

CLIENT UPDATE SEC AND CFTC ISSUE FINAL RULES ON IDENTITY THEFT PROTECTION

RED FLAG RULES ANNUAL REPORT TO MAYOR AND COUNCIL

Templeton Municipal Light and Water Plant

Audit Committee Meeting

Medical Identity Theft Prevention Policy

Compliance With the Red Flags Rules

CHAPTER 22 MANDATED POLICIES ARTICLE I IDENTITY THEFT PREVENTION POLICY

MEMORANDUM. Red Flag Identity Theft Regulations: Implications for Nursing Facilities and Assisted Living Facilities 1

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

Secure Opening Plus Requirements for the Identity Theft Red Flag Program

RED FLAG LAW made EASY! HIPAA made EASY. Training, Implementation & Sign-off Sheets

MID-CAROLINA ELECTRIC COOPERATIVE, INC. SERVICE RULES AND REGULATIONS

Identity Theft Prevention Program. FY17 Core Training

Regulatory Notice 08-18

The Red Flags Rule: Key Points and Safe Harbors. Jill Moore April 2009

Transcription:

UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION Responsible Department: Provost and Business and Financial Affairs Recommended By: Provost, VC Business and Financial Affairs Approved By: Chancellor Policy Number 2.30.060 Effective Date 6/8/2018 I. INTRODUCTION Pursuant to the Federal Trade Commission s (FTC) Red Flags Rule implementing Sections 114 and 315 of the Fair and Accurate Credit Transactions Act (FACTA) of 2003, the University is required to establish and administer an Identity Theft Prevention Program (Program). This Identity Theft Prevention Program Policy defines the requirements to build a compliant Program designed to detect, prevent and mitigate Identity Theft associated with the University s operations and account systems and the nature and scope of the University s activities. II. POLICY OVERVIEW As stated in Process Overview. III. PROCESS OVERVIEW A. Required Policies and Procedures The University shall implement reasonable policies and procedures to: 1. Identify relevant Red Flags for new and existing Covered Accounts and incorporate those Red Flags into the Program; 2. Detect Red Flags that have been incorporated into the Program; 3. Respond appropriately to any Red Flags that are detected to prevent and mitigate Identity Theft; and 4. Ensure the Program is updated periodically to reflect changes in risks to Customers or to the safety and soundness of the University from Identity Theft. Page 1 of 5

B. Oversight The Vice Chancellor for Business and Financial Affairs, or his designee, shall be responsible for the delegation of a Program Administrator. The Program Administrator shall: 1. Be responsible for the development, implementation, oversight and continued administration of the Program; 2. Review reports prepared by staff regarding compliance with the Program; 3. Recommend and approve all changes to the Program to address changing risks of Identity Theft, as necessary; and 4. Exercise appropriate and effective oversight of Service Provider arrangements. C. Identification of Red Flags In order to identify relevant Red Flags, each University department shall consider the types of accounts that it offers and maintains, methods it provides to open said accounts, methods it provides to access said accounts, and its previous experiences with Identity Theft in the development of procedures implementing this Policy. The Program shall identify relevant Red Flags from the following categories, as appropriate: 1. Alerts, notifications, or other warnings received from consumer reporting agencies, or Service Providers (e.g., fraud detection services); 2. The presentation of suspicious documents; 3. The presentation of suspicious personal identifying information; 4. The unusual use of, or other suspicious activity related to, a Covered Account; and 5. Notice from Customers, victims of Identity Theft, law enforcement authorities, or other persons regarding possible Identity Theft in connection with a Covered Account. Page 2 of 5

When implementing the Program, each University department shall consider the following Risk Factors in identifying relevant Red Flags for Covered Accounts, as appropriate: 1. The types of Covered Accounts offered or maintained; 2. The methods provided to open Covered Accounts; 3. The methods provided to access Covered Accounts; and 4. Any previous experiences with Identity Theft. The Program implementing policies and procedures shall incorporate relevant Red Flags from sources such as: 1. Incidents of Identity Theft previously experienced; 2. Methods of Identity Theft that reflect changes in risk; and 3. Applicable supervisory guidance. D. Detecting & Preventing Red Flag Events Methods of detection of Red Flags identified in Section 2.2, Identification of Red Flags, shall be established and defined within each implementing policy or procedure and shall include the following, as appropriate: 1. Obtaining identifying information about and verifying the identity of an individual opening a new or accessing an existing Covered Account, enrolling as a student at the University, or applying for a position of employment or volunteer for which a credit or background report is sought; and 2. Authenticating individuals, monitoring transactions, and verifying the validity of a change of address request. In order to mitigate and prevent Identity Theft, methods of responding to detected Red Flags shall also be established and defined within each implementing policy or procedure. Appropriate responses may include: 1. Monitor a student or Covered Account for evidence of Identity Theft; 2. Contact the individual whose identity may be at risk; 3. Change in any passwords, security codes or other security devices that permit access to Covered Accounts; Page 3 of 5

4. Re-open a Covered Account with a new account; 5. Close an existing Covered Account; 6. Notify law enforcement; or 7. Determine no response is warranted under the particular circumstances. E. Program Administration & Management To effectively implement the Program, University staff responsible for the implementation of associated policies and procedures shall be trained, as necessary, either by or under the direction of the Program Administrator in the detection of Red Flags and the responsive steps to be taken when a Red Flag is detected. Program trained University staff shall notify the Program Administrator once an incident of Identity Theft has occurred and/or the University failed to comply with the established Program. At least annually, or at the request of the Program Administrator, Program trained University staff shall report on the University s compliance with the Program to the Board of Trustees, an appropriate committee of the Board of Trustees, or a designated employee at the level of senior management. The report shall address matters related to the Program (e.g., effectiveness of the policies and procedures relating to the management, and mitigation and response to Red Flag; Service Provider arrangements; significant incidents involving identity theft and management s response) and recommendations for changes to the Program. The activity of all Service Providers performing an activity in connection with one or more Covered Accounts shall be conducted in accordance with reasonable policies and procedures designed to detect, prevent and mitigate the risk of Identity Theft. The Program shall be periodically reviewed and updated to reflect changes in risks to students and the soundness of the University from Identity Theft based on factors such as: 1. The experiences of the organization with Identity Theft; 2. Changes in methods of Identity Theft; 3. Changes in methods to detect, prevent and mitigate Identity Theft; 4. Changes in the types of accounts that the organization offers or maintains; and 5. Changes in the business arrangements of the University. Page 4 of 5

IV. DEFINITIONS 1. Covered Account - An account which is primarily for personal, family, or household purposes, that involves or is designed to permit multiple payments or transactions, includes items such as a student s tuition account, a student's ID card account (if financial transactions occur on said account), a student's financial aid account, an employee's payroll account, an employee's human resources file relating to a Social Security number, etc.; and any other account that the University offers or maintains for which there is a reasonably foreseeable risk to Customers or to the safety and soundness of the University from identity theft, including financial, operational, compliance, reputation, or litigation risks. 2. Customer - means a person that has a Covered Account with the University. 3. Identity Theft - Fraud committed or attempted using the identifying information of another individual without permission or authority. 4. Red Flag - A pattern, practice or specific activity that indicates the possible existence of Identity Theft. 5. Service Provider - A person that provides a service directly to the University. Page 5 of 5