B. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.

Similar documents
PROCEDURE. This procedure is intended to identify third party arrangements and red flags involving College activities that will:

Clarion University Identity Theft Prevention Program

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009

Note: Action items are italicized

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;

University Identity Theft and Detection Program

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan

POLICY: Identity Theft Red Flag Prevention

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

Financial Transaction

IDENTITY THEFT RED FLAGS AND RESPONSES

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial

Prevention of Identity Theft in Student Financial Transactions

Identity Theft Prevention Program

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT

University of Connecticut IDENTITY THEFT PREVENTION PROGRAM

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program

Illinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College

Identity Theft Prevention Program

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Riverside Community College District Policy No Student Services PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Minnesota State Colleges and Universities Identity Theft Prevention Program

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Identity Theft Prevention Program Procedure

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag

Middlebury College Identity Theft Prevention Program

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010

Middlebury Institute of International Studies Identity Theft Prevention Program

Number: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance

Identity Theft Prevention Program (DRAFT)

IDENTITY THEFT DETECTION POLICY

UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION

ADMINISTRATIVE POLICY STATEMENT

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND

LexisNexis Developing an Effective Red Flags Rule Program

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

CoreLogic Credco First American Way Poway, CA (800)

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.

Red Flags Rule Identity Theft Training Program

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008

AUDIT AND FINANCE COMMITTEE Wednesday, June 17, 2009

Identity Theft Prevention Program

30.17 Identity Theft Protection Policy October 2018

ORGANIZATIONAL MANUAL

Secure Opening Plus Requirements for the Identity Theft Red Flag Program

Jack Byrne Ford & Mercury Identity Theft Program (ITPP)

Identity Theft Prevention. Red Flags. Training Program

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper

Attachment to Identity Theft Prevention Service Provider Attestation

UM Identity Theft Protection Policy

CITY OF ISSAQUAH. Identity Theft Prevention Program

Olivet Nazarene University Identity Theft Prevention Program

POLICY SUMMARY FORM. Unit(s) Responsible for Policy Implementation: Vice President for Finance and Administration

Procedure for Identity Theft Prevention Program

Chapter 3. Identifying Red Flags. 3:1 Overview

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

LOUISIANA COMMUNITY & TECHNICAL COLLEGE SYSTEM Policy # Title: IDENTITY THEFT PREVENTION PROGRAM

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM

Eastpointe Community Credit Union Identity Theft and Deterrence Policy

RED FLAGS IDENTITY THEFT PREVENTION PROGRAM. Raleigh Radiology, LLC. Raleigh Radiology Associates. January 21, 2009

RED FLAG RULES ANNUAL REPORT TO MAYOR AND COUNCIL

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

Templeton Municipal Light and Water Plant

(2) Detect red flags that have been incorporated into the program;

Identity Theft Prevention Program

The New England College of Optometry Identity Theft Prevention Program October 30, 2009 _

MEMORANDUM. Red Flag Identity Theft Regulations: Implications for Nursing Facilities and Assisted Living Facilities 1

The National Association of Community Health Centers, Inc. Issue Brief on. Complying with the FTC s Red Flag Rules. February, 2009

Polson/ Ronan Ambulance Service Identity Theft Prevention Program

Medical Identity Theft Prevention Policy

Identity Theft Prevention Program Lake Forest College Revision 1.0

MID-CAROLINA ELECTRIC COOPERATIVE, INC. SERVICE RULES AND REGULATIONS

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

THE CHILDREN'S MERCY HOSPITAL ADMINISTRATIVE POLICY

The Federal Identity Theft Red Flag Rules and North Carolina Local Health Departments

The FACT Act An Overview

Drexel and FMFCU. Presented By

Identity Theft Prevention Program Red Flag Rule

McDonald Hop kins. January 23, Office of Washington Attorney General Consumer Protection Division 800 5th Ave, Suite 2000 Seattle, WA

Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009

NEW FTC RED FLAG REQUIREMENTS AS APPLICABLE TO CREDITORS AND COVERED ACCOUNTS

AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE

Identity Theft Protection Plans

Experian fraud alert phone number Address Submit

Red Flags Identity Theft Plan Bay Equity LLC Table of Contents Section 1 Overview of the Compliance Program... 5 Section 2 Terminology...

What is Credit Monitoring?

August 31, 2016 VIA AND OVERNIGHT MAIL

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations

Identity thieves use a variety of ways to gain access to your personal information:

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

Transcription:

COLLEGE of CENTRAL FLORIDA ADMINISTRATIVE PROCEDURE Title: Identity Theft Prevention Program Procedure Page 1 of 5 Implementing Procedure For Policy # # 2.04 Date Approved: 07/07/11 Division: Administration and Finance Purpose This Program is intended to identify third party arrangements and red flags that will alert College employees when new or existing billing accounts are opened using false information, protect against the establishment of false student accounts, methods to ensure existing accounts were not opened using false information, and measures to respond to such events. Within the context of this procedure, Red Flag means a pattern, practice, or specific activity that indicates the possible existence of identity theft. Scope This procedure applies to covered accounts, credit report usage, and third party service arrangements within the Identity Theft Red Flags rule. 1. Scope and General Guidelines A. Covered Accounts under the Red Flags Rule is a consumer account that involves multiple payments or transactions, such as a loan that is billed or payable monthly, or multiple payments in arrears, in which a continuing relationship is established. Certain payment arrangements, such as payment of tuition in full at the beginning of each semester either by the student s family or through a third-party student loan provider (see also, section 3 Oversight of Third Party ), does not meet the "continuing relationship" standard in the "covered account" definition. B. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered. C. C. The procedure also applies when the College uses consumer reports to conduct background checks on prospective employees (e.g. College Administrators) and students.

Identity Theft Prevention Program Procedure Page 2 2. Responsibilities and Delegation of Authority This Program is intended to identify red flags that will alert College employees when new or existing billing accounts are opened using false information, protect against the establishment of false student accounts, methods to ensure existing accounts were not opened using false information, and measures to respond to such events. The Vice President is responsible for the oversight of the Program. The Chief Information Officer and the Assistant Vice President, Finance are responsible for an annual review of the Program. 3. Internal Risk Assessment College of Central Florida will conduct random risk assessments to evaluate how at risk the current procedures are at allowing students to create a fraudulent account and evaluate if current (existing) student accounts are being manipulated. This risk assessment evaluates how new accounts are opened and the methods used to access the account information. This risk assessment also includes third party service arrangements used as part of the hiring process. Using this information the College is able to identify areas of highest risk for review and compliance: New accounts opened In Person New accounts opened via Web Account information accessed In Person Account information accessed via Telephone Account information accessed via Web Site Delinquent accounts placed with an outside collection agency Oversight of Third Party Service Providers: The College will, as part of its contracts with third party service providers (for example, collection agencies), require as part of the contract that these providers have policies, procedures and programs that comply with the Red Flag Rule. Further, Service providers must notify the College of any security incidents they experience, even if the incidents may not have led to an actual compromise of the College s applicant data.

Identity Theft Prevention Program Procedure Page 3 4. Identifying Red Flags The College adopts the following red flags to detect potential fraud. These are not intended to be all-inclusive and other suspicious activity may be investigated as necessary. Fraud or active duty alerts included with consumer reports Notice of credit freeze provided by consumer reporting agency Notice of address discrepancy provided by consumer reporting agency Inconsistent activity patterns indicated by consumer report such as: o Recent and significant increase in volume of inquiries o Accounts placed on hold for financial delinquency Identification documents appear to be altered Photo and physical description do not match appearance of applicant Other information is inconsistent with information provided by applicant Other information provided by applicant is inconsistent with information on file. Application appears altered or destroyed and reassembled Personal information provided by applicant does not match other sources of information (e.g. credit reports, SS# not issued or listed as deceased) Lack of correlation between the SS# range and date of birth Information provided is associated with known fraudulent activity (e.g. address or phone number provided is same as that of prior fraudulent activity) Information commonly associated with fraudulent activity is provided by applicant (e.g. address that is a mail drop or prison, non-working phone number or associated with answering service/pager) SS#, address, or telephone # is the same as that of other applicant at College Applicant fails to provide all information requested Personal information provided is inconsistent with information on file for applicant Applicant cannot provide information requested beyond what could commonly be found in a purse or wallet Identity theft is reported or discovered 5. Response to Attempted/Suspected Fraudulent Use of Identity Any employee that may suspect fraud or detect a red flag will implement the following response as applicable. All detections or suspicious red flags shall be reported to their cognizant Administrator and the Chief Information Officer/Assistant Vice President, Finance. Internal Notification Any College employee who becomes aware of a suspected or actual fraudulent use of a customer or potential customers identity must notify their cognizant Administrator who will then notify the Chief Information Officer/Assistant Vice President, Finance.

Identity Theft Prevention Program Procedure Page 4 External Notification Affected Individual The College will notify the affected individual(s), if possible, of any actual identity theft. The following information will be included in the notice: General information about the incident; The type of identifying information involved; The College telephone number that the affected individual can call for further information and assistance; The local Law Enforcement Agency with proper jurisdiction; The Federal Trade Commission (FTC) Telephone Number: 877-438-4338 and the FTC ID Theft website: http://www.consumer.gov/idtheft Advise affected individual to place fraud alerts on their credit reports by contacting the Credit Reporting Agencies: o Equifax: (800) 525-6285 or http://www.equifax.com o Experian: (800) 397-3742 or http://www.experian.com o TransUnion: (800) 916-8800 or http://www.transunion.com Method of Contact: Written notice: certified mail to last known good address if identity theft involves alteration of correct address of record. Telephone: provided the contact is made directly with the verified, affected person and appropriately documented. Local Law Enforcement: In all cases, the College will notify College Public Safety and Local Law Enforcement having proper jurisdiction of any attempted or actual identity theft. 6. Employee Training The College will implement periodic training to emphasize the importance of meaningful data security practices and to create a culture of security. The College acknowledges that a well-trained workforce is the best defense against identity theft and data breaches. Annually, explain the Program rules to relevant staff, and train them to spot security vulnerabilities, and update them about new risks and vulnerabilities. Inform employees of College s Appropriate Use Procedure # 3.25. Inform employees of College s Fraud Procedure #2.04. Inform employees of FERPA Guidelines. Advise employees that violation of the College s security policies is grounds for discipline, up to, and including, dismissal.

Identity Theft Prevention Program Procedure Page 5 7. Identity Theft Prevention Program Review and Approval The Chief Information Officer/Assistant Vice President, Finance will review the program at least annually, or after each and every attempt of identity theft. A report will be prepared annually and submitted to the Vice President to include matters related to the program, the effectiveness of the policies and procedures, the oversight and effectiveness of any third party billing and account establishment entities, a summary of any identify theft incidents and the response to the incident, and recommendations for substantial changes to the program, if any. Vice President. Administration & Finance Date Approved by President Date