Wheaton College Audit Committee Red Flag Identity Theft Prevention Program Meeting of February 20, 2009

Size: px
Start display at page:

Download "Wheaton College Audit Committee Red Flag Identity Theft Prevention Program Meeting of February 20, 2009"

Transcription

1 Wheaton College Audit Committee Red Flag Identity Theft Prevention Program Meeting of February 20, 2009 Late last year, the Federal Trade Commission (FTC) and Federal banking agencies issued a regulation known as the Red Flags Rule intended to reduce the risk of identity theft. Parts of the rule cover Wheaton College and therefore the college must develop and implement a written identify theft prevention program by May 1, The board of directors (or appropriate board committee) must approve the initial written program. Board approval may be necessary only for the first written program if the board delegates to appropriate senior management further responsibility. The college has attached a written policy of for an identity theft prevention program for your approval. Once approved operational responsibility of the program will be delegated to appropriate senior management for further responsibility.

2 Wheaton College s Red Flag Identity Theft Prevention Program The Federal Trade Commission (FTC) issued a regulation known as the Red Flag Rule (Sections 114 and 315 of the Fair and Accurate Credit Transactions Act), to be implemented no later than May 1, 2009 that is intended to reduce the risk of identity theft. This policy is intended to detect, prevent, and mitigate opportunities for identity theft at Wheaton College. The Red Flag Rule applies to Wheaton due to our participation in the Perkins Loan program, our small institutional loan program, our extension of credit for student accounts, and the fact that we request credit reports for some potential employees. Our analysis of the type and scope of activity covered in the regulation, and our risk assessment of potential identity theft opportunities has resulted in a determination that there is a low level risk of possible identity theft at Wheaton College. Scope of Covered Activities Participation in Federal Perkins Loan Program Wheaton - small Institutional student loan program Payment plans and promissory notes for covered student accounts Credit reports in employee hiring process Existing Policies and Practices Many offices at Wheaton College maintain files, both electronic and paper, of student biographical, academic, health, financial, and admission records. These records may also include student billing information, Perkins Loan records, and personal correspondence with students and parents. Policies to insure compliance with Gramm-Leach-Bliley Act (GLB), Family Educational Rights and Privacy Act (FERPA), and Payment Card Industry security standards (PCI), system and application security, and internal control procedures provide an environment where identify theft opportunities are mitigated. Records are safeguarded to ensure the privacy and confidentially of student, parents, alumni and employees. The Office of Human Resources performs credit and criminal background checks on some potential employees prior to their date of hire. This population includes any staff member who has unsupervised access to residence halls, and employees whose positions require them to have regular access to cash, and/or who have computer access to payroll data. Access to this information is very limited and procedures to safeguard the data are in place. Parents may obtain non-directory information (e.g. grades, academic standing, etc.) at the discretion of the institution and after it is determined that the student is legally dependent of either parent. Staff who have access to HR and Payroll data have been versed on the policy of the college that non-directory information regarding employees is not be provided unless approved in writing by the employee. Draft for Audit Committee Approval - February 20, 2009

3 Students are required to give written authorization to the Office of the Registrar if their information is permitted to be shared with another party. An Annual Notification to Students of their rights under FERPA is sent out to students each year. Students are given the opportunity to update their billing addresses for third party billing (parents, companies, scholarship foundations, etc). Occasionally, the college will extend short term credit to a student for payment of their tuition bill which thus creates a covered account. The student signs a short term promissory note, which is stored in a secured area. Students must make a change of address in person at the Office of the Registrar, or during sign-in through the secure self-service application in Banner. Access to non-directory student data in Wheaton s Banner system is restricted to those employees of the college with a need to properly perform their duties. These employees are trained to know FERPA and Red Flag regulations. Social Security numbers are not used as identification numbers and these data are classified as non-directory student data. All paper files are required to be maintained in locked filing cabinets when not in use. All offices, when not occupied, are to be locked. Access to non-directory employee data in Wheaton s Human Resources and Payroll systems is restricted to only those employees of the college who need this access to properly perform their duties. These employees are also trained to know FERPA and Red Flag regulations. Staff is requested to report all changes in name, address, telephone or marital status to the Human Resources Office as soon as possible; they also must periodically verify those persons listed as contacts in case of an emergency, and those persons designated as beneficiaries to life and/or retirement policies. The college is sensitive to the personal data (unlisted phone numbers, dates of birth, etc.) that it maintains in its personnel files and databases. We will not disclose personal information, except by written request or signed permission of the employee (for example, the Campus Directory), or unless there is a legitimate business "need-to-know", or if compelled by law. Every effort is made to limit the access to private information to those employees on campus with a legitimate "need-to-know." Staff who have approved access to the administrative information databases understand that they are restricted in using the information obtained only in the conduct of their official duties. The inappropriate use of such access and/or use of administrative data may result in disciplinary action up to, and including, dismissal from the College. The college's official personnel files for all employees are retained in the Human Resources Office. Employees have the right to review the materials contained in their personnel file. Draft for Audit Committee Approval - February 20, 2009

4 Detecting Red Flag Activity Address discrepancies Presentation of suspicious documents Photograph or physical description on the identification is not consistent with the appearance of the person presenting the identification Personal identifying information provided is not consistent with other personal identifying information on file with the college Documents provided for identification that appear to have been altered or forged Unusual or suspicious activity related to covered accounts Notification from students, borrowers, law enforcement, or service providers of unusual activity related to a covered account Notification from a credit bureau of fraudulent activity Responding to Red Flags Should an employee identify a red flag (patterns, practices and specific activities that signal possible identify theft), they are instructed to bring it to the attention of their department head immediately. The administrator will investigate the threat of identity theft to determine if there has been a breach and will respond appropriately to prevent future identity theft breaches. Additional actions may include notifying and cooperating with appropriate law enforcement and notifying the student or employee of the attempted fraud. Oversight of Service Providers Wheaton College employs Campus Partners, a Perkins Loan servicer, for the purpose of billing and collection of Perkins and Wheaton institutional loan payments. The only information that is shared with Campus Partners is information required to properly bill and collect loan payment as established by the Department of Education. This includes student name, address, telephone number, social security number, and date of birth. Wheaton College will collect and maintain on file documents from Campus Partners confirming their compliance with Red Flag Rules. Wheaton College uses external collection agencies for the purpose of collecting overdue student receivables and defaulted Perkins Loans. The only information that is shared with the collection agencies is that information required to perform credit checks, to perform address searches, and to properly bill and collect payment. This includes student name, address, telephone number, social security number, and date of birth. Wheaton College will collect and maintain on file documents from all collection agencies regarding their compliance with Red Flag Rules. Wheaton College employs Tuition Management Services (TMS), a tuition billing service, for monthly tuition payment plans. The only data that is shared with the TMS is information relating to the tuition payment plan established by the student or parent. Wheaton College will collect and maintain on file documents from TMS confirming their compliance with Red Flag Rules. Draft for Audit Committee Approval - February 20, 2009

5 Periodic Update of Plan This policy will be re-evaluated on or about the first day of each calendar year to determine whether all aspects of the program are up to date and applicable in the current business environments, and revised as necessary. Operational responsibility of the program is delegated to the the Asst. VP for Finance and the Asst. VP for Enrollment and SFS. Draft for Audit Committee Approval - February 20, 2009

6 FTC's Red Flag Rule Likely to Affect Colleges Print September 23, 2008 Identity Theft "Red Flags Rule" -- November 1 Compliance Date Nears By Elizabeth B. Meers and Daniel S. Meade Late last year, the Federal Trade Commission (FTC) and Federal banking agencies issued a regulation known as the Red Flags Rule intended to reduce the risk of identify theft. Mandatory compliance with the Red Flags Rule for "creditors" or "financial institutions" that provide "covered accounts" begins on November 1, Parts of the rule likely cover many colleges and universities, and as discussed below, the FTC has stated that nonprofit and government entities can be subject to parts of the rule. Institutions should consult with their legal counsel on applicability of the rule and should consider establishing a security program consistent with it. Background on Red Flags Rule The FTC issued the Red Flags Rule under sections 114 and 315 of the Fair and Accurate Credit Transactions Act (FACT Act), which amended the Fair Credit Reporting Act (FCRA). The rule requires "financial institutions" and "creditors" that hold "covered accounts" to develop and implement an identity theft prevention program" for new and existing accounts. The Red Flags Rule is actually three different but related rules, one or two of which apply to many colleges and universities: (1) Debit and credit card issuers must develop policies and procedures to assess the validity of a request for a change of address that is followed closely by a request for an additional or replacement card. (This provision is likely not applicable to colleges and universities, because, as discussed in the preamble to the Red Flags Rule, the definition of "debit card" specifically does not include stored value cards. However, this provision could implicate student ID s that also can be used as part of a national debit card network, such as Visa or MasterCard.) (2) Users of consumer reports must develop reasonable policies and procedures to apply when they receive notice of an address discrepancy from a consumer reporting agency. (This provision applies to colleges and universities when they use consumer reports to conduct credit or background checks on prospective employees or applicants for credit.) (3) Financial institutions and creditors holding "covered accounts" must develop and implement a written identity theft prevention program for both new and existing accounts. (This provision likely applies to many colleges and universities). Application of Red Flags Rule to Colleges and Universities as Creditors The Red Flags Rule defines the terms "creditor" and "covered accounts" broadly. A "creditor" under the Red Flags Rule includes any person who defers payment for services rendered, such as an organization that bills at the end of the month for services rendered the previous month. Although the FTC, in many contexts, does not have jurisdiction over not-for-profit entities, it has taken the position that not-for-profits are subject to FTC jurisdiction when they engage in activities in which a for-profit entity would also engage. In its July 2008 guidance, the FTC stated

7 "[w]here non-profit and government entities defer payment for goods or services, they, too, are to be considered creditors." Activities that could cause colleges and universities to be considered "creditors" under the Red Flags Rule may include, for instance: participating in the Federal Perkins Loan program, participating as a school lender in the Federal Family Education Loan Program, offering institutional loans to students, faculty, or staff, or offering a plan for payment of tuition throughout the semester rather than requiring full payment at the beginning of the semester. Under the rule, if an institution is a creditor, the institution must determine if any of its extensions of credit are "covered accounts." Basically, a covered account is a consumer account that involves multiple payments or transactions, such as a loan that is billed or payable monthly. The Red Flags Rule and the FTC s guidance on it indicate that covered accounts include certain types of arrangements in which an individual establishes a "continuing relationship" with the enterprise, including billing for previous services rendered. Certain payment arrangements, such as payment of tuition in full at the beginning of each semester either by the student s family or through a third-party student loan provider, likely does not meet the "continuing relationship" standard in the "covered account" definition. Any type of account or payment plan that involves multiple transactions or multiple payments in arrears, however, likely is a "covered account." Steps to be Taken by Colleges and Universities Covered by the Red Flags Rule Under the rule, creditors that hold covered accounts must develop an identity theft prevention program that includes reasonable policies and procedures to detect or mitigate identity theft and enable a creditor to: identify relevant "red flags" (patterns, practices, and specific activities that signal possible identity theft) and incorporate them into the program; detect the red flags that the program incorporates; respond appropriately to detected red flags to prevent and mitigate identity theft; and ensure that the Program is updated periodically to reflect changes in risks. The board of directors (or appropriate board committee) must approve the initial written program. Board approval may be necessary only for the first written program if the board delegates to appropriate senior management further responsibility. If an institution has not yet done so, it should promptly develop an identity theft prevention program for board (or board committee) approval, as the Red Flags Rule goes into effect November 1, Content of Identity Theft Prevention Program The Red Flags Rule allows for flexibility in the scope of the Identity Theft Prevention Program, depending on the creditors activities and level of identity theft risk associated with the relevant

8 covered accounts. In developing Identity Theft Prevention Programs, institutions should assess whether they have "covered accounts." This analysis and an initial risk assessment will enable the financial institution or creditor to identify accounts the Program must address and identify the risks the institution faces, based in large part on the institution s previous experiences with identity theft. The FTC has stated this risk-based approach will enable organizations to tailor their Programs appropriately. An appropriate identity theft prevention program may not need to be detailed or complex, but should be written, duly approved, and implemented. Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation, published as an appendix to the Red Flags Rule, provides an outline for developing a Program. In a supplement to the guidance, the FTC and federal banking regulators identified 26 "red flags" that may be useful to incorporate into an identity theft prevention program. Examples include: address discrepancy name discrepancy on identification and insurance information presentation of suspicious documents personal information inconsistent with information already on file unusual use or suspicious activity related to a covered account, and/or notice from customers, law enforcement or others of unusual activity related to that covered account. In addition to addressing relevant "red flags," an institution covered by the Red Flags Rule must "train staff, as necessary" to implement the identity theft prevention program effectively. According to the preamble to the rule, institutions need train only "relevant staff" and only insofar as necessary to supplement other training programs. The institution must also exercise "appropriate and effective oversight" of service provider arrangements. According to the preamble to the rule, this provision is intended to remind creditors and financial institutions that they remain responsible for compliance with the rule even if they outsource operations to a third party. The provision is also intended, however, to provide "maximum flexibility" to creditors and financial institutions in managing their service provider arrangements. Thus, a service provider that provides services to multiple creditors and financial institutions may do so in accordance with its own identity theft prevention program, as long as that program complies with the rule. Among other steps, a creditor or financial institution could require a service provider by contract to have policies and procedures to comply with the rule. Application of Red Flags Rule to "Financial Institutions" The Red Flags Rule also applies to "financial institutions," generally defined as banks, thrifts, credit unions, and other institutions that offer transaction accounts. 1 Colleges and universities that offer students the option of having their student ID also operate as a Visa or MasterCard debit card should coordinate with the bank through which such services are offered to ensure that the bank has an adequate identity theft prevention program in place. FTC Enforcement Under the FCRA, the FTC may impose civil money penalties (up to $2,500 per violation) for

9 knowing violations of the rule that constitute a pattern or practice. If the FTC finds violations of the rule to be unfair and deceptive, the FTC may also use its adjudicatory authority to issue cease and desist orders and other enforcement actions. Although there is no private right of action for noncompliance with the Red Flags Rule under the FCRA, victims of identity theft may be able to bring claims under other theories of liability such as private torts. Conclusion Many colleges and universities currently have procedures in place to flag some address discrepancies or other "red flags." The Red Flags Rule requires covered institutions to systematize these procedures, and develop a written plan, approved by the board of directors or equivalent, by November 1, *** Elizabeth Meers is a partner and Daniel Meade is an associate at Hogan & Hartson, LLP, and practice in its Education and Financial Institutions groups, respectively. NACUBO Contact: Anne C. Gross, vice president, regulatory affairs, Resources FTC Rules under 16 CFR Part 68. NACUBO has pulled out the relevant pages from the Federal Register notices and reformatted for easier reading. FTC Business Alert 1 A transaction account is a deposit or other account from which the account holder may make payments or transfers. Transaction accounts include checking accounts, negotiable order of withdrawal accounts, savings deposits subject to automatic transfers, and share draft accounts. See 12 U.S.C. 461(b)(1)(C). Return

DSU Identity Theft Prevention Policy No. DSU 802.7.001

DSU Identity Theft Prevention Policy No. DSU 802.7.001 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 IDENTITY THEFT PREVENTION DSU Policy No. 802.7.001 SOURCE: Fair and Accurate

More information

SIMMONS COLLEGE OFFICE OF THE GENERAL COUNSEL RED FLAG RULE POLICY. Background of the Federal Legislation Known as Red Flag Rule

SIMMONS COLLEGE OFFICE OF THE GENERAL COUNSEL RED FLAG RULE POLICY. Background of the Federal Legislation Known as Red Flag Rule SIMMONS COLLEGE OFFICE OF THE GENERAL COUNSEL RED FLAG RULE POLICY Background of the Federal Legislation Known as Red Flag Rule The Federal Trade Commission (FTC) has issued a regulation known as the Red

More information

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention

More information

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements 1.0 Introduction In 2003, Congress enacted the Fair and Accurate Credit Transactions Act of 2003, 15 U.S.C. Section 1681,

More information

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009 Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program

More information

California State University, Chico. Identity Theft Prevention Red Flags Program

California State University, Chico. Identity Theft Prevention Red Flags Program Identity Theft Prevention Red Flags Program Version 1.0 November 16, 2010 REVIEW/APPROVAL HISTORY Document Title: Author: Brooke F. Banks, Information Security Officer Date By Action Pages 10/30/2009 Bill

More information

IDENTITY THEFT DETECTION POLICY

IDENTITY THEFT DETECTION POLICY IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)

More information

Approved by the Audit Committee of the Board of Trustees, effective February 3, 2009.

Approved by the Audit Committee of the Board of Trustees, effective February 3, 2009. Red Flag Identity Theft Policy 1.) Policy and Program Rationale: Messiah College ( College ) has developed the Identity Theft Policy ( Policy) and Prevention Program ( Program ) pursuant to the Federal

More information

VCU Identity Theft Prevention Policy

VCU Identity Theft Prevention Policy VCU Identity Theft Prevention Policy POLICY STATEMENT AND PURPOSE Responsible Offices: Office of the Senior Vice President for Finance and Administration Office of the Provost and Vice President for Academic

More information

2.1 IDENTITY THEFT PREVENTION PROGRAM

2.1 IDENTITY THEFT PREVENTION PROGRAM Summary 2.1 IDENTITY THEFT PREVENTION PROGRAM Category: Administration Date Established: June 8, 2009 Responsible Office: Public Safety Date Last Revised: Responsible Executive: CFO/Vice President, Administrative

More information

Christopher Newport University Policy and Procedures

Christopher Newport University Policy and Procedures Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030 Date of Current Revision: Executive Oversight: Executive Vice President Contact Office: Comptroller s Office Policy:

More information

Identity theft. A fraud committed or attempted using the identifying information of another person without authority.

Identity theft. A fraud committed or attempted using the identifying information of another person without authority. SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE

More information

CFTC and SEC Jointly Propose Identity Theft Rules

CFTC and SEC Jointly Propose Identity Theft Rules CLIENT MEMORANDUM March 7, 2012 CFTC and SEC Jointly Propose Identity Theft Rules Contents Identity Theft Prevention Program...1 Entities Required to Comply...1 Financial Institutions and Creditors...

More information

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 9 Chapter 13,

More information

Questions and Answers About the Identity Theft Red Flag Requirements

Questions and Answers About the Identity Theft Red Flag Requirements Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,

More information

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority. Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade

More information

Red Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program

Red Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program Red Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program A Case Study of Sam Houston State University s Red Flag Program Dr. Kristy L. Vienne Objective Participants will: Understand

More information

University of Arkansas at Monticello Identity Theft Prevention Program

University of Arkansas at Monticello Identity Theft Prevention Program University of Arkansas at Monticello Identity Theft Prevention Program Overview The University Of Arkansas System Board Of Trustees adopted an Identity Theft Prevention Program (ITP) in compliance with

More information

CENTENARY COLLEGE POLICIES UNDER THE FAIR & ACCURATE CREDIT TRANSACTION ACT S RED FLAG RULES

CENTENARY COLLEGE POLICIES UNDER THE FAIR & ACCURATE CREDIT TRANSACTION ACT S RED FLAG RULES (FACTA) April 30, 2009 Approved by: Audit Committee of the Board of Trustees CENTENARY COLLEGE POLICIES UNDER THE A RESOLUTION ADOPTING AN IDENTITY THEFT POLICE Centenary College ( College ) developed

More information

University of Nebraska - Lincoln Identity Theft Prevention Program

University of Nebraska - Lincoln Identity Theft Prevention Program I. Purpose & Scope This program was developed pursuant to the Federal Trade Commission s (FTC) Red Flag Rules promulgated pursuant to the Fair and Accurate Credit Transactions Act (the FACT Act). The University

More information

identity TheFT PREVENTION Programs and Response

identity TheFT PREVENTION Programs and Response IDENTITY THEFT PREVENTION PROGRAM This program is launched in response to the Federal Trade Commission Red Flag Rules and Address Discrepancy Rules in conjunction with the Fair and Accurate Credit Transaction

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Eastern Kentucky University Policy and Regulation Library 6.#.#P Volume 6, Volume Title: Financial Affairs Chapter #, Chapter Title Section #, Name: Identity Theft Prevention Policy Approval Authority:

More information

01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) 01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) Authority: Board of Trustees History: Effective May 1, 2009 (approved initially April 24, 2009) Source of Authority: Related Links: Responsible Office:

More information

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM I. Purpose & Scope THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM The Identity Theft Prevention Program was developed pursuant to the Federal Trade Commission s Red Flag Rules promulgated

More information

policy All terms used in this policy that are defined in 16 C.F.R. 681.2 shall have the same meaning provided in that section.

policy All terms used in this policy that are defined in 16 C.F.R. 681.2 shall have the same meaning provided in that section. Name of Policy: Identity theft detection, prevention, and mitigation. Policy Number: 3364-15-12 Approving Officer: President Responsible Agent: Compliance Officer Scope: All University of Toledo Campuses

More information

Number: 56.300. Index

Number: 56.300. Index Identity Theft Prevention Program Section: General Operations Title: Identity Theft Prevention Program Number: 56.300 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND

More information

David Coble Internal Control Officer

David Coble Internal Control Officer WESTERN WASHINGTON UNIVERSITY S RED FLAGS IDENTITY THEFT PREVENTION PROGRAM IMPLEMENTING SECTIONS 114 AND 315 OF THE FAIR AND ACCURATE CREDIT TRANSACTIONS ACT OF 2003 David Coble Internal Control Officer

More information

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response) University of St. Thomas Identity Theft Prevention Program (Red Flags Regulation Response) Revised: January 10, 2013 Program Adoption and Administration The University of St. Thomas ( University ) established

More information

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009 Identity Theft Prevention Program Approved by the Arizona Board of Regents on May 1, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules

More information

3344-19-01 Identity theft prevention program and red flag compliance policy.

3344-19-01 Identity theft prevention program and red flag compliance policy. 3344-19-01 Identity theft prevention program and red flag compliance policy. (A) Program adoption Cleveland state university has developed this identity theft prevention program ( program ) pursuant to

More information

RESOLUTION TO ADOPT IDENTITY THEFT POLICY

RESOLUTION TO ADOPT IDENTITY THEFT POLICY RESOLUTION TO ADOPT IDENTITY THEFT POLICY WHEREAS, in late 2008 the Federal Trade Commission (FTC) and federal banking agencies issued a regulation known as the Red Flag Rule under sections 114 and 315

More information

VAN BUREN COMMUNITY MENTAL HEALTH AUTHORITY POLICIES & PROCEDURES

VAN BUREN COMMUNITY MENTAL HEALTH AUTHORITY POLICIES & PROCEDURES VAN BUREN COMMUNITY MENTAL HEALTH AUTHORITY POLICIES & PROCEDURES Title: Identity Theft Prevention Program Originated: 10/22/09 Number: I.05.02 Approved By: Executive Team DIRECTIVE: The Program was developed

More information

Facts About FACTA Red Flag Identity Theft Prevention Program

Facts About FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

Featured Article Federal Red Flag and Related Identity Theft Prevention Rules: Is Your Organization in Compliance?

Featured Article Federal Red Flag and Related Identity Theft Prevention Rules: Is Your Organization in Compliance? Featured Article Federal Red Flag and Related Identity Theft Prevention Rules: Is Your Organization in Compliance? Article contributed by: Nancy L. Perkins, Arnold & Porter LLP As of November 1, 2008,

More information

University of Alaska. Identity Theft Prevention Program

University of Alaska. Identity Theft Prevention Program University of Alaska Identity Theft Prevention Program Effective beginning October 31, 2009 I. PROGRAM ADOPTION The University of Alaska ( University ) developed this Identity Theft Prevention Program

More information

FACTA Identity Theft Red Flags Program. www.chs.acfei.com

FACTA Identity Theft Red Flags Program. www.chs.acfei.com 1 FACTA Identity Theft Red Flags Program Module 1 Fair and Accurate Credit Transactions Act Overview Identity thieves use individual s personal identifiable information to open new accounts and misuse

More information

Oregon University System Identity Theft Prevention Program Effective May 1, 2009

Oregon University System Identity Theft Prevention Program Effective May 1, 2009 Oregon University System Identity Theft Prevention Program Effective May 1, 2009 Page 2 I. PROGRAM ADOPTION The Oregon University System ( System ) developed this Identity Theft Prevention Program ("Program")

More information

University of Dayton Red Flag ID Theft Prevention Program

University of Dayton Red Flag ID Theft Prevention Program University of Dayton Red Flag ID Theft Prevention Program I. Program Adoption The University of Dayton developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM LEGAL REQUIREMENTS Section 114 of the Federal Trade Commission s Fair and Accurate Credit Transactions Act of 2003 created the Red Flags Rule. This regulation requires the College to have an Identity Theft

More information

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE. University of Cincinnati Red Flags Rule Protecting Against Identity Fraud

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE. University of Cincinnati Red Flags Rule Protecting Against Identity Fraud UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Cincinnati Red Flags Rule Protecting Against Identity Fraud Objectives Background What is the FTC Red Flags Rule? Why do we need

More information

MOTLOW STATE COMMUNITY COLLEGE

MOTLOW STATE COMMUNITY COLLEGE Page 1 of 5 MOTLOW STATE COMMUNITY COLLEGE SUBJECT: FACTA Red Flag Rule and Identity Theft Prevention Program I. BACKGROUND In late 2007 the Federal Trade Commission (FTC) and Federal banking agencies

More information

Identification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft

Identification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft George Mason University Identity Theft Prevention Program - Procedures Revised September 30, 2012 Identification of, ing, and Preventing and Mitigating Identity Theft IDENTIFICATION OF COVERED ACCOUNT

More information

Identity Theft Prevention Program Red Flag Rules Policy P093.00 Issued: May 2009

Identity Theft Prevention Program Red Flag Rules Policy P093.00 Issued: May 2009 Identity Theft Prevention Program Red Flag Rules Policy P093.00 Issued: May 2009 The Federal Trade Commission has issued a final rule (the Red Flag Rule) under the Fair and Accurate Credit Transactions

More information

The University of North Carolina at Charlotte Identity Theft Prevention Program

The University of North Carolina at Charlotte Identity Theft Prevention Program The University of North Carolina at Charlotte Identity Theft Prevention Program Program Adoption As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule ( Rule ),

More information

DHHS POLICIES AND PROCEDURES

DHHS POLICIES AND PROCEDURES DHHS POLICIES AND PROCEDURES Section VIII: Privacy and Security Identity Theft Policies, Identity Theft Red Flags and Address Discrepancy Identity Theft Policies Current Effective 2/1/16, 10/1/15 Date:

More information

Identity Theft Red Flags Procedures

Identity Theft Red Flags Procedures 3 4 5 6 7 8 9 INTRODUCTION AND PURPOSE DEFINITIONS EXCEPTIONS PENALTIES RECORD RETENTION REQUIREMENTS A B D Identity Theft Red Flags Procedures 717.90 Duties Regarding the Detection, Prevention, and Mitigation

More information

COUNCIL POLICY NO. C-13

COUNCIL POLICY NO. C-13 COUNCIL POLICY NO. C-13 TITLE: POLICY: Identity Theft Prevention Program See attachment. REFERENCE: Salem City Council Finance Committee Report dated November 7, 2011, Agenda Item No. 3 (a) Supplants Administrative

More information

Red Flags Identity Theft Training Program. Fall 2015

Red Flags Identity Theft Training Program. Fall 2015 Red Flags Identity Theft Training Program Fall 2015 Background In 2003, U.S. Congress enacted the Fair and Accurate Credit Transactions Act of 2003 (FACTA). FACTA requires creditors to adopt policies and

More information

POLICY: Identity Theft Red Flag Prevention

POLICY: Identity Theft Red Flag Prevention POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information

More information

Identity Theft and Data Protection

Identity Theft and Data Protection Identity Theft and Data Protection As keepers of student, faculty, and staff information, we as an institution are obligated and regulated by state and federal laws to protect certain pieces of information.

More information

Community College System of New Hampshire Identity Theft Prevention Program Revised 5/4/2009

Community College System of New Hampshire Identity Theft Prevention Program Revised 5/4/2009 Community College System of New Hampshire Identity Theft Prevention Program Revised 5/4/2009 Program Adoption The Community College System of New Hampshire ( CCSNH ) developed this Identity Theft Prevention

More information

IDENTITY THEFT PREVENTION

IDENTITY THEFT PREVENTION IDENTITY THEFT PREVENTION Policy Title: Identity Theft Prevention Program Policy Type: Administrative Policy Number: #41-07 (2014) Approval Date: 05/12/2015 Responsible Office: University Controller Responsible

More information

UCLA Policy 313: Prevention of Identity Theft

UCLA Policy 313: Prevention of Identity Theft UCLA Policy 313: Prevention of Identity Theft Issuing Officer: Executive Vice Chancellor and Provost Responsible Dept: Corporate Financial Services Effective Date: July 29, 2009 Supersedes: New I. REFERENCES

More information

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM Program Adoption THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule, implementing

More information

DMACC IDENTITY THEFT- RED FLAGS PROCEDURES

DMACC IDENTITY THEFT- RED FLAGS PROCEDURES DMACC IDENTITY THEFT- RED FLAGS PROCEDURES This document contains identity theft red flag procedures for Des Moines Area Community College. Section Topic Page 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 XX PURPOSE

More information

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009 Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity

More information

Ferris State University

Ferris State University Ferris State University BUSINESS POLICY TO: All Members of the University Community 2009:08 DATE: May 2009 I. BACKGROUND IDENTITY THEFT PREVENTION PROGRAM The risk to the University, and its students,

More information

McLennan Community College

McLennan Community College McLennan Community College POLICIES AND PROCEDURES Subject: Identity Theft Prevention Program Reference: E-XXVIII-f Source: Board of Trustees Eff. Date: November 27, 2012 Approval Auth: Board of Trustees

More information

University of Tennessee's Identity Theft Prevention Program

University of Tennessee's Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM 1. BACKGROUND The University of Tennessee (UT) developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission s Red Flags Rule, Section 114

More information

Identity Theft Prevention Policy. Effective Date: January 1, 2011. Policy Statement

Identity Theft Prevention Policy. Effective Date: January 1, 2011. Policy Statement Identity Theft Prevention Policy Effective Date: January 1, 2011 Policy Statement Identity Theft is a crime in which an individual wrongfully obtains and uses another person's personal data, usually for

More information

Risk Management Examiners

Risk Management Examiners Risk Management Examiners Introduction to Red Flags Examination Procedures Section 615(e) requires the federal banking agencies and the NCUA (the Agencies) as well as the FTC to prescribe regulations and

More information

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule NUMBER: BUSF 4.12 SECTION: SUBJECT: Finance and Planning University Identity Theft and Detection Program (NEW) DATE: March 3, 2011 Policy for: Procedure for: Authorized by: Issued by: All Campuses and

More information

Texas A&M International University Identity Theft Prevention Program

Texas A&M International University Identity Theft Prevention Program Texas A&M International University Identity Theft Prevention Program 1 I. PROGRAM ADOPTION Texas A&M International University ( University ) developed this Identity Theft Prevention Program ( Program )

More information

Detecting, Preventing, and Mitigating Identity Theft

Detecting, Preventing, and Mitigating Identity Theft THE RED FLAGS RULE Detecting, Preventing, and Mitigating Identity Theft Training for Ball State University s Identity Theft Protection Program What is the Red Flag Rule? Congress passed the Fair and Accurate

More information

IDENTITY THEFT PROCEDURES

IDENTITY THEFT PROCEDURES IDENTITY THEFT PROCEDURES FREQUENTLY ASKED QUESTIONS ABOUT IDENTITY THEFT INCIDENTS AND RED FLAGS Q1: How is a Red Flags incident different from a data security breach? A1: A data security breach is the

More information

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008 Green University Identity Theft Prevention Program Effective beginning October 31, 2008 1 I. PROGRAM ADOPTION Green University ( University ) developed this Identity Theft Prevention Program ("Program")

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Implemented October 2009 Page 1 Table of Contents Background... 3 Purpose... 3 Definitions... 3 Pretext Calling... 4 Receiving Telephone Calls... 5 Change of Address...

More information

What is FERPA? This act is enforced by the Family Policy Compliance Office, U.S. Department of Educational, Washington, D.C.

What is FERPA? This act is enforced by the Family Policy Compliance Office, U.S. Department of Educational, Washington, D.C. What is FERPA? The Family Educational Rights and Privacy Act of 1974 (FERPA), as amended (also referred to as the Buckley Amendment), is a Federal law designed to protect the confidentiality of a student

More information

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy RESPONSIBLE OFFICIAL : Executive Vice Chancellor/Provost RESPONSIBLE OFFICIAL : Business & Financial Services EFFECTIVE

More information

B. Credit - Deferral of payment of a debt incurred for the purchase of goods services, including educational services.

B. Credit - Deferral of payment of a debt incurred for the purchase of goods services, including educational services. Date Revised: Page 1 of 16 5-21 Identity Theft Prevention Program I. BACKGROUND As a result of the increasing instances of identity theft, the United States Congress passed the Fair and Accurate Credit

More information

II. F. Identity Theft Prevention

II. F. Identity Theft Prevention II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal

More information

An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules

An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules By: Andrea J. Shaw, Esq., Compliance Officer, Gorham Savings

More information

Identity Theft Policy

Identity Theft Policy Identity Theft Policy Policy/Procedure Section 1: Background The risk to Dickinson College (the College ), its employees and students from data loss and identity theft is of significant concern to the

More information

POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY

POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY I. POLICY SUMMARY It shall be the policy of Polk County Rural Public Power District (PCRPPD) to take all reasonable steps to identify, detect, and prevent

More information

RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009

RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009 RANDOLPH COUNTY PUBLIC WORKS Identity Theft Prevention Program Adopted September 1, 2009 Effective beginning September 1, 2009 I. PROGRAM ADOPTION The Randolph County Public Works Department ( the Department

More information

University Policy: Identity Theft Prevention Policy

University Policy: Identity Theft Prevention Policy University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for

More information

Central Oregon Community College. Identity Theft Prevention Program

Central Oregon Community College. Identity Theft Prevention Program Central Oregon Community College Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION This program has been created to put COCC in compliance with Section 41.90 under the

More information

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy ELKHORN RURAL PUBLIC POWER DISTRICT 1230-1 I. POLICY SUMMARY POLICY #1230 Identity Theft Prevention Policy It shall be the policy of Elkhorn Rural Public Power District ( District ) to take all reasonable

More information

Identity Theft Prevention Program (Approved by the Board of Trustees)

Identity Theft Prevention Program (Approved by the Board of Trustees) Administrative Regulation 8:8 Responsible Office: EVPFA Date Effective: 9/15/2009 Supersedes Version: No previous version Identity Theft Prevention Program (Approved by the Board of Trustees) Major Topics

More information

The National Association of Community Health Centers, Inc. ISSUE BRIEF

The National Association of Community Health Centers, Inc. ISSUE BRIEF The National Association of Community Health Centers, Inc. ISSUE BRIEF FTC Red Flag Rule Considerations in Developing an Identity Theft Prevention Program April 2009 Prepared for NACHC by: Carrie Bill

More information

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Guidelines to FTC Red Flag Rule(reformatted) Appendix A to Part 681 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 681.2 of this part requires each financial institution

More information

IDENTITY THEFT PREVENTION (Red Flag) POLICY

IDENTITY THEFT PREVENTION (Red Flag) POLICY IDENTITY THEFT PREVENTION (Red Flag) POLICY The risk to the College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only through

More information

PII = Personally Identifiable Information

PII = Personally Identifiable Information PII = Personally Identifiable Information EMU is committed to protecting the privacy of personally identifiable information of its students, faculty, staff, and other individuals associated with the University.

More information

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Concordia Board of Regents May 2009 A Resolution Adopting the Identity Theft Prevention Program WHEREAS, The Federal Trade Commission, under Part 681 of Title 16 in the

More information

City of Lathrop, California - Red Flags and Preventing Identity Theft

City of Lathrop, California - Red Flags and Preventing Identity Theft City of Lathrop, California Finance Department-Utility Billing Identity Theft Prevention Program This program is in response to and in compliance with the Fair and Accurate Credit Transaction (FACT) Act

More information

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0 Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0 Scope: The risk to Loyola University Chicago and its faculty, staff and students

More information

Identity Theft Prevention Program. Effective: November 1, 2009

Identity Theft Prevention Program. Effective: November 1, 2009 Identity Theft Prevention Program Effective: November 1, 2009 I. BACKGROUND Galveston College ("College" / Institution ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal

More information

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009 Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )

More information

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES 1. PROCEDURE SUMMARY STATMENT The purpose of this procedure

More information

Identity Theft Prevention Policy and Procedure

Identity Theft Prevention Policy and Procedure Identity Theft Prevention Policy and Procedure In accordance with the Fair and Accurate Credit Transactions Act of 2003 (FACTA), the college president shall be responsible for developing and maintaining

More information

Red Flag Rules Information and Training

Red Flag Rules Information and Training Red Flag Rules Information and Training What are Red Flag Rules? The Red Flag Rules: - Are enforced by the Federal Trade Commission (FTC), the federal bank regulatory agencies, and the National Credit

More information

The Florida A&M University. Identity Theft Prevention Program. Effective May 1, 2009

The Florida A&M University. Identity Theft Prevention Program. Effective May 1, 2009 The Florida A&M University Identity Theft Prevention Program Effective May 1, 2009 I. PROGRAM ADOPTION This Identity Theft Prevention Program ("Program") is established pursuant to the Federal Trade Commission's

More information

identity Theft Prevention and Identification Requirements For Utility

identity Theft Prevention and Identification Requirements For Utility [Utility Name] Identity Theft Prevention Program Effective beginning, 2008 I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed this Identity Theft Prevention Program ("Program") pursuant to the

More information

RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009

RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009 RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Emergency Services

More information

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft RED FLAGS RULE Identifying, Detecting, & Mitigating Possible Identity Theft What is the Red Flag Rule? The Federal Trade Commission (FTC), along with federal bank regulators and the National Credit Union

More information

Springfield Technical Community College Identity Theft Prevention Program

Springfield Technical Community College Identity Theft Prevention Program Springfield Technical Community College Identity Theft Prevention Program PROGRAM ADOPTION Springfield Technical Community College ( College ) developed this Identity Theft Prevention Program ( Program

More information

Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008

Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008 Travis County Water Control & Improvement District No. 17 Identity Theft Prevention Program Effective beginning November 20, 2008 I. PROGRAM ADOPTION The Travis County Water Control and Improvement District

More information

UNIVERSITY OF RICHMOND IDENTITY THEFT PREVENTION PROGRAM

UNIVERSITY OF RICHMOND IDENTITY THEFT PREVENTION PROGRAM UNIVERSITY OF RICHMOND IDENTITY THEFT PREVENTION PROGRAM I. Program Adoption. After consideration of the size and complexity of the University s operations and account systems, and the nature and scope

More information