1 Red Flags Identity Theft Training Program Fall 2015
2 Background In 2003, U.S. Congress enacted the Fair and Accurate Credit Transactions Act of 2003 (FACTA). FACTA requires creditors to adopt policies and procedures to prevent identity theft. These requirements are described in Section 114 and are known as the Red Flags Rule. The Red Flags Rule requires financial institutions and creditors holding covered accounts to develop and implement a written identity theft prevention program designed to identify, detect, and respond to Red Flags. UALR is considered a creditor under FACTA and is required to have an Identity Theft Prevention Program.
3 Purpose of Training The purpose of the Identity Theft Prevention Program is to detect, prevent, and mitigate identity theft in connection with the opening of a covered account or the management of an existing covered account. Since you work in a department that is involved in the creation, modification, or administration of covered accounts, you are required to complete this training annually as part of the UALR Identity Theft Prevention Program.
4 Training All staff in each department included in this program must complete training annually. Training will ensure that staff: Are knowledgeable and able to take steps to detect, prevent, and mitigate theft of personally identifiable financial information of UALR s customers. Are able to successfully resolve any security risks identified. Are aware of information security.
5 Instructions 1. Review the training presentation. 2. Complete the assessment with a score of at least 80%. a. You may repeat the assessment until you score 80%. b. You may also refer back to the training presentation, as needed. 3. It may be helpful to refer to the UALR Identity Theft Prevention Program, UALR Fraud Policy, or the Information Technology (IT) Acceptable Use Policy, which are provided under the Contents link. 4. Complete the course evaluation.
6 Question Is Identity Theft and Red Flags the same thing? No! Identity Theft is the actual fraud or theft committed or attempted using the personal identifying information of another person without that person s authority. Red Flags are the clues you can use to spot possible Identity Theft. This training will help you identify those clues.
7 Account Definitions A continuing relationship with the university established by a person to obtain a product or service for personal, family, household, or business purposes. Accounts include: Extension of credit, such as the purchase of property or services involving a deferred payment. Deposit account.
8 Covered Account Definitions A consumer account designed to permit multiple payments or transactions. These are accounts where payments are deferred and made by a borrower periodically over time, such as a tuition or fee installment payment plan. Covered Accounts include, but may not be limited to: Student loans. Installment payments and short-term loans. Accounts that are created for ongoing services and allow the student to reimburse the university when billed over a period of time. Any type of collection account.
9 Creditor Definitions A person or entity that regularly extends, renews, or continues credit and any person or entity that regularly arranges for the extension, renewal, or continuation of credit. Examples of activities that indicate a college or university is a creditor are: Offering institutional loans to students, faculty, or staff. Offering an installment payment plan for payments of tuition or fees throughout the semester. Participation as a school lender in the William D. Ford Federal Direct Loan Program. UALR is considered a creditor.
10 Identifying Information Definitions Any name or number that may be used, alone or in conjunction with any other information, to identify a specific person. Examples include: Name Address Telephone number Social Security Number Date of birth Driver s license number Government issued ID Student identification number Computer IP address or routing code
11 Definitions Red Flag A pattern, practice, or specific activity that indicates the possible existence of identity theft or attempted identity theft. Service Provider A person that provides a service directly to the university.
12 Recognizing Identity Theft You should consider the following when recognizing and identifying Red Flags: The types of covered accounts offered or maintained. The methods provided to open and/or access covered accounts. Previous experiences with identity theft.
13 Categories of Red Flags Alerts, Notifications, or Warnings from a Consumer Reporting Agency Suspicious Documents Suspicious Personal Identifying Information Unusual Use or Suspicious Account Activity Notice from Others Indicating Possible Identity Theft
14 Identification of Red Flags Alerts, Notifications, or Warnings from a Consumer Reporting Agency Examples of common Red Flags: When a fraud or active duty alert is included with a consumer report. When a consumer reporting agency provides a notice of credit freeze in response to a request for a consumer report. When a consumer reporting agency provides a notice of address discrepancy.
15 Identification of Red Flags Alerts, Notifications, or Warnings from a Consumer Reporting Agency Examples of common Red Flags: A consumer report indicates a pattern of activity that is inconsistent with the history and usual pattern of activity, such as: A recent and significant increase in the volume of inquires. An unusual number of recently established credit relationships. A material change in the use of credit, especially with respect to recently established credit relationships. An account that was closed for cause or identified for abuse of account privileges by a campus.
16 Identification of Red Flags Suspicious Documents Examples of common Red Flags: Documents provided for identification appear to have been altered, forged, or inauthentic. The photograph or physical description on the identification is not consistent with the appearance of the applicant or customer. Other information on the identification is not consistent with information provided by the person opening a new covered account or customer presenting the identification. An application appears to have been altered or forged, or gives the appearance of having been destroyed and reassembled.
17 Identification of Red Flags Suspicious Personal Identifying Information Examples of common Red Flags: Personal identifying information is not consistent with the information on file for the student, such as: The address does not match any address in the consumer report. The SSN has not been issued or is listed on the Social Security Administration s Death Master File. Personal identifying information provided by the customer is not consistent with other personal identifying information provided by the customer (e.g., lack of correlation between the SSN range and date of birth).
18 Identification of Red Flags Suspicious Personal Identifying Information Examples of common Red Flags: When the personal identifying information provided is associated with known fraudulent activity as indicated by internal or third-party sources used by the campus (e.g., the address or phone number on an application is the same as the address provided on a fraudulent application). When the personal identifying information provided is of a type commonly associated with fraudulent activity as indicated by internal or third-party sources used by the campus. The address on an application is fictitious, a mail drop, or a prison. When the phone number is invalid or is associated with a pager or answering service.
19 Identification of Red Flags Suspicious Personal Identifying Information Examples of common Red Flags: The SSN provided is the same as that submitted by other customers or persons opening an account. The address or telephone number provided is the same as or similar to the address or telephone number submitted by an unusually large number of other customers or persons opening accounts. The customer fails to provide all required personal identifying information on an application. Personal identifying information provided is not consistent with personal identifying information that is on file with the campus.
20 Identification of Red Flags Unusual Use or Suspicious Account Activity Examples of common Red Flags: Shortly following the notice of a change of address for a covered account, the campus receives a request for a new additional or replacement card or for the addition of authorized users on the account. A new revolving credit account is used in a manner commonly associated with known patterns of fraudulent activity, for example: The majority of available credit is used for cash advances or merchandise that is easily convertible to cash (e.g., electronics equipment or jewelry). The customer fails to make the first payment or makes an initial payment but no subsequent payments.
21 Identification of Red Flags Unusual Use or Suspicious Account Activity Examples of common Red Flags: A covered account is used in a manner that is not consistent with established patterns of activity on the account. There is, for example, nonpayment when there is no history of late or missed payments. A material increase in the use of available credit. A material change in purchasing or spending patterns. A material change in electronic fund transfer patterns in connection with a deposit account. A material change in telephone call patterns in connection with a cellular phone account.
22 Identification of Red Flags Notice from Others Indicating Possible Identity Theft Examples of common Red Flags: The campus is notified by a customer, a victim of identity theft, a law enforcement authority, or any other person that it has opened a fraudulent account for a person engaged in identity theft.
23 Detection of Red Flags Detection of Red Flags in connection with the opening of covered accounts, as well as existing covered accounts, can be made through such methods as: Obtaining and verifying identity. Authenticating customers. Monitoring transactions. Verifying the validity of change of address requests in the case of existing covered accounts. Verifying changes in banking information given for billing and payment purposes.
24 Detection of Red Flags Associated with Consumer (Credit) Report Requests Detection of Red Flags in connection with Consumer (Credit) Report Requests can be made through such methods as: Prior to requesting a background or credit check, obtain written verification from the applicant ensuring that the address and information provided is correct at the time the check is being requested. If an address discrepancy is found in the completed background or credit check, verify the address with the applicant to ensure the report actually pertains to the applicant for which the report was requested. Any unresolved address discrepancies should be reported to the consumer reporting agency.
25 Response to Red Flags If you detect a potential Red Flag, you should: Notify your immediate supervisor. The immediate supervisor then notifies the department head or director to determine any additional steps. The department head or director of the department must notify the Associate Vice Chancellor for Finance. Continue to monitor activity on the covered account. Do not contact the account holder unless approved by the department head, director, or Associate Vice Chancellor for Finance. All instances of possible identity theft must be kept strictly confidential.
26 Service Providers The university remains responsible for compliance with the Red Flags Rule even if it outsources operations to a third party service provider. The written agreement between the university and the third party service provider shall require the third party to have reasonable policies and procedures designed to detect relevant Red Flags that may arise in the performance of their service provider s activities. Require, by contract, that service providers review UALR s program and report any Red Flags to the Associate Vice Chancellor for Finance.
27 Preventing Identity Theft UALR incorporates the following internal operating procedures to protect student identifying information: Any university website used to access student accounts is secure or provides clear notice to all users that the website is not secure. Paper documents which contain personal identifying information are maintained in a secure environment and are shredded when no longer needed Computer files containing personal identifying information are secure and the only individuals who have access to such files are those with a need to access them in order to perform their job duties. All office computers which store or access student account information are password protected and follow all other computer security best practices as established by UALR s Information Security Program.
28 Preventing Identity Theft Any university website that is used to access student accounts is secure or provide clear notice to all users that the website is not secure. For example: Departmentally controlled IT resources (network, servers, applications, individual workstations, etc.) are maintained in strict compliance with the Information Security Program best practices.
29 Preventing Identity Theft Paper documents which contain personal identifying information are maintained in a secure environment and are shredded when no longer needed. For example: Employees keep sensitive documents and working materials out of the public view while working. Sensitive documents and working materials are secured during breaks and non-working hours. File cabinets that contain sensitive or confidential documents are located in a secure area. Employees are trained or otherwise required to use shredders for sensitive or confidential documents.
30 Preventing Identity Theft Computer files containing personal identifying information are secure and the only individuals who have access to such files are those with a need to access the files in order to perform their job duties. For example: Computer files containing sensitive or confidential information are stored in a secure manner. There are adequate procedures in place to ensure that only necessary access to information system resources are made available to employees to perform their job (principle of least privilege).
31 Preventing Identity Theft All office computers which store or access student account information are password protected and follow all other computer security best practices as established by UALR s information security program. For example: Employees are required to use a strong password for access to their computer and other systems. If employees are allowed to work remotely (e.g., from home or while traveling), secure methods are used to access IT resources and transmit files (e.g., the use of VPN, security of laptops, encryption, etc.). Employees are required to lock their computers and/or use password protected screen savers when they leave their work area.
32 Audit Requirements Each department should perform periodic audits to ensure that individuals who should not have access to such files are not accessing them.
33 Oversight The Identity Theft Committee is responsible for developing, implementing, and updating this program. Committee members include representatives from all tested departments. The committee is chaired by the Associate Vice Chancellor for Finance. The Associate Vice Chancellor for Finance is responsible for ensuring appropriate Red Flags training of UALR s staff, including the steps for preventing and mitigating identity theft, determining which steps of prevention and mitigation should be taken in particular circumstances, and consider periodic changes to the program.
34 Assessment To complete the Red Flag Training Program, you must pass the assessment with a score of 80% or higher. Click on the Content link in the menu on the left, then click on the Red Flag Training Assessment 2015 link. The assessment may be repeated as many times as necessary until you have scored 80%. (Step-by-step instructions to view your score are in the following slides and in the Content menu.) You may refer back to the training presentation and other materials, as needed. The Red Flags Rule Training Program must be repeated on an annual basis.
35 View Assessment Score 1. After completing the assessment, click Save and Submit. 2. Click OK in the pop up screen Test Submission Confirmation.
36 View Assessment Score 3. Click OK in the bottom right of the screen to review your results. 4. Attempt Score will be in the header.
37 View Assessment Score 5. A review of each question with feedback on correct and incorrect responses will display below the header. 6. Re-take the assessment if your score was below 80%. 7. Exit by clicking OK in the bottom right corner.
38 Program Evaluation You have now completed the Red Flags Identity Theft Training Program! Once you successfully pass the assessment, please evaluate the program. The evaluation can be accessed by clicking the Content link in the main menu and then the Red Flags Training Program Evaluation 2015 link. Responses are strictly anonymous and will assist us to refine and improve future training programs.
Page 1 of 15 California State University, Fullerton Identity Theft Prevention ( Red Flags Rule ) Implementation Plan Page 2 of 15 VERSION CONTROL Document Title: Author: California State University, Fullerton
Identity Theft Prevention Red Flags Program Version 1.0 November 16, 2010 REVIEW/APPROVAL HISTORY Document Title: Author: Brooke F. Banks, Information Security Officer Date By Action Pages 10/30/2009 Bill
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009 Table of Contents Introduction to the Training Module.. i I. Introduction. 1 II. Definitions. 3 III. Recognizing Identity Theft.. 6 IV. Identifying
NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES 1. PROCEDURE SUMMARY STATMENT The purpose of this procedure
The University of North Carolina at Chapel Hill Identity Theft Prevention Program The Board of Trustees of The University of North Carolina at Chapel Hill (the University ) adopts this Identity Theft Prevention
Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements 1.0 Introduction In 2003, Congress enacted the Fair and Accurate Credit Transactions Act of 2003, 15 U.S.C. Section 1681,
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0 Scope: The risk to Loyola University Chicago and its faculty, staff and students
Central Oregon Community College Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION This program has been created to put COCC in compliance with Section 41.90 under the
Reference: Fair and Accurate Credit Transactions Act, ( Pub. L. 108-159) The purpose of the Identity Theft Prevention Program (ITPP) is to control reasonably foreseeable risks to students from identity
Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030 Date of Current Revision: Executive Oversight: Executive Vice President Contact Office: Comptroller s Office Policy:
Guidelines to FTC Red Flag Rule(reformatted) Appendix A to Part 681 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 681.2 of this part requires each financial institution
I. Purpose & Scope This program was developed pursuant to the Federal Trade Commission s (FTC) Red Flag Rules promulgated pursuant to the Fair and Accurate Credit Transactions Act (the FACT Act). The University
University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for
Wholesale Broker Red Flag/Identity Theft Prevention Program Certification Federal regulations require that all financial institutions and their affiliates create an identity theft prevention program in
DMACC IDENTITY THEFT- RED FLAGS PROCEDURES This document contains identity theft red flag procedures for Des Moines Area Community College. Section Topic Page 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 XX PURPOSE
Name of Policy: Identity theft detection, prevention, and mitigation. Policy Number: 3364-15-12 Approving Officer: President Responsible Agent: Compliance Officer Scope: All University of Toledo Campuses
Oregon University System Identity Theft Prevention Program Effective May 1, 2009 Page 2 I. PROGRAM ADOPTION The Oregon University System ( System ) developed this Identity Theft Prevention Program ("Program")
University of St. Thomas Identity Theft Prevention Program (Red Flags Regulation Response) Revised: January 10, 2013 Program Adoption and Administration The University of St. Thomas ( University ) established
Identity Theft Prevention Program Approved by the Arizona Board of Regents on May 1, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules
Policy No: TITLE: AP-OP-07.2 Identity Theft Prevention Program EFFECTIVE DATE: April 11, 2014 ADMINISTERED BY: Office of the President CANCELLATION: REVIEW DATE: Fall 2016 PURPOSE To establish an Identity
Identity Theft Prevention Program Section: General Operations Title: Identity Theft Prevention Program Number: 56.300 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
Identity Theft Prevention Program I. PROGRAM PURPOSE AND DEFINITIONS The purpose of this Identity Theft Prevention Program ( Program ) is to detect, prevent and mitigate identity theft in connection with
University of Arkansas at Monticello Identity Theft Prevention Program Overview The University Of Arkansas System Board Of Trustees adopted an Identity Theft Prevention Program (ITP) in compliance with
RESOLUTION NO. 2009-1 A RESOLUTION OF THE MAYOR AND COUNCI8L OF THE CITY OF ST. ANTHONY, IDAHO, ADOPTING AN IDENTY THEFT PREVENTION PROGRAM WHEREAS, Section 114 of the Fair and Accurate Transaction Act
Doc. T08-109 Passed by the BoT 12/11/08 UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM The Board recognizes that some activities of the University are subject to the provisions of the Fair
TOWN OF APPLE VALLEY, CALIFORNIA AGENDA MATTER Subject Item: RESOLUTION OF THE TOWN COUNCIL OF THE TOWN OF APPLE VALLEY, CALIFORNIA ADOPTING AN IDENTITY THEFT PREVENTION PROGRAM SUMMARY STATEMENT In 2003,
IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)
RESOLUTION TO ADOPT IDENTITY THEFT POLICY WHEREAS, in late 2008 the Federal Trade Commission (FTC) and federal banking agencies issued a regulation known as the Red Flag Rule under sections 114 and 315
Program Adoption THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule, implementing
3344-19-01 Identity theft prevention program and red flag compliance policy. (A) Program adoption Cleveland state university has developed this identity theft prevention program ( program ) pursuant to
Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity
I. POLICY Eastern Virginia Medical School (EVMS) establishes the following identity theft program ( Program ) to detect, identify, and mitigate identity theft in its Covered Accounts in accordance with
THE LUTHERAN UNIVERSITY ASSOCIATION, INC. d/b/a Valparaiso University IDENTITY THEFT PREVENTION PROGRAM SECTION 1: BACKGROUND The risk to Valparaiso University ("University"), its employees, students (in
IDENTITY THEFT PREVENTION PROGRAM In compliance with Part 681 of Title 16 of the Code of Federal Regulations implementing Sections 114 of the Fair and Accurate Credit Transactions Act of 2003 ("FACTA"),
01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) Authority: Board of Trustees History: Effective May 1, 2009 (approved initially April 24, 2009) Source of Authority: Related Links: Responsible Office:
SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
IDENTITY THEFT PREVENTION PROGRAM This program is launched in response to the Federal Trade Commission Red Flag Rules and Address Discrepancy Rules in conjunction with the Fair and Accurate Credit Transaction
Red Flag Identity Theft Policy 1.) Policy and Program Rationale: Messiah College ( College ) has developed the Identity Theft Policy ( Policy) and Prevention Program ( Program ) pursuant to the Federal
UNIVERSITY OF RICHMOND IDENTITY THEFT PREVENTION PROGRAM I. Program Adoption. After consideration of the size and complexity of the University s operations and account systems, and the nature and scope
Model Identity Theft Policy and Adopting Resolution, Tennessee RESOLUTION NO. A RESOLUTION ADOPTING AN IDENTITY THEFT POLICY WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, an amendment
INTRODUCTION CHAPTER OSCEOLA COUNTY IDENTITY THEFT PREVENTION PROGRAM The Osceola County Board of County Commissioners is committed to protecting consumers who do business with Osceola County, and as such
Issued: 05/16/2014 Revised: Policy and College ( Seminary ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's ( FTC ) Red Flags Rule, which implements
Red Flag Policy Protecting your privacy is of paramount importance at Missouri Southern State University, and we are dedicated to the responsible handling of your personal information. We are very committed
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate
University of Dayton Red Flag ID Theft Prevention Program I. Program Adoption The University of Dayton developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's
Green University Identity Theft Prevention Program Effective beginning October 31, 2008 1 I. PROGRAM ADOPTION Green University ( University ) developed this Identity Theft Prevention Program ("Program")
[Utility Name] Identity Theft Prevention Program Effective beginning, 2008 I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed this Identity Theft Prevention Program ("Program") pursuant to the
Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )
EXHIBIT A Identity Theft Protection Program Definitions. For purposes of the Policy, the following definitions apply (1); A. City means: the City of Troy, Montana B. Covered Account means: An account that
The Florida A&M University Identity Theft Prevention Program Effective May 1, 2009 I. PROGRAM ADOPTION This Identity Theft Prevention Program ("Program") is established pursuant to the Federal Trade Commission's
University System of New Hampshire Identity Theft Prevention Program Approved by the USNH Board of Trustees on April 30, 2009 I. PROGRAM ADOPTION The University System of New Hampshire (USNH) developed
Identity Theft Prevention Program Effective beginning April 14, 2010 PROGRAM ADOPTION Cobalt Financial Corporation ( Broker ) developed this Identity Theft Program ( Program ) pursuant to the Federal Trade
Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended: I. PROGRAM ADOPTION Hawkeye REC ("REC") developed this Identity Theft Prevention Program
COUNCIL POLICY NO. C-13 TITLE: POLICY: Identity Theft Prevention Program See attachment. REFERENCE: Salem City Council Finance Committee Report dated November 7, 2011, Agenda Item No. 3 (a) Supplants Administrative
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention
ELKHORN RURAL PUBLIC POWER DISTRICT 1230-1 I. POLICY SUMMARY POLICY #1230 Identity Theft Prevention Policy It shall be the policy of Elkhorn Rural Public Power District ( District ) to take all reasonable
COUNCIL POLICY STATEMENT Policy No. 44 General Subject: Finance Specific Subject: Identity Theft Policy and Prevention Program Date Approved: October 20, 2008 The following policy is to implement the requirements
SOUTH TEXAS COLLEGE Identity Theft Prevention Program and Guidelines FTC Red Flags Rule Issued June 24, 2009 Table of Contents Section Section Description Page # 1 Section 1: Program Background and Purpose
POLICY USF System USF USFSP USFSM Number: 0-109 Subject: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance Date of Origin: 1-11-11 Date Last Amended: Date Last Reviewed:
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
Identity Theft Prevention Program Effective: November 1, 2009 I. BACKGROUND Galveston College ("College" / Institution ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal
Identity Theft Prevention Policy and Procedure In accordance with the Fair and Accurate Credit Transactions Act of 2003 (FACTA), the college president shall be responsible for developing and maintaining
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY I. POLICY SUMMARY It shall be the policy of Polk County Rural Public Power District (PCRPPD) to take all reasonable steps to identify, detect, and prevent
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
Florida Agricultural & Mechanical University Board of Trustees Policy Board of Trustees Policy Number: Date of Adoption: May 4, 2009 Date of Revision: June 6, 2013 Identity Theft Prevention Policy Subject
Delta Township Compiled Policy Manual Title: Delta Township Identity Theft Policy Adoption Date: October 20, 2008 Revision Date: General Purpose: To establish an Identity Theft Prevention Program designed
Identity Theft Prevention Program Illinois College of Optometry Illinois Eye Institute Effective Date: May 2009 Revised: Review Dates: IDENTITY THEFT PREVENTION POLICY STATEMENT The Illinois College of
MARSHALL UNIVERSITY BOARD OF GOVERNORS Policy No. FA-12 IDENTITY THEFT PREVENTION PROGRAM 1 General Information. 1.1 Scope: To identify, detect, and respond appropriately to any Red Flags that are detected
Springfield Technical Community College Identity Theft Prevention Program PROGRAM ADOPTION Springfield Technical Community College ( College ) developed this Identity Theft Prevention Program ( Program
Travis County Water Control & Improvement District No. 17 Identity Theft Prevention Program Effective beginning November 20, 2008 I. PROGRAM ADOPTION The Travis County Water Control and Improvement District
ORDINANCE NUMBER 644 AN ORDINANCE ESTABLISHING THE TOWN OF YORKTOWN IDENTITY THEFT PREVENTION PROGRAM WHEREAS, the Federal Trade Commission, through 16 C.F.R. Part 681.1, adopted Identity Theft Rules requiring
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program
THE RED FLAGS RULE Detecting, Preventing, and Mitigating Identity Theft Training for Ball State University s Identity Theft Protection Program What is the Red Flag Rule? Congress passed the Fair and Accurate
AUTOMOTIVE IDENTITY THEFT PREVENTION PROGRAM OVERVIEW What is the Red Flag Ruling? The Red Flag Ruling requires automotive dealerships to implement policies and procedures to prevent fraud due to identity
River Bend Identity Theft Program 1 TITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM Chapter 18.01. IDENTITY THEFT PREVENTION PROGRAM 2 Identity Theft Prevention Program SECTION Chapter 18.01: IDENTITY THEFT
Texas A&M International University Identity Theft Prevention Program 1 I. PROGRAM ADOPTION Texas A&M International University ( University ) developed this Identity Theft Prevention Program ( Program )
M. Renée Cahoon Mayor Anna D. Sadler Mayor Pro Tem Charlie Cameron Town Manager/ Public Safety Director Town of Nags Head Post Office Box 99 Nags Head, North Carolina 27959 Telephone 252-441-5508 Fax 252-441-0776