Our Comprehensive FACTA Program for Employers
|
|
- Lucas McBride
- 7 years ago
- Views:
Transcription
1 Our Comprehensive FACTA Program for Employers Every US employer has certain compliance obligations under a federal law referred to as the Fair and Accurate Credit Transactions Act ( FACTA ), which has rules and regulations that are all in effect today. FACTA was created to make organizations that collect and maintain personally identifiable information (Sensitive Information), responsible to protect that information. The rules developed pursuant to FACTA are designed to make organizations responsible to aid in the detection, deterrence and mitigation of identity theft. Compliance with FACTA is not an option for any organization including for profit, non-profit or religious organizations and governmental entities. Compliance with FACTA s Red Flags Rule alone does not constitute compliance with all of the rules mandated under FACTA. At minimum, under FACTA, every organization should have a written Privacy Policy and should conduct mandated employee training on that policy. According to the FACTA rules, each organization must perform a risk assessment to determine which rules it must follow. Organizations that do not attempt to comply with FACTA face federal penalties up to $3,500 and state penalties up to $50,000 for each violation. Organizations that suffer a data breach are responsible for actual or statutory damages and they can face class action lawsuits with punitive damages. OVERSIGHT: Congress gave certain oversight agencies the authority to write and enforce FACTA s final rules. These oversight agencies are the Federal Trade Commission (FTC) and federal banking agencies. The FTC investigates non-compliance with FACTA and federal consumer laws over all organizations that do not fall within the federal banking jurisdiction. The FTC identifies employers as its first category to which FACTA applies. Once an investigation is started it is too late to begin addressing compliance requirements. Minimum FACTA Requirements The FTC construes the Gramm, Leach, Bliley Safeguard Rule (GLB) being the minimum standard for addressing FACTA compliance. The Safeguard Rule, directed at financial institutions, required the protection of customer financial information. The FACTA rules would apply the protections of sensitive information, not just to customer financial data, but to all the identifiable data collected by an organization. Betsy Broder, the assistant director of the Federal Trade Commission s Privacy and Identity Protection Division said that all businesses [organizations] should look to GLB for guidance on how to protect personally identifiable information. (American Bar Association Journal/Stolen Lives (March 2006) Additional FACTA Requirements 1. Every organization and any person that uses a credit report or background report must follow the FACTA Disposal Rule. This law requires you to follow certain established procedures to dispose of such information. 2. As of January 1, 2011, organizations defined as creditors (as determined by the Red Flag Program Clarification Act of 2010) are subject to FACTA s Red Flags Rule. Employers subject to Red Flags Rule require an additional written Identity Theft Prevention Plan and include special training for 1
2 certain employees. Many organizations, including state agencies, county government and school districts are usually exempt from this requirement, but are not exempt from other FACTA rules. 3. The FACTA 2008 Address Discrepancy Rule requires employers using background checks on applicants to establish policies that permit them to form a reasonable belief as to whether addresses provided by applicants are correct and to notify the consumer reporting agency when they have confirmed applicant addresses. Requirements under GLB Safeguard Rules Conduct a risk assessment to determine which provisions of FACTA an organization is required to follow Appoint in writing, a Compliance Officer or Information Security Officer Develop a written Sensitive Information Security Policy (Privacy Policy) to create a culture of security Continue evaluating and adjust your security program Provide employee training on your company or organization s Privacy Policy including detection, prevention and response to identity theft The FTC has further stated that organizations must create a mitigation plan to minimize the damage due to identity theft. This mitigation plan must be in place prior to a breach Oversee service providers for compliance with your procedures Compliance Solutions We provide employers with a single source solution, to address mandated compliance requirements. They include the following: A required FACTA Rule Risk Assessment Federal Trade Commission required documents Industry specific Sensitive Information Security Policy (Privacy Policy) prepared by US Identity Theft Solution s compliance counsel (with ongoing support) A comprehensive Information Security Officer Compliance Manual including data breach and notification requirements Mandatory employee training developed by Certified Identity Theft Risk Management Specialists: Training includes the employer s Privacy Policy along with an identity theft workshop A fully managed Identity Theft Restoration Service to mitigate the employer s workplace identity theft liability Contractor/Vendor compliance requirements 2
3 Employer Proposal for Services Proposed Services: Prepare your organization s industry specific Privacy Policy Provide the Information Security Officer (ISO) appointment letter and ISO Compliance Manual Provide the required Risk Assessment Provide the required employee training (approximately 30 minutes, online or live) Provide FTC required documents and support from compliance attorney Employer Responsibilities: Make sure all employees participate in the employee training Provide each employee a copy of your organization s Privacy Policy Provide Use of Confidentially and Sensitive Information documents Complete mandatory employee training within 30 days of the date of this proposal Reducing Employer Liability to Identity Theft Victims Once a data breach occurs, an organization will face two types of liability: Federal/State government intervention with fines for non-compliance and Plaintiff s attorneys bringing individual or class action lawsuits. Identity Theft lawsuits almost always prove to be more expensive than Federal and State fines. Every company or organization is potentially exposed to thousands or even millions of dollars of liability for non-compliance with FACTA. Included in our one source solution is our pro-active identity monitoring and restoration service called idtfix. This is not your average credit monitoring service. idtfix is designed to prevent identity theft. In the event an identity theft does occur, idtfix provides an identity restoration specialist to restore victim s [employee s] identity to pre-theft status. idtfix can reduce an employer s liability to victims of a workplace data breach, who may hold the employer responsible and file a lawsuit for damages. Employers who fail to create a mitigation plan could face total liability for the damages sustained. Identity Theft Solutions idtfix services include: Proactive ID Monitoring for all 48 known types of identity theft Fully-Managed Identity Restoration Service toll free number 24/7/365 Immediate Fraud Alert placed with all three credit bureaus Notification to banks/creditors/law enforcement - government agencies 3
4 Document Replacements (SSN Card, Driver s License, Passport, Credit Cards etc.) Identity Theft Reimbursement Insurance/No Deductible Monthly identity activity report with user friendly ID Score Real- time updates on data breaches Prompt notification of suspicious identity activity ( or phone) idtfix is a Cost Effective Way to Reduce Employer Liability Three Options Available to Employers 1. For less than five cents (5 ) an hour (40 hr. week), employers can provide idtfix for employees, creating the most cost effective way to minimize their liability to victims of identity theft. 2. Employers who choose to make even a minimal contribution will find that a majority of employees will decide to participate in the idtfix program. 3. idtfix can be offered strictly as a voluntary benefit and will minimize an employer s liability, but only to those employees who participate. Identity Theft Protection idtfix can protect employees and dependents from any type of identity theft 24/7/365 Employee Only - $8.95 Monthly - Dependents - $4.55 Monthly - Total Family $13.50 Employee contribution requires a payroll deduction. Employees who leave their employer have the option to continue these benefits at no additional cost. Corporate Overview US Identity Theft Solutions, LLC, was established by a former judge and an attorney who specializes in compliance law to provide organizations with a solution to address their FACTA obligations. Our clients include counties, municipalities, school districts and for-profit and non-profit organizations. By documenting all the federally mandated requirements, we establish an affirmative defense for our clients and minimize their liability caused by a workplace identity theft. Judge Royce McCoy, CEO, was featured in the December 2009 issue of Forbes magazine as an expert in the field of Identity Theft. Prior to specializing in this field, he was elected and served as a Texas County Judge. He is also a former finalist for the Entrepreneur of the Year award sponsored by Inc. magazine, Merrill Lynch and Ernst & Young. Judge McCoy is a Certified Identity Theft Risk Management Specialist (CITRMS) as certified through The Institute of Fraud Risk Management. Karen McCoy, President, graduated from SMU with degrees in Journalism and Marketing. She is a Certified Identity Theft Risk Management Specialist and she has spoken across the country as an 4
5 expert regarding identity theft. Mrs. McCoy s years of experience in this industry and her management skills as a successful entrepreneur, has prepared her to lead this company in the 21st Century. Mark Deubner, Executive V.P., graduated from St. Mary's School of Law in San Antonio, Texas and clerked for the Fifth District Court of Appeals in Dallas, Texas. He has a background in statutory compliance law from drafting, testifying for, and passage of several state compliance statutes. He now specializes in identity theft compliance law. As our compliance counsel, Mr. Deubner supervised three other attorneys to create a unique FACTA Compliance Manual for our clients. He is a Certified Identity Theft Risk Management Specialist. Dale Brooks, Senior V.P. and National Marketing Director, is a graduate of University of North Texas with a degree in Business Administration & Information Systems. His primary focus is educating trade associations, chambers of commerce, service organizations and employers regarding compliance with federal/state mandated identity theft laws. Mr. Brooks is a Certified Identity Theft Risk Management Specialist (CITRMS). Julia Baker, Senior V.P. of Compliance and Corporate Communication is a graduate of Oklahoma Christian University and is a Certified Identity Theft Risk Management Specialist. She previously served as Sr. Vice President & Compliance Officer for a national company and Co-Chair of the Government Relations Commission for an industry association provided her with a platform to hone her skills as a leader in the legislative and regulatory arena. 5
YOUR CITY/MUNICIPALITY
The Red Flags Rule What Companies Need to Know About Complying with the New Privacy Laws for Fighting Identity Theft Is YOUR CITY/MUNICIPALITY In Compliance FACTA / GLB Safeguard Rule / The RED FLAGS RULE?
More informationWheaton College Audit Committee Red Flag Identity Theft Prevention Program Meeting of February 20, 2009
Wheaton College Audit Committee Red Flag Identity Theft Prevention Program Meeting of February 20, 2009 Late last year, the Federal Trade Commission (FTC) and Federal banking agencies issued a regulation
More informationIdentity Theft Security and Compliance: Issues for Business
Identity Theft Security and Compliance: Issues for Business The Facts Six Common Uses for Stolen Information Financial Criminal Medical DMV Social Security Terrorist The Facts A Chronology of Data Breaches
More informationIdentity Theft Prevention Policy and Procedure
Identity Theft Prevention Policy and Procedure In accordance with the Fair and Accurate Credit Transactions Act of 2003 (FACTA), the college president shall be responsible for developing and maintaining
More informationData Security Breaches: Learn more about two new regulations and how to help reduce your risks
Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches
More informationTexas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009
Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention
More informationidentity TheFT PREVENTION Programs and Response
IDENTITY THEFT PREVENTION PROGRAM This program is launched in response to the Federal Trade Commission Red Flag Rules and Address Discrepancy Rules in conjunction with the Fair and Accurate Credit Transaction
More informationUNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy
UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy RESPONSIBLE OFFICIAL : Executive Vice Chancellor/Provost RESPONSIBLE OFFICIAL : Business & Financial Services EFFECTIVE
More informationS12: Medical Identity Theft and Red Flag Rules: The Health Plan Perspective Marita Janiga, Kaiser Permanente
S12: Medical Identity Theft and Red Flag Rules: The Health Plan Perspective Marita Janiga, Kaiser Permanente Medical Identity Theft and Red Flag Rules: The Health Plan Perspective Marita C. Janiga Director,
More informationQuestions and Answers About the Identity Theft Red Flag Requirements
Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,
More informationDSU Identity Theft Prevention Policy No. DSU 802.7.001
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 IDENTITY THEFT PREVENTION DSU Policy No. 802.7.001 SOURCE: Fair and Accurate
More informationVillage of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program
More informationDATA BREACH COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
More informationIdentity Theft Prevention Program
Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity
More informationFacts About FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
More informationCity of Lathrop, California - Red Flags and Preventing Identity Theft
City of Lathrop, California Finance Department-Utility Billing Identity Theft Prevention Program This program is in response to and in compliance with the Fair and Accurate Credit Transaction (FACT) Act
More informationOklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
More informationKeeping watch over your best business interests.
Keeping watch over your best business interests. 0101010 1010101 0101010 1010101 IT Security Services Regulatory Compliance Services IT Audit Services Forensic Services Risk Management Services Attestation
More informationResponding to New Identity Theft Laws
Responding to New Identity Theft Laws March 2011 Privacy Expectations Today, there is increasing recognition that an individual has a legitimate interest in controlling the collection, use and disclosure/dissemination
More information21.01.04.Z1.01 Guideline: Identity Theft Prevention Program
Texas A&M Health Science Center Guidelines 21.01.04.Z1.01 Guideline: Identity Theft Prevention Program Approved October 7, 2009 Reviewed February 26, 2015 Supplements System Regulation 21.01.04 Reason
More informationIdentity Theft Prevention Program Red Flag Rules Policy P093.00 Issued: May 2009
Identity Theft Prevention Program Red Flag Rules Policy P093.00 Issued: May 2009 The Federal Trade Commission has issued a final rule (the Red Flag Rule) under the Fair and Accurate Credit Transactions
More informationGreen University. Identity Theft Prevention Program. Effective beginning October 31, 2008
Green University Identity Theft Prevention Program Effective beginning October 31, 2008 1 I. PROGRAM ADOPTION Green University ( University ) developed this Identity Theft Prevention Program ("Program")
More informationTexas A&M International University Identity Theft Prevention Program
Texas A&M International University Identity Theft Prevention Program 1 I. PROGRAM ADOPTION Texas A&M International University ( University ) developed this Identity Theft Prevention Program ( Program )
More informationFeatured Article Federal Red Flag and Related Identity Theft Prevention Rules: Is Your Organization in Compliance?
Featured Article Federal Red Flag and Related Identity Theft Prevention Rules: Is Your Organization in Compliance? Article contributed by: Nancy L. Perkins, Arnold & Porter LLP As of November 1, 2008,
More informationIdentity Theft Prevention Program
-- Sample Policy -- Identity Theft Prevention Program Purpose To establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection with the opening of
More informationOregon University System Identity Theft Prevention Program Effective May 1, 2009
Oregon University System Identity Theft Prevention Program Effective May 1, 2009 Page 2 I. PROGRAM ADOPTION The Oregon University System ( System ) developed this Identity Theft Prevention Program ("Program")
More informationPrivacy Legislation and Industry Security Standards
Privacy Legislation and Issue No. 3 01010101 01010101 01010101 Information is generated about and collected from individuals at an unprecedented rate in the ordinary course of business. In most cases,
More informationNumber of Pages: 5 Number of Forms: 0 Saved As: X:/Policies & Procedures/13. JCAHO STD s (if applicable): N/A
15.05 Identity Theft Prevention Program Policy: Identity Theft Prevention Program Effective Date: Manual: RFHC Clinical Policies and Procedures Revision Date: Number of Pages: 5 Number of Forms: 0 Saved
More informationIdentity Theft Prevention Policy. Effective Date: January 1, 2011. Policy Statement
Identity Theft Prevention Policy Effective Date: January 1, 2011 Policy Statement Identity Theft is a crime in which an individual wrongfully obtains and uses another person's personal data, usually for
More informationRESOLUTION NO. 0913 IDENTITY THEFT PREVENTION PROGRAM
RESOLUTION NO. 0913 IDENTITY THEFT PREVENTION PROGRAM WHEREAS, the Eugene Water & Electric Board (EWEB) recognizes the importance of establishing a Identity Theft Prevention Program (Program) and procedures
More informationPolicies and Procedures: IDENTITY THEFT PREVENTION
Policies and Procedures: IDENTITY THEFT PREVENTION Section: Chapter: Policy: Compliance Administration Identity Theft Prevention I. PURPOSE The purpose of this policy is to protect patients and West Virginia
More informationFACTA Identity Theft Red Flags Program. www.chs.acfei.com
1 FACTA Identity Theft Red Flags Program Module 1 Fair and Accurate Credit Transactions Act Overview Identity thieves use individual s personal identifiable information to open new accounts and misuse
More informationSpringfield Technical Community College Identity Theft Prevention Program
Springfield Technical Community College Identity Theft Prevention Program PROGRAM ADOPTION Springfield Technical Community College ( College ) developed this Identity Theft Prevention Program ( Program
More informationIdentity theft. A fraud committed or attempted using the identifying information of another person without authority.
SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE
More informationPOLICY PRINCIPLES/STATEMENT
Applicability: Policy Title: Policy Number: Identity Theft Prevention PP-31 Superseded Policy(ies) or Entity Policy: N/A Date Established: August 1, 2009 Date Effective: March 1, 2015 Dates Revised: December
More informationProtecting Families, Finances, and Your Future
Protecting Families, Finances, and Your Future Contact Information Protecting Families, Finances, and Your Future www.harvardbenefits.com Company Profile In business since 1993 Employee Benefit Specialists
More informationSub. H.B. 9 * 126th General Assembly (As Reported by H. Civil and Commercial Law)
Aida S. Montano Bill Analysis Legislative Service Commission Sub. H.B. 9 * 126th General Assembly (As Reported by H. Civil and Commercial Law) Reps. Oelslager, Flowers, Buehrer, White, Trakas BILL SUMMARY
More informationSIMMONS COLLEGE OFFICE OF THE GENERAL COUNSEL RED FLAG RULE POLICY. Background of the Federal Legislation Known as Red Flag Rule
SIMMONS COLLEGE OFFICE OF THE GENERAL COUNSEL RED FLAG RULE POLICY Background of the Federal Legislation Known as Red Flag Rule The Federal Trade Commission (FTC) has issued a regulation known as the Red
More informationNumber: 56.300. Index
Identity Theft Prevention Program Section: General Operations Title: Identity Theft Prevention Program Number: 56.300 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND
More informationCHAPTER 101: IDENTITY THEFT PREVENTION PROGRAM
CHAPTER 101: IDENTITY THEFT PREVENTION PROGRAM Section 101.01 Purpose 101.02 Definitions 101.03 Program established 101.04 Administration of program 101.05 Identification of relevant red flags 101.06 Detection
More informationUniversity of Arkansas at Monticello Identity Theft Prevention Program
University of Arkansas at Monticello Identity Theft Prevention Program Overview The University Of Arkansas System Board Of Trustees adopted an Identity Theft Prevention Program (ITP) in compliance with
More informationIdentity Theft Prevention Policy
Eastern Kentucky University Policy and Regulation Library 6.#.#P Volume 6, Volume Title: Financial Affairs Chapter #, Chapter Title Section #, Name: Identity Theft Prevention Policy Approval Authority:
More informationIDENTITY THEFT PROCEDURES
IDENTITY THEFT PROCEDURES FREQUENTLY ASKED QUESTIONS ABOUT IDENTITY THEFT INCIDENTS AND RED FLAGS Q1: How is a Red Flags incident different from a data security breach? A1: A data security breach is the
More informationIdentity Theft Prevention Program (FACTA Identity Theft Red Flags Rule)
Identity Theft Prevention Program (FACTA Identity Theft Red Flags Rule) Overview The Fair and Accurate Credit Transactions Act of 2003 ("FACTA") requirement, known as the Identity Theft Red Flags Rule,
More informationUNIVERSITY OF RICHMOND IDENTITY THEFT PREVENTION PROGRAM
UNIVERSITY OF RICHMOND IDENTITY THEFT PREVENTION PROGRAM I. Program Adoption. After consideration of the size and complexity of the University s operations and account systems, and the nature and scope
More informationUniversity of Alaska. Identity Theft Prevention Program
University of Alaska Identity Theft Prevention Program Effective beginning October 31, 2009 I. PROGRAM ADOPTION The University of Alaska ( University ) developed this Identity Theft Prevention Program
More informationThe Florida A&M University. Identity Theft Prevention Program. Effective May 1, 2009
The Florida A&M University Identity Theft Prevention Program Effective May 1, 2009 I. PROGRAM ADOPTION This Identity Theft Prevention Program ("Program") is established pursuant to the Federal Trade Commission's
More informationIDENTITY THEFT PREVENTION PROGRAM COUNTY OF DUPLIN, NORTH CAROLINA
IDENTITY THEFT PREVENTION PROGRAM COUNTY OF DUPLIN, NORTH CAROLINA TO ESTABLISH AN IDENTIFY THEFT PREVENTION PROGRAM; TO COMPLY WITH FEDERAL REGULATIONS RELATING TO ADDRESS DISCREPANCIES; TO COMPLY WITH
More informationDetecting, Preventing, and Mitigating Identity Theft
THE RED FLAGS RULE Detecting, Preventing, and Mitigating Identity Theft Training for Ball State University s Identity Theft Protection Program What is the Red Flag Rule? Congress passed the Fair and Accurate
More informationRESOLUTION TO ADOPT IDENTITY THEFT POLICY
RESOLUTION TO ADOPT IDENTITY THEFT POLICY WHEREAS, in late 2008 the Federal Trade Commission (FTC) and federal banking agencies issued a regulation known as the Red Flag Rule under sections 114 and 315
More informationidentity Theft Prevention and Identification Requirements For Utility
[Utility Name] Identity Theft Prevention Program Effective beginning, 2008 I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed this Identity Theft Prevention Program ("Program") pursuant to the
More informationRed Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program
Red Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program A Case Study of Sam Houston State University s Red Flag Program Dr. Kristy L. Vienne Objective Participants will: Understand
More informationMARSHALL UNIVERSITY BOARD OF GOVERNORS
MARSHALL UNIVERSITY BOARD OF GOVERNORS Policy No. FA-12 IDENTITY THEFT PREVENTION PROGRAM 1 General Information. 1.1 Scope: To identify, detect, and respond appropriately to any Red Flags that are detected
More informationLincoln Financial Group. FTC/SEC Red Flags Identity Theft Prevention Program
Lincoln Financial Group FTC/SEC Red Flags Identity Theft Prevention Program Program Summary For Internal Use Only Table of Contents Page The Red Flags Rule 3 Key Points of the Program 4 Covered Accounts
More informationORDINANCE NUMBER 644 AN ORDINANCE ESTABLISHING THE TOWN OF YORKTOWN IDENTITY THEFT PREVENTION PROGRAM
ORDINANCE NUMBER 644 AN ORDINANCE ESTABLISHING THE TOWN OF YORKTOWN IDENTITY THEFT PREVENTION PROGRAM WHEREAS, the Federal Trade Commission, through 16 C.F.R. Part 681.1, adopted Identity Theft Rules requiring
More informationIDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009 Table of Contents Introduction to the Training Module.. i I. Introduction. 1 II. Definitions. 3 III. Recognizing Identity Theft.. 6 IV. Identifying
More informationCOUNCIL POLICY NO. C-13
COUNCIL POLICY NO. C-13 TITLE: POLICY: Identity Theft Prevention Program See attachment. REFERENCE: Salem City Council Finance Committee Report dated November 7, 2011, Agenda Item No. 3 (a) Supplants Administrative
More informationCATAWBA COUNTY IDENTITY THEFT RED FLAGS POLICY
UI. PROGRAM ADOPTION CATAWBA COUNTY IDENTITY THEFT RED FLAGS POLICY Catawba County s Identity Theft Prevention Program ("Program") was developed to comply with the Federal Trade Commission's Red Flags
More informationCYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
More informationTable of Contents. Table of Contents... 1. Chapter 1 Introduction... 5. Sample. Chapter 2 Monitoring and Quality Control... 8
[ Client]... 1 Chapter 1 Introduction... 5 1.1 Goals and Objectives... 5 1.2 Required Review... 5 1.3 Applicability... 5 1.4 Role and Responsibilities of the Compliance Officer... 6 1.5 Role and Responsibilities
More informationMIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
More informationAn Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules
An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules By: Andrea J. Shaw, Esq., Compliance Officer, Gorham Savings
More informationHORRY COUNTY PRIVACY AND IDENTITY THEFT PREVENTION POLICY
HORRY COUNTY PRIVACY AND IDENTITY THEFT PREVENTION POLICY STEPS FOR YOUR DEPARTMENT TO COMPLY WITH POLICY AND THE LAW WHAT IS THE PURPOSE OF THIS POLICY? TO PROTECT THE PRIVACY OF RESIDENTS UTILIZING COUNTY
More information1 5 9 5 8 N a t i o n a l F u n e r a l D i r e c t o r s A s s o c i a t i o n 2 0 0 8
S A M P L E I D E N T I T Y T H E F T P R E V E N T I O N P R O G R A M F O R F U N E R A L H O M E S 1. I n t r o d u c t i o n : I f y o u r f u n e r a l h o m e u n d e r t a k e s a n y o f t h e
More informationData Privacy and Cybersecurity Task Force
Data Privacy and Cybersecurity Task Force key contact Josephine Cicchetti Shareholder T: 202.965.8162 F: 202.965.8104 email We provide clients across industries with comprehensive counsel on complex, evolving,
More informationIDENTITY THEFT AND MUNICIPAL UTILITIES
Minnesota Municipal Utilities Association IDENTITY THEFT AND MUNICIPAL UTILITIES Identity Theft and Red Flags Rule requirements The Red Flags Rule implements portions of the Fair and Accurate Credit Transactions
More information2.1 IDENTITY THEFT PREVENTION PROGRAM
Summary 2.1 IDENTITY THEFT PREVENTION PROGRAM Category: Administration Date Established: June 8, 2009 Responsible Office: Public Safety Date Last Revised: Responsible Executive: CFO/Vice President, Administrative
More informationIdentity Theft Prevention Program
Smyth County Policy Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in
More informationFrequently Asked Questions Wellmark s Identity Protection Services Offering Member Q&A
Learn More Frequently Asked Questions Wellmark s Identity Protection Services Offering Member Q&A Enrolling in identity protection services Q1. How can I enroll in identity protection services? A1. Enrollment
More informationSummary of Social Security Account Number Privacy Legislation Under Active Consideration in House and Senate (as of Sept. 5, 2007)
Summary of Social Security Account Number Privacy Legislation Under Active Consideration in House and Senate (as of Sept. 5, 2007) H.R. 3046, the Social Security Number Privacy and Identity Theft Protection
More informationNEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 9 Chapter 13,
More informationFlorida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
More informationThe National Association of Community Health Centers, Inc. ISSUE BRIEF
The National Association of Community Health Centers, Inc. ISSUE BRIEF FTC Red Flag Rule Considerations in Developing an Identity Theft Prevention Program April 2009 Prepared for NACHC by: Carrie Bill
More informationCalifornia State University, Chico. Identity Theft Prevention Red Flags Program
Identity Theft Prevention Red Flags Program Version 1.0 November 16, 2010 REVIEW/APPROVAL HISTORY Document Title: Author: Brooke F. Banks, Information Security Officer Date By Action Pages 10/30/2009 Bill
More informationTITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM
River Bend Identity Theft Program 1 TITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM Chapter 18.01. IDENTITY THEFT PREVENTION PROGRAM 2 Identity Theft Prevention Program SECTION Chapter 18.01: IDENTITY THEFT
More informationTexas Medical Records Privacy Act
A COALFIRE PERSPECTIVE Texas Medical Records Privacy Act Texas House Bill 300 (HB 300) Rick Dakin, CEO & Co-Founder Rick Link, Director Andrew Hicks, Director Overview The State of Texas has pushed ahead
More informationDHHS POLICIES AND PROCEDURES
DHHS POLICIES AND PROCEDURES Section VIII: Privacy and Security Identity Theft Policies, Identity Theft Red Flags and Address Discrepancy Identity Theft Policies Current Effective 2/1/16, 10/1/15 Date:
More informationACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.
ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...
More informationJ.V. Industrial Companies, Ltd. Dispute Resolution Process. Introduction
J.V. Industrial Companies, Ltd. Dispute Resolution Process Companies proudly bearing the Zachry name have had the Dispute Resolution Process ( DR Process ) in place since April 15, 2002. It has proven
More informationMcLennan Community College
McLennan Community College POLICIES AND PROCEDURES Subject: Identity Theft Prevention Program Reference: E-XXVIII-f Source: Board of Trustees Eff. Date: November 27, 2012 Approval Auth: Board of Trustees
More informationUNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM
Doc. T08-109 Passed by the BoT 12/11/08 UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM The Board recognizes that some activities of the University are subject to the provisions of the Fair
More informationCity of Watauga Utility Billing Department Identity Theft Prevention Program. Effective beginning November 1, 2008
City of Watauga Utility Billing Department Identity Theft Prevention Program Effective beginning November 1, 2008 A. PROGRAM ADOPTION The City of Watauga Utility Billing Department ("Utility") developed
More informationUniversity Policy: Identity Theft Prevention Policy
University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for
More informationEXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);
EXHIBIT A Identity Theft Protection Program Definitions. For purposes of the Policy, the following definitions apply (1); A. City means: the City of Troy, Montana B. Covered Account means: An account that
More informationChristopher Newport University Policy and Procedures
Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030 Date of Current Revision: Executive Oversight: Executive Vice President Contact Office: Comptroller s Office Policy:
More informationTravis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008
Travis County Water Control & Improvement District No. 17 Identity Theft Prevention Program Effective beginning November 20, 2008 I. PROGRAM ADOPTION The Travis County Water Control and Improvement District
More information~CEIVEcJ FEB 2 4 2014
February 21, 2014 Hon. Kamala D. Harris Attorney General 13 00 I Street, 1 ih Floor Sacramento, California 95814 Attention: Ms. Ashley Johansson Initiative Coordinator ~CEIVEcJ FEB 2 4 2014 INITIATIVE
More informationPacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009
Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program
More informationUCLA Policy 313: Prevention of Identity Theft
UCLA Policy 313: Prevention of Identity Theft Issuing Officer: Executive Vice Chancellor and Provost Responsible Dept: Corporate Financial Services Effective Date: July 29, 2009 Supersedes: New I. REFERENCES
More informationThe City of West Linn Identity Theft Prevention Program
Identity Theft Prevention Program Implemented January 1, 2009 Updated: July 20, 2009 Updated: December 18, 2009 I. PROGRAM ADOPTION The City of West Linn ("Utility") developed this Identity Theft Prevention
More informationUniversity of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)
University of St. Thomas Identity Theft Prevention Program (Red Flags Regulation Response) Revised: January 10, 2013 Program Adoption and Administration The University of St. Thomas ( University ) established
More informationUniversity of North Dakota. Identity Theft Prevention Program
University of North Dakota Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION University of North Dakota ( University ) developed this Identity Theft Prevention Program
More informationRed Flags Rule Identity Theft Prevention Program Master Policy
Red Flags Rule Identity Theft Prevention Program Master Policy DOCUMENTS A master policy setting up the framework for developing, implementing, updating and administering a written identity theft prevention
More informationDeer Park Independent School District. Identity Theft Policy and Board of Trustees Resolution
Deer Park Independent School District Identity Theft Policy and Board of Trustees Resolution Deer Park, Texas ORDINANCE AND RESOLUTION A RESOLUTION ADOPTING AN IDENTITY THEFT POLICY WHEREAS, The Fair and
More informationPolicy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended:
Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended: I. PROGRAM ADOPTION Hawkeye REC ("REC") developed this Identity Theft Prevention Program
More informationA LIST OF PRIVACY AND DATA SECURITY TRAINING REQUIREMENTS
A LIST OF PRIVACY AND DATA SECURITY TRAINING REQUIREMENTS HIPAA Privacy and Security Rules HIPAA s Privacy and Security Rules have extensive training requirements. HIPAA requires a covered entity to train
More informationNorth Los Angeles County Regional Center Board of Trustees. Zero Tolerance Policy for Consumer Abuse or Neglect
North Los Angeles County Regional Center Board of Trustees Zero Tolerance Policy for Consumer Abuse or Neglect 1. Scope Pursuant to the requirements in Article 1, section 17 of NLACRC s master contract
More informationVAN BUREN COMMUNITY MENTAL HEALTH AUTHORITY POLICIES & PROCEDURES
VAN BUREN COMMUNITY MENTAL HEALTH AUTHORITY POLICIES & PROCEDURES Title: Identity Theft Prevention Program Originated: 10/22/09 Number: I.05.02 Approved By: Executive Team DIRECTIVE: The Program was developed
More informationBy Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN
Major Changes to HIPAA Security and Privacy Rules Enacted in Economic Stimulus Package By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN The HITECH Act is the
More informationVERSION DATED AUGUST 2013/TEXAS AND CALIFORNIA
VERSION DATED AUGUST 2013/TEXAS AND CALIFORNIA This Business Associate Addendum ("Addendum") supplements and is made a part of the service contract(s) ("Contract") by and between St. Joseph Health System
More information