1. Entities and Accounts Covered by the New Rules Covered Entities
|
|
|
- Annice Thomas
- 10 years ago
- Views:
Transcription
1 CLIENT MEMORANDUM RED FLAG IDENTITY THEFT RULES MAY HAVE YOU SEEING RED: FTC EXTENDS COMPLIANCE DEADLINE BECAUSE MANY COMPANIES DID NOT KNOW THAT THESE RULES APPLY TO THEM When companies outside the financial industry hear terms like FACT Act, 1 FCRA, 2 or Identity Theft Red Flags, many understandably tune out, concluding that any associated regulations are inapplicable to them. However, the Red Flag rules recently adopted under the FACT Act can apply to any company that provides a product or service for which the consumer pays after delivery. 3 Given this extremely broad scope, the Red Flag rules will apply to a wide range of companies outside the financial arena, including telecommunications companies, cable operators, mobile telephone service providers, automobile dealers, franchisors, merchants, hospitals, and utility companies, among others. Under the key provisions of these rules, covered entities, including both financial institutions and creditors, must implement a written program approved by their board of directors to detect, prevent, and mitigate identity theft ( Program ). This Program must be designed to identify and address so-called Red Flags that signal the possibility of an instance of identity theft. The requirements of the Red Flag rules are set forth in more detail below. In light of the expansive coverage of the new Red Flag rules and the potentially significant enforcement penalties associated with noncompliance, companies across all industries should assess whether they qualify as a covered entity under the Red Flag rules and offer or maintain covered accounts, in which case they are required to implement an identity theft prevention Program consistent with the FACT Act s requirements. Deadline Extended. The new Red Flag rules went into effect on January 1, 2008, and require full compliance by November 1, The Federal Trade Commission ( FTC ), however, recently suspended enforcement of the new rules until May 1, 2009 for nonfinancial companies. 5 The FTC has authority over enforcement of the Red Flag rules for most entities that fall under the creditor prong of the rules, and that is where there has been the most confusion over See Fair and Accurate Credit Transactions Act of 2003 ( FACT Act ) (Public Law ), 15 U.S.C et seq. See Fair Credit Reporting Act ( FCRA ), 15 U.S.C et seq. See FTC Notice: Commission Determination to Forbear from Bringing Enforcement Actions against Certain Financial Institutions and Creditors until May 1, 2009 (available at 72 Fed. Reg The text of the rules is available at The FTC extension of the compliance deadline applies only to companies outside the supervision of the federal bank regulatory agencies. For financial entities governed by the Federal Deposit Insurance Corporation, the Federal Reserve Board, the Office of the Comptroller of the Currency, or the Office of Thrift Supervision, the November 1 deadline remains effective. See FTC Notice, supra. Hereinafter, these financial agencies and the FTC are referred to collectively as the Agencies. NEW YORK WASHINGTON PARIS LONDON MILAN ROME FRANKFURT BRUSSELS in alliance with Dickson Minto W.S., London and Edinburgh
2 whether the Red Flag rules apply to a particular business. 6 The FTC believes that delaying its enforcement of the Red Flag rules by six months will allow nonfinancial entities -- which may not have even realized that they were covered by the rules -- to take the appropriate care and consideration in developing and implementing their required Programs. Enforcement and Penalties. The Red Flag rules empower federal authorities to impose civil penalties against companies without adequate identity theft Programs in amounts up to $2,500 per knowing violation. 7 While the FTC has not elaborated on its method of calculating penalties, it is possible that the fine amount chosen could be assessed against a noncompliant company for each covered account it maintains. Companies with a significant number of accounts, therefore, could face significant civil penalties if they do not have an adequate Program. Although it lacks the authority to initiate random audits, the FTC has indicated that it might investigate a company s compliance based on consumer complaints or outside tips, or on other sources of industry information Entities and Accounts Covered by the New Rules 1.1. Covered Entities Under the FACT Act, financial institutions and creditors must comply with the new Red Flag rules. A financial institution is defined to include all banks, savings and loan associations, mutual savings banks, credit unions, and any other person that holds, directly or indirectly, a consumer transaction account, such as a checking account, demand deposit, negotiable order of withdrawal account, savings deposit subject to automatic transfers, or share draft account. Creditor is defined broadly and includes (a) any entity that regularly extends, renews, or continues credit; (b) any entity that regularly arranges for the extension, renewal, or continuation of credit; or (c) any assignee of an original creditor that is involved in the decision to extend, renew, or continue credit. Thus, as noted, the new Red Flag rules apply far beyond the financial industry, covering a wide variety of entities and industries that offer customers the ability to pay for goods or services after receipt of such goods or services. 9 The new rules explicitly include entities such as telecommunications companies, utility companies, and automobile dealers See BNA Privacy & Security Law Report: Identity Theft: FTC Won t Enforce Red Flags Until May 09; Banks Still Must Comply With Rules by Nov. 1, 7 PVLR 1533 (October 2008). See FCRA, 621(a)(2)(A), 15 U.S.C. 1681s. State authorities may also initiate enforcement proceedings if no federal action is pending; maximum fines in state proceedings are $1,000 for each willful or negligent violation. See FCRA, 621(c). Teleconference with Pavneet Singh, attorney in the FTC s Division of Privacy and Identity Protection, October 30, See FTC Notice, supra. See also FTC Business Alert, New Red Flag Requirements for Financial Institutions and Creditors Will Help Fight Identity Theft (available at 72 Fed. Reg (Nov. 9, 2007)
3 1.2. Covered Accounts Financial institutions and creditors that are subject to the new rules must develop and implement a written Program for all of their covered accounts. A covered account is (a) a consumer account primarily for personal, family, or household purposes that involves or is designed to permit multiple payments or transactions (e.g., a credit card account, mortgage loan, automobile loan, margin account, cell phone account, utility account, checking account, or savings account); or (b) any other account for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the financial institution or creditor from identity theft, including financial, operational, compliance, reputation, or litigation risks. The second prong is intended to cover certain business accounts; however, the risk-based nature of this prong allows each financial institution or creditor flexibility in determining which business accounts will be covered by its Program through a risk evaluation process. The Program must be designed to detect, prevent, and mitigate identity theft in connection with both (a) the opening of new covered accounts and (b) existing covered accounts. The Agencies also recognized that a person may establish a relationship with a creditor, such as an automobile dealer or a telecommunications provider, primarily to obtain a product or service that is not financial in nature. To make clear that an account includes relationships with creditors that are not financial institutions, the definition is purposefully not tied to the provision of financial products and services Key Definitions and Specific Program Requirements The Program must contain reasonable policies and procedures to (a) identify relevant Red Flags for covered accounts and incorporate those Red Flags into the Program; (b) detect when the selected Red Flags are triggered; (c) respond appropriately to any Red Flags that are detected to prevent and mitigate identity theft; and (d) ensure that the Program is updated periodically to reflect changes in risks to customers or to the safety and soundness of the financial institution or creditor from identity theft. 12 Each of these four components and additional Program definitions are discussed below Definitions Red Flag is defined as a pattern, practice, or specific activity that indicates the possible existence of identity theft. 13 Identity theft means a fraud committed or attempted using the identifying information of another person without authority. Identifying information means any name or number that may be used, alone or in conjunction with any other information, to identify a specific person, including any (a) Name, social security number, date of birth, Fed. Reg Fed. Reg Fed. Reg
4 official State or government-issued driver s license or identification number, alien registration number, government passport number, employer or taxpayer identification number; (b) Unique biometric data, such as fingerprint, voice print, retina or iris image, or other unique physical representation; (c) Unique electronic identification number, address, or routing code; or (d) Telecommunication identifying information or access device (as defined in 18 U.S.C. 1029(e)) Identifying Possible Red Flags The Agencies decided not to single out any specific Red Flags as mandatory for all financial institutions and creditors to address. Rather, the Agencies recognized that the final rules and guidelines cover a wide variety of entities that offer and maintain many different products and services, and must have the flexibility to be able to adapt to rapidly changing risks of identity theft. Therefore, the Red Flag rules contain a list of factors that a financial institution or creditor should consider... as appropriate in identifying relevant Red Flags. These factors include (a) the types of covered accounts it offers or maintains; (b) the methods it provides to open its covered accounts; (c) the methods it provides to access its covered accounts; and (d) its previous experiences with identity theft. 14 A financial institution or creditor will not need to justify to an Agency its failure to include in the Program a specific Red Flag from the list of examples. However, a covered entity will have to account for the overall effectiveness of a Program, and that Program must be appropriate both as to its size and complexity and as to the nature and scope of its activities Detecting Red Flags A Program must contain policies and procedures to detect the Red Flags that a financial institution or creditor has incorporated into its Program. Notably, the Program s policies and procedures should address the detection of Red Flags in connection with (a) the opening of covered accounts, such as by obtaining identifying information about, and verifying the identity of, a person opening a covered account; and (b) existing covered accounts, such as by authenticating customers, monitoring transactions, and verifying the validity of change of address requests Responding to Red Flags The Program s policies and procedures should provide for appropriate responses to any detected Red Flags that are commensurate with the degree of risk posed. In determining an appropriate response, a financial institution or creditor should consider aggravating factors that might heighten the risk of identity theft, such as a data security incident that resulted in the Fed. Reg , 63732, (OTS rules). 72 Fed. Reg , 63732, (OTS rules). 72 Fed. Reg
5 unauthorized access to or loss of a customer s account records held by the financial institution or creditor, or notice that a customer has provided information related to a covered account held by the financial institution or creditor to someone fraudulently claiming to represent the financial institution or creditor, or to a fraudulent website. Appropriate responses may include, for example: (a) monitoring a covered account for evidence of identity theft; (b) contacting and notifying the customer; (c) changing any passwords, security codes, or other security devices that permit access to a covered account; (d) reopening a covered account with a new account number; (e) not opening a new covered account; (f) closing an existing covered account; (g) not attempting to collect on a covered account or not selling a covered account to a debt collector; (h) notifying law enforcement; or (i) determining that no response is warranted under the particular circumstances Updating the Program The Red Flag rules require periodic updating because the Agencies concluded that requiring financial institutions and creditors to immediately and continuously update their Programs would be overly burdensome. Factors that should cause a financial institution or creditor to update its Program include (a) its own experiences with identity theft; (b) changes in methods of identity theft; (c) changes in methods to detect, prevent, and mitigate identity theft; (d) changes in the types of accounts that it offers or maintains; and (e) changes in the business arrangements of the financial institution or creditor, including mergers, acquisitions, alliances, joint ventures, and service provider arrangements Administering the Program (a) The Program must be approved by an institution s board of directors or a committee of the board. (Note: The board or an appropriate committee must approve only the initial written Program; thereafter, the board, a committee, or senior management may update the Program.) (b) The board, an appropriate committee, or a designated senior management employee must be involved in the development, implementation, administration, and oversight of the Program. (c) Those responsible for the Program should provide to the board or senior management a report (at least annually) that does the following: (1) shows the effectiveness of the Program in addressing the risk of identity theft in connection with new and existing covered accounts; (2) explains any significant events involving identity theft that have occurred and the management s response to them; (3) addresses service provider arrangements; and (4) provides recommendations for material changes to the Program based upon evolving risks and methods of identity theft Fed. Reg Fed. Reg
6 (d) A covered entity must train relevant staff to effectively implement the Program. Staff members who have already been trained as a part of the antifraud prevention efforts of the financial institution or creditor do not need to be retrained except as necessary. (e) Whenever a financial institution or creditor engages a service provider to perform an activity in connection with one or more covered accounts, the financial institution or creditor must take steps to ensure that the activity of the service provider is conducted in accordance with reasonable policies and procedures designed to detect, prevent, and mitigate the risk of identity theft. For example, a financial institution or creditor could require the service provider, by contract, to have policies and procedures to detect relevant Red Flags that may arise in the performance of the service provider s activities, and either report the Red Flags to the financial institution or creditor, or take appropriate steps to prevent or mitigate identity theft. 19 These service provider provisions impose potentially unforeseen, but significant, burdens on companies. Notably, a business or organization that is not itself a covered entity but which serves as a service provider to a covered entity may still be required, via contract, to comply with these new rules if it has access to covered accounts in its role as a service provider. 3. Conclusion Companies across all industries -- not just financial institutions -- must assess whether they fall under the Red Flag rules very broad creditor definition and provide or maintain covered accounts and therefore must establish an identity theft prevention Program by the FTC s new May 1, 2009 deadline. In addition, service providers that are not themselves covered entities may nonetheless be indirectly subject to these rules through their contracts with covered entities. * * * * * * * * * * * * * * * If you have any questions regarding this memorandum, please contact Francis M. Buono ( , [email protected]), McLean Sieverding ( , [email protected]), Brien Bell ( , [email protected]), or the attorney with whom you regularly work. Willkie Farr & Gallagher LLP is headquartered at 787 Seventh Avenue, New York, N.Y and has an office located at 1875 K Street, N.W., Washington, D.C Our New York telephone number is (212) and our facsimile number is (212) Our Washington, D.C. telephone number is (202) and our facsimile number is (202) Our website is located at November 7, 2008 Copyright 2008 by Willkie Farr & Gallagher LLP. All Rights Reserved. This memorandum may not be reproduced or disseminated in any form without the express permission of Willkie Farr & Gallagher LLP. This memorandum is provided for news and information purposes only and does not constitute legal advice or an invitation to an attorney-client relationship. While every effort has been made to ensure the accuracy of the information contained herein, Willkie Farr & Gallagher LLP does not guarantee such accuracy and cannot be held liable for any errors in or any reliance upon this information. Under New York s Code of Professional Responsibility, this material may constitute attorney advertising. Prior results do not guarantee a similar outcome Fed. Reg
Lake Havasu City. Identity Theft Prevention Program
Lake Havasu City Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION Lake Havasu City (City) developed this Identity Theft Prevention Program (Program) pursuant to the
An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules
An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules By: Andrea J. Shaw, Esq., Compliance Officer, Gorham Savings
Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies
Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies The staff of the Board of Governors of the Federal Reserve System (FRB), Federal Deposit Insurance Corporation (FDIC), National
Red Flag Rules and Aging Services: What You Need to Know
Red Flag Rules and Aging Services: What You Need to Know Late in 2007, six federal agencies, including the Federal Trade Commission ( FTC ), jointly issued final rules and accompanying guidelines to implement
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
City of Wyoming, Michigan Administrative Policy
City of Wyoming, Michigan Administrative Policy Department: Administrative Services-Treasurer Department Head Approval: /s/ Andrea Boot City Manager Approval: /s/ Curtis L. Holt Subject: Identity Theft
IDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)
Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009
Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )
Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation
Guidelines to FTC Red Flag Rule(reformatted) Appendix A to Part 681 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 681.2 of this part requires each financial institution
Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business
Federal Trade Commission BCP Business Center business.ftc.gov Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business An estimated nine million Americans have their identities stolen
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate
ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.
ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...
FACTA Identity Theft Red Flags Program. www.chs.acfei.com
1 FACTA Identity Theft Red Flags Program Module 1 Fair and Accurate Credit Transactions Act Overview Identity thieves use individual s personal identifiable information to open new accounts and misuse
LEGAL EFFECT OF ERRONEOUS FILING OF A UNIFORM COMMERCIAL CODE TERMINATION FINANCING STATEMENT
CLIENT MEMORANDUM LEGAL EFFECT OF ERRONEOUS FILING OF A UNIFORM COMMERCIAL CODE TERMINATION FINANCING STATEMENT Two cases, one recently decided and one pending, address the question of whether unauthorized
Identity Theft Red Flags Rule
Identity Theft Red Flags Rule Frequently asked questions Overview The federal banking agencies, the National Credit Union Administration (NCUA) and the Federal Trade Commission (FTC) recently have issued
SWAP DEALER AND SECURITY-BASED SWAP DEALER DEFINED
CLIENT MEMORANDUM SWAP DEALER AND SECURITY-BASED SWAP DEALER DEFINED The Securities and Exchange Commission and Commodity Futures Trading Commission jointly adopted final rules 1 under Title VII of the
the definition of financial companies potentially subject to the orderly liquidation provisions;
CLIENT MEMORANDUM FDIC PROPOSES NEW ORDERLY LIQUIDATION AUTHORITY RULES ADDRESSING EXECUTIVE COMPENSATION CLAWBACK, PRIORITY OF CLAIMS AND ADMINISTRATIVE CLAIMS PROCEDURES On March 15, 2011, the FDIC released
Securities and Futures & Derivatives Alert
Securities and Futures & Derivatives Alert April 25, 2013 SECURITIES SEC and CFTC Issue Identity Theft Red Flags Rules I. Introduction On April 10, 2013, the Securities and Exchange Commission (SEC) and
S T R O O C K SPECIAL BULLETIN
S T R O O C K SPECIAL BULLETIN May 8, 2013 EXECUTIVE SUMMARY The CFTC and SEC have issued jointly a release setting forth final rules and guidelines requiring certain business entities subject to their
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED: I. Adoption of Identity Theft Prevention Program Doylestown Family Medicine, P.C.
Questions and Answers About the Identity Theft Red Flag Requirements
Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,
FEDERAL CIRCUIT HOLDS THAT HEIGHTENED PLEADING REQUIREMENTS APPLY TO FALSE MARKING ACTIONS
CLIENT MEMORANDUM FEDERAL CIRCUIT HOLDS THAT HEIGHTENED PLEADING REQUIREMENTS APPLY TO FALSE MARKING ACTIONS In a decision that will likely reduce the number of false marking cases, the Federal Circuit
Lincoln Financial Group. FTC/SEC Red Flags Identity Theft Prevention Program
Lincoln Financial Group FTC/SEC Red Flags Identity Theft Prevention Program Program Summary For Internal Use Only Table of Contents Page The Red Flags Rule 3 Key Points of the Program 4 Covered Accounts
RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009
RANDOLPH COUNTY PUBLIC WORKS Identity Theft Prevention Program Adopted September 1, 2009 Effective beginning September 1, 2009 I. PROGRAM ADOPTION The Randolph County Public Works Department ( the Department
Identity Theft Prevention Program (FACTA Identity Theft Red Flags Rule)
Identity Theft Prevention Program (FACTA Identity Theft Red Flags Rule) Overview The Fair and Accurate Credit Transactions Act of 2003 ("FACTA") requirement, known as the Identity Theft Red Flags Rule,
CLIENT MEMORANDUM CFTC AND SEC ADOPT DEFINITION OF SWAP AND SECURITY-BASED SWAP
CLIENT MEMORANDUM CFTC AND SEC ADOPT DEFINITION OF SWAP AND SECURITY-BASED SWAP The Commodity Futures Trading Commission and the Securities and Exchange Commission have issued joint final rules and interpretations
UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM
Doc. T08-109 Passed by the BoT 12/11/08 UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM The Board recognizes that some activities of the University are subject to the provisions of the Fair
PROVISIONS IDENTITY THEFT RED FLAG FAQS
R E D F L A G PROVISIONS 2 0 0 9 IDENTITY THEFT RED FLAG FAQS Provided to you by P r e p a r e d b y Eduard Goodman, J.D.,LL.M. Chief Privacy Officer I d e n t i t y T h e f t 9 11, L L C FREQUENTLY ASKED
Identity theft. A fraud committed or attempted using the identifying information of another person without authority.
SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE
Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009
Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program
RECENT CHANGES TO THE NEW YORK POWER OF ATTORNEY LAW
CLIENT MEMORANDUM RECENT CHANGES TO THE NEW YORK POWER OF ATTORNEY LAW Powers of attorney are commonly used in the asset management business, including in private funds and other investment arrangements,
University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule
NUMBER: BUSF 4.12 SECTION: SUBJECT: Finance and Planning University Identity Theft and Detection Program (NEW) DATE: March 3, 2011 Policy for: Procedure for: Authorized by: Issued by: All Campuses and
DHHS POLICIES AND PROCEDURES
DHHS POLICIES AND PROCEDURES Section VIII: Privacy and Security Identity Theft Policies, Identity Theft Red Flags and Address Discrepancy Identity Theft Policies Current Effective 2/1/16, 10/1/15 Date:
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM This program shall become effective November 1, 2008. Adopted this the 20 th day of October, 2008. I. PREFACE The purpose of this program is to detect,
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
IDENTITY THEFT AND MUNICIPAL UTILITIES
Minnesota Municipal Utilities Association IDENTITY THEFT AND MUNICIPAL UTILITIES Identity Theft and Red Flags Rule requirements The Red Flags Rule implements portions of the Fair and Accurate Credit Transactions
FEDERAL RESERVE AND FDIC PROPOSE NEW RULES REGARDING PREPARATION OF LIVING WILLS
CLIENT MEMORANDUM FEDERAL RESERVE AND FDIC PROPOSE NEW RULES REGARDING PREPARATION OF LIVING WILLS On March 29, 2011, the Board of Governors of the Federal Reserve System (the Federal Reserve ) and the
Identity Theft Regulation: Are you under the SEC/CFTC microscope?
Regulatory September 2013 brief A publication of PwC s financial services regulatory practice Identity Theft Regulation: Are you under the SEC/CFTC microscope? Overview Easy access to information has made
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Emergency Services
1 5 9 5 8 N a t i o n a l F u n e r a l D i r e c t o r s A s s o c i a t i o n 2 0 0 8
S A M P L E I D E N T I T Y T H E F T P R E V E N T I O N P R O G R A M F O R F U N E R A L H O M E S 1. I n t r o d u c t i o n : I f y o u r f u n e r a l h o m e u n d e r t a k e s a n y o f t h e
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM Effective May 1, 2009 Because [FACILITY NAME] offers and maintains covered accounts, as defined by 16 C.F.R. Part 681 (the Regulations ), [FACILITY NAME]
Treasury Department Proposes Anti-Money Laundering Regulations for Investment Advisers
CLIENT MEMORANDUM Treasury Department Proposes Anti-Money Laundering Regulations for Investment Advisers August 28, 2015 AUTHORS Benjamin J. Haskin Russell L. Smith Barbara Block On August 25, 2015, the
Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009
Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention
Identity Theft Prevention Program
Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity
21.01.04.Z1.01 Guideline: Identity Theft Prevention Program
Texas A&M Health Science Center Guidelines 21.01.04.Z1.01 Guideline: Identity Theft Prevention Program Approved October 7, 2009 Reviewed February 26, 2015 Supplements System Regulation 21.01.04 Reason
Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 9 Chapter 13,
University Policy: Identity Theft Prevention Policy
University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program
Identity Theft Prevention Policy
Eastern Kentucky University Policy and Regulation Library 6.#.#P Volume 6, Volume Title: Financial Affairs Chapter #, Chapter Title Section #, Name: Identity Theft Prevention Policy Approval Authority:
II. F. Identity Theft Prevention
II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal
