DSU Identity Theft Prevention Policy No. DSU
|
|
|
- Collin Copeland
- 10 years ago
- Views:
Transcription
1 IDENTITY THEFT PREVENTION DSU Policy No SOURCE: Fair and Accurate Credit Transactions (FACTA) of 2003; SBHE Section 802.7, Identity Theft Prevention Red Flag: A pattern, practice, or specific activity that indicates the possible existence of identity theft. Purpose To establish an Identity Theft Prevention Program designed to detect, prevent, and mitigate identity theft in connection with the opening of a covered account or an existing covered account and to provide for continued administration of the program in compliance with Part 681 of the Code of Federal Regulations implementing Sections 114 and 315 of the Fair and Accurate Credit Transactions Act (FACTA) of Definitions Identity Theft: Fraud committed or attempted using the identifying information of another person without authority. Covered Account: An account that Dickinson State University (DSU) offers or maintains primarily for personal or business purposes that involves or is designed to permit multiple payments or transactions. Covered accounts includes but is not limited to credit/debit card processing, financial aid information, student loan information, business accounts, payroll account information; student accounts granted credit; and any other account that DSU offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and soundness of DSU from identity theft, including financial operational, compliance, reputation, or litigation risks. Scope of Covered activities/ business processes, rules Any account or financial service that DSU offers or maintains for which there is reasonably foreseeable risk to customers or to the safety and soundness of DSU from identity theft, including financial operational, compliance, reputation, or litigation risks. Departments covered under the Red Flag Rule Any department that offers financial services. Red Flag Standards and Practices Many colleges, departments, and offices maintain files, both electronic and paper, of personal biographical, academic, health, financial, and admission records. These records may also include personal billing information, Perkins loans records, student institutional loans, and personal correspondence with employees, students, and parents. Policies to ensure compliance with Gramm Leach Bliley Act, Family Educational Rights and Privacy Act (FERPA), and Payment 1 P a g e
2 Card Industry security standards (PCI), system and application security, and internal control procedures provide an environment where identity theft opportunities are mitigated. Personal financial records are safeguarded to ensure the privacy and confidentiality of student, parents, alumni, and employees. The department of Human Resources may perform credit and criminal background checks on potential employees prior to their date of hire. The decision is dependent upon the type of position and the sensitivity of the data the employee may deal with. Staff who have access to HR and Payroll data have received training that non directory information regarding employees is not to be provided unless approved in writing by the employee. The student is required to submit a Release of Information form to the Office of Academic Records before FERPA information can be disclosed. A FERPA disclosure statement is sent out to students annually. Social Security numbers are confidential and are not used as identification numbers. All paper files should be maintained in locked filing cabinets when not in use. All offices, when not occupied, should be locked. Access to confidential data is restricted to those employees who have a need to know for performance of their duties. The inappropriate use of such access and/or use of administrative data may result in disciplinary action up to, and including, dismissal from the University. These employees receive training related to FERPA, Employee Data Privacy, and access to Red Flag regulations.. Employees and students should enter changes in name, address, telephone number or marital status in HRMS self-service and Campus Solutions offices as soon as possible. Employees and students should periodically verify and/or update emergency contacts in HRMS and Campus Solutions. Employees should periodically review their designated beneficiaries on insurance policies and retirement programs. The University ensures that all personal data e.g., date of birth, emplid, Social Security number, etc. is protected. DSU will not disclose personal information, except by written request or signed permission of the employee, student or vendor or if required by law. Faculty official personnel files are maintained in the Office of the Provost/Vice President for Academic Affairs (VPAA). Official staff personnel files are maintained in the Office of Human Resources. Employees have the right to review their personnel file. Personnel files, with the exception of personal data, are classified as open records according the North Dakota Century Code. Detecting Red Flag Activity Alerts, Notifications, or Warnings from a Consumer Reporting Agency: o A fraud or active duty alert is included with a consumer report. o A consumer reporting agency provides a notice of credit freeze in response to a request for a consumer report. o A consumer reporting agency provides a notice of address discrepancy, as defined in 41.82(b) of this part. o A consumer report indicates a pattern of activity that is inconsistent with the history and usual pattern of activity of an applicant or customer, such as: A recent significant increase in the volume of inquiries. An unusual number of recently established credit relationships. 2 P a g e
3 A material change in the use of credit, especially with respect to recently established credit relationships. An account that was closed for cause or identified for abuse of account privileges by a financial institution or creditor. Suspicious Documents o Documents appear to have been altered or forged. o The photograph or physical description on the identification is not consistent with the appearance of the applicant or customer presenting the identification. o Other information on the identification is not consistent with information provided by the person opening a new covered account or customer presenting the identification. o An application appears to have been altered or forged, or gives the appearance of having been destroyed and reassembled. Suspicious Personal Identifying Information o Personal identifying information provided is inconsistent when compared against external information sources used by the financial institution or creditor. Examples: the address does not match any address in the consumer report; or the Social Security Number has not been issued, or is listed on the Social Security Administration s Death Master File. o Personally identifying information provided by the customer is not consistent with other personal identifying information provided by the customer, e.g., there is a lack of correlation between the SSN range and the date of birth. o Personal identifying information provided is associated with known fraudulent activity as indicated by internal or third party sources used by the institution. Examples: The address on an application is the same as the address provided on a fraudulent application; or the phone number on an application is the same as the number provided on a fraudulent application. o Personal identifying information provided is of a type commonly associated with fraudulent activity as indicated by internal or third party sources used by the institution Examples: The address on an application is fictitious, a mail drop, or a prison; or the phone number is invalid, or is associated with a pager or answering service. o The SSN provided is the same as that submitted by other persons opening an account or other customers. o The address or telephone number provided is the same as or similar to the account number or telephone number submitted by an unusually large number of other persons opening accounts or other customers. o The person opening the covered account fails to provide all required personal identifying information on an application or in response to notification that the application is incomplete. 3 P a g e
4 o Personal identifying information provided is not consistent with personal information that is on file with the institution. o For financial institutions and creditors that use challenge questions, the person opening the covered account or the customer cannot provide authenticating information beyond that which generally would be available from a wallet or consumer report. Unusual Use of, or Suspicious Activity Related to, the Covered Account o Shortly, following the notice of a change of address for a covered account, the institution receives a request for new, additional, or replacement cards, or the addition of authorized users on the account. o The covered account is used in a manner commonly associated with known patterns of fraud. Example: The customer fails to make the first payment or makes an initial payment but no subsequent payments. o A covered account is used in a manner that is not consistent with established patterns of activity on the account. Examples: Nonpayment when there is no history of late or missed payments; a material increase in use of available credit; a material change in purchasing or spending patterns; a material change in electronic fund transfer patterns in connection with a deposit account; or a material change in telephone call patterns in connection with a phone account (can be cellular or landline). o A covered account that has been inactive for a reasonably lengthy period of time is used (taking into consideration the type of account, the expected pattern of usage and other relevant factors). o Mail sent to customer is returned repeatedly as undeliverable although transactions continue to be conducted in connection with the customer s covered account. o The institution is notified the customer is not receiving paper account statements. o The institution is notified of unauthorized charges or transactions in connection with a customer s covered account. Notice from Customers, Victims of Identity Theft, Law Enforcement Authorities, or Other Persons Regarding Possible Identity Theft in Connection with Covered Accounts Held by the Institution. Responding to Red Flags Should an employee identify a red flag, they are instructed to bring it to the attention of their immediate supervisor. The supervisor will investigate the threat of identity theft to determine if there has been a breach and will respond appropriately to prevent future identity theft breaches. Additional actions may include notifying and cooperating with appropriate law enforcement and notifying the student or employee of the attempted fraud. 4 P a g e
5 Oversight of Service Providers Collection agency data sharing procedure: o Whenever a service provider is engaged to perform an activity in connection with one or more covered accounts, the institution should take steps to ensure the activity of the service provider is conducted in accordance with reasonable policies and procedures designed to detect, prevent, and mitigate the risk of identity theft. Thus, the guidelines make clear that a service provider that provides services to multiple financial institutions and creditors may do so in accordance with its own program to prevent identity theft, as long as the program meets the requirements of the regulations. Plan Responsibility, Review, Updates, and Approval Responsibility for DSU s Identity Theft Prevention Program is assigned to a team comprised of the following positions: Position Director of Financial Aid Director of Information Technology Services Controller Coordinator of Student Accounts Coordinator of Human Resources Director of Academic Records These positions will work together and be responsible for coordinating DSU s Identity Theft Prevention Program including the following: Identify relevant patterns, practices, and specific forms of activity that are red flags signaling possible identity theft and incorporate those red flags into the program; Detect red flags that have been incorporated into the program; and Respond appropriately to any red flags that are detected to prevent and mitigate theft. 5 P a g e
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0 Scope: The risk to Loyola University Chicago and its faculty, staff and students
University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)
University of St. Thomas Identity Theft Prevention Program (Red Flags Regulation Response) Revised: January 10, 2013 Program Adoption and Administration The University of St. Thomas ( University ) established
University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule
NUMBER: BUSF 4.12 SECTION: SUBJECT: Finance and Planning University Identity Theft and Detection Program (NEW) DATE: March 3, 2011 Policy for: Procedure for: Authorized by: Issued by: All Campuses and
Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation
Guidelines to FTC Red Flag Rule(reformatted) Appendix A to Part 681 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 681.2 of this part requires each financial institution
Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions
Reference: Fair and Accurate Credit Transactions Act, ( Pub. L. 108-159) The purpose of the Identity Theft Prevention Program (ITPP) is to control reasonably foreseeable risks to students from identity
identity TheFT PREVENTION Programs and Response
IDENTITY THEFT PREVENTION PROGRAM This program is launched in response to the Federal Trade Commission Red Flag Rules and Address Discrepancy Rules in conjunction with the Fair and Accurate Credit Transaction
University Policy: Identity Theft Prevention Policy
University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for
Red Flag Identity Theft Financial Policy 1.10
Issued: 05/16/2014 Revised: Policy and College ( Seminary ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's ( FTC ) Red Flags Rule, which implements
EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);
EXHIBIT A Identity Theft Protection Program Definitions. For purposes of the Policy, the following definitions apply (1); A. City means: the City of Troy, Montana B. Covered Account means: An account that
MCPHS IDENTITY THEFT POLICY
SECTION 1: BACKGROUND MCPHS IDENTITY THEFT POLICY The risk to the College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM This program shall become effective November 1, 2008. Adopted this the 20 th day of October, 2008. I. PREFACE The purpose of this program is to detect,
31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003,
5/23/2011 31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, Public Law 108-159, requires municipalities to promulgate
DMACC IDENTITY THEFT- RED FLAGS PROCEDURES
DMACC IDENTITY THEFT- RED FLAGS PROCEDURES This document contains identity theft red flag procedures for Des Moines Area Community College. Section Topic Page 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 XX PURPOSE
University of Tennessee's Identity Theft Prevention Program
IDENTITY THEFT PREVENTION PROGRAM 1. BACKGROUND The University of Tennessee (UT) developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission s Red Flags Rule, Section 114
CHAPTER 12 IDENTITY PROTECTION AND IDENTITY THEFT PREVENTION POLICIES
CHAPTER 12 IDENTITY PROTECTION AND IDENTITY THEFT PREVENTION POLICIES Section 1-12-1: Purpose 1-12-2: Definitions 1-12-3: Scope 1-12-4: Identity Protection Policy 1-12-5: Identity Theft Prevention Policy
Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009
Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program
Detecting, Preventing, and Mitigating Identity Theft
THE RED FLAGS RULE Detecting, Preventing, and Mitigating Identity Theft Training for Ball State University s Identity Theft Protection Program What is the Red Flag Rule? Congress passed the Fair and Accurate
Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY I. POLICY SUMMARY It shall be the policy of Polk County Rural Public Power District (PCRPPD) to take all reasonable steps to identify, detect, and prevent
Red Flags Identity Theft Training Program. Fall 2015
Red Flags Identity Theft Training Program Fall 2015 Background In 2003, U.S. Congress enacted the Fair and Accurate Credit Transactions Act of 2003 (FACTA). FACTA requires creditors to adopt policies and
Red Flag Rules and Aging Services: What You Need to Know
Red Flag Rules and Aging Services: What You Need to Know Late in 2007, six federal agencies, including the Federal Trade Commission ( FTC ), jointly issued final rules and accompanying guidelines to implement
FACTA Identity Theft Red Flags Program. www.chs.acfei.com
1 FACTA Identity Theft Red Flags Program Module 1 Fair and Accurate Credit Transactions Act Overview Identity thieves use individual s personal identifiable information to open new accounts and misuse
UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM
Doc. T08-109 Passed by the BoT 12/11/08 UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM The Board recognizes that some activities of the University are subject to the provisions of the Fair
3344-19-01 Identity theft prevention program and red flag compliance policy.
3344-19-01 Identity theft prevention program and red flag compliance policy. (A) Program adoption Cleveland state university has developed this identity theft prevention program ( program ) pursuant to
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009
Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 9 Chapter 13,
IDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)
Facts About FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM SUMMARY OF OUR PROGRAM AND PROCESSES This dealership is committed to protecting its customers and itself from identity
Identity Theft Prevention Program
Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity
DHHS POLICIES AND PROCEDURES
DHHS POLICIES AND PROCEDURES Section VIII: Privacy and Security Identity Theft Policies, Identity Theft Red Flags and Address Discrepancy Identity Theft Policies Current Effective 2/1/16, 10/1/15 Date:
Identity Theft Prevention Program. Effective: November 1, 2009
Identity Theft Prevention Program Effective: November 1, 2009 I. BACKGROUND Galveston College ("College" / Institution ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal
Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate
Identification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft
George Mason University Identity Theft Prevention Program - Procedures Revised September 30, 2012 Identification of, ing, and Preventing and Mitigating Identity Theft IDENTIFICATION OF COVERED ACCOUNT
PROVISIONS IDENTITY THEFT RED FLAG FAQS
R E D F L A G PROVISIONS 2 0 0 9 IDENTITY THEFT RED FLAG FAQS Provided to you by P r e p a r e d b y Eduard Goodman, J.D.,LL.M. Chief Privacy Officer I d e n t i t y T h e f t 9 11, L L C FREQUENTLY ASKED
Physician Office Compliance with the Red Flag Rule
Physician Office Compliance with the Red Flag Rule The Red Flag Rule, implemented by the Federal Trade Commission (FTC) on May 1, 2009, requires all financial institutions and creditors, including physician
Identity theft. A fraud committed or attempted using the identifying information of another person without authority.
SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE
