identity Theft - Every Loan Originator Needs to Know This

Size: px
Start display at page:

Download "identity Theft - Every Loan Originator Needs to Know This"

Transcription

1 Module 4 Module 4 Identity Theft

2 Explanation: This pdf is only a copy of the module slides. To proceed through the course, you must read and click through each slide.

3 Fighting Identity Theft What EVERY Loan Originator should know Identity Theft Presentation Overview The Identity Theft Problem The Impact of Identity Theft The Identity Theft Assumption and Deterrence Act The Fair and Accurate Credit Transactions Act (FACTA) RED Flags Rule and RED Flag Triggers

4 A short clip from the Federal Trade Commission

5 Access to Information Living in the Information Age Many areas of our society including Military, Law Enforcement, Financial and Healthcare REQUIRE immediate access to massive amounts of information. Safeguarding that information from getting into the wrong hands is a constant challenge. Prevention Detection Protection mitigation

6 Five types of Identity Theft Loan officers and Realtors be aware It is far more than bank accounts and credit card numbers, there are often serious legal complications! You likely know someone who has been the victim of Identity Theft

7 How does it happen? Here are some of the ways it happens ILLEGAL ONLINE AUCTION sites where millions of credit card numbers are bought and sold. Credit card numbers are bid on like it s ebay. In fact, full identities are bid on, often for less than $25. According to Shawn Henry, the FBI s top Cyber Expert Lost or Stolen Wallets; Stealing information during a Payment Transaction; Friendly Theft, or identity theft by fellow employees, friends, family members, or other people you know; Online Methods, like e mail phishing schemes; Data Breaches, or hacking into company systems to gain customer information; Mailbox Raiding and Dumpster Diving for your personal and financial information Shred all personal information Bills, bank statements, invoices or records of any kind can be used by an identity thief.

8 Identity Theft is Everywhere

9 Identity Theft is spiraling out of control Over 550 million American s Identities have been reported lost or stolen since Jan PrivacyRights.org Over 400,000 Dead People opened Bank accounts last year AARP The revenue from trafficking financial data has surpassed that of drug trafficking. Secret Service March 2007 Every Three seconds (30,000 times per day) someone becomes a victim of Identity Theft. USA TODAY Identity Theft has no respect to race, gender, creed, nationality, political affiliation, financial standing, or credit rating... According to the FBI, less than 1 in 700 Identity Thieves get caught!

10 Identity Theft is spiraling out of control Almost 60% of victims had NEW ACCOUNTS opened in their name* Close to 70% had warrants issued for their arrest* 82% found out through an adverse action* Out of pocket cost to the average victim $1,800 $5,000* Victims spent an average of 600 hours trying to clean up the mess.. (CNBC Report 2011) 63% could not get their credit reports cleared 22% have their SSN tied to someone else s 19% had their fraud alerts ignored

11 How we are Affected by Identity Theft? Identity Theft and the Legal Issues that often occur can be life changing events Identity Theft is a legal issue* According to the FTC, Identity Theft Victims can spend 600+ hours to restore their Identity and between $1200 $5000 in associated expenses* Employees suffering the effects of Identity Theft can cost employers over $600 per year* Harris Interactive Employees with problems often become problem employees. *As a loan officer or Realtor, becoming a victim of Identity Theft could effect your ability to earn a living.

12 Identity Theft is Everywhere, who can we trust? Often, those we routinely trust, violate that trust Government Employees Medical Personnel Legal Counsel University Administrators Bank Officers Loan Officers Realtors Postal Inspectors

13 Where Are We Now? Identity Theft is spiraling out of control. Which of the following is not true about Identity Theft? a. Over 550 million American s Identities have been reported lost or stolen since Jan PrivacyRights.org b. Over 400,000 Dead People opened Bank accounts last year AARP c. The revenue from trafficking financial data has surpassed that of drug trafficking. Secret Service March 2007 d. According to the FBI, most Identity Thieves get caught! Over 550 million American s Identities have been reported lost or stolen since Jan PrivacyRights.org Over 400,000 Dead People opened Bank accounts last year AARP The revenue from trafficking financial data has surpassed that of drug trafficking. Secret Service March 2007 Every Three seconds (30,000 times per day) someone becomes a victim of Identity Theft. USA TODAY Identity Theft has no respect to race, gender, creed, nationality, political affiliation, financial standing, or credit rating... According to the FBI, less than 1 in 700 Identity Thieves get caught!

14 Identity Theft is Everywhere, who can we trust? Download Story Here

15 Identity Theft is Everywhere, who can we trust? Download Story Here

16 Being Careless, What can Happen? Mortgage Broker who discarded consumers personal financial records in a publicly accessible dumpster paid a $35,000 civil penalty to settle FTC charges Information Security Laws mandate the destruction of information about your customers, employees, or patients. Download Story Here

17 WAGING WAR in the Fight IDENTITY THEFT The Identity Theft and Assumption Deterrence Act of U.S.C DEFINITION OF IDENTITY THEFT Knowingly transfer or use, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law.

18 WAGING WAR in the Fight IDENTITY THEFT The Identity Theft and Assumption Deterrence Act of U.S.C Act addresses the problem of Identity Theft by focusing on consumers as victims S. Rep. No , at 4 (1998). Penalties for Violations Violators are generally subject to a fine and/or imprisonment of up to 15 years. 1028(b)(1)(D).

19 What Loan Originators Must Know about FACTA The Fair and Accurate Credit Transactions ACT The Fair and Accurate Credit Transactions Act (which is also sometimes known as FACTA or the FACT Act) was enacted by Congress in 2003 (although some parts of it did not go fully into effect until late 2004) as a part of an overall effort to better assist individual consumers who have been victims of identity theft and/or have inaccurate reporting on their personal credit reports. The law can be found at 15 USC 1681 et seq. The Act provides uniform national standards for the credit markets, and strong Consumer Protections. Intended to primarily help Consumers fight the growing crime of identity theft. The Fair and Accurate Credit Transaction Act of 2003 (FACTA) amends the federal Fair Credit Reporting Act (FCRA, 15 U.S.C et seq.)

20 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION Fraud Alerts and Active Duty Alerts Establishes a nationwide system of fraud alerts for consumers to place on their credit files (FACTA 112,FCRA 605A(a)(1)). ONE Call Fraud Alert Call one reporting agency, that agency will notify the others Establishment of Procedures for the Identification of Possible Instances of Identity Theft

21 Fraud Alerts and Active Duty Alerts FACTA 112 FACTA creates a national system of fraud detection to make identity thieves more likely to be caught. Previously, victims would have to make phone calls to all of their credit card companies and three major credit rating agencies to alert them to the crime. Now, consumers will only need to make one call FACTA 112, FCRA 605A(a)) to receive advice, set off a nationwide fraud alert, and protect their credit standing. FACTA also establishes a nationwide system of fraud alerts for consumers to place on their credit files. FACTA allows the consumer to contact the credit reporting agency and flag their account (FACTA 112, FCRA 605A(a)(1)). These fraud alerts are placed on the report for 90 days (FACTA 112, FCRA 605A(a)(1)(A)), but may be extended. Credit reporting agencies that receive such alerts from customers will now be obliged to follow procedures to ensure that any future requests are by the true consumer, not an identity thief posing as the consumer. In most cases the creditor is required to contact the consumer at a telephone number authorized by the consumer (FACTA 112, FCRA 605A (h)(1)(b)(ii)). The law also will enable active duty military personnel to place special alerts on their files when they are deployed overseas (FACTA 112, FCRA 605A(c)(1)(2)(3).

22 Truncation of Credit Card and Debit Card Account Numbers FACTA 113 FACTA FACTA helps prevent identity theft before it occurs by requiring merchants to leave all but the last five digits of a credit card number off store receipts (FACTA 113(g)(1)). The credit card s expiration date must not be printed on any receipt (FACTA 113(g)(1)). FACTA will make sure that slips of paper that most people throw away do not contain their credit card number, a key to their financial identities. This provision is enforced with statutory damages ranging from $100 to $1000 per violation, and when claims are aggregated in a class action class (brought by all the customers of a retailer that failed to truncate credit card numbers) the amount of damages can be massive. The provision excludes receipts that are handwritten or imprinted, where the only method of recording the credit card number is by such means. The act did not become effective for three years after its enactment for any cash register manufactured before January 1, 2005 and did not become effective for one year after its enactment for any cash register manufactured after January 1, 2005.

23 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) 114 The RED FLAGS Rule Red Flag: means a pattern, practice, or specific activity that indicates the possible existence of identity theft. Look for Red Flags Red Flags Rule Joint Rule Making Red Flag provision, requires that the Federal Trade Commission and Federal Banking Agencies issue identity theft program guidelines and Regulations Final Rules Published November 9, 2007

24 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) Red Flags Rule (Continued) A financial institution is: A state or national bank A state or federal savings and loan association A mutual savings bank A state or federal credit union, or Any other person that directly or indirectly holds a transaction account belonging to a consumer Section l.90(b)(7) A covered account is: A consumer account designed to permit multiple payments or transactions, and any other account for which there is a reasonably foreseeable risk from identity theft Section l.90(b)(3)

25 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) Red Flags Rule (Continued) Must include policies and procedures to: Identify relevant red flags and incorporate them into the Program Detect red flags that are part of the Program Respond appropriately to any red flags that are detected Ensure the Program is updated periodically to address changing risks Section l.90(d)(1)

26 Red Flag Rule (continued) Under the Red Flags Rules, mortgage loan originators must develop a written program that identifies and detects the warning signs of identity theft. A Red Flag compliance program should address and detail company policies and procedures that protect against identity theft during the processing of a mortgage loan application. The program must also describe appropriate responses that would prevent and mitigate if a security breach occurs and detail a plan to update the program (FCRA ). The program must be managed by the Board of Directors or senior employees of the financial institution or creditor, include appropriate staff training, and provide for oversight of any service providers. Penalties for noncompliance The FTC can seek both monetary civil penalties and injunctive relief for violations of the Red Flags Rule. Where the complaint seeks civil penalties, the U.S. Department of Justice typically files the lawsuit in federal court, on behalf of the FTC. Currently, the law sets $3,500 as the maximum civil penalty per violation. Each instance in which the company has violated the Rule is a separate violation. Injunctive relief in cases like this often requires the parties being sued to comply with the law in the future, as well as provide reports, retain documents, and take other steps to ensure compliance with both the Rule and the court order. Failure to comply with the court order could subject the parties to further penalties and injunctive relief. Source: The Red Flags Rule: Frequently Asked Questions,

27 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) FACTA Identity Theft "Red Flags What Business Owners Must Know about FACTA FACTA Regulations provide the following 26 examples of activities that may indicate potential identity theft and raise a Red Flag. Source: Supplement A to Appendix J Appendix J to Part 334 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

28 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) FACTA Identity Theft "Red Flags FACTA Regulations provide the following 26 examples of activities that may indicate potential identity theft and raise a Red Flag. Alerts, Notifications or Warnings from a Consumer Reporting Agency 1. A fraud alert included with a consumer report. 2. Notice of a credit freeze in response to a request for a consumer report. 3. A consumer reporting agency providing a notice of address discrepancy. 4. Unusual credit activity, such as an increased number of accounts or inquiries. Source: Appendix J Section IIb and Supplement A to Appendix J.

29 Where Are We Now? The Identity Theft and Assumption Deterrence Act of 1998 (18 U.S.C. 1028) addresses the problem of Identity Theft by focusing on consumers as victims. Violators of the ACT are generally subject to a fine and/or imprisonment of up to: a. 15 years. b. 7 years c. 30 years d. 1 year This law criminalizes fraud as it relates to the unlawful theft and misuse of personal identifying information, regardless of whether the information appears or is used in documents, software, or computer files. Violators are generally subject to a fine and/or imprisonment of up to 15 years. The law also makes it a crime to aid anyone in the theft or fraudulent use of identifying information. The Act makes identity theft a Federal crime with penalties up to 15 years imprisonment and a maximum fine of $250,000.

30 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) FACTA Identity Theft "Red Flags FACTA Regulations provide the following 26 examples of activities that may indicate potential identity theft and raise a Red Flag. Presentation of suspicious documents 5. Documents provided for identification appearing altered or forged. 6. Photograph on ID inconsistent with appearance of customer. 7. Information on ID inconsistent with information provided by person opening account. 8. Information on ID, such as signature, inconsistent with information on file at financial institution. 9. Application appearing forged or altered or destroyed and reassembled. Source: Appendix J Section IIb and Supplement A to Appendix J.

31 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) FACTA Identity Theft "Red Flags FACTA Regulations provide the following 26 examples of activities that may indicate potential identity theft and raise a Red Flag. Presentation of suspicious documents 10. Information on ID not matching any address in the consumer report, Social Security number has not been issued or appears on the Social Security Administration's Death Master File, a file of information associated with Social Security numbers of those who are deceased. 11. Lack of correlation between Social Security number range and date of birth. Source: Appendix J Section IIb and Supplement A to Appendix J.

32 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) FACTA Identity Theft "Red Flags FACTA Regulations provide the following 26 examples of activities that may indicate potential identity theft and raise a Red Flag. 12. Personal identifying information associated with known fraud activity. 13. Suspicious addresses supplied, such as a mail drop or prison, or phone numbers associated with pagers or answering service. Source: Appendix J Section IIb and Supplement A to Appendix J.

33 Where Are We Now? FACTA allows the consumer to contact the credit reporting agency and flag their account. These fraud alerts are placed on the report for a. 90 days b. 30 days c. 6 months d. 1 year FACTA gives the consumer the right to contact a credit reporting agency to flag their account. To place a fraud alert, the consumer must provide proof of their identity to the credit bureau. The fraud alert is initially effective for 90 days, but may be extended at the consumer s request for seven years when they provide a police report to the credit bureaus that indicates they are a victim of identity theft.

34 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) FACTA Identity Theft "Red Flags FACTA Regulations provide the following 26 examples of activities that may indicate potential identity theft and raise a Red Flag. Suspicious activity relating to a covered account 14. Social Security number provided matching that submitted by another person opening an account or other customers. 15. An address or phone number matching that supplied by a large number of applicants. Source: Appendix J Section IIb and Supplement A to Appendix J.

35 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) FACTA Identity Theft "Red Flags FACTA Regulations provide the following 26 examples of activities that may indicate potential identity theft and raise a Red Flag. 16. The person opening the account unable to supply identifying information in response to notification that the application is incomplete. 17. Personal information inconsistent with information already on file at financial institution or creditor. 18. Person opening account or customer unable to correctly answer challenge questions. Source: Appendix J Section IIb and Supplement A to Appendix J.

36 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) FACTA Identity Theft "Red Flags FACTA Regulations provide the following 26 examples of activities that may indicate potential identity theft and raise a Red Flag. 19. Shortly after change of address, creditor receiving request for additional users of account. 20. Most of available credit used for cash advances, jewelry or electronics, plus customer fails to make first payment. 21. Drastic change in payment patterns, use of available credit or spending patterns. Source: Appendix J Section IIb and Supplement A to Appendix J.

37 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) FACTA Regulations provide the following 26 examples of activities that may indicate potential identity theft and raise a Red Flag. 22. An account that has been inactive for a lengthy time suddenly exhibiting unusual activity. 23. Mail sent to customer repeatedly returned as undeliverable despite ongoing transactions on active account. Financial institution or creditor notified of unauthorized charges or transactions on customer's account. Be on the look out for "Red Flags"

38 TITLE I IDENTITY THEFT PREVENTION AND CREDIT HISTORY RESTORATION (Continued) Any notices received from identify theft victims, law Enforcement authorities, or other parties containing information related to identity theft as to covered accounts. 24. Financial institution or creditor notified that customer is not receiving paper account statements. 25. Financial institution or creditor notified of unauthorized charges or transactions on customer's account. 26. Financial institution or creditor notified that it has opened a fraudulent account for a person engaged in identity theft. When does FACTA s Red Flag Rules take effect and what is the deadline for compliance? December 31, 2010 Source: Appendix J Section IIb and Supplement A to Appendix J.

39 FACTA noncompliance can mean severe fines and even class action lawsuits, including: Civil Liability actual damages sustained if identity is stolen as a result of corporate inaction or statutory damages up to $1,000 per employee. Class Action Lawsuits If large numbers of employees are affected, they may be able to bring classaction suits and get punitive damages from employers. [15 U.S.C. 1681n] Federal Fines up to $2,500 for each violation. [15 U.S.C. 1681n]

40 TITLE II IMPROVEMENTS IN USE OF AND CONSUMER ACCESS TO CREDIT INFORMATION Free Consumer Reports FACTA 211 Consumers have the right to obtain one free copy of their credit report from Experian, Trans Union, Equifax and CoreLogic credit bureaus every 12 Months. is the ONLY place you can get your annual credit report for free. One free report from EACH one annually. Each national credit bureau must provide, at no charge, a report within 15 days of a request (FACTA 211(C)(2)). Free reports are available through a dedicated web site, As 2012, all four reporting agencies will provide one free report each year.

41 TITLE II IMPROVEMENTS IN USE OF AND CONSUMER ACCESS TO CREDIT INFORMATION FALSE CLAIMS LEAD TO HEAVY FINES Download Story Here

42 TITLE II IMPROVEMENTS IN USE OF AND CONSUMER ACCESS TO CREDIT INFORMATION Disclosure of Credit Scores 212 Mortgage loan originators must provide credit scores, and information on key factors lowering a consumer s score to those who apply for mortgages (FACTA 212) As a mortgage loan originator, you must provide this*.

43 Where Are We Now? One FACTA identity theft related provision requires the "truncation" of account numbers on electronic credit and debit card receipts. Specifically, electronically printed credit and debit card receipts provided to consumers shall not include more than the: a. Last three digits of the card number or the expiration date. b. Last five digits of the card number only. c. Cardholder s full name. d. Last five digits of the card number or the expiration date. FACTA helps prevent identity theft before it occurs by requiring merchants to leave all but the last five digits of a credit card number off store receipts (FACTA 113(g)(1)). The credit card s expiration date must not be printed on any receipt (FACTA 113(g)(1)).

44 TITLE II IMPROVEMENTS IN USE OF AND CONSUMER ACCESS TO CREDIT INFORMATION Disposal of Consumer Reports 216 The disposal rule requires covered entities that maintain or possess consumer report information for a business purpose to take reasonable measures to protect against unauthorized access to or use of the In formation in connection with its disposal. Federal Register (69 FR 68690) Rule 30(b)(2)(i) You MUST Dispose of Documents Properly

45 TITLE II IMPROVEMENTS IN USE OF AND CONSUMER ACCESS TO CREDIT INFORMATION Reasonable Measures include but is NOT limited to: Burning, pulverizing or shredding of information Destruction or erasure of electronic media so that information cannot be read or reconstructed You MUST Dispose of Documents Properly Federal Register (69 FR 68690) Rule 30(b)(2)(i)

46 TITLE III ENHANCING THE ACCURACY of CONSUMER REPORT INFORMATION Reconciling Addresses 315 The Address Discrepancy Rule National CRAs are required to issue a notice of address discrepancy when an address provided by a user requesting a consumer report substantially differs from the address the CRA has on file for that consumer.

47 Identity Theft prevalent in the work place Fighting Fraud with the Red Flags Rule Active enforcement is now in place, regulators are increasingly taking action against violators. Taking steps now to protect your company, employees and customers will go a long way towards reducing any potential liabilities should a breach occur at your company.

48 What you MUST know about Identity Theft Federal and State Governments have enacted various laws including: FACTA Red Flag Rules Gramm, Leach Bliley 2006 False Claims Act Various state laws YOU may be held RESPONSIBLE! These laws now potentially make your company and even you as an employee/associate/ or Agent liable for losing information. Some of these violations include fines up to $1,000,000 and up to 10 years in jail.

49 Steps you MUST take against Identity Theft It is important for you to understand that these laws require companies to: Appoint an Information Security Officer in writing; either an officer of the company or senior level employee Develop a written plan and policy to protect the non public information of employees and customers Conduct regularly scheduled training for all employees and staff including employees at satellite offices and temporary help Oversee service provider arrangements the Red Flag Guidelines state that a financial institution or creditor is responsible for ensuring the service provider s compliance with the Red Flags Rules.

50 IMPORTANT, Employers are RESPONSIBLE A rise in identity theft is presenting employers with a major headache: They are being held liable for identity theft that occurs in the workplace. Douglas Hottle, Meyer, Unkovic & Scott, Workplace Identity Theft: How to Curb an HR Headache BLR: Business and Legal Reports, September 19, 2006 *(Identity Theft Resource Center 2007)

51 Implement a clean desk policy Identity Theft in the Workplace Pictures taken with cell phone camera after waiting several minutes for someone to respond.

52 Where Are We Now? FACTA makes it possible for every consumer to review a free report every year for unauthorized activity, including activity that might be the result of identity theft. Each national credit bureau must provide: a. A report free of charge within 15 days of the request. b. Access to a report for a fee. c. A report only if the consumer has been denied credit in the past 30 days. d. A report free of charge within 30 days of the request. Free Consumer Reports FACTA 211 This law makes it possible for every consumer to review a free report every year for unauthorized activity, including activity that might be the result of identity theft. Each national credit bureau must provide, at no charge, a report within 15 days of a request (FACTA 211(C)(2)). Reports are available though the web site, by telephone at (877) or by mail. To receive a credit report by mail go to, www. annualcreditreport.com/cra.requestformfinal.pdf

53 Implement a clean desk policy Identity Theft in the Workplace Cell phones and personal files are at risk Access to the computer, mail and other documents possible.

54 IDENTITY THEFT in the Work Place Think about your company s Red Flag Compliance Program. What does you companies Red Flag program look like? Do you receive training on a on going basis?

55 Special care MUST be taken at the work place In Summary Identity Theft Laws have become increasingly restrictive in recent years and are likely to continue to do so. *Security risks will continue to increase due to the massive volume of personal information that is collected, disclosed, and used on a daily basis in the United States. Important steps you can take right now include: *You MUST be aware of the increasing legal obligation arising from identity theft risks and establish reasonable information security practices to protect the personal information in your possession. Sources of Information include: Federal Trade Commission, Texas Attorney General, Privacy Rights Clearinghouse, Consumer Sentinel, WJS, USA Today, CNN, IDTI, PPL, ITAG, 60 Minutes, Human Resource Executive, Texas Business Today, Magtek, Inc., Jack Henry & Associates, Inc., msnbc.com

56 Module 4 End of Module 4 Identity Theft Proceed to the Module 4 quiz

Identity Theft Prevention Policy. Effective Date: January 1, 2011. Policy Statement

Identity Theft Prevention Policy. Effective Date: January 1, 2011. Policy Statement Identity Theft Prevention Policy Effective Date: January 1, 2011 Policy Statement Identity Theft is a crime in which an individual wrongfully obtains and uses another person's personal data, usually for

More information

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Guidelines to FTC Red Flag Rule(reformatted) Appendix A to Part 681 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 681.2 of this part requires each financial institution

More information

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the

More information

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0 Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0 Scope: The risk to Loyola University Chicago and its faculty, staff and students

More information

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg. ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...

More information

Wholesale Broker Red Flag/Identity Theft Prevention Program Certification

Wholesale Broker Red Flag/Identity Theft Prevention Program Certification Wholesale Broker Red Flag/Identity Theft Prevention Program Certification Federal regulations require that all financial institutions and their affiliates create an identity theft prevention program in

More information

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule NUMBER: BUSF 4.12 SECTION: SUBJECT: Finance and Planning University Identity Theft and Detection Program (NEW) DATE: March 3, 2011 Policy for: Procedure for: Authorized by: Issued by: All Campuses and

More information

IDENTITY THEFT PROCEDURES

IDENTITY THEFT PROCEDURES IDENTITY THEFT PROCEDURES FREQUENTLY ASKED QUESTIONS ABOUT IDENTITY THEFT INCIDENTS AND RED FLAGS Q1: How is a Red Flags incident different from a data security breach? A1: A data security breach is the

More information

Detecting, Preventing, and Mitigating Identity Theft

Detecting, Preventing, and Mitigating Identity Theft THE RED FLAGS RULE Detecting, Preventing, and Mitigating Identity Theft Training for Ball State University s Identity Theft Protection Program What is the Red Flag Rule? Congress passed the Fair and Accurate

More information

DSU Identity Theft Prevention Policy No. DSU 802.7.001

DSU Identity Theft Prevention Policy No. DSU 802.7.001 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 IDENTITY THEFT PREVENTION DSU Policy No. 802.7.001 SOURCE: Fair and Accurate

More information

FACTA Identity Theft Red Flags Program. www.chs.acfei.com

FACTA Identity Theft Red Flags Program. www.chs.acfei.com 1 FACTA Identity Theft Red Flags Program Module 1 Fair and Accurate Credit Transactions Act Overview Identity thieves use individual s personal identifiable information to open new accounts and misuse

More information

PROVISIONS IDENTITY THEFT RED FLAG FAQS

PROVISIONS IDENTITY THEFT RED FLAG FAQS R E D F L A G PROVISIONS 2 0 0 9 IDENTITY THEFT RED FLAG FAQS Provided to you by P r e p a r e d b y Eduard Goodman, J.D.,LL.M. Chief Privacy Officer I d e n t i t y T h e f t 9 11, L L C FREQUENTLY ASKED

More information

Deer Park Independent School District. Identity Theft Policy and Board of Trustees Resolution

Deer Park Independent School District. Identity Theft Policy and Board of Trustees Resolution Deer Park Independent School District Identity Theft Policy and Board of Trustees Resolution Deer Park, Texas ORDINANCE AND RESOLUTION A RESOLUTION ADOPTING AN IDENTITY THEFT POLICY WHEREAS, The Fair and

More information

Central Oregon Community College. Identity Theft Prevention Program

Central Oregon Community College. Identity Theft Prevention Program Central Oregon Community College Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION This program has been created to put COCC in compliance with Section 41.90 under the

More information

DHHS POLICIES AND PROCEDURES

DHHS POLICIES AND PROCEDURES DHHS POLICIES AND PROCEDURES Section VIII: Privacy and Security Identity Theft Policies, Identity Theft Red Flags and Address Discrepancy Identity Theft Policies Current Effective 2/1/16, 10/1/15 Date:

More information

Red Flag Rules and Aging Services: What You Need to Know

Red Flag Rules and Aging Services: What You Need to Know Red Flag Rules and Aging Services: What You Need to Know Late in 2007, six federal agencies, including the Federal Trade Commission ( FTC ), jointly issued final rules and accompanying guidelines to implement

More information

These rules became effective August 1, 2009, and require certain agencies to implement an identity theft program and policy.

These rules became effective August 1, 2009, and require certain agencies to implement an identity theft program and policy. Red Flag Policy Protecting your privacy is of paramount importance at Missouri Southern State University, and we are dedicated to the responsible handling of your personal information. We are very committed

More information

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES 1. PROCEDURE SUMMARY STATMENT The purpose of this procedure

More information

California State University, Chico. Identity Theft Prevention Red Flags Program

California State University, Chico. Identity Theft Prevention Red Flags Program Identity Theft Prevention Red Flags Program Version 1.0 November 16, 2010 REVIEW/APPROVAL HISTORY Document Title: Author: Brooke F. Banks, Information Security Officer Date By Action Pages 10/30/2009 Bill

More information

Questions and Answers About the Identity Theft Red Flag Requirements

Questions and Answers About the Identity Theft Red Flag Requirements Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,

More information

Red Flag Identity Theft Financial Policy 1.10

Red Flag Identity Theft Financial Policy 1.10 Issued: 05/16/2014 Revised: Policy and College ( Seminary ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's ( FTC ) Red Flags Rule, which implements

More information

Xavier University. Fair & Accurate Credit Transactions Act (Red Flags Rule) Policy and Procedures

Xavier University. Fair & Accurate Credit Transactions Act (Red Flags Rule) Policy and Procedures Xavier University Fair & Accurate Credit Transactions Act (Red Flags Rule) Policy and Procedures Revised April 7, 2009 1 Identity Theft Policy IdentityTheft An identity can be stolen with nothing more

More information

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1); EXHIBIT A Identity Theft Protection Program Definitions. For purposes of the Policy, the following definitions apply (1); A. City means: the City of Troy, Montana B. Covered Account means: An account that

More information

Designing an Identity Theft Prevention Program

Designing an Identity Theft Prevention Program The Federal Trade Commission has indicated that mortgage brokers are covered by the Red Flags Rule and must design identity theft prevention programs to comply with the law. The FTC has published a How-To

More information

Identity Theft Policy

Identity Theft Policy Identity Theft Policy Policy/Procedure Section 1: Background The risk to Dickinson College (the College ), its employees and students from data loss and identity theft is of significant concern to the

More information

MCPHS IDENTITY THEFT POLICY

MCPHS IDENTITY THEFT POLICY SECTION 1: BACKGROUND MCPHS IDENTITY THEFT POLICY The risk to the College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only

More information

IDENTITY THEFT PREVENTION PROGRAM OVERVIEW

IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE IDENTITY THEFT PREVENTION PROGRAM OVERVIEW What is the Red Flag Ruling? The Red Flag Ruling requires automotive dealerships to implement policies and procedures to prevent fraud due to identity

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003,

31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, 5/23/2011 31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, Public Law 108-159, requires municipalities to promulgate

More information

COUNCIL POLICY STATEMENT

COUNCIL POLICY STATEMENT COUNCIL POLICY STATEMENT Policy No. 44 General Subject: Finance Specific Subject: Identity Theft Policy and Prevention Program Date Approved: October 20, 2008 The following policy is to implement the requirements

More information

Policies and Procedures: IDENTITY THEFT PREVENTION

Policies and Procedures: IDENTITY THEFT PREVENTION Policies and Procedures: IDENTITY THEFT PREVENTION Section: Chapter: Policy: Compliance Administration Identity Theft Prevention I. PURPOSE The purpose of this policy is to protect patients and West Virginia

More information

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims

More information

CENTENARY COLLEGE POLICIES UNDER THE FAIR & ACCURATE CREDIT TRANSACTION ACT S RED FLAG RULES

CENTENARY COLLEGE POLICIES UNDER THE FAIR & ACCURATE CREDIT TRANSACTION ACT S RED FLAG RULES (FACTA) April 30, 2009 Approved by: Audit Committee of the Board of Trustees CENTENARY COLLEGE POLICIES UNDER THE A RESOLUTION ADOPTING AN IDENTITY THEFT POLICE Centenary College ( College ) developed

More information

MOTLOW STATE COMMUNITY COLLEGE

MOTLOW STATE COMMUNITY COLLEGE Page 1 of 5 MOTLOW STATE COMMUNITY COLLEGE SUBJECT: FACTA Red Flag Rule and Identity Theft Prevention Program I. BACKGROUND In late 2007 the Federal Trade Commission (FTC) and Federal banking agencies

More information

2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost

2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost 2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost With passage of HR 2622, the Fair and Accurate Credit Transactions Act, Congress significantly amended the Fair Credit

More information

policy All terms used in this policy that are defined in 16 C.F.R. 681.2 shall have the same meaning provided in that section.

policy All terms used in this policy that are defined in 16 C.F.R. 681.2 shall have the same meaning provided in that section. Name of Policy: Identity theft detection, prevention, and mitigation. Policy Number: 3364-15-12 Approving Officer: President Responsible Agent: Compliance Officer Scope: All University of Toledo Campuses

More information

DMACC IDENTITY THEFT- RED FLAGS PROCEDURES

DMACC IDENTITY THEFT- RED FLAGS PROCEDURES DMACC IDENTITY THEFT- RED FLAGS PROCEDURES This document contains identity theft red flag procedures for Des Moines Area Community College. Section Topic Page 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 XX PURPOSE

More information

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule SOUTH TEXAS COLLEGE Identity Theft Prevention Program and Guidelines FTC Red Flags Rule Issued June 24, 2009 Table of Contents Section Section Description Page # 1 Section 1: Program Background and Purpose

More information

Richard Swed. CEO- The Risk Management Group

Richard Swed. CEO- The Risk Management Group Richard Swed CEO- The Risk Management Group Richard is a recognized expert in the field of identity theft, with 14 years of experience, and speaks to groups of all sizes on identity theft & identity theft

More information

Physician Office Compliance with the Red Flag Rule

Physician Office Compliance with the Red Flag Rule Physician Office Compliance with the Red Flag Rule The Red Flag Rule, implemented by the Federal Trade Commission (FTC) on May 1, 2009, requires all financial institutions and creditors, including physician

More information

Northeast Technology Center Board Policy 2110 Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS)

Northeast Technology Center Board Policy 2110 Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS) Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS) This Policy is adopted to ensure compliance with the Fair and Accurate Credit Transaction Act, 15 U.S.C. 1601 et seq. and the Federal Trade Commission

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the Lafayette County Sheriff s Department and obtained a report number related to your

More information

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ 85211-1466

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ 85211-1466 FRAUD PACKET Instructions and Useful Information Please read entire packet and follow instructions to complete this packet properly. **This packet should ONLY be completed if you are a victim of Identity

More information

UNC Asheville. Red Flag Rule and NC Identity Protection Act Information

UNC Asheville. Red Flag Rule and NC Identity Protection Act Information UNC Asheville Red Flag Rule and NC Identity Protection Act Information Why Should UNC Asheville be Concerned? The Federal Trade Commission (FTC) regulates financial transactions at UNC Asheville The FTC

More information

CHAPTER 12 IDENTITY PROTECTION AND IDENTITY THEFT PREVENTION POLICIES

CHAPTER 12 IDENTITY PROTECTION AND IDENTITY THEFT PREVENTION POLICIES CHAPTER 12 IDENTITY PROTECTION AND IDENTITY THEFT PREVENTION POLICIES Section 1-12-1: Purpose 1-12-2: Definitions 1-12-3: Scope 1-12-4: Identity Protection Policy 1-12-5: Identity Theft Prevention Policy

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious

More information

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions Reference: Fair and Accurate Credit Transactions Act, ( Pub. L. 108-159) The purpose of the Identity Theft Prevention Program (ITPP) is to control reasonably foreseeable risks to students from identity

More information

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE. University of Cincinnati Red Flags Rule Protecting Against Identity Fraud

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE. University of Cincinnati Red Flags Rule Protecting Against Identity Fraud UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Cincinnati Red Flags Rule Protecting Against Identity Fraud Objectives Background What is the FTC Red Flags Rule? Why do we need

More information

NCUA LETTER TO CREDIT UNIONS

NCUA LETTER TO CREDIT UNIONS NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Identity Theft Prevention Program Illinois College of Optometry Illinois Eye Institute Effective Date: May 2009 Revised: Review Dates: IDENTITY THEFT PREVENTION POLICY STATEMENT The Illinois College of

More information

identity TheFT PREVENTION Programs and Response

identity TheFT PREVENTION Programs and Response IDENTITY THEFT PREVENTION PROGRAM This program is launched in response to the Federal Trade Commission Red Flag Rules and Address Discrepancy Rules in conjunction with the Fair and Accurate Credit Transaction

More information

Identity Theft. Emergency Repair Kit

Identity Theft. Emergency Repair Kit Identity Theft Emergency Repair Kit 2012 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Any duplication or reproduction is strictly prohibited. Identity Theft Emergency Repair

More information

Facts About FACTA Red Flag Identity Theft Prevention Program

Facts About FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

York County Sheriff's Office Identity Theft Victim s Packet

York County Sheriff's Office Identity Theft Victim s Packet York County Sheriff's Office Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have received a copy of your police report from the York County Sheriff's

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet In this packet: Information and Instructions Section 1, # of pages 6 Fair and Accurate Credit Transactions Act of 2003 Section 2, # of pages 3 ID Theft Affidavit Section

More information

Identity Theft Prevention Program

Identity Theft Prevention Program The University of North Carolina at Chapel Hill Identity Theft Prevention Program The Board of Trustees of The University of North Carolina at Chapel Hill (the University ) adopts this Identity Theft Prevention

More information

A Guide to Benedictine College and Identity Theft

A Guide to Benedictine College and Identity Theft IDENTITY THEFT PREVENTION PROGRAM The risk to Benedictine College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only through

More information

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor;

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor; CITY OF STATE OF GEORGIA ORDINANCE NO: AN ORDINANCE TO AMEND THE CODE OF ORDINANCES, CITY OF, GEORGIA TO PROVIDE A NEW ARTICLE, IDENTITY THEFT PREVENTION PROGRAM; TO COMPLY WITH FEDERAL REGULATIONS RELATING

More information

Model Identity Theft Policy and Adopting Resolution

Model Identity Theft Policy and Adopting Resolution Model Identity Theft Policy and Adopting Resolution, Tennessee RESOLUTION NO. A RESOLUTION ADOPTING AN IDENTITY THEFT POLICY WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, an amendment

More information

RESOLUTION TO ADOPT IDENTITY THEFT POLICY

RESOLUTION TO ADOPT IDENTITY THEFT POLICY RESOLUTION TO ADOPT IDENTITY THEFT POLICY WHEREAS, in late 2008 the Federal Trade Commission (FTC) and federal banking agencies issued a regulation known as the Red Flag Rule under sections 114 and 315

More information

University Policy: Identity Theft Prevention Policy

University Policy: Identity Theft Prevention Policy University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for

More information

POLICY: Identity Theft Red Flag Prevention

POLICY: Identity Theft Red Flag Prevention POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information

More information

IDENTITY THEFT RESOURCE KIT

IDENTITY THEFT RESOURCE KIT IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What

More information

Identity Theft Packet

Identity Theft Packet BOULDER POLICE DEPARTMENT 1805 33 rd Street Boulder, CO 80301 Identity Theft Packet ** Use this packet when the crime involves the stealing of someone's identity, such as when a victim finds out that someone

More information

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy ELKHORN RURAL PUBLIC POWER DISTRICT 1230-1 I. POLICY SUMMARY POLICY #1230 Identity Theft Prevention Policy It shall be the policy of Elkhorn Rural Public Power District ( District ) to take all reasonable

More information

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response) University of St. Thomas Identity Theft Prevention Program (Red Flags Regulation Response) Revised: January 10, 2013 Program Adoption and Administration The University of St. Thomas ( University ) established

More information

COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM

COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM In Accordance with the Fair and Accurate Credit Transactions Act of 2003 And 16 CFR 681.1 and 16 CFR

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Implemented October 2009 Page 1 Table of Contents Background... 3 Purpose... 3 Definitions... 3 Pretext Calling... 4 Receiving Telephone Calls... 5 Change of Address...

More information

How To Get A Credit Card From A Fraudulent Account

How To Get A Credit Card From A Fraudulent Account Information and Instructions This packet is to be completed once you have contacted New York State University Police and obtained a police report number related to your identity theft case. To obtain a

More information

I dentity theft occurs

I dentity theft occurs 1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,

More information

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009 Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the Ottawa County Sheriff s Office and obtained a complaint number related to your identity

More information

USF System & Preventing Identity Fraud

USF System & Preventing Identity Fraud POLICY USF System USF USFSP USFSM Number: 0-109 Subject: Identity Theft Program Procedures and Protocol Responsible Office: Business and Finance Date of Origin: 1-11-11 Date Last Amended: Date Last Reviewed:

More information

Lake County Sheriff s Office Identity Theft/Fraud Packet

Lake County Sheriff s Office Identity Theft/Fraud Packet Gary S. Borders, Sheriff Lake County Sheriff s Office Identity Theft/Fraud Packet Information and Instructions The Information and Instructions portion of this packet is for you to keep and contains information

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Identity Theft Prevention Program Red Flag Rules Policy P093.00 Issued: May 2009

Identity Theft Prevention Program Red Flag Rules Policy P093.00 Issued: May 2009 Identity Theft Prevention Program Red Flag Rules Policy P093.00 Issued: May 2009 The Federal Trade Commission has issued a final rule (the Red Flag Rule) under the Fair and Accurate Credit Transactions

More information

IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule

IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule I. Firm Policy Our firm s policy is to protect our customers and their accounts from identity theft

More information

POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY

POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY I. POLICY SUMMARY It shall be the policy of Polk County Rural Public Power District (PCRPPD) to take all reasonable steps to identify, detect, and prevent

More information

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic

More information

The City of West Linn Identity Theft Prevention Program

The City of West Linn Identity Theft Prevention Program Identity Theft Prevention Program Implemented January 1, 2009 Updated: July 20, 2009 Updated: December 18, 2009 I. PROGRAM ADOPTION The City of West Linn ("Utility") developed this Identity Theft Prevention

More information

Tempe Police Department Victim s Fraud Packet

Tempe Police Department Victim s Fraud Packet 1 Tempe Police Fraud Packet: Report # - Tempe Police Department Victim s Fraud Packet Do not complete this packet until you have contacted Tempe Police Department to file a report and obtained a police

More information

B. Credit - Deferral of payment of a debt incurred for the purchase of goods services, including educational services.

B. Credit - Deferral of payment of a debt incurred for the purchase of goods services, including educational services. Date Revised: Page 1 of 16 5-21 Identity Theft Prevention Program I. BACKGROUND As a result of the increasing instances of identity theft, the United States Congress passed the Fair and Accurate Credit

More information

IDENTITY THEFT PREVENTION PROGRAM COUNTY OF DUPLIN, NORTH CAROLINA

IDENTITY THEFT PREVENTION PROGRAM COUNTY OF DUPLIN, NORTH CAROLINA IDENTITY THEFT PREVENTION PROGRAM COUNTY OF DUPLIN, NORTH CAROLINA TO ESTABLISH AN IDENTIFY THEFT PREVENTION PROGRAM; TO COMPLY WITH FEDERAL REGULATIONS RELATING TO ADDRESS DISCREPANCIES; TO COMPLY WITH

More information

8/13/2014. Types of Identity Theft HOW IS IDENTITY THEFT DISCOVERED? Identity Theft. Run up existing accounts. Create new accounts.

8/13/2014. Types of Identity Theft HOW IS IDENTITY THEFT DISCOVERED? Identity Theft. Run up existing accounts. Create new accounts. According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States Increasing an average nearly 40 percent per year for the past several years. The

More information

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009 Identity Theft Prevention Program Approved by the Arizona Board of Regents on May 1, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

University of Nebraska - Lincoln Identity Theft Prevention Program

University of Nebraska - Lincoln Identity Theft Prevention Program I. Purpose & Scope This program was developed pursuant to the Federal Trade Commission s (FTC) Red Flag Rules promulgated pursuant to the Fair and Accurate Credit Transactions Act (the FACT Act). The University

More information

West Palm Beach Police Department s Identity Theft Victim s Packet

West Palm Beach Police Department s Identity Theft Victim s Packet West Palm Beach Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted West Palm Beach Police Department and obtained a

More information

Crime Prevention Tips

Crime Prevention Tips Crime Prevention Tips The suggests the following crime prevention techniques to avoid becoming a victim of Identity Theft: 1. To minimize the amount of information an identity thief can steal, do not carry

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage. Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT 101 4 TH Street Southeast Rochester, Minnesota 55904-3761 507-328-6800 Fax 507-328-6975 To: From: Subject: Identity Theft and Internet Crime Victims Rochester

More information

Investigation and Prosecution of Identity Theft

Investigation and Prosecution of Identity Theft Investigation and Prosecution of Identity Theft In an effort to assist you in dealing with problems related to Identity Theft, the Menomonee Falls Police Department has prepared this packet of information

More information

Rising Tide: The Explosion of Identity Theft During Hard Economic Times

Rising Tide: The Explosion of Identity Theft During Hard Economic Times Rising Tide: The Explosion of Identity Theft During Hard Economic Times Locating Services for Victims Paula Pierce Managing Attorney Victims Initiative for Counseling Advocacy and Restoration of the Southwest

More information

IDENTITY THEFT VICTIM S PACKET

IDENTITY THEFT VICTIM S PACKET DEPARTMENT OF PUBLIC SAFETY 1150 Canton Center S Canton, MI 48188-1699 John R. Santomauro, Director of Public Safety IDENTITY THEFT VICTIM S PACKET INFORMATION AND INSTRUCTIONS The purpose of this packet

More information

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements 1.0 Introduction In 2003, Congress enacted the Fair and Accurate Credit Transactions Act of 2003, 15 U.S.C. Section 1681,

More information