Using Promontory s RADAR to Develop and Maintain an Identity Theft Prevention Program and Risk Assessment
|
|
|
- Erick Hoover
- 9 years ago
- Views:
Transcription
1 Using Promontory s RADAR to Develop and Maintain an Identity Theft Prevention Program and Risk Assessment
2 Contents Steps to Develop a Robust Program Dashboards Reports Program Maintenance Technical Information Integration with Other Compliance Risk Assessments Contact information 2
3 Steps to Develop a Robust Program 1. Identify covered accounts 2. Identify red flags that are relevant to covered accounts 3. Determine controls to identify relevant red flags 4. Determine appropriate response when a red flag is identified 5. Assess control effectiveness 6. Identify and implement any enhancements as required 7. Document the program, including supporting policies and procedures 8. Approve the program 9. Keep the program current over time Even if you already have an Identity Theft Prevention Program in place, keeping it current over time without the right tools is challenging. Promontory s RADAR provides those tools. 3
4 Identify covered accounts Identify: account[s] that a financial institution or creditor offers or maintains, primarily for personal, family, or household purposes, that involves or is designed to permit multiple payments or transactions, such as a credit card account, mortgage loan, automobile loan, margin account, cell phone account, utility account, checking account, or savings account; and any other account[s] that the financial institution or creditor offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the financial institution or creditor from identity theft, including financial, operational, compliance, reputation, or litigation risks. Reasonably foreseeable risk depends on factors such as: methods used to open accounts methods used to access accounts previous experience with identity theft RADAR helps financial institutions make risk-based determinations of covered accounts and track them over time. 4
5 Select the obligation from the inventory. Select products with common methods of opening, access, and common identity theft loss histories. 5
6 Conduct risk assessment, include high risk accounts as covered accounts. 6
7 Identify relevant red flags RADAR helps financial institutions Map relevant red flags to covered accounts; Document controls to detect red flags; Document the response to red flags; Document an assessment of control effectiveness; and Record any remedial action necessary to enhance controls. 7
8 Map relevant red flags to... Covered accounts with common controls for the relevant red flags. 8
9 Document quality of risk management, including controls, response, and effectiveness. Specify remedial actions. 9
10 See the results in inter-active dashboards. 10
11 Generate user-friendly reports 11
12 Keep program current over time Robust security, user permissioning, and audit trails help you keep the program current over time. Avoids problems that arise when institutions try to maintain their Identity Theft Prevention Program in excel files or word documents. 12
13 Integrates with other risk assessments Although institutions can purchase RADAR for use only with their Identity Theft Prevention Program, the system is modular and can be used for other compliance risk assessments, including AML risk assessments. 13
14 RADAR - technological overview RADAR combines a web-based front end developed using ASP.NET (and C#) with the power of a SQL Server 2005 database on the backend. The application is an enterprise system that is highly scalable to accommodate users in the world s largest financial institutions. The web interface leverages Ajax to provide a friendly, responsive user experience. The system keeps user credentials secure by storing them in an encrypted format. Most financial institutions can readily install RADAR on their own servers. Some institutions, however, choose to host the application on Promontory s servers during initial implementation. 14
15 Contact information Michael Dawson Chief Executive Officer Promontory Financial Group (UK) Ltd. Chief Operating Officer and President, Promontory Compliance Solutions, LLC 15
Identity Theft Prevention Program (FACTA Identity Theft Red Flags Rule)
Identity Theft Prevention Program (FACTA Identity Theft Red Flags Rule) Overview The Fair and Accurate Credit Transactions Act of 2003 ("FACTA") requirement, known as the Identity Theft Red Flags Rule,
IDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)
Risk Management Examiners
Risk Management Examiners Introduction to Red Flags Examination Procedures Section 615(e) requires the federal banking agencies and the NCUA (the Agencies) as well as the FTC to prescribe regulations and
Red Flag Rules and Aging Services: What You Need to Know
Red Flag Rules and Aging Services: What You Need to Know Late in 2007, six federal agencies, including the Federal Trade Commission ( FTC ), jointly issued final rules and accompanying guidelines to implement
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
IDENTITY THEFT RED FLAGS, ADDRESS DISCREPANCIES, AND CHANGE OF ADDRESS REGULATIONS Examination Procedures
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Financial Institution Letter FIL-105-2008 October 16, 2008 IDENTITY THEFT RED FLAGS, ADDRESS DISCREPANCIES, AND CHANGE
An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules
An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules By: Andrea J. Shaw, Esq., Compliance Officer, Gorham Savings
University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)
University of St. Thomas Identity Theft Prevention Program (Red Flags Regulation Response) Revised: January 10, 2013 Program Adoption and Administration The University of St. Thomas ( University ) established
1. Entities and Accounts Covered by the New Rules. 1.1. Covered Entities
CLIENT MEMORANDUM RED FLAG IDENTITY THEFT RULES MAY HAVE YOU SEEING RED: FTC EXTENDS COMPLIANCE DEADLINE BECAUSE MANY COMPANIES DID NOT KNOW THAT THESE RULES APPLY TO THEM When companies outside the financial
Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009
Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009 Table of Contents Introduction to the Training Module.. i I. Introduction. 1 II. Definitions. 3 III. Recognizing Identity Theft.. 6 IV. Identifying
FACTA Identity Theft Red Flags Program. www.chs.acfei.com
1 FACTA Identity Theft Red Flags Program Module 1 Fair and Accurate Credit Transactions Act Overview Identity thieves use individual s personal identifiable information to open new accounts and misuse
White paper. Implications of digital certificates on trusted e-business.
White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security
Developing a Proactive Compliance Monitoring Program
Developing a Proactive Compliance Monitoring Program Ed Nowicki Deputy Compliance Officer Corporate Compliance Pfizer Inc Lori Alarimo Senior Corporate Counsel Promotional Quality Assurance Pfizer Inc
Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009
Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )
Lincoln Financial Group. FTC/SEC Red Flags Identity Theft Prevention Program
Lincoln Financial Group FTC/SEC Red Flags Identity Theft Prevention Program Program Summary For Internal Use Only Table of Contents Page The Red Flags Rule 3 Key Points of the Program 4 Covered Accounts
Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008
Travis County Water Control & Improvement District No. 17 Identity Theft Prevention Program Effective beginning November 20, 2008 I. PROGRAM ADOPTION The Travis County Water Control and Improvement District
University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule
NUMBER: BUSF 4.12 SECTION: SUBJECT: Finance and Planning University Identity Theft and Detection Program (NEW) DATE: March 3, 2011 Policy for: Procedure for: Authorized by: Issued by: All Campuses and
DMACC IDENTITY THEFT- RED FLAGS PROCEDURES
DMACC IDENTITY THEFT- RED FLAGS PROCEDURES This document contains identity theft red flag procedures for Des Moines Area Community College. Section Topic Page 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 XX PURPOSE
VCU Identity Theft Prevention Policy
VCU Identity Theft Prevention Policy POLICY STATEMENT AND PURPOSE Responsible Offices: Office of the Senior Vice President for Finance and Administration Office of the Provost and Vice President for Academic
Securities and Futures & Derivatives Alert
Securities and Futures & Derivatives Alert April 25, 2013 SECURITIES SEC and CFTC Issue Identity Theft Red Flags Rules I. Introduction On April 10, 2013, the Securities and Exchange Commission (SEC) and
You Can t Afford the Risks
Anti-Money Laundering You Can t Afford the Risks Audit Tax Advisory The Risks Associated With AML/Sanctions Compliance Are Just Too Great to Ignore Continued increases in regulatory scrutiny and rigorous
Section 10: Fair Credit Reporting Act (FCRA) Policy
Section 10: Fair Credit Reporting Act (FCRA) Policy Summary of Regulation The Fair Credit Reporting Act (FCRA) regulates Consumer Reporting Agencies (CRAs), users of consumer reports, and furnishers of
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0 Scope: The risk to Loyola University Chicago and its faculty, staff and students
University Policy: Identity Theft Prevention Policy
University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for
FAIR CREDIT REPORTING ACT
FAIR CREDIT REPORTING ACT PURPOSE AND SCOPE Serves the following principal purposes: To regulate the consumer-reporting industry. To prohibit unfair actions from CRAs To restrict the availability and use
Business Solution Suite
Business Solution Suite Overview Mobilize your entire business Sky Technologies has been mobilizing business systems for more than 12 years, and has hundreds of successful projects in more than 25 countries.
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate
Electronic Prescriptions, Dashboards and MyHealth @ University Hospital Birmingham
Electronic Prescriptions, Dashboards and MyHealth @ University Hospital Birmingham Thursday 25 th July 2013 Digital Health: design: develop: deploy: evaluate Electronic Prescribing & Medication Administration
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,
Document Management Server - Overview
Introduction The Document Management System (DMS) is a web-based application designed to allow for storage and retrieval of documents with user-defined document types, document groups, and keywords. The
Client Requirement. Why SharePoint
Client Requirement Client wanted a sharepoint system that could meet their document and record management needs. It should also improve client s information management systems. To support existing and
RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009
RANDOLPH COUNTY PUBLIC WORKS Identity Theft Prevention Program Adopted September 1, 2009 Effective beginning September 1, 2009 I. PROGRAM ADOPTION The Randolph County Public Works Department ( the Department
SOOKASA WHITEPAPER SECURITY SOOKASA.COM
SOOKASA WHITEPAPER SECURITY SOOKASA.COM Sookasa Overview Sookasa was founded in 2012 by a team of leading security experts. The company s patented file-level encryption enables enterprises to protect data
WORKERS COMPENSATION
MARKET SOLUTIONS WORKERS COMPENSATION A secure, cloud-hosted and feature-rich end-to-end claims and policy management solution designed specifically for Workers Compensation insurers and claims administrators.
INTRODUCTION PRODUCT PRIORITIES INTEGRATION
INTRODUCTION In June 2007, Microsoft announced the acquisition of Stratature, a privately held company based in Alpharetta, Georgia, and a leading provider of master data management (MDM) software. This
OLIVIA123 FOR ADMINISTRATORS. User Guide
OLIVIA123 FOR ADMINISTRATORS User Guide August 2014 OLIVIA123 for Administrators Contents OLIVIA123 Basic Functions... 1 Registration... 1 New Users... 1 Login... 1 Update Details... 1 Change Password...
RazorSafe Mail Archiving Appliances
RazorSafe Mail Archiving Appliances Product Overview Oct 2012 INTRODUCING RAZORSAFE Copyright (C) 2012 2 RAZORSAFE Overview Our fastest, most scalable and HIGHEST CAPACITY mail archiving appliances ever!
SAMAY - Attendance, Access control and Payroll Software
SAMAY - Attendance, Access control and Payroll Software Welcome to a new world of comprehensive Human Capital Management (HCM) solutions from ISS. ISS SAMAY is a highly simplified HCM solution with an
Symantec Control Compliance Suite Standards Manager
Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance
City of Wyoming, Michigan Administrative Policy
City of Wyoming, Michigan Administrative Policy Department: Administrative Services-Treasurer Department Head Approval: /s/ Andrea Boot City Manager Approval: /s/ Curtis L. Holt Subject: Identity Theft
