University Policy: Identity Theft Prevention Policy
|
|
|
- Sybil Tyler
- 10 years ago
- Views:
Transcription
1 University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for Review of this Policy: Office of Finance and Treasurer Procedures: Developed within departments responsible for Covered Accounts Related University Policies: Gramm-Leach Bliley Information Security Plan, American University Information Technology Security Policies I. SCOPE This Policy applies to the creation, modification, and access to Identifying Information from Covered Accounts connected to American University; including, but not limited to, the following: Federal Perkins Loan program Institutional loan programs Tuition payment plans Eagle Bucks program II. POLICY STATEMENT The purpose of this Identity Theft Prevention Policy is intended to comply with the Fair and Accurate Credit Transaction Act of 2003 in protecting American University customers from Identity Theft. The Policy is intended to establish procedures to facilitate the detection, prevention and mitigation of Identity Theft in connection with opening new Covered Accounts and activity in existing Covered Accounts. This Policy does not replace or repeal any previously existing policies addressing some or all of the activities that are the subject of this Policy, but rather it is intended to supplement any such existing policies. III. DEFINITIONS When used in this Policy, the following terms have the meanings below, unless the context clearly requires that the term be given a different meaning: 1
2 Customer: The term customer means any individual (student, parent, faculty, staff, or other third party with whom the University interacts) who receives a financial service from the University and who, in the course of receiving that financial service, provides the University with Identifying Information about themselves. Covered Account: The term Covered Account means an account that American University offers or maintains primarily for personal, family, or household purposes that involves or is designed to allow multiple payments of transactions. The term Covered Account also includes other accounts offered or maintained by the University for which there is a reasonably foreseeable risk of Identity Theft. Examples of Covered Accounts include Student accounts established for various transactions, and faculty/staff accounts established to process institutional loan transactions. Identity Theft: The term Identity Theft means a fraud committed or attempted using the identifying information of another person without authority. Identifying Information: The term Identifying Information means any name or number that may be used, alone or in conjunction with any other information, to identify a specific person, including any name, social security number, date of birth, official State or government issued driver s license or identification number, alien registration number, government passport number, employer or taxpayer identification number. Red Flag: The term Red Flag means a pattern, practice or specific activity that indicates the possible existence of Identity Theft. IV. POLICY Identification of Relevant Red Flags American University has considered the guidelines and the illustrative examples of possible Red Flags from the FTC s Identity Theft Rules and has reviewed the University s history with instances of Identity Theft, if any. The University determined that the following are the relevant Red Flags for purposes of this Policy given the relative size of the University and the limited nature and scope of the services it provides to its customers. A. Alerts, notifications, or other warnings received from consumer reporting agencies or service providers. 1. A fraud or active duty alert is included with a consumer report or an identity verification response from a credit reporting agency. 2. A consumer reporting agency provides a notice of credit freeze in response to a request for a consumer report. 2
3 3. A consumer reporting agency provides a notice of address discrepancy. 4. A consumer report indicates a pattern of activity that is inconsistent with the history and usual pattern of activity of an applicant or customer, such as: a) A recent and significant increase in the volume of inquiries; b) An unusual number of recently established credit relationships; c) A material change in the use of credit, especially with respect to recently established credit relationships; or d) An account that was closed for cause or identified for abuse of account privileges by a financial institution or creditor. B. The presentation of suspicious documents. 5. Documents provided for identification appear to have been altered or forged. 6. The photograph or physical description on the identification is not consistent with the appearance of the applicant or customer presenting the identification. 7. Other information on the identification is not consistent with information provided by the person opening a new Covered Account or customer presenting the identification. 8. Other information on the identification is not consistent with readily accessible information that is on file with the University, such as a signature card or a recent check. 9. An application appears to have been altered or forged, or gives the appearance of having been destroyed and reassembled. C. The presentation of suspicious personal identifying information, such as a suspicious address change. 10. Personal identifying information provided is inconsistent when compared against external information sources used by the University. 11. Personal identifying information provided by the customer is not consistent with other personal identifying information provided by the customer. For example, there is a lack of correlation between the SSN range and date of birth. 12. Personal identifying information provided is associated with known fraudulent activity as indicted by internal or thirdparty sources used by the University. 3
4 13. Personal identifying information provided is of a type commonly associated with fraudulent activity. For example, the billing address on an application is fictitious, a mail drop, or a prison or the phone number is invalid or associated with an answering service. 14. The SSN provided is the same as that submitted by other persons opening an account or other customers. 15. The address and telephone number provided is the same as or similar to the address or telephone number submitted by an unusually large number of other persons opening accounts or other customers. 16. The person opening the Covered Account or the customer fails to provide all the required personal identifying information on an application or in response to notification that the application is incomplete. 17. Personal identifying information provided is not consistent with personal identifying information that is on file with the University. D. The unusual use of, or other suspicious activity related to, a Covered Account. 18. A Covered Account with a stable history shows irregularities. 19. Mail sent to the customer is returned repeatedly as undeliverable although usage of services continues in connections with the Covered Account. 20. The University is notified that the customer is not receiving paper account statements, if applicable. 21. The University is notified of unauthorized use of products or services in connection with a customer s Covered Account. E. Notice of possible Identity Theft. 22. The University is notified by a customer, a victim of Identity Theft, a law enforcement authority, or any other person that it has opened a fraudulent account for a person engaged in Identity Theft. Detection of Red Flags The employees of American University who interact directly with customers on relevant transactions shall have the initial responsibility for monitoring the information and documentation provided. 4
5 To detect any of the Red Flags identified above associated with opening of a new Covered Account, employees should take the following steps to obtain and verify the identity of the Customer opening a Covered Account: Require certain identifying information which may include but not limited to name, date of birth, AU ID; and Verify the person s identity. To detect any of the Red Flags identified above associated with an existing Covered Account, employees should take the following steps to monitor transactions: Verify the identification of customers if they request information; Verify the validity of requests to change billing addresses; and Verify changes in banking information given for billing and payment purposes. Management employees shall be responsible for making the final decision on any such unresolved Red Flag issues. Response to Detected Red Flags Once a potentially fraudulent activity is detected, an employee should gather all appropriate information and documentation regarding the alleged incident to the designated Management employee. The Management employee will make the determination if there was a fraudulent transaction. If a transaction is determinate to be fraudulent, appropriate action will be taken. Appropriate responses to prevent or mitigate Identity Theft when a Red Flag is detected include: Contacting the customer Closing an existing Covered Account Not attempting to collect on a Covered Account or not submitting the Account to a debt collection agency. Notifying the University s Security Plan Coordinator (x3284) or Chief Information Officer (x2612) for assistance with additional mitigation measurers. Program Updates Risk Assessment The Policy, including relevant Red Flags, is to be updated as often as necessary but at least annually to reflect changes in risks to customers from Identity Theft. Factors to consider in the Policy update include: 1. An assessment of the risk factors identified in this Policy. 2. Any identified Red Flag weaknesses in associated account systems or procedures. 3. Changes in methods of Identity Theft. 4. Changes in methods to detect, prevent, and mitigate Identity Theft. 5
6 5. Changes in business arrangements, including mergers, acquisitions, alliances, joint ventures, and service provider arrangements. Training and Oversight All staff and third-party service providers performing any activity in connection with one or more Covered Accounts are to be provided appropriate training and receive effective oversight to ensure that the activity is conducted in accordance with policies and procedures designed to detect, prevent, and mitigate the risk of Identity Theft. V. EFFECTIVE DATE: This Policy is effective November 1, 2008; Last reviewed February 2009; December 2010; August
7 VI. SIGNATURE, TITLE, DATE OF APPROVAL This Policy is effective November 1, The initial adoption and approval of the Identity Theft Prevention Policy shall be by the Board of Trustees, or an appropriate Committee of the Board. Thereafter, senior management shall oversee the development, implementation, and maintenance of the Policy. Approved by American University Board of Trustees: February 27, 2009 (Date approved) 7
University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule
NUMBER: BUSF 4.12 SECTION: SUBJECT: Finance and Planning University Identity Theft and Detection Program (NEW) DATE: March 3, 2011 Policy for: Procedure for: Authorized by: Issued by: All Campuses and
Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation
Guidelines to FTC Red Flag Rule(reformatted) Appendix A to Part 681 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 681.2 of this part requires each financial institution
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0 Scope: The risk to Loyola University Chicago and its faculty, staff and students
Lake Havasu City. Identity Theft Prevention Program
Lake Havasu City Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION Lake Havasu City (City) developed this Identity Theft Prevention Program (Program) pursuant to the
University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)
University of St. Thomas Identity Theft Prevention Program (Red Flags Regulation Response) Revised: January 10, 2013 Program Adoption and Administration The University of St. Thomas ( University ) established
Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions
Reference: Fair and Accurate Credit Transactions Act, ( Pub. L. 108-159) The purpose of the Identity Theft Prevention Program (ITPP) is to control reasonably foreseeable risks to students from identity
Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009
Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )
UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM
Doc. T08-109 Passed by the BoT 12/11/08 UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM The Board recognizes that some activities of the University are subject to the provisions of the Fair
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM SUMMARY OF OUR PROGRAM AND PROCESSES This dealership is committed to protecting its customers and itself from identity
Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009
Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 9 Chapter 13,
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
IDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)
Identity theft. A fraud committed or attempted using the identifying information of another person without authority.
SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM This program shall become effective November 1, 2008. Adopted this the 20 th day of October, 2008. I. PREFACE The purpose of this program is to detect,
Identity Theft Prevention Program
Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program
Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009
Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention
II. F. Identity Theft Prevention
II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal
Ouachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
21.01.04.Z1.01 Guideline: Identity Theft Prevention Program
Texas A&M Health Science Center Guidelines 21.01.04.Z1.01 Guideline: Identity Theft Prevention Program Approved October 7, 2009 Reviewed February 26, 2015 Supplements System Regulation 21.01.04 Reason
University of Alaska. Identity Theft Prevention Program
University of Alaska Identity Theft Prevention Program Effective beginning October 31, 2009 I. PROGRAM ADOPTION The University of Alaska ( University ) developed this Identity Theft Prevention Program
City of Wyoming, Michigan Administrative Policy
City of Wyoming, Michigan Administrative Policy Department: Administrative Services-Treasurer Department Head Approval: /s/ Andrea Boot City Manager Approval: /s/ Curtis L. Holt Subject: Identity Theft
University of Tennessee's Identity Theft Prevention Program
IDENTITY THEFT PREVENTION PROGRAM 1. BACKGROUND The University of Tennessee (UT) developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission s Red Flags Rule, Section 114
RESOLUTION NO. 2009-1
RESOLUTION NO. 2009-1 A RESOLUTION OF THE MAYOR AND COUNCI8L OF THE CITY OF ST. ANTHONY, IDAHO, ADOPTING AN IDENTY THEFT PREVENTION PROGRAM WHEREAS, Section 114 of the Fair and Accurate Transaction Act
identity TheFT PREVENTION Programs and Response
IDENTITY THEFT PREVENTION PROGRAM This program is launched in response to the Federal Trade Commission Red Flag Rules and Address Discrepancy Rules in conjunction with the Fair and Accurate Credit Transaction
Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
DSU Identity Theft Prevention Policy No. DSU 802.7.001
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 IDENTITY THEFT PREVENTION DSU Policy No. 802.7.001 SOURCE: Fair and Accurate
Number: 56.300. Index
Identity Theft Prevention Program Section: General Operations Title: Identity Theft Prevention Program Number: 56.300 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY I. POLICY SUMMARY It shall be the policy of Polk County Rural Public Power District (PCRPPD) to take all reasonable steps to identify, detect, and prevent
EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);
EXHIBIT A Identity Theft Protection Program Definitions. For purposes of the Policy, the following definitions apply (1); A. City means: the City of Troy, Montana B. Covered Account means: An account that
Request for City Council Action
Request for City Council Action Date: March 17, 2009 Agenda Section: General Business Originating Department: Finance/Legal No. 6 Item: Ordinance Approving and Adopting an Identity Theft Program No. 6.2
Red Flag Identity Theft Financial Policy 1.10
Issued: 05/16/2014 Revised: Policy and College ( Seminary ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's ( FTC ) Red Flags Rule, which implements
3344-19-01 Identity theft prevention program and red flag compliance policy.
3344-19-01 Identity theft prevention program and red flag compliance policy. (A) Program adoption Cleveland state university has developed this identity theft prevention program ( program ) pursuant to
Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
DMACC IDENTITY THEFT- RED FLAGS PROCEDURES
DMACC IDENTITY THEFT- RED FLAGS PROCEDURES This document contains identity theft red flag procedures for Des Moines Area Community College. Section Topic Page 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 XX PURPOSE
