Identity Theft Prevention Program (ITPP) under the FTC FACTA Red Flags Rule PROCEDURES DOCUMENT. I. Purpose/Scope... 1

Size: px
Start display at page:

Download "Identity Theft Prevention Program (ITPP) under the FTC FACTA Red Flags Rule PROCEDURES DOCUMENT. I. Purpose/Scope... 1"

Transcription

1 Identity Theft Preventin Prgram (ITPP) under the FTC FACTA Red Flags Rule PROCEDURES DOCUMENT Table f Cntents I. Purpse/Scpe... 1 II. ITPP Apprval and Administratin... 2 III. Relatinship t Other University Plicies & Prcedures... 2 IV. Key Definitins fr purpses f this Prcedures Dcument... 3 V. Identifying Red Flags & Key Areas... 3 VI. Red Flag Identificatin and Detectin Grid... 5 VII. Preventing and Mitigating Identity Theft VIII. Service Prviders IX. Prgram Administratin X. Key Resurces XI. Acrnyms XII. Dcument Histry and Annual Review I. Purpse/Scpe The Fair and Accurate Credit Transactins Act (FACTA, Pub.L ) became federal law in 2003 as an amendment t the Fair Credit Reprting Act (FCRA). Sectins 114 and 315 f FACTA directed the Federal Trade Cmmissin (FTC), alng with ther banking agencies, t issue regulatins regarding identity theft 1

2 preventin, nw knwn as the Red Flags Rule ( Rule, see 16 CFR 681). The Rule requires many businesses and rganizatins t implement a written Identity Theft Preventin Prgram ( ITPP r Prgram ) designed t detect the warning signs ( red flags ) f identity theft in their daily peratins. The purpse f this Prgram is t detect, prevent, and mitigate identity theft at the University. II. ITPP Apprval and Administratin The Bard f Trustees f UNC Charltte adpted an Identify Theft Preventin Prgram (ITPP) n April 16, 2009, which can be fund n the Red Flags Rule webpage. The University s Cmpliance Manager in the Cntrller s Office is the designated Prgram Administratr and is respnsible fr the versight, develpment, implementatin and administratin f this ITPP. III. Relatinship t Other University Plicies & Prcedures We have reviewed ther plicies, prcedures and plans required by regulatins regarding the prtectin f ur custmer infrmatin in the frmulatin f this ITPP, including University Plicy 311, Data and Infrmatin Access and Security, and its supplemental regulatins and prcedures, and have attempted t establish this ITPP in a way that minimizes incnsistencies and duplicative effrts. Relatinship t GLBA, HIPAA, and FERPA: Nte that the Red Flags Rule is nt a data security regulatin. Per the FTC s Red Flags Rule FAQs, Gd data security practices like cllecting nly the persnal infrmatin yu need, prtecting that infrmatin, and securely dispsing f what yu n lnger need help ensure that persnal infrmatin des nt fall int the hands f identity thieves The Red Flags Rule picks up where data security leaves ff. 1 The Gramm-Leach-Bliley Act (GLBA) shuld cver any plicies and prcedures dealing with the actual safeguarding f identity credentials t prevent their theft. University Plicy speaks t the GLBA and assigns the Chief Infrmatin Security Officer (CISO) r designee as the Prgram Officer fr that plicy. In the same manner, the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) requires safeguarding f Prtected Health Infrmatin (PHI); the University s HIPAA cmpliance prgram is managed by the University s HIPAA Security Officer as described in University Plicy Finally, the Family Educatinal Rights and Privacy Act f 1974 (FERPA) requires safeguarding f educatin recrds; the University s FERPA cmpliance prgram is managed by the Office f Legal Affairs as described in University Plicy 402. The Red Flags Rule speaks t what happens if identity theft is suspected and the prcedures necessary t mitigate any further expsure t the University and custmer if identity theft des ccur. 1 FAQ D.1, Designing Yur Identity Theft Preventin Prgram 2

3 IV. Key Definitins fr purpses f this Prcedures Dcument Identity Theft - Any use r attempt by an individual t use anther persn s individual identifying infrmatin t btain a thing f value, including mney, credit, items, r services, such as medical care r educatin services t which the individual is nt entitled. Red Flag A pattern, practices, r specific activity that indicates the pssible existence f identity theft. Cvered Accunts Accunts thrugh which UNC Charltte cnducts financial activities that cause the University t be required t cmply with the Red Flags Rule n an institutin-wide basis. Persnally Identifiable Infrmatin (PII) - Any name r number that may be used, alne r in cnjunctin with any ther infrmatin, t identify a specific persn, including, but nt limited t: name; address; telephne number; scial security number; date f birth; gvernment-issued driver s license r identificatin number; passprt number; taxpayer identificatin number; credit, debit, r banking accunt numbers; unique electrnic identificatin number, including IP r ther cmputer identifying address; unique bimetric data such as fingerprint, vice print, retina r iris image r ther unique physical representatin. Key Areas University Departments/units that are expsed t the risk f identity theft by the fact that they: 1) regularly and significantly rely n, and/r 2) have access t mdify, PII. V. Identifying Red Flags & Key Areas T identify relevant identity theft Red Flags, we assessed these risk factrs: 1) the types f cvered accunts at the University, 2) ther Key Areas that are expsed t the risk f identity theft (as defined in Sectin IV), and 3) previus experience with identity theft. There are 22 Key Areas identified by the Prgram Administratr at UNC Charltte, as fllws: Key Area Div Reasn Enrllment Mgmt. Financial Aid AA Administers student emergency lans and lan accunts where UNC Charltte is the creditr (cnstitute a Cvered Accunts); Handles financial aid PII Enrllment Mgmt. Office f the Registrar AA Lgs and maintains the fficial academic recrd (which includes PII) fr all students Enrllment Mgmt. Residency Determinatin AA Receipt, review and maintenance f dcumentatin w/pii fr determinatin f NC residence classificatin, which determines tuitin charges Enrllment Mgmt. AA Prcesses Admissins PII Undergrad Admissins Graduate Schl AA Receives, prcesses, handles, and stres all applicatin fr admissin materials fr graduate applicants as well as internatinal undergraduate applicants 3

4 Graduate Schl AA Administers financial awards fr grad students, incl. schlarships, financial aid, and assistantships. Handles registrar services fr grad students (academic petitins, graduatin clearance, leaves f absence, etc.) Infrmatin Technlgy Services AA Manages system accesses and general infrmatin security Office f Internatinal Prgrams AA Manages internatinal student/faculty database Auxiliary Services 49er ID Card & Retail Services BA Administers 49er ID cards (cnstitutes a Cvered Accunt); Regularly handles cards w/pii Auxiliary Services Mail & BA Issues passprts; handles U.S. mail Package Services Auxiliary Services Parking and Transprtatin Services BA Issues parking permits based n driver-related PII and handles ther DMV-issued PII Facilities Management Mtr Fleet BA Requires cpy f driver's licenses t authrize use f UNC Charltte Mtr Fleet vehicles Financial Services BA Manages PCI cmpliance ecmmerce Financial Services BA Handles tax infrmatin fr the University Tax Office Financial Services Student Accunts BA Handles Student Accunts PII; Helps Financial Aid prcess student emergency lans and lan accunts where UNC Charltte is the creditr (cnstitute a Cvered Accunts) Human Resurces BA Administers emplyee lans up t $250 (cnstitutes a Cvered Accunt) Emplyee Relatins Human Resurces Infrmatin Systems (HRIS) BA Maintains faculty/staff paperwrk w/pii and requests fr related dcumentatin Human Resurces Staff Emplyment BA Handles faculty/staff paperwrk w/pii, including I-9s, backgrund cnsent frms, tax frms Plice and Public Safety BA Manages criminal incident database; Respnds t incidents where fraud is suspected Dean f Students Office, Office SA Manages student cnduct prcess and recrds f Student Cnduct Husing and Residence Life SA Handles Husing-related PII (students are mainly directed t My UNC Charltte t make changes) Student Health Center SA Handles Prtected Health infrmatin gverned by HIPAA In additin, we cnsidered Red Flags frm the fllwing five categries frm Supplement A t Appendix A f the FTC s Red Flags Rule, as they fit ur situatin: 1) alerts, ntificatins r warnings frm a credit reprting agency; 2) suspicius dcuments; 3) suspicius persnal identifying infrmatin; 4) suspicius accunt activity; and 5) ntices frm ther surces. We understand that sme f these categries and examples may nt be relevant t the University and sme may be relevant nly when cmbined r cnsidered with ther indicatrs f identity theft. We als understand that the examples are nt exhaustive r a mandatry checklist but a way t help ur emplyees think thrugh relevant red flags in the cntext f ur peratins. 4

5 Based n a review f the risk factrs, surces, and FTC examples f Red Flags, we have identified ur University s Red Flags, as listed in the first clumn ( Red Flag ) f Sectin VI, Red Flag Identificatin and Detectin Grid. VI. Red Flag Identificatin and Detectin Grid Nte that these prcedures are included here fr basic guidance. Mre detailed prcedures shuld be develped fr yur area as necessary. In general, the fllwing shuld be dne in all situatins where Red Flags are suspected: Once ptentially fraudulent activity is detected, an emplyee must act quickly, as a rapid apprpriate respnse can prtect individuals and the University frm damages and lss. At a minimum, the emplyee must ntify his r her supervisr, gather all related dcumentatin, and cmplete the Red Flag Detectin Frm, which is sent t the Red Flags Rule Prgram Administratr. Additinal investigatin f authenticating infrmatin will be cnducted t determine whether the attempted transactin was fraudulent r authentic. If a transactin is determined t be fraudulent, apprpriate actins must be taken immediately. Actins may include: Canceling the transactin; Ntifying and cperating with apprpriate law enfrcement; Determining the extent f liability f the University; and Ntifying the actual individual upn whm fraud has been attempted. Red Flag Detecting the Red Flag Categry: Alerts, Ntificatins r Warnings frm a Cnsumer Credit Reprting Agency 1. Ntice/reprt f fraud r active duty alert Verify activity reprted with applicant/ custmer. If verified, review the ntice, freeze, r degree f 2. Ntice/reprt f a credit freeze n an incnsistency with prir histry, and prceed with applicant evaluatin f applicant based n cnsumer reprt 3. Indicatin f activity that is incnsistent with an applicant s usual pattern r activity histry Examples: a large increase in the vlume f received. If unable t verify, d nt use this reprt in evaluating applicant n further actin required. inquiries r use f credit, especially n new accunts; an unusual number f recently established credit relatinships; r an accunt clsed because f an abuse f accunt privileges. 4. Ntice f address r ther discrepancy Cmpare reprted address (r ther infrmatin) with that prvided by applicant and, if necessary, cntact the applicant t verify. If address (r ther infrmatin) has been verified, 5

6 reprt t credit reprt agency. If unable t determine relatinship between the applicant and the ntice, d nt use the reprt t evaluate the applicant and ntify the applicant. N further actin required. Als see the FTC s Address Discrepancy rule (16 CFR part 641.1). Categry: Suspicius Dcuments 5. Identificatin presented lks altered, frged, r inauthentic. 6. The persn presenting identificatin des nt lk like the identificatin s phtgraph r physical descriptin. 7. The persn presenting identificatin cnveys infrmatin that differs frm what is indicated n the identificatin. 8. Infrmatin n the identificatin des nt match ther infrmatin n file fr the custmer (e.g., emplyee/student infrmatin in Banner). 9. A request fr infrmatin, applicatin, r ther dcument lks like it has been altered, frged, r trn up and reassembled. Retain and scrutinize identificatin r ther dcument presented t ensure: it is nt altered, frged, r trn up and reassembled; that the phtgraph and the physical descriptin n the identificatin match the persn presenting it; that the identificatin and the statements f the persn presenting it are cnsistent; and/r that the identificatin presented and ther infrmatin we have n file are cnsistent. Ntify management fr assistance if necessary. D nt prvide services until identity is prven. Categry: Suspicius Persnal Identifying Infrmatin 10. Identifying infrmatin is incnsistent with ther external infrmatin surces. Inspect infrmatin and cmpare with ther external infrmatin surces. Examples: an address that des nt match the address printed n a FAFSA frm, a Scial Security Number (SSN) that has nt been issued Retain infrmatin and ntify management fr assistance if necessary. D nt prvide services until identity is prven. r is listed n the Scial Security Administratin s (SSA s) Master Death File. 11. Identifying infrmatin is incnsistent with ther infrmatin prvided by the custmer Inspect infrmatin and ask custmer t validate which infrmatin is accurate. Examples: incnsistent dates f birth, SSNs, r addresses n tw frms received. Retain infrmatin and ntify management fr assistance if necessary. D nt prvide services until crrect identifying infrmatin is prven. 12. Identifying infrmatin is assciated with Inspect infrmatin and cmpare with dcumentatin 6

7 knwn fraudulent activity. Example: an address r phne number being used is als knwn t be assciated with a fraudulent applicatin. 13. Identifying infrmatin suggests fraud r is f the type cmmnly assciated with fraudulent activity. Examples: an address that is bviusly fictitius, an address that is fr a mail drp r a prisn, a phne number is invalid. 14. The SSN r University 800 number is the same as that submitted by anther custmer. 15. Address r phne number is the same as that presented by an unusually large number f ther custmers. 16. A custmer mits required persnal identifying infrmatin n an applicatin r ther frm r des nt prvide it in respnse t ntificatin that the applicatin/frm is incmplete. 17. Identifying infrmatin is incnsistent with internal infrmatin surces n file. indicating fraudulent activity. Retain infrmatin and ntify management fr assistance if necessary. D nt prvide services until identity is prven. Inspect infrmatin and determine its validity. Retain infrmatin and ntify management fr assistance if necessary. D nt prvide services until identity is prven. Inspect infrmatin and request t see the student s Scial Security card, 49er Card, r driver s license. Retain infrmatin and ntify management fr assistance if necessary. D nt prvide services until identity is prven. Place hld n riginal custmer wh prvided the duplicate ID number if identity is prven. Direct custmer t FTC Identity Theft website if necessary t learn what steps t take t recver frm identity theft. Request and inspect infrmatin t determine its validity. Retain infrmatin and ntify management fr assistance if necessary. D nt prvide services until identity is prven. D nt prvide services r award aid until applicatin/frm is cmplete. Inspect infrmatin and cmpare with infrmatin in Banner r ther fficial University systems f recrd r data files. Retain infrmatin and ntify management fr assistance if necessary. D nt prvide services until identity is prven. 7

8 18. A persn seeking access t systems r sensitive infrmatin cannt prvide authenticating infrmatin beynd what wuld be fund in a wallet r cnsumer credit reprt, r cannt answer a challenge questin. Example: Staff member cannt answer security challenge questin required t regain access t ecmmerce systems. D nt prvide services, reset passwrds, r therwise prvide access until identity is prven. Fllw any prtcls established t recver access t the system in questin (e.g., by ntifying the system administratr t send a reset passwrd link t the persn s ). Categry: Suspicius Accunt Activity 19. Change f address request fllwed shrtly by a request fr a name change. Request fficial dcumentatin reflecting name change (curt rder, marriage certificate, etc.) and cmpare with pht identificatin. Verify change f address previusly submitted. If custmer did nt initiate the actin(s) and identity theft f the custmer s infrmatin is suspected, direct custmer t FTC Identity Theft website t learn what steps t take t recver frm identity theft. 20. An accunt is used in a manner incnsistent with established patterns f activity n that accunt. Fr example, payments are n lnger made n an therwise cnsistently up-t-date accunt. 21. Mail sent t a custmer is returned repeatedly as undeliverable even thugh the accunt remains active. 22. Custmer ntifies UNC Charltte (via phne, , r in-persn) that the custmer is nt receiving mail. Banner autmatically places a financial hld n verdue accunts and restricts certain services frm being prvided until the hld has been remved by Student Accunts. Attempt t cntact the custmer via cntact infrmatin n file. Verify address infrmatin with custmer and ensure listed addresses are active. If address n file was nt entered by custmer, ntify management fr assistance. If identity theft f the custmer s infrmatin is suspected, direct custmer t FTC Identity Theft website t learn what steps t take t recver frm identity theft. 8

9 23. Custmer ntifies UNC Charltte (via phne, , r in-persn) that an accunt with the University has unauthrized activity. 24. Custmer ntifies UNC Charltte (via phne, , r in-persn) that unauthrized access t a University accunt that uses NinerNET authenticatin ( , My UNC Charltte, Mdle, 49er Mart, etc.) has ccurred. Example: Custmer is autmatically lgged ff during an nline sessin due t multiple lgin attempts frm an external site. Verify if the ntificatin is legitimate and invlves a UNC Charltte accunt. Ntify management fr assistance t investigate the activity. If custmer s accunt des have unauthrized activity and identity theft f the custmer s infrmatin is suspected, direct custmer t FTC Identity Theft website t learn what steps t take t recver frm identity theft. Verify if the ntificatin is legitimate and invlves a UNC Charltte accunt. Ntify management fr assistance t investigate the activity. Instruct custmer t reset the accunt passwrd immediately. If unauthrized access did ccur and identity theft f the custmer s infrmatin is suspected, direct custmer t FTC Identity Theft website t learn what steps t take t recver frm identity theft. Categry: Ntice Frm Other Surces 25. A custmer, identity theft victim, r law enfrcement agent ntifies UNC Charltte (via phne, , r in-persn) that an accunt has been pened r used fraudulently. 26. We learn that unauthrized access t the custmer s persnal infrmatin tk place r became likely due t data lss (e.g., lss f wallet, birth certificate, r laptp), leakage, r breach. Verify if the ntificatin is legitimate and invlves a UNC Charltte accunt. Ntify management fr assistance t investigate the activity and determine if any actins are needed (e.g., inactivating direct depsit, placing a financial hld n the accunt). Direct custmer t FTC Identity Theft website t learn what steps t take t recver frm identity theft, if custmer has nt already dne s. If the fraud ccurred during cnduct f University business, reprt the incident t Campus Plice and cmplete the Red Flag Detectin Frm. Verify if the ntificatin is legitimate and invlves a UNC Charltte accunt. Ntify management fr assistance t investigate the activity and determine if any actins are needed (e.g., inactivating direct depsit, placing a financial hld n the accunt). Als see University Plicy 311.5, Persnal Infrmatin Security Breach Ntificatin Prcedures. If identity theft f custmer s infrmatin is suspected, 9

10 VII. Preventing and Mitigating Identity Theft direct custmer t FTC Identity Theft website t learn what steps t take t recver frm identity theft. PROCEDURES TO PREVENT IDENTITY THEFT Student Enrllment T prevent identity theft assciated with the enrllment f a student, University persnnel shall take the fllwing steps t btain and verify the identity f the persn pening the accunt: Require certain Identifying Infrmatin such as name, date f birth, academic recrds, hme address r ther identificatin; and Verify the individual s identity at time f issuance f individual identificatin card (review f driver s license r ther gvernment-issued pht identificatin). Existing Accunts T prevent identity theft fr an existing Cvered Accunt, University persnnel shall take the fllwing steps t mnitr transactins n an accunt: Verify the identificatin f individuals if they request infrmatin (in persn, via telephne, via facsimile, via ); Verify the validity f requests t change billing addresses by mail r and prvide the individual a reasnable means f prmptly reprting incrrect billing address changes; and Verify changes in banking infrmatin given fr billing and payment purpses. Cnsumer ( Credit ) Reprt Requests T prevent identity theft regarding an emplyment r vlunteer psitin fr which a credit r backgrund reprt is sught, University persnnel shall take the fllwing steps t assist in identifying address discrepancies: Require written verificatin frm any applicant that the address prvided by the applicant is accurate at the time the request fr the credit reprt is made t the cnsumer reprting agency; and In the event that ntice f an address discrepancy is received, verify that the credit reprt pertains t the applicant fr whm the requested reprt was made and reprt t the cnsumer reprting agency an address fr the applicant that the University has reasnably cnfirmed is accurate. Prtectin f Identifying Infrmatin T further prevent the likelihd f Identity Theft ccurring during cnduct f University business, the University will take the fllwing steps with respect t its internal perating prcedures t prtect PII: Ensure that its website is secure r prvide clear ntice that the website is nt secure; Ensure cmplete and secure destructin f paper dcuments and cmputer files cntaining individual accunt infrmatin when a decisin has been made t n lnger maintain such infrmatin; Ensure that ffice cmputers with access t PII are passwrd prtected; Ensure that laptps are passwrd prtected and encrypted; Avid use f scial security numbers when pssible; Ensure the security f physical facilities that cntain PII; Ensure that transmissin f PII is limited and encrypted when necessary; 10

11 Ensure cmputer virus prtectin is up t date; and Require and keep nly the kinds f individual infrmatin that are necessary fr University purpses. Hard Cpy Distributin Each emplyee and cntractr perfrming wrk fr the University will cmply with the fllwing security measures related t hard cpy files with PII: File cabinets, desk drawers, verhead cabinets, and any ther strage space cntaining dcuments with PII will be lcked when nt in use, when unsupervised, and at the end f each wrkday. Desks, wrkstatins, wrk areas, printers and fax machines, and cmmn shared wrk areas will be cleared f all dcuments cntaining PII when nt in use. Whitebards, dry-erase bards, writing tablets, and ther writing surfaces in cmmn shared wrk areas with PII will be erased, remved, r shredded when nt in use. When dcuments cntaining PII are discarded, they will be placed inside a lcked shred bin r immediately shredded using a mechanical crss cut r Department f Defense-apprved shredding device. Lcked shred bins are labeled Cnfidential paper shredding and recycling. PROCEDURES TO MITIGATE IDENTITY THEFT In the event that University persnnel are ntified f a Red Flag r ur detectin prcedures shw evidence f a Red Flag, such persnnel shuld take the steps utlined belw, as apprpriate t the type and seriusness f the threat: Watch. We will mnitr, limit, r temprarily suspend activity in the accunt until the situatin is reslved. Check with the custmer. We will cntact the custmer, describe what we have fund, and verify with them that there has been an attempt at identify theft. Change passwrds. We will change any passwrds r ther security measures that permit access t the affected accunt(s). Deny new accunts. If we find that the applicant is using an identity ther than his r her wn, we will deny pening any new accunts. Prvide new identificatin. If a custmer s identificatin number has been cmprised, we will prvide the individual with a new 800 number. Heightened risk. We will determine if a particular reasn exists that has made it easier fr an intruder t seek access, such as a custmer s lst wallet, mail theft, a data security incident, r the ccurrence f a custmer giving his r her accunt infrmatin t an impster pretending t represent the University r t a fraudulent website. Check similar accunts. We will review similar accunts the custmer has with the University t see if ther attempts t access them withut authrizatin have been made. 11

12 VIII. Cllect incident infrmatin. Persnnel will cmplete a Red Flag Detectin Frm, which is sent t the Red Flags Rule Prgram Administratr. Reprt. If we find that the applicant is using an identity ther than his r her wn, we will reprt it t the campus plice ( ), wh may determine if it is subsequently necessary t ntify ther federal r state agencies if rganized r widespread crime is suspected r, if mail is invlved, the US Pstal Inspectr. Service Prviders In the event the University engages a Service Prvider t perfrm an activity in cnnectin with ne r mre f its Cvered Accunts, the University will take the fllwing steps t ensure the Service Prvider perfrms its activities in accrdance with reasnable plicies and prcedures designed t detect, prevent and mitigate the risk f Identity Theft: Require, by signed cntract, that Service Prviders have such plicies and prcedures in place; and Require, by signed cntract, that Service Prviders review the University s Prgram and reprt any Red Flags t the Prgram Administratr. IX. Prgram Administratin The Prgram Administratr, currently the Cmpliance Manager in the Cntrller s Office, is respnsible fr develping, implementing, and administering the University s ITPP. Apprpriate staff shall reprt t the Prgram Administratr at least annually n cmpliance by the University with this Prgram. The reprt shall address matters such as the effectiveness f the plicies and prcedures f the University in addressing the risk f Identity Theft in cnnectin with the pening f Cvered Accunts and with respect t existing Cvered Accunts; Service Prvider arrangements; significant incidents invlving Identity Theft and the University s respnse; and recmmendatins fr material changes t the Prgram. X. Key Resurces University Red Flags Rule pages: Overview: Annual Survey: Red Flag Detectin Frm: FTC Resurces: FTC Data Security resurces: Fighting Identity Theft with the Red Flags Rule: A Hw-T Guide fr Business 12

13 FTC Cnsumer Infrmatin: Identity Theft XI. Acrnyms CFR Cde f Federal Regulatins CISO Chief Infrmatin Security Officer FACTA Fair and Accurate Credit Transactins Act FAFSA Free Applicatin fr Federal Student Aid FCRA Fair Credit and Reprting Act FERPA Family Educatinal Rights and Privacy Act f 1974 FTC Federal Trade Cmmissin GLBA Gramm-Leach-Bliley Act HIPAA Health Insurance Prtability and Accuntability Act f 1996 ITPP Identity Theft Preventin Prgram ITS Infrmatin Technlgy Services department NCRA Natinwide Cnsumer Reprting Agency (Experian, Equifax, TransUnin) PHI Prtected Health Infrmatin PII Persnally Identifiable Infrmatin SSA Scial Security Administratin SSN Scial Security Number XII. Dcument Histry and Annual Review These Prcedures were cnstructed using varius resurces, including the University s ITPP, the FTC FACT Act Red Flags Rule Template, and The University f Texas at San Antni s Red Flags Rule plicy. The fllwing departments cntributed t the creatin and review f this dcument: Financial Services, the Office f Legal Affairs, the Internal Audit Department, and the ITS Infrmatin Systems Cmpliance Office. The cntributins and cllabratin amng the staff within these departments are gratefully acknwledged. Creatin date: June 2013 Our identity theft plicies, prcedures and internal cntrls will be reviewed and updated peridically t ensure they accunt fr changes bth in regulatins and in ur peratins. Revisin dates: March 2014 (updated links); April 2014 (updated Key Areas); June 2015 (updated Key Areas & links); Octber 2015 (updated 49er Express text t My UNC Charltte) 13

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff

More information

Information Security Policy

Information Security Policy Purpse The risk t Charlestn Suthern University, its emplyees and students frm data lss and identity theft is f significant cncern t the University and can be reduced nly thrugh the cmbined effrts f every

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT Kentwd Plice Department 4742 Walma Ave SE Kentwd, Michigan 49512 (616) 698-6580 http://www.ci.kentwd.mi.us REPORTING IDENTITY THEFT If yu are the victim f identity theft and ne f the fllwing cnditins are

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

Texas Woman's University University Policy Manual

Texas Woman's University University Policy Manual Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Preventing Identity Theft

Preventing Identity Theft Preventing Identity Theft Each year, millins f Americans have their identity stlen. ENG Lending wants yu t have the infrmatin yu need t prtect yurself against identity theft. While there are n guarantees

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

Credit Work Group Recommendation

Credit Work Group Recommendation Credit Wrk Grup Recmmendatin T: Credit Wrk Grup Frm: Mike Bixby (305) 829-5549 mbixby@inf1team.cm Paul Wills (770) 740-7353 Paul.Wills@equifax.cm Date: Octber 7, 2004 Re: FACT Act Implicatins and Recmmendatins

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices This is being prvided t yu as a requirement f the privacy regulatins issued under the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA). This ntice describes hw HROSM may use and disclse

More information

Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business

Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business This infrmatin prvided by the Federal Trade Cmmissin. (http://business.ftc.gv/dcuments/bus23-fighting-identity-theft-red-flags-rule-hw-guide-business) Fighting Identity Theft with the Red Flags Rule: A

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs

More information

How To Get A Credit By Examination

How To Get A Credit By Examination LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION FACT SHEET Texas Ri Salad Cllege, a Maricpa Cunty Cmmunity Cllege in Tempe, Arizna, is prud t annunce its Credit by Examinatin prgram in Law Enfrcement

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

BridgeValley Community and Technical College Financial Aid Office 2015-2016 Maximum Hour Financial Aid Suspension Appeal Process

BridgeValley Community and Technical College Financial Aid Office 2015-2016 Maximum Hour Financial Aid Suspension Appeal Process BridgeValley Cmmunity and Technical Cllege Financial Aid Office 2015-2016 Maximum Hur Financial Aid Suspensin Appeal Prcess T receive financial aid administered by BridgeValley Cmmunity and Technical Cllege,

More information

Privacy Breach and Complaint Protocol

Privacy Breach and Complaint Protocol Privacy Breach and Cmplaint Prtcl Effective: December 31, 2012 Apprved by: Le McKenna, CFO 1.0 General Privacy breaches and privacy cmplaints will be handled in accrdance with this prtcl. This prtcl is

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

Electronic Data Interchange (EDI) Requirements

Electronic Data Interchange (EDI) Requirements Electrnic Data Interchange (EDI) Requirements 1.0 Overview 1.1 EDI Definitin 1.2 General Infrmatin 1.3 Third Party Prviders 1.4 EDI Purchase Order (850) 1.5 EDI PO Change Request (860) 1.6 Advance Shipment

More information

ES PROCEDURES FOR OVERPAYMENT RECOVERY

ES PROCEDURES FOR OVERPAYMENT RECOVERY ES PROCEDURES FOR OVERPAYMENT RECOVERY Effective: 7/1/2012 Respnsible Office: Emplyee Services (ES) Apprved: ES Directr Applicatin: All Emplyees f the University f Clrad Plicy The University f Clrad will

More information

Employees - recruitment, records and monitoring

Employees - recruitment, records and monitoring Emplyees - recruitment, recrds and mnitring This guidance has been prduced t help rganisatins cmply with the Data Prtectin Act (DPA) when recruiting and emplying wrkers. It is relevant t public sectr emplyers,

More information

COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE

COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE Mst dealers are familiar with the requirements f the Gramm-Leach-Bliley Act

More information

CLEARANCE REVIEWS FOR STUDENT RESTRICTION ISSUES OTHER THAN ACADEMIC PROGRESS

CLEARANCE REVIEWS FOR STUDENT RESTRICTION ISSUES OTHER THAN ACADEMIC PROGRESS CLEARANCE REVIEWS FOR STUDENT RESTRICTION ISSUES OTHER THAN ACADEMIC PROGRESS Only the Ministry f Training, Clleges & Universities can cnsider clearance reviews fr mst ther student restrictin issues. These

More information

CORPORATE CREDIT CARD POLICY

CORPORATE CREDIT CARD POLICY TITLE: POLICY OWNERS: DATE INSTITUTED: May 1, 2008 CURRENT VERSION: Ver. 1.6 REVISION DATE: July 1, 2015 Crprate Credit Card Plicy Melissa Cluse, Vice President & Cntrller Cindy Klein, Accunts Payable

More information

TITLE: Supplier Contracting Guidelines Process: FIN_PS_PSG_050 Replaces: Manual Sections 6.4, 7.1, 7.5, 7.6, 7.11 Effective Date: 10/1/2014 Contents

TITLE: Supplier Contracting Guidelines Process: FIN_PS_PSG_050 Replaces: Manual Sections 6.4, 7.1, 7.5, 7.6, 7.11 Effective Date: 10/1/2014 Contents TITLE: Supplier Cntracting Guidelines Prcess: FIN_PS_PSG_050 Replaces: Manual Sectins 6.4, 7.1, 7.5, 7.6, 7.11 Cntents 1 Abut university supplier cntracting... 2 2 When is a cntract required?... 2 3 Wh

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Symantec User Authentication Service Level Agreement

Symantec User Authentication Service Level Agreement Symantec User Authenticatin Service Level Agreement Overview and Scpe This Symantec User Authenticatin service level agreement ( SLA ) applies t Symantec User Authenticatin prducts/services, such as Managed

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

MAYFAIR INSURANCE & MORTGAGE CONSULTANTS LTD 11 Lurke Street, Bedford MK40 3HZ Telephone: 01234 242900

MAYFAIR INSURANCE & MORTGAGE CONSULTANTS LTD 11 Lurke Street, Bedford MK40 3HZ Telephone: 01234 242900 MAYFAIR INSURANCE & MORTGAGE CONSULTANTS LTD 11 Lurke Street, Bedfrd MK40 3HZ Telephne: 01234 242900 Please read this dcument carefully as it sets ut the terms n which we agree t act fr ur clients and

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Montana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management

Montana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management Mntana Acquisitin & Cntracting System (emacs) emacs Handbk Vendr Registratin and Data Management Welcme The purpse f this emacs Handbk fr Vendr Registratin and Data Management is t prvide vendrs with the

More information

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service. FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept

More information

GOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES For Your Protected Health Information

GOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES For Your Protected Health Information GOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES Fr Yur Prtected Health Infrmatin THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

RECONCILIATION OF FUNDS

RECONCILIATION OF FUNDS RECONCILIATION OF FUNDS ROLES Departmental Staff f Interest Accuntants Office Managers Business Managers Prgram Assistants OVERVIEW S why d we need t recncile? Gd general business practices determine that

More information

Wire Transfer Request

Wire Transfer Request Wire Transfer Request Requirements and Instructins OFFICE OF DISBURSEMENTS Categry: Dcument Name: Payment Prcessing Wire Transfer Request - Requirements and Instructins Respnsible Department: Office f

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

0820.02 Workers Disability Compensation Claims Procedures Issued: January 1, 1994 Revised: March 29, 2012

0820.02 Workers Disability Compensation Claims Procedures Issued: January 1, 1994 Revised: March 29, 2012 State f Michigan Administrative Guide t State Gvernment 0820.02 Wrkers Disability Cmpensatin Claims Prcedures Issued: January 1, 1994 Revised: March 29, 2012 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY:

More information

Heythrop College Disciplinary Procedure for Support Staff

Heythrop College Disciplinary Procedure for Support Staff Heythrp Cllege Disciplinary Prcedure fr Supprt Staff Intrductin 1. This prcedural dcument des nt apply t thse academic-related staff wh are mentined in the Cllege s Ordinance, namely the Librarian and

More information

THIRD PARTY PROCUREMENT PROCEDURES

THIRD PARTY PROCUREMENT PROCEDURES ADDENDUM #1 THIRD PARTY PROCUREMENT PROCEDURES NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS TRANSPORTATION DEPARTMENT JUNE 2011 OVERVIEW These prcedures establish standards and guidelines fr the Nrth Central

More information

Frequently Asked Questions about the Faith A. Fields Nursing Scholarship Loan

Frequently Asked Questions about the Faith A. Fields Nursing Scholarship Loan ARKANSAS STATE BOARD OF NURSING 1123 S. University Avenue, Suite 800, University Twer Building, Little Rck, AR 72204 Phne: (501) 686-2700 Fax: (501) 686-2714 www.arsbn.rg Frequently Asked Questins abut

More information

UNIVERSITY OF WINCHESTER

UNIVERSITY OF WINCHESTER UNIVERSITY OF WINCHESTER INTRODUCTION DEBT MANAGEMENT POLICY: STUDENTS ACADEMIC YEAR 15/16 This dcument sets ut the plicy f the University in relatin t student debt, alng with the debt management prcedures

More information

Chapter 7 Business Continuity and Risk Management

Chapter 7 Business Continuity and Risk Management Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity

More information

Lost or stolen wallet or checkbook

Lost or stolen wallet or checkbook Identity theft is ne f the fastest-grwing financial crimes in America, accunting fr lsses in the billins f dllars every year. The Federal Trade Cmmissin reprts that 10 millin Americans discvered that their

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

LOUISIANA TECH UNIVERSITY Division of Student Financial Aid Post Office Box 7925 Ruston, LA 71272

LOUISIANA TECH UNIVERSITY Division of Student Financial Aid Post Office Box 7925 Ruston, LA 71272 LOUISIANA TECH UNIVERSITY Divisin f Student Financial Aid Pst Office Bx 7925 Rustn, LA 71272 Dear Financial Aid Applicant, Accrding t yur 2011-2012 Student Aid Reprt (SAR), yu did nt include any parental

More information

All Harvard University schools, tubs, local units, Affiliate Institutions, Allied Institutions and University-wide Initiatives.

All Harvard University schools, tubs, local units, Affiliate Institutions, Allied Institutions and University-wide Initiatives. HARVARD UNIVERSITY FINANCIAL POLICY INDEPENDENT CONTRACTOR CLASSIFICATION Plicy Title: Independent Cntractr Respnsible Office: ERP and UFS Effective Date: Octber 4, 2000 Revisin Date: May 12, 2009 Plicy

More information

Purpose Statement. Objectives

Purpose Statement. Objectives Apprved by Academic Affairs Cuncil, June 24, 2014 Faculty Handbk Part VI: Other Plicies and Prcedures Sectin R. Intellectual Prperty Classified Emplyee Handbk Part VI: Other Plicies and Prcedures Sectin

More information

Dear Flexible Spending Account (FSA) Enrollee:

Dear Flexible Spending Account (FSA) Enrollee: Dear Flexible Spending Accunt (FSA) Enrllee: Welcme t yur FSA Plan! Yu nw have 24x7 access t all yur FSA needs n the web. T access yur accunt simply lgn t www.fsa4me.cm. Yur user name is yur first initial,

More information

State Fleet Card Oversight Usage and Responsibilities

State Fleet Card Oversight Usage and Responsibilities State Fleet Card Oversight Usage and Respnsibilities Intrductin The Department f General Services (DGS), Office f Fleet and Asset Management (OFAM) administers a statewide ne-prvider payment system cntract

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Application for 477 Services

Application for 477 Services An Indian Rerganizatin Act Village Under Act f Cngress June 15 th, 1935 32 Chilkat Ave. Klukwan, Alaska 99827 HC60 Bx 2207 Haines, Alaska 99827 Phne: 907-767-5505 Fax: 907-767-5408 klukwan@chilkat-nsn.gv

More information

Fiscal Operation of Service Centers

Fiscal Operation of Service Centers Oregn University System Fiscal Plicy Manual Fiscal Operatin f Service Centers Sectin: Accunting and Financial Reprting Number: 05.713 Title: Fiscal Operatin f Service Centers Index POLICY.100 POLICY STATEMENT.110

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

KIK s GUIDE FOR LAW ENFORCEMENT

KIK s GUIDE FOR LAW ENFORCEMENT Thanks fr checking ut ur law enfrcement guide. Kik takes the safety f ur users very seriusly, and we hpe this guide will be a useful tl fr yu. It includes infrmatin abut ur app; the features and functins

More information

NEW YORK STATE DEPARTMENT OF HEALTH BUREAU OF DENTAL HEALTH SCHOOL-BASED HEALTH CENTER DENTAL PROGRAM PERFORMANCE EFFECTIVENESS REVIEW TOOL (PERT)

NEW YORK STATE DEPARTMENT OF HEALTH BUREAU OF DENTAL HEALTH SCHOOL-BASED HEALTH CENTER DENTAL PROGRAM PERFORMANCE EFFECTIVENESS REVIEW TOOL (PERT) NEW YORK STATE DEPARTMENT OF HEALTH BUREAU OF DENTAL HEALTH SCHOOL-BASED HEALTH CENTER DENTAL PROGRAM PERFORMANCE EFFECTIVENESS REVIEW TOOL (PERT) March 1, 2007 TABLE OF CONTENTS SECTION I: INTRODUCTION

More information

Merchant Processes and Procedures

Merchant Processes and Procedures Merchant Prcesses and Prcedures Table f Cntents EXHIBIT C 1. MERCHANT INTRODUCTION TO T-CHEK 3 1.1 Wh is T-Chek Systems? 3 1.2 Hw t Cntact T-Chek Systems 3 1.3 Hw t Recgnize T-Chek Frms f Payment 3 1.3.1

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

Detroit Public Schools Policy 13.14 Page 1

Detroit Public Schools Policy 13.14 Page 1 Detrit Public Schls Plicy 13.14 Page 1 SUBJECT: Supersedes: STUDENT RECORD AND TRANSCRIPT PROCESSING Nne; New Plicy Effective: September 1, 2006 Page: 1 f 10 1.0 Purpse 2.0 Scpe This prcedure dcuments

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

Post-Baccalaureate Certificate Programs

Post-Baccalaureate Certificate Programs Pst-Baccalaureate Certificate Prgrams Certificate prgrams benefit students and/r interest by prviding greater flexibility and brader training in areas related t the students' majr fields and making thse

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

If the CAP is acceptable, the serious deficiency determination for the provider is temporarily deferred.

If the CAP is acceptable, the serious deficiency determination for the provider is temporarily deferred. Pat McCrry Gvernr Sent Via Email TO: FROM: Nrth Carlina Department f Health and Human Services Divisin f Public Health May 12.2014 Spnsring Organizatins f Day Care Hmes Arnette Cwan, MS, RD, LDN Supervisr,

More information

NAIC Replacement Requirements For Certain Life Insurance Policies And Annuity Contracts

NAIC Replacement Requirements For Certain Life Insurance Policies And Annuity Contracts NAIC Replacement Requirements Fr Certain Life Insurance Plicies And Annuity Cntracts Duties f Prducers If a transactin invlves a replacement, the prducer must leave with the applicant, at the time an applicatin

More information

Audit Committee Charter

Audit Committee Charter Audit Cmmittee Charter Membership The Audit Cmmittee (the "Cmmittee") f the Bard f Directrs (the "Bard") f Philip Mrris Internatinal Inc. (the "Cmpany") shall cnsist f at least three directrs all f whm

More information

Munising Memorial Hospital. Administrative/Financial Policy

Munising Memorial Hospital. Administrative/Financial Policy Munising Memrial Hspital Administrative/Financial Plicy SUBJECT: Credit and Cllectins & Financial Assistance POLICY NO. 100-072 REVISED: March 26, 2014 Authrized By: The credit and cllectin plicy f Munising

More information

Sources of Federal Government and Employee Information

Sources of Federal Government and Employee Information Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Infrmatin Security Incident Respnse Plan Agency: Date: Cntact: 1 TABLE OF CONTENTS Intrductin... 3 Authrity... 4 Terms and Definitins... 4 Rles and Respnsibilities... 5 Prgram... 6 Educatin and Awareness...

More information

Bill Payment Agreement & Disclosures

Bill Payment Agreement & Disclosures Bill Payment Agreement & Disclsures Welcme t Online Banking Bill Payment Service. Use f the Bill Payment Service indicates acceptance f terms and cnditins set frth in the Online Banking Agreement & Disclsures

More information

COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS for STUDY ABROAD PROGRAMS

COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS for STUDY ABROAD PROGRAMS COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS fr STUDY ABROAD PROGRAMS Belw is a list f items t address and questins that need t be addressed in the cmprehensive safety assessment. In additin t the safety

More information

Agency Fund (Non-Student Org X-Fund) Guidelines Last Revision: 12/7/2009

Agency Fund (Non-Student Org X-Fund) Guidelines Last Revision: 12/7/2009 Agency Fund (Nn-Student Org X-Fund) Guidelines Last Revisin: 12/7/2009 Definitin f Agency Fund: An Agency Fund cnsists f funds held by Eastern Michigan University as custdian r fiscal agent fr thers, such

More information

o o 2) Program Rewards

o o 2) Program Rewards 1) T qualify fr the American Red Crss High Schl Leadership Prgram (referred t as Prgram), each student (referred t as Member) is asked t cmplete the fllwing requirements: a. Cmplete an nline prfile at

More information

POLICIES AND PROCEDURES

POLICIES AND PROCEDURES POLICIES AND PROCEDURES Department: Campus Safety and Security and Welcme Center/Infrmatin Subject: Rental Vehicle Insurance Date Issued: December 16, 2005 Date Revised: March 23, 2009; Octber 1, 2011

More information

How To Get A Job At A Farmhouse Farmhouse

How To Get A Job At A Farmhouse Farmhouse Lan Applicatin fr Pre- Apprval Get pre-apprved fr yur hme lan financing tday by cmpleting this applicatin. Please cmplete the entire applicatin and return with the dcumentatin requested n the attached

More information

Cell Phone & Data Access Policy Frequently Asked Questions

Cell Phone & Data Access Policy Frequently Asked Questions Cell Phne & Data Access Plicy Frequently Asked Questins 1. Wh is eligible fr a technlgy allwance? First and fremst, the technlgy allwance is fr the benefit f the University, rather than fr the cnvenience

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

Interagency Guidance on Privacy Laws and Reporting Financial Abuse of Older Adults

Interagency Guidance on Privacy Laws and Reporting Financial Abuse of Older Adults Bard f Gvernrs f the Federal Reserve System Cmmdity Futures Trading Cmmissin Cnsumer Financial Prtectin Bureau Federal Depsit Insurance Crpratin Federal Trade Cmmissin Natinal Credit Unin Administratin

More information

Enrollee Health Assessment Program Implementation Guide and Best Practices

Enrollee Health Assessment Program Implementation Guide and Best Practices Enrllee Health Assessment Prgram Implementatin Guide and Best Practices March 2015 033129 (03-2015) This guide will help yu answer these questins: What is the Enrllee Health Assessment (EHA) prgram and

More information

University of Texas at Tyler 2015-2016 Special Circumstances Request Independent Student

University of Texas at Tyler 2015-2016 Special Circumstances Request Independent Student University f Texas at Tyler 2015-2016 Special Circumstances Request Independent Student Student Name: ID#: Sectin I. In accrdance with Federal regulatins, student and spuse 2014 incme is used t determine

More information

Internet and Social Media Solicitations: Wise Giving Tips

Internet and Social Media Solicitations: Wise Giving Tips Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial

More information

WORKPLACE INJURY/ILLNESS/INCIDENT INVESTIGATION & REPORTING POLICY (BC VERSION)

WORKPLACE INJURY/ILLNESS/INCIDENT INVESTIGATION & REPORTING POLICY (BC VERSION) WORKPLACE INJURY/ILLNESS/INCIDENT INVESTIGATION & REPORTING POLICY (BC VERSION) Intrductin: Hw t Use This Tl As d all ther jurisdictins, BC requires emplyers t investigate and reprt specific kinds f wrkplace

More information

How To Contact Skrill

How To Contact Skrill Skrill Merchant Services Applicatin Frm Skrill Merchant Services Applicatin Frm (the Applicatin ) shuld be signed by r n behalf f the Merchant. It is very imprtant that the Merchant has read the Applicatin

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 8 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk The Bard f Educatin recgnizes as new technlgies shift the manner in which infrmatin is

More information