Red Flag Rules Information and Training
|
|
|
- Samantha Elliott
- 10 years ago
- Views:
Transcription
1 Red Flag Rules Information and Training
2 What are Red Flag Rules? The Red Flag Rules: - Are enforced by the Federal Trade Commission (FTC), the federal bank regulatory agencies, and the National Credit Union Administration. - Set out how certain businesses and organizations must develop, implement and administer their Identity Theft Prevention Program. - These rules have been in effect since January 1, As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit, and even endanger their medical treatment. -Federal Trade Commission, Fighting Fraud with the Red Flag Rule
3 Who Must Comply With these Rules? Financial Institutions and Creditors must comply. - Although UNM is not a financial institution, we are a creditor because we, regularly defer payment for goods or services or provide goods or services and bill customers later. (Ever get a bill from the Bursar s Office?) - The definition further describes covered accounts. These are accounts where there maybe a foreseeable risk of identity theft. This is particularly true if the account can accessed remotely, such a through the Internet or telephone. - In thinking about identity theft, we must go beyond accounts at UNM and think about things like, Admissions, Financial Aid, Employment Applications. All can send up a red flag.
4 UNM Covered Accounts Include But are not limited to: Student Accounts Receivable LoboCa$h Bookstore Accounts Patient Accounts Employee Accounts Receivable and Employment Records Any Department Offering Goods/Services and Accepting Payment at a Later Date
5 Compliance is a Four-Step Process Step 1: Identify Relevant Red Flags Step 2: Detect Red Flags Step 3: Prevent and Mitigate Identity Theft Step 4: Update your Program Let s Go Over Each Step....
6 Each Department is Unique The following slides are guidelines for identifying, detecting and mitigating identity theft. Each department has unique circumstances and accounts. Each department dealing with covered accounts must develop their own program for dealing with identity theft. That program must be reviewed and updated periodically.
7 Step 1: Identify Red Flags There are five different categories for identifying red flags: 1. Notifications and Warnings from Credit Reporting Agencies 2. Suspicious Documents 3. Suspicious Personal Identifying Information 4. Suspicious Covered Account Activity or Unusual Use of Account 5. Alerts from Others
8 Step 1: Identify (continued) Category 1: Notifications and Warnings from Credit Reporting Agencies: Most UNM Departments do not request credit reports on a regular basis. If your department does use credit reports for whatever reason, Red Flags may include: 1. Report of fraud accompanying a credit report; 2. Notice from a credit agency of a credit freeze; 3. Notice from a credit agency of an active duty alert ; 4. Receipt of address discrepancy in response to a credit report request; and 5. Indication from a credit report of activity inconsistent with an applicant s usual pattern or activity.
9 Step 1: Identify (continued) Category 2: Suspicious Documents: Almost all UNM departments with covered accounts work with some form of documentation. These documents may include employment applications, applications for admissions, taxation and revenue documentation and change of address request. Red flags include: 1. Identification document or card that appears to be forged, altered or inauthentic; 2. Identification document or card on which a person s photograph or physical description is not consistent with the person presenting the document; 3. Other document with information that is not consistent with existing student/employee information; and 4. Application that appears to have been altered or forged.
10 Step 1: Identify (continued) Category 3: Suspicious Personal Identifying Information: When dealing with individuals at UNM, proper identifying information is needed. This may include a Lobo ID, driver s license or passport. On the phone, employees should verify birth date or other personal information. This doesn t stop with student contact as described below: 1. Identifying information presented that is inconsistent with other information the student provides (example: inconsistent birth dates); 2. The social security number has not been issued or is listed on the Social Security Administration s Death Master File; 3. A person fails to provide complete personal identifying information on an application when reminded to do so; and 4. Identifying information presented that is consistent with fraudulent activity (such as an invalid phone number or fictitious billing address).
11 Step 1: Identify (continued) Category 4: Suspicious Account Activity or Unusual Use of Account Any of the following should be considered a Red Flag. Use your own judgment. Is there anything else specific to your department that may cause concern? For example, a student charging only electronic devices (e.g. ipods or laptop computer) to their UNM Bookstore account. 1. Change of address on account followed by a request to change the student s name; 2. Payments stop on an otherwise up-to-date account; 3. Mail sent to a student is repeatedly undeliverable although there is account activity; 4. Notice to UNM that the student is not receiving any UNM mail; 5. Notice to UNM that the account has unauthorized activity; 6. Unauthorized access to or use of student account information; and 7. Breach in UNM s computer system security.
12 Step 1: Identify (continued) Category 5: Alerts from Others: An obvious Red Flag occurs whenever notice is given to UNM from a student, identity theft victim, law enforcement agency or other person that UNM has opened or is maintaining a fraudulent account for a person engaged in identity theft. Once you ve identified what constitutes a possible Red Flag, what s the next step?
13 Step 2: Detect Red Flags Now that your department knows what a Red Flag looks like, it s time to come up with procedures to detect Red Flags in your own area. Two areas of particular concern are: 1. Obtaining identifying information about, and verifying the identity of a person opening/maintaining a covered account. This is as simple as requesting a picture ID anytime a student transacts business with your department. And, in the case of issuing a LoboCard to a new or existing student, requesting additional photo identification and verifying information such as address and date of birth. 2. Authenticating customers (e.g. requiring a logon ID and password if online or verifying birthday and/or class schedule by phone), monitoring transactions and verifying the validity of change of address requests. For example, the Bursar s Office will not change account addresses. Students are directed to do this online as a logon ID and password are required for authentication.
14 Step 3: Prevent and Mitigate Identity Theft In the event UNM personnel detect any identified Red Flags, these individuals should discuss the situation with his or her supervisor who will take one or more of the following steps, depending on the degree of risk posed by the Red Flag: Prevent and Mitigate: -Continue to monitor an account for evidence of identity theft. -Contact the student or applicant. -Change passwords or other security devices that permit access to the account. -Not open a new account/admit student. -Provide student with a new ID number. -Notify the department Dean or Director. -Notify the Program Administrator for determination of the appropriate steps to take. -Notify law enforcement. -Determine that no response is warranted under the particular circumstances.
15 Step 3: Prevent and Mitigate Identity Theft (continued) Protect Student/Employee Identifying Information: -Ensure that the UNM website is secure or provide clear notice that the website is not secure. -Ensure complete destruction of paper documents and computer files containing student account information when a decision is made to no longer maintain such information. -Ensure office computers with access to account information are password protected. -Avoid use of Social Security Numbers. -Ensure computer virus protection is up-to-date. -Require and keep only the kinds of student information that are necessary for University purposes.
16 Step 4: Update the Program UNM UBPPM Policy 2040, Identity Theft Prevention Program, states, Deans, directors and department heads of areas that work with covered accounts are responsible for implementing departmental processes for complying with this policy... Each department working with covered accounts must implement policies and procedures related to identifying, detecting, mitigating and preventing identity theft. In addition, a detailed report of all incidents of identity theft and suspicious behavior that may be related to identity theft must be submitted to the Office of the Vice President for HSC/UNM Finance and University Controller. Our environment changes constantly. Technological advances and the ability to conduct most business online makes it imperative that individual departmental policies and procedures be reviewed and updated periodically. Know your environment. Know your customers. Know your risk.
17 Example of a Red Flag Incident Mary works in the Bursar s Office. She receives a call one day from a student requesting information on a refund check that should have been mailed to her weeks ago. Mary, according to Bursar s procedures, asks the student to verify her birth date and asks her what courses she is taking the current semester. The student provides information that matches the system data. Mary determines that a refund check was issued two weeks ago. She looks up the mailing address and asks the student to verify this address. The two addresses do not match. The address the student provides was inactivated when a new address was entered. Upon further investigation, the address was not changed online by the student but by another department at UNM. Mary sees a Red Flag. She informs the student she will look into the matter further and someone will call her back. Immediately she reports the Red Flag to her supervisor. Her supervisor looks into the matter and finds that the check was cashed but the signature on the copy of the cancelled check does not match any other signatures on prior checks or other UNM documentation signed by the student.
18 Example of a Red Flag Incident (continued) Mary s supervisor determines that this is definitely a possible identity theft situation. She contacts the student, prepares a written report and contacts the UNM Police Department. The UNM Police Department will contact the potential identity theft victim (student) and investigate fully. This incident and any others that occur will be included on the periodic report submitted to the Office of the Vice President for HSC/UNM Finance and University Controller. Further Information: - The department that changed the address should have asked for other documentation showing the new address and a photo ID as verification of the identity of the individual and evidence of a valid address. Or, the student should have been directed to change the address online with a logon ID and password. - The student will be issued another check. Because the signature is not hers, an affidavit must be completed and submitted to the bank, but she will receive a replacement check.
19 Where Can I Get More Information? UNM UBPPM Policy 2040 Identity Theft Prevention Program: UNM UBPPM Policy Cash Management Policy: Federal Trade Commission s (FTC) Red Flags Rule Website: National Association of College and University Business Officers (NACUBO) site containing links to both NACUBO Resources and FTC Resources:
Identity Theft and Data Protection
Identity Theft and Data Protection As keepers of student, faculty, and staff information, we as an institution are obligated and regulated by state and federal laws to protect certain pieces of information.
Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009
Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program
21.01.04.Z1.01 Guideline: Identity Theft Prevention Program
Texas A&M Health Science Center Guidelines 21.01.04.Z1.01 Guideline: Identity Theft Prevention Program Approved October 7, 2009 Reviewed February 26, 2015 Supplements System Regulation 21.01.04 Reason
Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
Identity Theft Prevention Program
Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity
Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009
Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 9 Chapter 13,
IDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
University of Alaska. Identity Theft Prevention Program
University of Alaska Identity Theft Prevention Program Effective beginning October 31, 2009 I. PROGRAM ADOPTION The University of Alaska ( University ) developed this Identity Theft Prevention Program
Facts About FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
II. F. Identity Theft Prevention
II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal
Identity theft. A fraud committed or attempted using the identifying information of another person without authority.
SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE
UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM
Doc. T08-109 Passed by the BoT 12/11/08 UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM The Board recognizes that some activities of the University are subject to the provisions of the Fair
Number: 56.300. Index
Identity Theft Prevention Program Section: General Operations Title: Identity Theft Prevention Program Number: 56.300 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND
Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
3344-19-01 Identity theft prevention program and red flag compliance policy.
3344-19-01 Identity theft prevention program and red flag compliance policy. (A) Program adoption Cleveland state university has developed this identity theft prevention program ( program ) pursuant to
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)
University of St. Thomas Identity Theft Prevention Program (Red Flags Regulation Response) Revised: January 10, 2013 Program Adoption and Administration The University of St. Thomas ( University ) established
Ouachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate
Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions
Reference: Fair and Accurate Credit Transactions Act, ( Pub. L. 108-159) The purpose of the Identity Theft Prevention Program (ITPP) is to control reasonably foreseeable risks to students from identity
IDENTITY THEFT PROCEDURES
IDENTITY THEFT PROCEDURES FREQUENTLY ASKED QUESTIONS ABOUT IDENTITY THEFT INCIDENTS AND RED FLAGS Q1: How is a Red Flags incident different from a data security breach? A1: A data security breach is the
Identity Theft Prevention Program. Effective: November 1, 2009
Identity Theft Prevention Program Effective: November 1, 2009 I. BACKGROUND Galveston College ("College" / Institution ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal
Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation
Guidelines to FTC Red Flag Rule(reformatted) Appendix A to Part 681 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 681.2 of this part requires each financial institution
Identification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft
George Mason University Identity Theft Prevention Program - Procedures Revised September 30, 2012 Identification of, ing, and Preventing and Mitigating Identity Theft IDENTIFICATION OF COVERED ACCOUNT
Detecting, Preventing, and Mitigating Identity Theft
THE RED FLAGS RULE Detecting, Preventing, and Mitigating Identity Theft Training for Ball State University s Identity Theft Protection Program What is the Red Flag Rule? Congress passed the Fair and Accurate
Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008
Travis County Water Control & Improvement District No. 17 Identity Theft Prevention Program Effective beginning November 20, 2008 I. PROGRAM ADOPTION The Travis County Water Control and Improvement District
University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule
NUMBER: BUSF 4.12 SECTION: SUBJECT: Finance and Planning University Identity Theft and Detection Program (NEW) DATE: March 3, 2011 Policy for: Procedure for: Authorized by: Issued by: All Campuses and
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED: I. Adoption of Identity Theft Prevention Program Doylestown Family Medicine, P.C.
IDENTITY THEFT AND MUNICIPAL UTILITIES
Minnesota Municipal Utilities Association IDENTITY THEFT AND MUNICIPAL UTILITIES Identity Theft and Red Flags Rule requirements The Red Flags Rule implements portions of the Fair and Accurate Credit Transactions
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009 Table of Contents Introduction to the Training Module.. i I. Introduction. 1 II. Definitions. 3 III. Recognizing Identity Theft.. 6 IV. Identifying
University Policy: Identity Theft Prevention Policy
University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0 Scope: The risk to Loyola University Chicago and its faculty, staff and students
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM SUMMARY OF OUR PROGRAM AND PROCESSES This dealership is committed to protecting its customers and itself from identity
RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009
RANDOLPH COUNTY PUBLIC WORKS Identity Theft Prevention Program Adopted September 1, 2009 Effective beginning September 1, 2009 I. PROGRAM ADOPTION The Randolph County Public Works Department ( the Department
RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft
RED FLAGS RULE Identifying, Detecting, & Mitigating Possible Identity Theft What is the Red Flag Rule? The Federal Trade Commission (FTC), along with federal bank regulators and the National Credit Union
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM This program shall become effective November 1, 2008. Adopted this the 20 th day of October, 2008. I. PREFACE The purpose of this program is to detect,
Identity Theft Prevention Policy
Eastern Kentucky University Policy and Regulation Library 6.#.#P Volume 6, Volume Title: Financial Affairs Chapter #, Chapter Title Section #, Name: Identity Theft Prevention Policy Approval Authority:
POLICY TITLE: IDENTITY THEFT PROTECTION POLICY
POLICY TITLE: IDENTITY THEFT PROTECTION POLICY I. Purpose The purpose of this policy is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY I. POLICY SUMMARY It shall be the policy of Polk County Rural Public Power District (PCRPPD) to take all reasonable steps to identify, detect, and prevent
