THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM
|
|
|
- Harry Briggs
- 10 years ago
- Views:
Transcription
1 THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant t the Federal Trade Cmmissin's Red Flags Rule (the "Rule"), which implements Sectins 114 and 315 f the Fair and Accurate Credit Transactins Act f On Nvember 9, 2007, a jint ntice f final rulemaking was published in the Federal Register (72 FR 63718) finalizing the Rule. The Rule requires each creditr that ffers r maintains ne r mre "cvered accunts", as defined belw, t develp and prvide fr the cntinuing administratin f a written prgram t detect, prevent, and mitigate identity theft in cnnectin with the pening f a cvered accunt r with any existing cvered accunt. This Prgram was develped with versight and apprval f the University's Bard f Trustees. After cnsideratin f the size and cmplexity f the University's peratins and accunt systems, and the nature and scpe f the University's activities, the University's Bard f Trustees determined that the Prgram was apprpriate fr the University and therefre apprved the Prgram, t be effective as f Octber 1, Definitins 2.1 "Cvered Accunt" means: (1) An accunt that a Creditr ffers r maintains, primarily fr persnal, family, r husehld purpses, that invlves r is designed t permit multiple payments r transactins; and (2) any ther accunt that the Creditr ffers r maintains fr which there is a reasnably freseeable risk t Custmers r t the safety and sundness f the Creditr frm Identity Theft, including financial, peratinal, cmpliance, reputatin, r litigatin risks. Examples f Cvered Accunts at the University include Perkins lan accunts, tuitin payment plan accunts, and accunts established fr the repayment f lans prvided t students by the University s cllege assciatins, which, fr the purpse f the Prgram, will be cnsidered t be part f the University. 2.2 Creditr means any persn wh regularly extends, renews, r cntinues credit; any persn wh regularly arranges fr the extensin, renewal, r cntinuatin f credit; r any assignee f an riginal creditr wh participates in the decisin t extend, renew, r cntinue credit. 2.3 Custmer means any persn wh has a Cvered Accunt with the University. 2.4 "Identity Theft" means a fraud cmmitted r attempted using the Identifying Infrmatin f anther persn withut authrity. 1
2 2.5 "Identifying Infrmatin'' means any name r number that may be used, alne r in cnjunctin with any ther infrmatin, t identify a specific persn, including but nt limited t any name, scial security number, date f birth, gvernment issued driver's license r identificatin number, alien registratin number, gvernment passprt number, and emplyer r taxpayer identificatin number. 2.6 Prgram Administratr means the individual designated with primary respnsibility fr versight f the Prgram, as described in Sectin 7.1 belw. 2.7 "Red Flag" means a pattern, practice, r specific activity that indicates the pssible existence f Identity Theft. 3. Identificatin f Red Flags In rder t identify relevant Red Flags, the University has cnsidered the types f Cvered Accunts that it ffers and maintains, the methds it prvides t pen and t access these accunts, and its previus experiences with Identity Theft. The University has identified the fllwing Red Flags in each f the five listed categries: 3.1 Suspicius Dcuments Dcuments prvided fr identificatin appear t have been altered r frged. The phtgraph r physical descriptin n the identificatin is nt cnsistent with the appearance f the Custmer presenting the identificatin. Other infrmatin n the identificatin is nt cnsistent with infrmatin prvided by the persn pening a new Cvered Accunt r the Custmer presenting the identificatin. Other infrmatin n the identificatin is nt cnsistent with readily accessible infrmatin that is n file with the University. An applicatin appears t have been altered r frged, r gives the appearance f having been destryed and reassembled. 3.2 Suspicius Persnal Identifying Infrmatin Persnal Identifying Infrmatin prvided is nt cnsistent with persnal Identifying Infrmatin that is n file with the University. Persnal Identifying Infrmatin prvided is nt cnsistent with external infrmatin surces used by the University. 2
3 Persnal Identifying Infrmatin prvided by the Custmer is nt cnsistent with ther persnal Identifying Infrmatin prvided by the Custmer. Persnal Identifying Infrmatin prvided is assciated with knwn fraudulent activity, as indicated by internal r third-party surces used by the University. Persnal Identifying Infrmatin prvided is f a type cmmnly assciated with fraudulent activity, as indicated by internal r thirdparty surces used by the University. The scial security number prvided is the same as that submitted by ther persns pening an accunt r ther Custmers. The address r telephne number prvided is the same as r similar t the accunt number r telephne number submitted by an unusually large number f ther persns pening accunts r ther Custmers. The persn pening the Cvered Accunt r the Custmer fails t prvide all required persnal Identifying Infrmatin n an applicatin r in respnse t ntificatin that the applicatin is incmplete. If the University uses a challenge questin fr the purpse f authenticatin, the persn pening the Cvered Accunt r the Custmer cannt prvide authenticating infrmatin beynd that which generally wuld be available frm a wallet r cnsumer reprt. 3.3 Unusual Use f, r Suspicius Activity Related t, the Cvered Accunt Shrtly fllwing the ntice f a change f address fr a Cvered Accunt, the University receives a request fr a new, additinal, r replacement card r fr the additin f authrized users n the accunt. A new revlving credit accunt is used in a manner cmmnly assciated with knwn patterns f fraud. A Cvered Accunt is used in a manner that is nt cnsistent with established patterns f activity n the accunt. 3
4 A Cvered Accunt that has been inactive fr a reasnably lengthy perid f time is used. Mail sent t the Custmer is returned repeatedly as undeliverable althugh transactins cntinue t be cnducted in cnnectin with the Custmer s Cvered Accunt. The University is ntified that the Custmer is nt receiving paper accunt statements. The University is ntified f unauthrized charges r transactins in cnnectin with a Cvered Accunt. Unauthrized access t r inapprpriate disclsure f Identifying Infrmatin ccurs in cnnectin with a Cvered Accunt. 3.4 Ntice frm Custmers, Victims f Identity Theft, Law Enfrcement Authrities, r Other Persns regarding Pssible Identity Theft in Cnnectin with Cvered Accunts The University is ntified by a Custmer, a victim f Identity Theft, a law enfrcement authrity, r any ther persn that the University has pened a fraudulent accunt fr a persn engaged in Identity Theft. 3.5 Alerts, Ntificatins, r Warnings frm a Cnsumer Reprting Agency A fraud r credit alert is included with a cnsumer reprt. A ntice f credit freeze n a cnsumer reprt is prvided frm a cnsumer reprting agency. A cnsumer reprting agency prvides a ntice f address discrepancy. A cnsumer reprt indicates a pattern f activity incnsistent with the histry and usual pattern f activity f a Custmer. 4. Detecting Red Flags 4.1 Student Enrllment In rder t detect any f the Red Flags identified in Sectin 3 abve assciated with the enrllment f a student, University persnnel will take the fllwing steps t btain and verify the identity f the persn pening the accunt: 4
5 Require certain Identifying Infrmatin such as name, date f birth, academic recrds, hme address, r ther identificatin; and Verify the student's identity at time f issuance f a student identificatin card, including review f a driver's license r ther gvernment-issued pht identificatin. 4.2 Existing Accunts In rder t detect any f the Red Flags identified in Sectin 3 abve fr an existing Cvered Accunt, University persnnel will take the fllwing steps t mnitr transactins n an accunt: Verify the identificatin f a student in persn r via telephne if he r she requests infrmatin related t the Cvered Accunt by asking questins with readily accessible infrmatin that is n file with the University; Verify the validity f a student request by mail r t change an address r banking infrmatin in cnnectin with the Cvered Accunt by asking questins with readily accessible infrmatin that is n file with the University; and Prvide students a reasnable means f prmptly reprting incrrect changes in addresses r banking infrmatin in cnnectin with Cvered Accunts. 4.3 Cnsumer Reprt Requests In rder t detect any f the Red Flags identified in Sectin 3 abve in a case in which the University seeks a cnsumer reprt, University persnnel will take the fllwing steps t assist in identifying address discrepancies: Require written verificatin frm the subject f the cnsumer reprt that the address prvided by him r her is accurate at the time the request fr the cnsumer reprt is made t the cnsumer reprting agency; and In the event that ntice f an address discrepancy is received, verify that the cnsumer reprt pertains t the subject f the requested reprt and reprt t the cnsumer reprting agency an address fr the applicant that the University has reasnably cnfirmed is accurate. 5. Preventing and Mitigating Identity Theft In the event any University persnnel detects any f the Red Flags identified in Sectin 3 abve, he r she will take ne r mre f the fllwing steps, depending n the degree f risk psed by the Red Flag: 5
6 Nt pen a new Cvered Accunt; Change any passwrds r ther security devices that permit access t the Cvered Accunt; Cntact the student r the applicant fr which a cnsumer reprt was run; Ntify the Prgram Administratr r his r her designee t determine the apprpriate step(s) t take; Cntinue t mnitr the Cvered Accunt fr evidence f Identity Theft; Ntify law enfrcement; and/r Determine that n respnse is warranted under the particular circumstances. 6. Prtecting Identifying Infrmatin In rder t further prevent the likelihd f Identity Theft ccurring with respect t Cvered Accunts, the University has established and disseminated Infrmatin Technlgy Security Prcedures t limit access and disclsure f Identifying Infrmatin and require that all individuals permitted access t such infrmatin in University files and systems, whether in cmputerized r printed frm, are cntinually respnsible fr maintaining the integrity, accuracy, and privacy f such infrmatin. These Infrmatin Technlgy Security Prcedures are available nline at 7. Prgram Administratin 7.1 Oversight The develpment, implementatin, and updating f the Prgram are the respnsibility f the University s Identity Theft Preventin Cmmittee (the Cmmittee ) established under the Prgram. The Cmmittee will be headed by the Prgram Administratr, wh will be the University Cntrller r his r her designee. Tw r mre ther individuals wh represent functinal departments within the University that are respnsible fr pening and/r maintaining Cvered Accunts and wh are appinted by the Prgram Administratr will cmprise the remainder f the Cmmittee s membership. The Cmmittee will be respnsible fr ensuring apprpriate training f University persnnel with respect t the Prgram, reviewing any reprts cncerning the detectin f Red Flags and the steps fr preventing and mitigating Identity Theft, determining which steps f preventin and mitigatin shuld be taken in particular circumstances, and cnsidering peridic changes in the Prgram. 6
7 7.2 Staff Training and Reprts University persnnel respnsible fr implementing the Prgram will be trained under the directin f the Cmmittee t detect Red Flags and determine the respnsive steps t be taken when a Red Flag is detected. University persnnel will be trained, as necessary, t carry ut the Prgram effectively. University persnnel are expected t ntify the Cmmittee nce they becme aware f an incident f Identity Theft r the University s failure t cmply with the Prgram. At least annually r as therwise requested by the Cmmittee, University persnnel respnsible fr the develpment, implementatin, and administratin f the Prgram will reprt t the Cmmittee n cmpliance with the Prgram. The reprt will cver such issues as effectiveness f the University s plicies and prcedures in addressing the risk f Identity Theft in cnnectin with the pening and maintenance f Cvered Accunts, the effectiveness f the University s service prvider arrangements in cmplying with the Prgram, significant incidents invlving Identity Theft at the University and the University s respnse, and recmmendatins fr changes in the Prgram. 7.3 Service Prvider Arrangements In the event the University has engaged r engages in the future any service prvider t perfrm an activity in cnnectin with any Cvered Accunts, the University will take the fllwing steps t ensure the service prvider perfrms its activity in accrdance with reasnable plicies and prcedures designed t detect, prevent, and mitigate the risk f Identity Theft: Require, by cntract, that the service prvider have its wn similar plicies and prcedures in place; and Require, by cntract, that the service prvider review the University's Prgram and reprt any Red Flags t the Prgram Administratr r the University emplyee with primary versight f the relatinship with the service prvider. 7.4 Prgram Updates The Cmmittee will peridically review and update the Prgram t reflect changes in risks t Custmers r t the safety and sundness f the University frm Identity Theft. In ding s, the Cmmittee will cnsider the University's experiences with Identity Theft, changes in methds f Identity Theft, changes in methds t detect, prevent, and mitigate Identify Theft, and changes in the University's business arrangements with ther entities. After cnsidering these factrs, the Cmmittee will determine whether changes in the Prgram, including the list f Red Flags, are warranted. If warranted, the Cmmittee will update the Prgram. 7
NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine
Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff
Information Security Policy
Purpse The risk t Charlestn Suthern University, its emplyees and students frm data lss and identity theft is f significant cncern t the University and can be reduced nly thrugh the cmbined effrts f every
Identity Theft Prevention Program (ITPP) under the FTC FACTA Red Flags Rule PROCEDURES DOCUMENT. I. Purpose/Scope... 1
Identity Theft Preventin Prgram (ITPP) under the FTC FACTA Red Flags Rule PROCEDURES DOCUMENT Table f Cntents I. Purpse/Scpe... 1 II. ITPP Apprval and Administratin... 2 III. Relatinship t Other University
Key Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
Process for Responding to Privacy Breaches
Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident
FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT
FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028
VCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
Audit Committee Charter
Audit Cmmittee Charter Membership The Audit Cmmittee (the "Cmmittee") f the Bard f Directrs (the "Bard") f Philip Mrris Internatinal Inc. (the "Cmpany") shall cnsist f at least three directrs all f whm
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin
WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy
WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin
Plus500CY Ltd. Statement on Privacy and Cookie Policy
Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and
Credit Work Group Recommendation
Credit Wrk Grup Recmmendatin T: Credit Wrk Grup Frm: Mike Bixby (305) 829-5549 [email protected] Paul Wills (770) 740-7353 [email protected] Date: Octber 7, 2004 Re: FACT Act Implicatins and Recmmendatins
FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.
FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept
GUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
Privacy and Security Training Policy (PS.Pol.051)
Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider
HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.
HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN
Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
Personal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER
MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER This Audit Cmmittee Charter has been amended as f July 17, 2015. The Audit Cmmittee shall review and reassess this Charter annually and recmmend
ES PROCEDURES FOR OVERPAYMENT RECOVERY
ES PROCEDURES FOR OVERPAYMENT RECOVERY Effective: 7/1/2012 Respnsible Office: Emplyee Services (ES) Apprved: ES Directr Applicatin: All Emplyees f the University f Clrad Plicy The University f Clrad will
Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd
Audit Cmmittee Charter St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Versin 2.0, 22 February 2016 Apprver Bard f Directrs St Andrew
Symantec User Authentication Service Level Agreement
Symantec User Authenticatin Service Level Agreement Overview and Scpe This Symantec User Authenticatin service level agreement ( SLA ) applies t Symantec User Authenticatin prducts/services, such as Managed
Municipal Advisor Registration
FACT SHEET Municipal Advisr Registratin SEC Open Meeting Sept. 18, 2013 The Securities and Exchange Cmmissin tday will cnsider whether t adpt a rule that wuld establish a permanent registratin regime fr
Malpractice and Maladministration Policy
TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs
o o 2) Program Rewards
1) T qualify fr the American Red Crss High Schl Leadership Prgram (referred t as Prgram), each student (referred t as Member) is asked t cmplete the fllwing requirements: a. Cmplete an nline prfile at
CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC.
CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC. PURPOSE The purpse f the Cmpensatin Cmmittee f the Bard f Directrs (the Bard ) f Upland Sftware, Inc. (the Cmpany
RATIONALE TERMS OF REFERENCE FOR THE QUALITY COMMITTEE UNDER THE EXCELLENT CARE FOR ALL ACT. Authority
RATIONALE With the intrductin f the Excellent Care fr All Act, hspital bards must nw have a quality cmmittee that reprts t the bard. The template prvides sample terms f references fr rganizatins t adapt
ERISA Compliance FAQs: Fiduciary Responsibilities
Brught t yu by Mrris & Reynlds Insurance ERISA Cmpliance FAQs: Fiduciary Respnsibilities The Emplyee Retirement Incme Security Act f 1974 (ERISA) is a federal law that sets minimum standards fr emplyee
Accessible Service Policy
Accessible Service Plicy Date Created Revisin Oct. 16, 2012 1 Gal This plicy is intended t meet the requirements f the Accessibility Standards fr Custmer Service, Ontari Regulatin 429/07 under the Accessibility
PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK
Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs
COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply
Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t
Privacy Breach and Complaint Protocol
Privacy Breach and Cmplaint Prtcl Effective: December 31, 2012 Apprved by: Le McKenna, CFO 1.0 General Privacy breaches and privacy cmplaints will be handled in accrdance with this prtcl. This prtcl is
DisplayNote Technologies Limited Data Protection Policy July 2014
DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f
0820.02 Workers Disability Compensation Claims Procedures Issued: January 1, 1994 Revised: March 29, 2012
State f Michigan Administrative Guide t State Gvernment 0820.02 Wrkers Disability Cmpensatin Claims Prcedures Issued: January 1, 1994 Revised: March 29, 2012 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY:
AUDIT AND RISK COMMITTEE TERMS OF REFERENCE
AUDIT AND RISK COMMITTEE TERMS OF REFERENCE 1. TITLE OF COMMITTEE Audit and Risk Cmmittee 2. ESTABLISHMENT The Audit and Risk Cmmittee is established under Part 3 Sectin 19(1) f the Charles Darwin University
Online Banking Agreement
Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet
First Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
THIRD PARTY PROCUREMENT PROCEDURES
ADDENDUM #1 THIRD PARTY PROCUREMENT PROCEDURES NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS TRANSPORTATION DEPARTMENT JUNE 2011 OVERVIEW These prcedures establish standards and guidelines fr the Nrth Central
Heythrop College Disciplinary Procedure for Support Staff
Heythrp Cllege Disciplinary Prcedure fr Supprt Staff Intrductin 1. This prcedural dcument des nt apply t thse academic-related staff wh are mentined in the Cllege s Ordinance, namely the Librarian and
Directives to LHINs in respect of Reporting Requirements under the BPSAA. Issued By Minister of Health and Long-Term Care
Directives t LHINs in respect f Reprting Requirements under the BPSAA Issued By Minister f Health and Lng-Term Care Effective April 1, 2011 Table f Cntents 1. BACKGROUND... 2 2. REPORT ON THE USE OF CONSULTANTS...
Internet and Social Media Solicitations: Wise Giving Tips
Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial
Chapter 7 Business Continuity and Risk Management
Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity
HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
Seabrook Seventh-Day Adventist Church Seventh-Day Adventist School Education Assistance Policy
Seabrk Seventh-Day Adventist Church Seventh-Day Adventist Schl Educatin Assistance Plicy The missin f the Seabrk SDA Educatin Department is t develp the whle child mentally, scially, physically, and spiritually
E-Business Strategies For a Cmpany s Bard
DATATEC LIMITED BOARD CHARTER / TERMS OF REFERENCE 1. CONSTITUTION The primary bjective f the Cmpany s Bard Charter is t set ut the rle and respnsibilities f the Bard f Directrs ( the Bard ) as well as
State Fleet Card Oversight Usage and Responsibilities
State Fleet Card Oversight Usage and Respnsibilities Intrductin The Department f General Services (DGS), Office f Fleet and Asset Management (OFAM) administers a statewide ne-prvider payment system cntract
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles
How To Ensure Your Health Care Is Safe
Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t
Sources of Federal Government and Employee Information
Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities
NSW FAIR TRADING. Real Estate Fraud Prevention Guidelines
NSW FAIR TRADING Real Estate Fraud Preventin Guidelines Real Estate Fraud Preventin Guidelines Cntents 1. Intrductin..... 2 2. Backgrund.. 2 3. The Law.. 2 4. Cmmissiner s Guidance.... 3 5. Prescribed
RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer
RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible
HEALTH PLAN IDENTIFIER NUMBERS (HPIDs)
HEALTH PLAN IDENTIFIER NUMBERS (HPIDs) NEWLY REQUIRED HEALTH PLAN IDENTIFIER NUMBER (HPID) FOR SELF-FUNDED GROUP HEALTH PLANS 2014 SELF-FUNDED HEALTH PLANS MUST APPLY FOR A HEALTH PLAN IDENTIFIER (HPID)
Data Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
Columbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE
Clumbine Federal Credit Unin ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE 1. Online Banking/Bill Payment 2. Online Banking/ Bill Payment Limitatins 3. Online Bill Payment
DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released
Page 1 f 11 APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial plicy released 1. PURPOSE OF THIS POLICY T define the purpses fr which Crprate Purchase Cards are t be used
MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. HIPAA: Use and Disclosure of Protected Health Information
Page 1 f 23 HIPAA: Use and Disclsure f Prtected Health Infrmatin Applies t: faculty staff students student emplyees visitrs cntractrs clinicians Effective Date f This Revisin: Nvember 27, 2012 Cntact fr
FREQUENTLY ASKED QUESTIONS ON THE EUCOMED ETHICAL BUSINESS LOGO
Rue Jseph II, 40 www.eucmed.rg FREQUENTLY ASKED QUESTIONS ON THE EUCOMED ETHICAL BUSINESS LOGO Q1: What is the Eucmed Ethical Business Lg? A1: The Ethical Business Lg is a Lg licensed by Eucmed, the Eurpean
Shelby County Schools Online Employee Accident Reporting User Manual
Shelby Cunty Schls Online Emplyee Accident Reprting User Manual Department f Risk Management Nvember, 2013 Overview In accrdance with SCS bard plicy 4014, Accidents n the Jb (als referred t as On the Jb
Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES
Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care
Wire Transfer Request
Wire Transfer Request Requirements and Instructins OFFICE OF DISBURSEMENTS Categry: Dcument Name: Payment Prcessing Wire Transfer Request - Requirements and Instructins Respnsible Department: Office f
CORPORATE CREDIT CARD POLICY
TITLE: POLICY OWNERS: DATE INSTITUTED: May 1, 2008 CURRENT VERSION: Ver. 1.6 REVISION DATE: July 1, 2015 Crprate Credit Card Plicy Melissa Cluse, Vice President & Cntrller Cindy Klein, Accunts Payable
POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
General Records Authority 33. Accredited Training
General Recrds Authrity 33 2012/00579704 Accredited Training February 2013 This is an accurate reprductin f the authrised recrds authrity cntent, created fr accessibility purpses CONTENTS INTRODUCTION
Creating an Ethical Culture and Protecting Your Bottom Line:
Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please
FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS
APPENDIX A FORM ADV (Paper Versin) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS Frm ADV: General Instructins Read these instructins carefully befre
CLEARANCE REVIEWS FOR STUDENT RESTRICTION ISSUES OTHER THAN ACADEMIC PROGRESS
CLEARANCE REVIEWS FOR STUDENT RESTRICTION ISSUES OTHER THAN ACADEMIC PROGRESS Only the Ministry f Training, Clleges & Universities can cnsider clearance reviews fr mst ther student restrictin issues. These
Fiscal Operation of Service Centers
Oregn University System Fiscal Plicy Manual Fiscal Operatin f Service Centers Sectin: Accunting and Financial Reprting Number: 05.713 Title: Fiscal Operatin f Service Centers Index POLICY.100 POLICY STATEMENT.110
Process of Setting up a New Merchant Account
Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am
Customer Support & Software Enhancements Policy
Custmer Supprt & Sftware Enhancements Plicy Welcme t Manhattan Assciates Custmer Supprt Organizatin (CSO). Staying current n Custmer Supprt & Sftware Enhancements and n a supprted versin f the licensed
We will record and prepare documents based off the information presented
Dear Client: We appreciate the pprtunity f wrking with yu regarding yur Payrll needs. T ensure a cmplete understanding between us, we are setting frth the pertinent infrmatin abut the services that we
DATA REQUEST GUIDELINES
DATA REQUEST GUIDELINES This dcument describes prcedures law enfrcement authrities and individuals invlved in civil litigatin shuld fllw t request data frm LinkedIn and its affiliated service prviders.
Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network
2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal
GOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES For Your Protected Health Information
GOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES Fr Yur Prtected Health Infrmatin THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS
Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021
Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada
VENDOR REGISTRATION AND DISCLOSURE STATEMENT AND SMALL, WOMEN-, AND MINORITY-OWNED BUSINESS CERTIFICATION APPLICATION
WV-1A New Update REV. 09/18/15 STATE OF WEST VIRGINIA - PURCHASING DIVISION VENDOR REGISTRATION AND DISCLOSURE STATEMENT AND SMALL, WOMEN-, AND MINORITY-OWNED BUSINESS CERTIFICATION APPLICATION Befre a
NHVAS Mass Management Spot Check Checklist
Legal Entity Name f NHVAS Operatr: DTMR Representative: Lcatin: NHVAS Mass Management Spt Check Checklist Spt Check Date: Spt Check Number: DMS Number: 540/ The fllwing surces f evidence have been identified
Transportation Allowance Program
Transprtatin Allwance Prgram Respnsibilities, Prcedures and Guidelines I. INTRODUCTION This manual describes respnsibilities, prcedures and guidelines (including vehicle specificatins and reimbursable
