RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009



Similar documents
RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009

RANDOLPH COUNTY HEALTH DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009

identity Theft Prevention and Identification Requirements For Utility

Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended:

Chatsworth Water Works Commission. Identity Theft Prevention Program. Effective beginning December 1, 2008

City of Hercules Hercules Municipal Utility Identity Theft Prevention Program

Delta Township Compiled Policy Manual

[Institution or GPLS Name] Red Flag Rules - Identity Theft/Fraud Prevention Program. Effective beginning, 2009

Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008

Identity Theft Prevention Program

City of Caro Identity Theft Prevention Policy

DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:

CATAWBA COUNTY IDENTITY THEFT RED FLAGS POLICY

City of Watauga Utility Billing Department Identity Theft Prevention Program. Effective beginning November 1, 2008

CITY OF ANDREWS IDENTITY THEFT PREVENTION PROGRAM

UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM

Identity Theft Prevention Program

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

IDENTITY THEFT PREVENTION PROGRAM

Identity Theft Prevention Policy and Procedure

The Florida A&M University. Identity Theft Prevention Program. Effective May 1, 2009

IDENTITY THEFT AND MUNICIPAL UTILITIES

TITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM

Identity theft. A fraud committed or attempted using the identifying information of another person without authority.

Florida Agricultural & Mechanical University Board of Trustees Policy

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

Approved by the Audit Committee of the Board of Trustees, effective February 3, 2009.

Identity Theft Prevention Program

City of Des Plaines. %SJ Miner Street. consent Agenda Items #6 & 6a. Finance Department MEMORANDUM. Date: May2,201l

II. F. Identity Theft Prevention

Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009

Texas A&M International University Identity Theft Prevention Program

IDENTITY THEFT DETECTION POLICY

Identity Theft Prevention Program

IDENTITY THEFT PREVENTION

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule

Central Oregon Community College. Identity Theft Prevention Program

Z1.01 Guideline: Identity Theft Prevention Program

University of Dayton Red Flag ID Theft Prevention Program

University of Alaska. Identity Theft Prevention Program

MARSHALL UNIVERSITY BOARD OF GOVERNORS

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);

IDENTITY THEFT PREVENTION PROGRAM COUNTY OF DUPLIN, NORTH CAROLINA

University of Arkansas at Monticello Identity Theft Prevention Program

Oregon University System Identity Theft Prevention Program Effective May 1, 2009

RESOLUTION NO WHEREAS, the City of Wilsonville strives to protect all personal information that can be used by identity thieves, and;

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

Springfield Technical Community College Identity Theft Prevention Program

Ouachita Baptist University. Identity Theft Policy and Program

University of North Dakota. Identity Theft Prevention Program

University of Nebraska - Lincoln Identity Theft Prevention Program

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor;

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

IDENTITY THEFT PREVENTION PROGRAM

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009

Identity Theft Prevention Program. Effective: November 1, 2009

Weber Human Services Identity Theft Prevention Policy

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia (404) (404)

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

Number: Index

Northeast Technology Center Board Policy 2110 Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS)

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES

[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009

Identity theft prevention program and red flag compliance policy.

POLICY TITLE: IDENTITY THEFT PROTECTION POLICY

Facts About FACTA Red Flag Identity Theft Prevention Program

Identity Theft Prevention Policy

City of Wyoming, Michigan Administrative Policy

The University of North Carolina at Charlotte Identity Theft Prevention Program

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

University System of New Hampshire. Identity Theft Prevention Program

UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM

Identity Theft Prevention Program

POLICY: Identity Theft Red Flag Prevention

RESOLUTION TO ADOPT IDENTITY THEFT POLICY

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy

Red Flag Policy and Procedures for Alexander Orthopaedic Associates

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

Wholesale Broker Red Flag/Identity Theft Prevention Program Certification

Red Flag Rules and Aging Services: What You Need to Know

OLYMPIC COLLEGE POLICY

University Policy: Identity Theft Prevention Policy

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008

Lake Havasu City. Identity Theft Prevention Program

CHAPTER 99: IDENTITY THEFT PREVENTION PROGRAM

Appalachian State University Identity Theft Prevention Program Procedures

University of Tennessee's Identity Theft Prevention Program

Christopher Newport University Policy and Procedures

policy All terms used in this policy that are defined in 16 C.F.R shall have the same meaning provided in that section.

PITTSBURGH CARE PARTNERSHIP, INC. COMMUNITY LIFE PROGRAM POLICIES AND PROCEDURES. Identity Theft Prevention Program Policy for Health Care Providers

State Of Florida's Real Estate Law

Transcription:

RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009

I. PROGRAM ADOPTION The Randolph County Emergency Services Department and the ambulance billing division of the Randolph County Tax Department (collectively the Department ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's Red Flags Rule ( Rule ), which implements Section 114 of the Fair and Accurate Credit Transactions Act of 2003. 16 C.F.R. 681.2. This Program was approved by the Randolph County Board of Commissioners on August 3, 2009, and is effective August 1, 2009. II. PROGRAM PURPOSE AND DEFINITIONS A. Fulfilling requirements of the Red Flags Rule Under the Red Flag Rule, every creditor is required to establish an Identity Theft Prevention Program tailored to its size, complexity and the nature of its operation. Each program must contain reasonable policies and procedures to: 1. Identify relevant Red Flags for new and existing covered accounts and incorporate those Red Flags into the Program; 2. Detect Red Flags that have been incorporated into the Program; 3. Respond appropriately to any Red Flags that are detected to prevent and mitigate Identity Theft; and 4. Ensure the Program is updated periodically, to reflect changes in risks to customers or to the safety and soundness of the creditor from Identity Theft. Randolph County Emergency Services is committed to providing all aspects of our service and conducting our business operations in compliance with all applicable laws and regulations. The Department provides ambulance services that involve transactions in which payment is not made until after the services are rendered and therefore have covered accounts under this Rule. However, due to the nature of these services, it is critical that no barriers are raised to accessing emergency services. In Randolph County, although the ambulance services are provided by the Emergency Services Department, billing on these accounts is handled by a division of the Tax Department. The provisions of this Program therefore apply to both the Emergency Services Department and the Tax Department as applicable. B. Red Flags Rule definitions used in this Program In this Program, the term Department is used to refer to both the Randolph County Emergency Services Department and to the division of the Randolph County Tax Department that handles billing for ambulance services. The term Director is used to refer both to the Randolph County Emergency Services Director and the Randolph County Tax Administrator. The Red Flags Rule defines Identity Theft as fraud committed using the identifying information of another person and a Red Flag as a pattern, practice, or specific activity that indicates the possible existence of Identity Theft. 2

According to the Rule, a county emergency services department is a creditor subject to the Rule requirements. The Rule defines creditors to include finance companies, automobile dealers, mortgage brokers, utility companies, and telecommunications companies. Where non-profit and government entities defer payment for goods or services, they, too, are to be considered creditors. Under the Rule, a covered account is: 1. Any account the Department offers or maintains primarily for personal, family or household purposes, that involves multiple payments or transactions; and 2. Any other account the Department offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the Department from Identity Theft. Identifying information is defined under the Rule as any name or number that may be used, alone or in conjunction with any other information, to identify a specific person, including: name, address, telephone number, social security number, date of birth, government issued driver s license or identification number, alien registration number, government passport number, employer or taxpayer identification number, unique electronic identification number, computer s Internet Protocol address, or routing code. III. IDENTIFICATION OF RED FLAGS. In order to identify relevant Red Flags, the Department considered the types of accounts that it offers and maintains and which if those are covered accounts under this Rule, the methods it provides to initiate or access its accounts, and its previous experiences with Identity Theft. The Department identifies the following red flags, in each of the listed categories: Red Flags A. Suspicious Documents 1. Identification document or card that appears to be forged or altered; 2. Identification document or card on which a person s photograph or physical description is not consistent with the person presenting the document; and 3. Other document with information that is not consistent with existing customer information (such as if a person s signature on a check appears forged). Red Flags B. Suspicious Personal Identifying Information 1. Identifying information presented that is inconsistent with other information the customer provides (example: inconsistent birth dates); 3

2. Identifying information presented that is the same as information shown on other applications that were found to be fraudulent; 3. Social security, Medicaid number or other insurance number presented that is the same as one given by another customer; 4. Address of telephone numbers given by a customer are the same or similar to those of other customers, particularly recent ones; 5. Customer provides an insurance number but never produces an insurance card or other physical documentation of insurance; and 6. A person s identifying information is not consistent with the information that is on file for the customer. Red Flags C. Suspicious Account Activity or Unusual Use of Account 1. Mail sent to the account holder is repeatedly returned as undeliverable; 2. Customer notifies agency she/he is not receiving mail sent by the Department; 3. Patterns of activity on payment accounts that are inconsistent with prior history; 4. Increase in the volume of inquiries to an account; 5. Attempt to access an account by persons who cannot provide authenticating information; 6. Requests for additional authorized users on an account shortly following a change of address; 7. Nonpayment on the first payment on an account; 8. A complaint or question from a customer based on the customer s receipt of: a. a bill for another individual; b. a bill for service that the customer denies receiving; c. a bill from a health care provider that the customer never utilized; d. a notice of insurance benefits (or Explanation of Benefits) for health services never received; or 4

e. a customer or insurance company report that coverage for legitimate healthcare service is denied because insurance benefits have been depleted or a lifetime cap has been reached. 9. Inactivity on an account for an unreasonably lengthy period of time. Red Flag D. Alerts from Others and Security Breaches 1. Notice to the Department that an account has unauthorized activity; 2. Breach in the Department s computer system activities; 3. Unauthorized access or use of customer account information; 4. Dispute of a bill by a customer who claims to be a victim of any type of Identity Theft; and 5. Notice to the Department from a customer or law enforcement that Identity Theft has occurred. IV. PREVENTING AND MITIGATING IDENTITY THEFT In the event that any Department employee responsible for or involved in establishing or updating covered accounts or accepting payment for a covered account becomes aware of Red Flags indicating possible identity theft, the employee shall use his or her discretion to determine whether such Red Flag or a combination of Red Flags suggest a threat of identity theft. In doing so, the employee shall consider whether the Red Flag may be accounted for by the cultural norms of the customer. If the employee, in his or her discretion, determines that identity theft or attempted identity theft is likely, the employee shall immediately report such Red Flag(s) to his/her Supervisor. If the employee deems that identity theft is unlikely or that reliable information is available to reconcile the Red Flag(s), the employee shall convey that information to his/her Supervisor, who at his/his discretion may determine that no further action is needed. If the Supervisor determines that further action is needed, a Department employee shall perform one or more of the following, as determined to be appropriate by his/her Supervisor: Prevent and Mitigate 1. Continue to monitor an account for evidence of Identity Theft; 2. Contact the customer; 3. Change any passwords or other security devices that permit access to accounts; 5

4. Reopen an account with a new number; 5. Cease attempts to collect additional payment from the customer; or 6. Notify law enforcement Protect customer identifying information In order to further prevent the likelihood of identity theft occurring with respect to covered accounts, the Department will take the following steps with respect to its internal operating procedures to protect customer identifying information: 1. Ensure complete and secure destruction of paper documents and computer files containing customer information; 2. Ensure that office computers are password protected and that computer screens lock after a set period of time; 3. Ensure that papers containing customer information are appropriately stored and are not seen by those who should not have access; 4. Ensure computer virus protection is up to date; and 5. Require and keep only the kinds of customer information that are necessary for the provision of service or to comply with laws and regulations, including records retention schedules. V. PROGRAM UPDATES This Program will be annually reviewed and updated to reflect changes in risks to customers and the soundness of the Department from Identity Theft. In doing so, the Director will consider the following factors: 1. the Department s experiences with Identity Theft situation; 2. changes in Identity Theft methods; 3. changes in Identity Theft detection and prevention methods; 4. changes in types of accounts the Department maintains; and 5. changes in the agency s service provider arrangements. After considering these factors, the Director will determine whether changes to the Program, including the listing of Red Flags, are warranted. If warranted, the Director will update the Program and share any changes with the County Manager. 6

VI. PROGRAM ADMINISTRATION. A. Oversight Supervisors shall be responsible for oversight of the program and for program implementation. The Director is responsible for reviewing reports prepared by staff regarding compliance with Red Flag requirements and/or recommending changes to the program. Supervisors shall report to the Director at least annually on compliance with the Red Flag requirements. The report will address issues such as: 1. effectiveness of the policies and procedures in addressing the risk of identity theft in connection with covered accounts ; 2. changes in service provider arrangements; 3. significant incidents involving identity theft and management s response; and 4. recommendations for changes in the program. B. Staff Training and Reports The Director shall be responsible for assuring that training of all Department employees responsible for or involved with covered accounts with respect to the implementation and requirements of the Identity Theft prevention program. The Director shall exercise discretion in determining the amount and substance of training necessary. C. Service Provider Arrangements In the event the Department engages an outside service provider to perform an activity in connection with one or more accounts, the Department will take the following steps to ensure the service provider performs its activity in accordance with reasonable policies and procedures designed to detect, prevent, and mitigate the risk of Identity Theft. 1. Require, by contract, that service providers have such policies and procedures in place; and 2. Require, by contract, that service providers review the Department s Program and report any Red Flags to the Director. 7