Detecting, Preventing and Mitigating Identity Theft. Presented by the Bursar s Office

Similar documents
Ouachita Baptist University. Identity Theft Policy and Program

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0

COUNCIL POLICY STATEMENT

Identity Theft Policy

Facts About FACTA Red Flag Identity Theft Prevention Program

University of Nebraska - Lincoln Identity Theft Prevention Program

Identity theft prevention program and red flag compliance policy.

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions

Detecting, Preventing, and Mitigating Identity Theft

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

Red Flag Rules Information and Training

Wholesale Broker Red Flag/Identity Theft Prevention Program Certification

RESOLUTION TO ADOPT IDENTITY THEFT POLICY

USF System & Preventing Identity Fraud

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule

University Policy: Identity Theft Prevention Policy

A Guide to Benedictine College and Identity Theft

Texas A&M International University Identity Theft Prevention Program

University of Dayton Red Flag ID Theft Prevention Program

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

policy All terms used in this policy that are defined in 16 C.F.R shall have the same meaning provided in that section.

Identity Theft Prevention Program

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

Oregon University System Identity Theft Prevention Program Effective May 1, 2009

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

MCPHS IDENTITY THEFT POLICY

Delta Township Compiled Policy Manual

UNIVERSITY OF RICHMOND IDENTITY THEFT PREVENTION PROGRAM

identity TheFT PREVENTION Programs and Response

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM

University of Arkansas at Monticello Identity Theft Prevention Program

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

IDENTITY THEFT PREVENTION PROGRAM

Red Flag Identity Theft Financial Policy 1.10

IDENTITY THEFT DETECTION POLICY

Central Oregon Community College. Identity Theft Prevention Program

Identity Theft Prevention Program

DSU Identity Theft Prevention Policy No. DSU

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM

Number: Index

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE. University of Cincinnati Red Flags Rule Protecting Against Identity Fraud

Identification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft

Identity Theft Prevention Program

City of Hercules Hercules Municipal Utility Identity Theft Prevention Program

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

THE LUTHERAN UNIVERSITY ASSOCIATION, INC. d/b/a Valparaiso University IDENTITY THEFT PREVENTION PROGRAM

These rules became effective August 1, 2009, and require certain agencies to implement an identity theft program and policy.

University of North Dakota. Identity Theft Prevention Program

Springfield Technical Community College Identity Theft Prevention Program

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

Model Identity Theft Policy and Adopting Resolution

The Florida A&M University. Identity Theft Prevention Program. Effective May 1, 2009

MARSHALL UNIVERSITY BOARD OF GOVERNORS

Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009

IDENTITY THEFT PREVENTION PROGRAM OVERVIEW

Christopher Newport University Policy and Procedures

Z1.01 Guideline: Identity Theft Prevention Program

California State University, Chico. Identity Theft Prevention Red Flags Program

COUNCIL POLICY NO. C-13

Ferris State University

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule

CENTENARY COLLEGE POLICIES UNDER THE FAIR & ACCURATE CREDIT TRANSACTION ACT S RED FLAG RULES

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

Identity theft. A fraud committed or attempted using the identifying information of another person without authority.

ORDINANCE NUMBER 644 AN ORDINANCE ESTABLISHING THE TOWN OF YORKTOWN IDENTITY THEFT PREVENTION PROGRAM

identity Theft Prevention and Identification Requirements For Utility

Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended:

Red Flags Identity Theft Training Program. Fall 2015

Policies and Procedures: IDENTITY THEFT PREVENTION

IDENTITY THEFT PREVENTION (Red Flag) POLICY

IDENTITY THEFT PROCEDURES

UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM

Identity Theft Prevention Policy and Procedure

IDENTITY THEFT PREVENTION

Community College System of New Hampshire Identity Theft Prevention Program Revised 5/4/2009

TITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

II. F. Identity Theft Prevention

ADRIAN COLLEGE IDENTITY THEFT POLICY

City of Caro Identity Theft Prevention Policy

University of Alaska. Identity Theft Prevention Program

Florida Agricultural & Mechanical University Board of Trustees Policy

IDENTITY THEFT PREVENTION PROGRAM

The University of North Carolina at Charlotte Identity Theft Prevention Program

Xavier University. Fair & Accurate Credit Transactions Act (Red Flags Rule) Policy and Procedures

Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008

31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003,

CHAPTER 12 IDENTITY PROTECTION AND IDENTITY THEFT PREVENTION POLICIES

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);

POLICY: Identity Theft Red Flag Prevention

Identity Theft Prevention Program

Identity Theft Prevention Program. Effective: November 1, 2009

Red Flag Rules and Aging Services: What You Need to Know

Identity Theft Prevention Policy

Chatsworth Water Works Commission. Identity Theft Prevention Program. Effective beginning December 1, 2008

Transcription:

Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar s Office

To explain the federal rules intended to prevent Identity Theft and how they apply to the University, To identify risks that alert you to a potential fraudulent activity, To assist you in detecting when these risks occur on a student s account, and To review how you should respond once you ve detected a potential fraudulent activity.

A fraud committed or attempted using the identifying information of another person without authority.

A pattern, practice, or specific activity that indicates the possible existence of identity theft.

In November 2007, final rules were issued to implement the Identity Theft Red Flags Rule. The Rule applies to financial institutions and creditors that offer or maintain accounts. The Rule requires the implementation of a written Identity Theft Prevention Program. All procedures must be fully implemented by June 2010! RED FLAG R U L E

Under the law, you are a creditor if you sell customer services now and bill them later. The Installment Payment Plan offered to students makes SIUE a creditor and subject to the Red Flags Rule. Financial aid like short term loans and Perkins loans are also creditor activities that SIUE administers.

Offices throughout campus access and update customer records. Red Flags Rule is about protecting customer records in order to prevent, detect and mitigate identity theft.

The Rule s goal is to detect, prevent, and mitigate identity theft in certain covered accounts. A covered account is a continuing relationship established to provide a financial product or service and includes all consumer accounts or loans that are administered by the University. Student account information on Banner and CougarNet are covered accounts.

Risks may arise when updating accounts already established in Banner and CougarNet. Risks may arise when creating new accounts. How are new accounts created? When apply for admission to the University When apply for campus housing When a service is rendered and billed for later When fines are imposed (parking, library, etc.) When apply for financial aid and loans

A Red Flag, or any situation closely resembling one, should be investigated for verification. The following are potential indicators of fraud: Identification document or ID card that appears to be forged, altered or inauthentic; Identification document or card on which a person s photograph or physical description is not consistent with the person presenting the identification; Other information on the identification is not consistent with existing student information;

Application for service that appears to have been altered or forged; Social security number presented that is the same as one given by another student; A person fails to provide complete personal identifying information on an application when reminded to do so;

A person s identifying information is not consistent with the information that is on file for the student; A person s identifying information provided is inconsistent when compared against external information sources;

University is notified that the University has opened or is maintaining a fraudulent account for a person engaged in Identity Theft. This notice may come from... a student, an Identity Theft victim, law enforcement, or other person.

The address does not match any address on record; The address on a document is the same as the address provided on a known fraudulent document; The address on a document is fictitious, a mail drop, or a prison; and The phone number is invalid or is associated with a pager or answering service.

a SSN provided for an account is the same as one provided by another person for a different account? How would you know? the person opening a Covered Account fails to provide all the required personal identifying information on an application and then doesn t respond to notices that the application is incomplete? What do you do next? a person requesting access to a Covered Account cannot answer the security questions (mother s maiden name, pet s name, etc.)? How do you handle this?

Do you know what to do if mail sent to the account-holder is returned repeatedly as undeliverable although transactions continue to be conducted in connection with the Student Account? the University is notified that a customer is not receiving documents, even though they were mailed and not returned?

Do you know what to do when the University receives a notice regarding possible identity theft in connection with a student??? the University is notified that your department has opened a fraudulent account for a student engaged in identity theft???

What red flags might you detect in your department? Do you know what to do if you suspect something fraudulent? How can you best protect your customers?

Report known and suspected fraudulent activity immediately to your supervisor. Gather information and documentation on the activity; Continue to monitor a Covered Account for evidence of Identity Theft. Notify the student that you suspect Identity Theft involving their University account. Change any passwords or other security devices that permit access to the accounts Notify Campus Police. Inform the Bursar s Office.

Store restricted information on secure servers, never on your workstation. Password protect your computer and set your screensaver to come on automatically. Do not send restricted information via email. Cross-shred all restricted data documents before throwing them away. Keep conversations quiet, make sure they cannot be overheard when exchanging restricted data.

Visit the Red Flags Website: The Federal Trade Commission's information page. http://www.ftc.gov/redflagsrule

Questions? Contact the Bursar s Office Dawn Sparks dsparks@siue.edu or Cathy Foland cfoland@siue.edu.