policy All terms used in this policy that are defined in 16 C.F.R. 681.2 shall have the same meaning provided in that section.



Similar documents
Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule

Identity Theft Prevention Program

Wholesale Broker Red Flag/Identity Theft Prevention Program Certification

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions

CENTENARY COLLEGE POLICIES UNDER THE FAIR & ACCURATE CREDIT TRANSACTION ACT S RED FLAG RULES

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0

California State University, Chico. Identity Theft Prevention Red Flags Program

Central Oregon Community College. Identity Theft Prevention Program

University of Nebraska - Lincoln Identity Theft Prevention Program

University Policy: Identity Theft Prevention Policy

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009

Identity Theft Policy

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM

USF System & Preventing Identity Fraud

CHAPTER 99: IDENTITY THEFT PREVENTION PROGRAM

PROVISIONS IDENTITY THEFT RED FLAG FAQS

POLICY: Identity Theft Red Flag Prevention

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);

Board of Commissioners Policy. Town of Nags Head Identity Theft Protection Program. Adopted October 22, 2008

COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM

DSU Identity Theft Prevention Policy No. DSU

Red Flag Rules and Aging Services: What You Need to Know

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor;

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)

COUNCIL POLICY STATEMENT

identity TheFT PREVENTION Programs and Response

IDENTITY THEFT PREVENTION PROGRAM COUNTY OF DUPLIN, NORTH CAROLINA

Red Flag Identity Theft Financial Policy 1.10

RESOLUTION TO ADOPT IDENTITY THEFT POLICY

Identity Theft Prevention Program

POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY

A Guide to Benedictine College and Identity Theft

These rules became effective August 1, 2009, and require certain agencies to implement an identity theft program and policy.

Identity Theft Prevention Program

UCLA Policy 313: Prevention of Identity Theft

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule

UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM

DMACC IDENTITY THEFT- RED FLAGS PROCEDURES

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

PREPARED AS GUIDANCE FOR NAAA MEMBERS DO NOT USE WITHOUT CONSULTING LEGAL COUNSEL.

ORDINANCE NUMBER 644 AN ORDINANCE ESTABLISHING THE TOWN OF YORKTOWN IDENTITY THEFT PREVENTION PROGRAM

Ferris State University

Model Identity Theft Policy and Adopting Resolution

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM

DHHS POLICIES AND PROCEDURES

Northeast Technology Center Board Policy 2110 Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS)

MCPHS IDENTITY THEFT POLICY

Lake Havasu City. Identity Theft Prevention Program

THE LUTHERAN UNIVERSITY ASSOCIATION, INC. d/b/a Valparaiso University IDENTITY THEFT PREVENTION PROGRAM

DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:

IDENTITY THEFT PREVENTION PROGRAM

University of Tennessee's Identity Theft Prevention Program

University of Arkansas at Monticello Identity Theft Prevention Program

FACTA Identity Theft Red Flags Program.

Identity Theft Prevention Policy. Effective Date: January 1, Policy Statement

Detecting, Preventing, and Mitigating Identity Theft

31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003,

The National Association of Community Health Centers, Inc. ISSUE BRIEF

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

Identity Theft Prevention Program

City of Hercules Hercules Municipal Utility Identity Theft Prevention Program

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

Red Flags Identity Theft Training Program. Fall 2015

CHAPTER 12 IDENTITY PROTECTION AND IDENTITY THEFT PREVENTION POLICIES

Identity theft. A fraud committed or attempted using the identifying information of another person without authority.

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

RESOLUTION NO

State Of Florida's Real Estate Law

IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule

Identity Theft Prevention Program

IDENTITY THEFT PREVENTION PROGRAM

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

University of North Dakota. Identity Theft Prevention Program

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM

Christopher Newport University Policy and Procedures

Identity theft prevention program and red flag compliance policy.

IDENTITY THEFT DETECTION POLICY

Z1.01 Guideline: Identity Theft Prevention Program

Physician Office Compliance with the Red Flag Rule

Number: Index

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model

identity Theft Prevention and Identification Requirements For Utility

County Identity Theft Prevention Program

Identity Theft Prevention Program

Oregon University System Identity Theft Prevention Program Effective May 1, 2009

Policies and Procedures: IDENTITY THEFT PREVENTION

RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009

University of Dayton Red Flag ID Theft Prevention Program

Ouachita Baptist University. Identity Theft Policy and Program

The Florida A&M University. Identity Theft Prevention Program. Effective May 1, 2009

SEVEN EASY STEPS TO CREATING AN IDENTITY THEFT RED FLAG PROGRAM

Transcription:

Name of Policy: Identity theft detection, prevention, and mitigation. Policy Number: 3364-15-12 Approving Officer: President Responsible Agent: Compliance Officer Scope: All University of Toledo Campuses X New policy proposal Major revision of existing policy Initial effective date: May 1, 2009 Minor/technical revision of existing policy Reaffirmation of existing policy (A) Policy statement The University of Toledo will take appropriate action to detect, prevent, and mitigate identity theft associated with financial credit accounts. (B) Purpose Identity theft, including identity theft committed in order to obtain medical treatment, poses a risk to patients and students of The University of Toledo (the university ), as well as the university. The university has established these reasonable policies and procedures to address the risks of identity theft to its patients, students, and other customers and to the safety and soundness of the university. (C) Scope of policy The requirements of this policy applies to all university departments that defer payment for services rendered and/or regularly extends, renews, or continues credit or regularly arranges for the extension, renewal, or continuation of credit. (D) Definitions All terms used in this policy that are defined in 16 C.F.R. 681.2 shall have the same meaning provided in that section. (E) Establishment of an identity theft program The university hereby establishes an identity theft program (the program ) to detect, prevent, and mitigate identity theft in connection with the opening of covered accounts and existing covered accounts. The program shall enable the university to:

3364-15-12 Identity theft detection, prevention, and mitigation 2 (1) Identify relevant red flags from the categories described in section (G) that signal possible identity theft and incorporate those red flags into the program; (2) Detect red flags that have been incorporated into the program; (3) Respond appropriately to detected red flags to prevent and mitigate identity theft; and (4) Ensure the program (including the relevant red flags) is updated periodically to reflect changes in the risks of identity theft. The university incorporates its current HIPAA, FERPA, and privacy and security policies into the program. The program includes procedures in addition to those in the HIPAA, FERPA, and privacy and security policies only to the extent necessary to accomplish the above purposes and to comply with 16 C.F.R. 681.2. (F) Administration of the program (1) In general. (a) The compliance officer shall administer and oversee the program and ensure that it is implemented in all appropriate departments, including training staff as necessary, determining the proper response to detected red flags, and updating the program to address changing areas of risk. (b) The compliance shall be responsible for its administration, oversight, and implementation of the program, and shall have primary responsibility for preparing reports in accordance with section (F)(3) and overseeing service provider arrangements. (2) Program oversight. In administering the program, the compliance officer shall: (a) Assign specific responsibility for the program s implementation; (b) Review reports prepared pursuant to section (F)(3). (c) Approve all material changes to the program as necessary to address changing identity theft risks. (3) Program reports. The compliance and privacy officer shall prepare annual reports regarding compliance with 16 C.F.R. 681.2, and provide each report to the senior vice president for finance and administration for review. Each annual report shall address material matters related to the program and shall evaluate: (a) The effectiveness of the program in accomplishing its purpose; (b) Any service provider arrangements; (c) Any significant incidents involving identity theft that may have occurred and the university s response to those incidents; and (d) All recommendations for material changes to the program.

3364-15-12 Identity theft detection, prevention, and mitigation 3 (4) Oversight of Service Providers. The university is ultimately responsible for compliance with 16 C.F.R. 681.2, even when it engages a service provider to perform an activity in connection with one or more covered accounts. Therefore, the university shall require each such service provider by contract to: (a) Abide by this identity theft policy and the program; and (b) Cooperate with the university to prevent or mitigate the risks of identity theft arising from red flags detected under the program. (G) Identification, sources, and categories of red flags The university shall look to any covered accounts it offers and maintains, the methods it provides to open and access those covered accounts, and any previous experiences with identity theft to identify relevant red flags under the program. It shall incorporate relevant red flags from sources including its past incidents of identity theft, changes in methods of identity theft, and any applicable laws, rules, or regulations. Categories of relevant red flags include: (1) Alerts, notifications, or other warnings received from consumer reporting agencies or service providers, such as fraud detection services; (2) Presentation of suspicious documents or suspicious personal identifying information, such as a suspicious address change; (3) Unusual use of, or other suspicious activity related to, a covered account; and (4) Notice from customers, victims of identity theft, law enforcement authorities, or other persons regarding possible identity theft in connection with the university s covered accounts. Examples of red flags from each category are attached to this policy as Appendix A. The university may choose which of these red flags to incorporate into its program, none are mandatory or prescriptive. Therefore, the university will incorporate into the program, whether singly or in combination, red flags from Appendix A that affect the risk of identity theft to the university, its covered accounts, and its patients, students, and other customers. (H) Detecting red flags The program shall detect red flags in connection with covered accounts by: (1) Obtaining identifying information about, and verifying the identity of, a person opening a covered account, by presenting positive proof of identification (i.e. physically presenting photo ID, official government ID, or valid system credentials (user ID and password)); and (2) Authenticating customers, monitoring transactions, and verifying the validity of change of address requests, in the case of existing covered accounts, through the following methods: presentation of positive proof of

3364-15-12 Identity theft detection, prevention, and mitigation 4 identification. (I) Responding to red flags (prevention and mitigation) The university must act promptly and effectively to respond to red flags. To this end, the university shall utilize the following protocol: (1) Any person detecting a red flag shall immediately gather all related documentation, write a description of the incident, and report this information to the compliance and privacy officer. (2) The compliance and privacy officer shall evaluate the incident and report his or her findings to the senior vice president for finance and administration. (3) Not all detected red flags will require a response. If a response is warranted under the circumstances, then the compliance and privacy officer and the senior vice president for finance and administration shall take action appropriate to the level of risk presented. This action may include: (a) Monitoring a covered account for evidence of identity theft; (b) Contacting the customer; (c) Changing any passwords, security codes, or other security devices that permit access to a covered account; (d) Reopening a covered account with a new account number; (e) Not opening a new covered account; (f) Closing an existing covered account; (g) Not attempting to collect on a covered account or not selling a covered account to a debt collector; or (h) Notifying law enforcement. (J) Updating the program The university shall periodically re-evaluate whether the program continues to be appropriate and effective in accomplishing its purpose. These periodic reviews will include an assessment of the university s covered accounts, the relevant red flags, and responses to identity theft. The university shall consider the following factors when updating the program: (1) Information contained in the annual reports prepared under the program; (2) The university s experiences with identity theft; (3) Changes in methods of identity theft and in methods to detect, prevent, and mitigate incidences of the same; (4) Changes to the types of accounts offered by the university; and (5) Changes in the university s business arrangements, including mergers, acquisitions, alliances, joint ventures, and service provider arrangements. (K) Other legal requirements

3364-15-12 Identity theft detection, prevention, and mitigation 5 The university shall comply with any other applicable legal requirements when implementing, operating, and updating the program. Approved by: /s/ laj Lloyd A. Jacobs, M.D. President Policies Superseded by This Policy: None Initial Effective Date: May 1, 2009 Review/Revision Date: Next review date: May 1, 2012 June 11, 2009 Date Review/Revision Completed by: Compliance Officer

3364-15-12 Identity theft detection, prevention, and mitigation 6 Appendix A Alerts, Notifications or Warnings from a Consumer Reporting Agency 1. A fraud or active duty alert is included with a consumer report. 2. A consumer reporting agency provides a notice of credit freeze in response to a request for a consumer report. 3. A consumer reporting agency provides a notice of address discrepancy, as defined in 681.1(b) of this part. 4. A consumer report indicates a pattern of activity that is inconsistent with the history and usual pattern of activity of an applicant or customer, such as: a. A recent and significant increase in the volume of inquiries; b. An unusual number of recently established credit relationships; c. A material change in the use of credit, especially with respect to recently established credit relationships; or d. An account that was closed for cause or identified for abuse of account privileges by a financial institution or creditor. Suspicious Documents 5. Documents provided for identification appear to have been altered or forged. 6. The photograph or physical description on the identification is not consistent with the appearance of the applicant or customer presenting the identification. 7. Other information on the identification is not consistent with information provided by the person opening a new covered account or customer presenting the identification. 8. Other information on the identification is not consistent with readily accessible information that is on file with the university, such as a signature card or a recent check. 9. An application appears to have been altered or forged, or gives the appearance of having been destroyed and reassembled. Suspicious Personal Identifying Information 10. Personal identifying information provided is inconsistent when compared against external information sources used by the university. For example: a. The address does not match any address in the consumer report; or b. The social security number (SSN) has not been issued, or is listed on the social security administration's death master file.

3364-15-12 Identity theft detection, prevention, and mitigation 7 11. Personal identifying information provided by the customer is not consistent with other personal identifying information provided by the customer. For example, there is a lack of correlation between the SSN range and date of birth. 12. Personal identifying information provided is associated with known fraudulent activity as indicated by internal or third-party sources used by the university. For example: a. The address on an application is the same as the address provided on a fraudulent application; or b. The phone number on an application is the same as the number provided on a fraudulent application. 13. Personal identifying information provided is of a type commonly associated with fraudulent activity as indicated by internal or third-party sources used by the university. For example: a. The address on an application is fictitious, a mail drop, or a prison; or b. The phone number is invalid, or is associated with a pager or answering service. 14. The SSN provided is the same as that submitted by other persons opening an account or other customers. 15. The address or telephone number provided is the same as or similar to the account number or telephone number submitted by an unusually large number of other persons opening accounts or other customers. 16. The person opening the covered account or the customer fails to provide all required personal identifying information on an application or in-response to notification that the application is incomplete. 17. Personal identifying information provided is not consistent with personal identifying information that is on file with the university. 18. If the university uses challenge questions, the person opening the covered account or the customer cannot provide authenticating information beyond that which generally would be available from a wallet or consumer report. Unusual Use of, or Suspicious Activity Belated to, the Covered Account 19. Shortly following the notice of a change of address for a covered account, the university receives a request for a new, additional, or replacement card or a cell phone, or for the addition of authorized users on the account. 20. A new revolving credit account is used in a manner commonly associated with known patterns of fraud patterns. For example:

3364-15-12 Identity theft detection, prevention, and mitigation 8 a. The majority of available credit is used for cash advances or merchandise that is easily convertible to cash (e.g., electronics equipment or jewelry); or b. The customer fails to make the first payment or makes an initial payment but no subsequent payments. 21. A covered account is used in a manner that is not consistent with established patterns of activity on the account. There is, for example: a. Nonpayment when there is no history of late or missed payments; b. A material increase in the use of available credit; c. A material change in purchasing or spending patterns; d. A material change in electronic fund transfer patterns in connection with a deposit account; or e. A material change in telephone call patterns in connection with a cellular phone account. 22. A covered account that has been inactive for a reasonably lengthy period of time is used (taking into consideration the type of account, the expected pattern of usage and other relevant factors). 23. Mail sent to the customer is returned repeatedly as undeliverable although transactions continue to be conducted in connection with the customer's covered account. 24. The university is notified that the customer is not receiving paper account statements. 25. The university is notified of unauthorized charges or transactions in connection with a customer's covered account. Notice from Customers, Victims of Identity Theft, Law Enforcement Authorities, or Other Persons Regarding Possible Identity Theft in Connection With Covered Accounts Held by the University 26. The university is notified by a customer, a victim of identity theft, a law enforcement authority, or any other person that it has opened a fraudulent account for a person engaged in identity theft.