MOTLOW STATE COMMUNITY COLLEGE



Similar documents
B. Credit - Deferral of payment of a debt incurred for the purchase of goods services, including educational services.

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)

UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM

University Policy: Identity Theft Prevention Policy

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

RESOLUTION TO ADOPT IDENTITY THEFT POLICY

Christopher Newport University Policy and Procedures

Identity Theft Prevention Program

Oregon University System Identity Theft Prevention Program Effective May 1, 2009

Central Oregon Community College. Identity Theft Prevention Program

IDENTITY THEFT PREVENTION PROGRAM

California State University, Chico. Identity Theft Prevention Red Flags Program

University of Nebraska - Lincoln Identity Theft Prevention Program

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

University of Tennessee's Identity Theft Prevention Program

Number: Index

Northeast Technology Center Board Policy 2110 Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS)

IDENTITY THEFT PREVENTION PROGRAM

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);

Ferris State University

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES

Identity Theft Policy

Identity Theft Prevention Policy and Procedure

Identity Theft Prevention Program

Delta Township Compiled Policy Manual

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

The Florida A&M University. Identity Theft Prevention Program. Effective May 1, 2009

Facts About FACTA Red Flag Identity Theft Prevention Program

City of Caro Identity Theft Prevention Policy

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009

IDENTITY THEFT DETECTION POLICY

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009

IDENTITY THEFT PREVENTION PROGRAM

University of Arkansas at Monticello Identity Theft Prevention Program

Identity Theft Prevention Program Red Flag Rules Policy P Issued: May 2009

DSU Identity Theft Prevention Policy No. DSU

Identity Theft Prevention Program

Identity theft prevention program and red flag compliance policy.

University of Dayton Red Flag ID Theft Prevention Program

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

Identity theft. A fraud committed or attempted using the identifying information of another person without authority.

ADRIAN COLLEGE IDENTITY THEFT POLICY

CENTENARY COLLEGE POLICIES UNDER THE FAIR & ACCURATE CREDIT TRANSACTION ACT S RED FLAG RULES

Approved by the Audit Committee of the Board of Trustees, effective February 3, 2009.

COUNCIL POLICY STATEMENT

Chatsworth Water Works Commission. Identity Theft Prevention Program. Effective beginning December 1, 2008

Identity Theft Prevention Program (Approved by the Board of Trustees)

University of Alaska. Identity Theft Prevention Program

II. F. Identity Theft Prevention

UNIVERSITY OF RICHMOND IDENTITY THEFT PREVENTION PROGRAM

Z1.01 Guideline: Identity Theft Prevention Program

IDENTITY THEFT PREVENTION PROGRAM COUNTY OF DUPLIN, NORTH CAROLINA

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor;

Identity Theft Prevention Program

THE LUTHERAN UNIVERSITY ASSOCIATION, INC. d/b/a Valparaiso University IDENTITY THEFT PREVENTION PROGRAM

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

identity Theft Prevention and Identification Requirements For Utility

University of North Dakota. Identity Theft Prevention Program

MCPHS IDENTITY THEFT POLICY

ORDINANCE NUMBER 644 AN ORDINANCE ESTABLISHING THE TOWN OF YORKTOWN IDENTITY THEFT PREVENTION PROGRAM

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM

Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended:

State Of Florida's Real Estate Law

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule

A Guide to Benedictine College and Identity Theft

Springfield Technical Community College Identity Theft Prevention Program

DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:

Florida Agricultural & Mechanical University Board of Trustees Policy

David Coble Internal Control Officer

IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009

MARSHALL UNIVERSITY BOARD OF GOVERNORS

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy

Wholesale Broker Red Flag/Identity Theft Prevention Program Certification

IDENTITY THEFT PREVENTION

IDENTITY THEFT PREVENTION PROGRAM

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009

Texas A&M International University Identity Theft Prevention Program

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE. University of Cincinnati Red Flags Rule Protecting Against Identity Fraud

Detecting, Preventing, and Mitigating Identity Theft

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy

Red Flag Identity Theft Financial Policy 1.10

IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009

USF System & Preventing Identity Fraud

Weber Human Services Identity Theft Prevention Policy

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM

Red Flags Identity Theft Training Program. Fall 2015

IDENTITY THEFT PREVENTION PROGRAM

These rules became effective August 1, 2009, and require certain agencies to implement an identity theft program and policy.

UCLA Policy 313: Prevention of Identity Theft

UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM

Red Flag Rules and Aging Services: What You Need to Know

Transcription:

Page 1 of 5 MOTLOW STATE COMMUNITY COLLEGE SUBJECT: FACTA Red Flag Rule and Identity Theft Prevention Program I. BACKGROUND In late 2007 the Federal Trade Commission (FTC) and Federal banking agencies issued a regulation known as the Red Flag Rule under sections 114 and 315 of the Fair and Accurate Credit Transactions Act (FACTA) of 2003. The regulation is intended to reduce the risk of identity theft by requiring stronger fraud prevention to protect consumers personal data. The regulation applies to any organization that offers credit or manages a covered account. The Red Flag rule requires any organization that maintains a covered account to establish, document, and maintain an identity theft prevention program that identifies potential Red Flags, detects the occurrence of Red Flags, and appropriately responds to Red Flags. This Identity Theft Prevention Program is appropriate to the size and complexity of the college and the nature and scope of the college s activities. The law requires that a Red Flag policy (from which a Red Flag program will be developed) be approved by either the organization s governing board or a committee of the board. Oversight of the program has been assigned to the Vice President for Business Affairs, with program reviews conducted annually. Red Flag rules become enforceable on November 1, 2009. II. PURPOSE Motlow State Community College adopted this Identity Theft Prevention Program to enact reasonable policies and procedures to protect students and college employees from damages associated with the compromise of sensitive personal information. III. DEFINITIONS A. Creditor Any organization, including community colleges, which regularly: 1. extends, renews, or continues credit; or 2. arranges for someone else to extend, renew, or continue credit; or 3. is the assignee of a creditor involved in the decision to extend, renew, or continue credit. B. Credit - Deferral of payment of a debt incurred for the purchase of goods services, including educational services. C. Covered account An account with a creditor used by individuals, families, or households which involves multiple payments to that creditor. D. Identifying information Information which alone, or in combination with other information, can be used to identify a specific individual. Identifying information includes name, social security number, date of birth, driver s license number, identification card number, employer or taxpayer identification number, unique electronic identification numbers, address or routing code, or certain

Page 2 of 5 electronic account identifiers associated with telephonic communications. E. Identity theft A fraud attempted or committed using identifying information of another person without proper authority. F. Red Flag A pattern, practice, or specific activity which indicates the possibility of identity theft. G. Sensitive information Personal information belonging to any student, staff, or faculty member or other person with whom the college is affiliated. H. Service provider Person providing a service directly to the financial institution or creditor. IV. SCOPE Activities in which Motlow State Community College is involved in that require compliance with the Red Flag Rules include: Covered accounts are described as an account that a creditor holds that is designed to allow multiple payments or transactions after services have been delivered. Motlow College is subject to Red Flag rules because we participate in or offer: Student tuition and fee payment plans through a contracted provider Employee and student background checks through third party providers (Motlow College does not participate in the Federal Perkins Loan program; the Federal Family Education Loan Program; institutional loans to students, faculty, or staff; nor a deferred tuition payment plan delivered by the institution.) V. IDENTIFICATION OF RELEVANT RED FLAGS The following red flags are potential indicators of fraud. Any time a red flag, or a situation closely resembling a red flag, is apparent, it should be investigated for verification. A. Alerts, notifications, or other warnings received from the Attorney General s Office or consumer reporting agencies. For example: A consumer report indicates a pattern of activity that is inconsistent with the history and usual pattern of activity of an applicant or customer, such as: a. A recent and significant increase in the volume of inquiries; b. An unusual number of recently established credit relationships; c. A material change in the use of credit, especially with respect to recently established credit relationships; or d. An account that was closed for cause or identified for abuse of account privileges by a financial institution or creditor. B. The presentation of suspicious documents. For example: 1. Documents provided for identification appear to have been altered or forged. 2. The photograph/physical description on the identification is not consistent with the appearance of the applicant or customer presenting the identification. 3. Other information on the identification is not consistent with information provided by the person opening a new covered account or customer

Page 3 of 5 presenting the identification. 4. An application appears to have been altered or forged, or gives the appearance of having been destroyed and reassembled. C. The unusual use of, or other suspicious activity related to, a covered account. For example: 1. Any student account is used in a manner commonly associated with known patterns of fraud. 2. Mail sent to the customer is returned repeatedly as undeliverable although transactions continue to be conducted in connection with the customer's covered account. 3. The college is notified that the customer is not receiving e-mail account statements. 4. The college is notified of unauthorized charges or transactions in connection with a customer's covered account. 5. A customer is attempting to access information about a deceased student. 6. The college is notified by a customer, a victim of identity theft, a law enforcement authority, or any other person that it has opened a fraudulent account for a person engaged in identity theft. VI. DETECTING RED FLAGS Motlow State Community College uses the following methods to detect red flags when opening and maintaining covered accounts: A. Procedures are in place to verify a person s identity when processing any activity to their account including, but not limited to registration activity, financial aid processing, and business office payments/inquiries. B. Receipt of notifications from service providers of red flag criteria (i.e., discrepancies in social security number to name, address differences, etc.) are disseminated to specifically identified individuals. C. Receipt of notification of suspicious activity by student, law enforcement, or borrower is disseminated to specifically identified individuals. D. Equipment inventory coordinator reports that laptop and/or computer equipment with sensitive data has been lost or stolen. E. Motlow State Community College has procedures in place to verify changes to sensitive information (e.g. record name changes, SSN changes, and MyMotlow password resets). F. Motlow State Community College performs routine diagnostics on firewalls and the security of electronic data portals. G. Security scans are done in regular intervals.

Page 4 of 5 VII. PREVENTING AND MITIGATING IDENTITY THEFT Motlow State Community College uses the following methods to prevent and to mitigate identity theft when opening and maintaining covered accounts: A. Third party agencies that handle sensitive data for the college need to be evaluated no less than annually to ensure that they are in compliance with red flag rules. B. All employees are informed and are expected to adhere to FERPA laws to verify proper identity and non-disclosure of data to unauthorized persons. C. Personal banking information is only obtained and used by appropriate personnel with compliance being maintained regarding security of personal information. D. A re-admission process is in place to verify a student s identity when an account has been inactive for a prolonged period. E. Students applying for financial aid awards are verified with more than one identifying method to assure that aid is being distributed to the proper person. F. Procedures are in place for the proper handling of data including electronically saved data on laptops and/or flash drives and data that are accessible remotely. This includes what data should be stored on these devices and what security measures should be taken to prevent loss and/or theft of such data. G. Motlow State Community College trains employees, then reviews procedures for dealing with sensitive information and with access requests. H. Motlow State Community College reviews internal access to paper, electronic documents and information systems containing sensitive information. I. Motlow State Community College provides regular training to educate employees about risks and liabilities of data loss or theft. VIII. RESPONDING TO DETECTION OF RED FLAGS Once a red flag has been detected, Motlow State Community College will: A. Ask for validation and/or supplemental documentation/identification when a student s identity is in question. B. Check credit card receipts when possible fraudulent charges are reported from a customer s bank statement. C. Verify original student documents when a discrepancy is reported regarding social security number discrepancies to name and other red flag issues regarding aged accounts. D. Deny access to information or disable an account pending further investigation and resolution of suspicious activity. E. Follow-up on reported thefts which possibly involve the compromise of sensitive data. F. Notify victims of possible identity theft and proper authorities. G. Develop a plan for using all available media to disseminate information concerning an improper disclosure of sensitive information. The records of current students, former students, and employees should be considered when disseminating the information concerning a breach.

Page 5 of 5 IX. UPDATE OF IDENTITY THEFT PROGRAM This policy will be re-evaluated annually to determine whether all aspects of the program are up to date and applicable in the current work environment and will be revised as necessary. X. PROGRAM ADMINISTRATION A. Program Oversight 1. Motlow State Community College has designated the Vice President for Business Affairs to be responsible for the oversight, development, implementation, and administration of the Identify Theft Prevention Program. 2. A representative has been assigned from each high-risk area to identify what red flags might exist at the college. B. Staff Training 1. Staff training shall be conducted for all employees for whom it is reasonably foreseeable that they may come in contact with accounts or personally identifiable information. 2. The HR Office is responsible for ensuring identity theft training for all requisite employees. 3. Employees must receive annual training in all elements of this identity theft program. 4. Additional training will be provided as changes to the program are made. C. Oversight of Service Providers Motlow State Community College assumes the responsibility of ensuring that the activities of all service providers are conducted in accordance with reasonable policies and procedures to detect, prevent, and mitigate the risk of identity theft. The college will either require the contract for the service providers to have red flag policies and procedures in place or require the service provider to report any red flags to the Vice President for Business Affairs. SOURCE: MOTLOW COLLEGE XR: TBR Policy 4:01:05:60