Understanding our requirements and ensuring compliance



Similar documents
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE. University of Cincinnati Red Flags Rule Protecting Against Identity Fraud

Do s & Don ts Reference website.

University of Nebraska - Lincoln Identity Theft Prevention Program

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

Deputy Mike Butler Deputy Leslie Fox Dane County Sheriff s Office

UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM

University Policy: Identity Theft Prevention Policy

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

RESOLUTION TO ADOPT IDENTITY THEFT POLICY

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM

City of Wyoming, Michigan Administrative Policy

policy All terms used in this policy that are defined in 16 C.F.R shall have the same meaning provided in that section.

UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM

Springfield Technical Community College Identity Theft Prevention Program

University of Dayton Red Flag ID Theft Prevention Program

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule

Christopher Newport University Policy and Procedures

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009

Identity Theft Prevention Program

University of Arkansas at Monticello Identity Theft Prevention Program

COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM

Facts About FACTA Red Flag Identity Theft Prevention Program

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions

MOTLOW STATE COMMUNITY COLLEGE

IDENTITY THEFT PREVENTION PROGRAM NATCO COMMUNICATIONS, INC. NORTHERN ARKANSAS TELEPHONE CO., INC. NATCO TECHNOLOGIES, INC.

Lake Havasu City. Identity Theft Prevention Program

ORDINANCE NUMBER 644 AN ORDINANCE ESTABLISHING THE TOWN OF YORKTOWN IDENTITY THEFT PREVENTION PROGRAM

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

IDENTITY THEFT DETECTION POLICY

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy

Identity theft prevention program and red flag compliance policy.

Identity Theft. Officer Rob Romey IPD Crime Prevention Officer.

Wholesale Broker Red Flag/Identity Theft Prevention Program Certification

California State University, Chico. Identity Theft Prevention Red Flags Program

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);

Identity Theft Prevention Program

To detect identity theft at your institution/organization.

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)

CHAPTER 99: IDENTITY THEFT PREVENTION PROGRAM

The Florida A&M University. Identity Theft Prevention Program. Effective May 1, 2009

IDENTITY THEFT PREVENTION PROGRAM COUNTY OF DUPLIN, NORTH CAROLINA

Identity Theft Protection

CFTC and SEC Jointly Propose Identity Theft Rules

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

Oregon University System Identity Theft Prevention Program Effective May 1, 2009

Community College System of New Hampshire Identity Theft Prevention Program Revised 5/4/2009

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

Red Flag Rules Information and Training

Detecting, Preventing, and Mitigating Identity Theft

Approved by the Audit Committee of the Board of Trustees, effective February 3, 2009.

IDENTITY THEFT PREVENTION PROGRAM

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor;

identity Theft Prevention and Identification Requirements For Utility

Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business

Red Flag Rules and Aging Services: What You Need to Know

Central Oregon Community College. Identity Theft Prevention Program

POLICY: Identity Theft Red Flag Prevention

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

USF System & Preventing Identity Fraud

University of North Dakota. Identity Theft Prevention Program

RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM

Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model

Identity Theft Prevention Program Red Flag Rules Policy P Issued: May 2009

VCU Identity Theft Prevention Policy

Identity Theft Policy

Identity Theft Prevention Program

Northeast Technology Center Board Policy 2110 Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS)

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES

Identity Theft Prevention Program

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.

DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

Florida Agricultural & Mechanical University Board of Trustees Policy

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft

RED FLAGS IDENTITY THEFT PREVENTION PROGRAM. Raleigh Radiology Cedarhurst, Wake Forest and Clayton. May 1, 2009

IDENTITY THEFT PREVENTION PROGRAM

Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.

Ferris State University

Number: Index

City of Hercules Hercules Municipal Utility Identity Theft Prevention Program

Z1.01 Guideline: Identity Theft Prevention Program

Identity Theft Prevention Program

Identity Theft Prevention Policy and Procedure

Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended:

I know what is identity theft but how do I know if mine has been stolen?

Identity Theft and Medical Theft. *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA

UNC Asheville. Red Flag Rule and NC Identity Protection Act Information

IDENTITY THEFT PREVENTION PROGRAM

University of Alaska. Identity Theft Prevention Program

Identity Theft Prevention Program

2.1 IDENTITY THEFT PREVENTION PROGRAM

McLennan Community College

Transcription:

Understanding our requirements and ensuring compliance

The FTC = Federal Trade Commission The FTC issued the Red Flag Rule as part of the Fair and Accurate Credit Transaction Act of 2003 (FACT Act), Sections 114 and 315. Final regulations issued November 9, 2007, 16 CFR 681.1, 681.2, and 681.3

The Red Flag Rule supplements existing legislation aimed at detecting, and preventing identity theft Applies to financial institutions and creditors with covered accounts Sets out how affected institutions/accounts must develop, implement, and administer their Identity Theft Prevention Programs Picks up where data security leaves off

Dumpster Diving. They rummage through trash looking for bills or other paper with your personal information on it. Skimming. They steal credit/debit card numbers by using a special storage device when processing your card. Phishing. They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information. Changing Your Address. They divert your billing statements to another location by completing a change of address form. Old-Fashioned Stealing. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access. Pretexting. They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.

Under the authority of the Federal Trade Commission (FTC) the new rule requires certain businesses and organizations to: Develop Implement; and, Administer Identity Theft Prevention Programs

Must include reasonable written policies and procedures to identify the red flags of identity theft that may occur in day-to-day operations Must be designed to detect the potential red flags identified Must spell out appropriate actions the organization will take when red flags are detected Must include appropriate staff training Must be re-evaluated periodically to reflect new risks

Determination isn t based on industry or sector but whether your activities fall within the relevant definitions: Financial Institution Creditor Covered account

Financial Institution State or national bank, savings and loan, mutual savings bank, credit union or any person that directly or indirectly holds a transaction account belonging to a consumer Creditor Businesses or organizations that regularly defer payments for goods or services and bill customers later Anyone who regularly participates in decision to extend, renew, or continue credit Includes third-party debt collector

Covered Accounts A consumer account offered or maintained, primarily for personal, family or household purposes, that involves or is designed to permit multiple payments or transactions. These are accounts where payments are deferred and made by a borrower periodically over time. Any other account that a financial institution or creditor offers or maintains for which there is a reasonably foreseeable risk to customers of identity theft

All campus units that work with covered accounts are subject to these regulations Examples include any units that offer: Deferred payment plans Loans Other extension of credit Or hold other accounts where there is a foreseeable risk of identity theft Campus Identity Theft Prevention Policy VI.2.2, available at http://www.purdue.edu/policies/pages/record s/vi_2_2.html

Affected companies, such as Purdue, must develop and implement written identity theft prevention programs to: Identify Detect Mitigate

Consumer Agency Alerts Suspicious Documents Suspicious PII A pattern, practice, or specific activity that indicates the possible existence of identity theft. Regulation provides many examples of Red Flags and the following categories are outlined in the regulations: Unusual Account Activity Consumer Notifications

Consumer Agency Alerts Fraud or Active duty alerts Notice of credit freezes Address discrepancy Activity pattern change

Suspicious Documents Identification documents appear forged Photograph or identification does not agree with the appearance of the applicant Provided documentation is inconsistent with the file

Suspicious PII Inconsistent information or information that matches fraudulent accounts A Social Security Number that matches other accounts Information that doesn t match external sources such as an address that does not match the credit report address

Unusual Account Activity New or additional users shortly after a change of address Returned mail from an active account Fraudalent patterns such as failure to make first or subsequent payments Notification of unauthorized charges

Consumer Notifications Notice from customers, victims of ID theft, or Law Enforcement regarding possible Identity Theft in connection with a customer account

1. Identify likely red flags in your operations 2. Detect red flags in day-to-day operations 3. Prevent and mitigate identity theft Respond appropriately Mitigate the harm done 4. Update your program Conduct periodic risk assessment Educate staff

Campus Identity Theft Prevention Policy VI.2.2, available at http://www.purdue.edu/policies/pages/records/vi_2_2.html FTC Red Flag site available at http://www.ftc.gov/redflagsrule (This site includes an instructional video) Departmental Plan/Controls