I. INTRODUCTION [RIA]'S WRITTEN IDENTITY THEFT PREVENTION PROGRAM

Similar documents
NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

Identity Theft Prevention Program

Identity Theft Prevention Program

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule

Central Oregon Community College. Identity Theft Prevention Program

University Policy: Identity Theft Prevention Policy

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions

Lake Havasu City. Identity Theft Prevention Program

IDENTITY THEFT PREVENTION PROGRAM

CHAPTER 99: IDENTITY THEFT PREVENTION PROGRAM

policy All terms used in this policy that are defined in 16 C.F.R shall have the same meaning provided in that section.

UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM

CENTENARY COLLEGE POLICIES UNDER THE FAIR & ACCURATE CREDIT TRANSACTION ACT S RED FLAG RULES

Identity Theft Prevention Program

COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM

Wholesale Broker Red Flag/Identity Theft Prevention Program Certification

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0

Board of Commissioners Policy. Town of Nags Head Identity Theft Protection Program. Adopted October 22, 2008

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule

City of Hercules Hercules Municipal Utility Identity Theft Prevention Program

UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy

RESOLUTION NO

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

Identity Theft Prevention Program

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009

University of Nebraska - Lincoln Identity Theft Prevention Program

Identity Theft Policy

PROVISIONS IDENTITY THEFT RED FLAG FAQS

identity Theft Prevention and Identification Requirements For Utility

Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended:

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)

California State University, Chico. Identity Theft Prevention Red Flags Program

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

COUNCIL POLICY STATEMENT

The Florida A&M University. Identity Theft Prevention Program. Effective May 1, 2009

POLICY: Identity Theft Red Flag Prevention

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

Weber Human Services Identity Theft Prevention Policy

USF System & Preventing Identity Fraud

POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

City of Watauga Utility Billing Department Identity Theft Prevention Program. Effective beginning November 1, 2008

DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:

DMACC IDENTITY THEFT- RED FLAGS PROCEDURES

Chatsworth Water Works Commission. Identity Theft Prevention Program. Effective beginning December 1, 2008

Delta Township Compiled Policy Manual

UCLA Policy 313: Prevention of Identity Theft

A Guide to Benedictine College and Identity Theft

IDENTITY THEFT PREVENTION PROGRAM COUNTY OF DUPLIN, NORTH CAROLINA

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor;

IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule

Northeast Technology Center Board Policy 2110 Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS)

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009

Florida Agricultural & Mechanical University Board of Trustees Policy

Identity theft. A fraud committed or attempted using the identifying information of another person without authority.

FACTA Identity Theft Red Flags Program.

TITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM

Red Flag Identity Theft Financial Policy 1.10

[Institution or GPLS Name] Red Flag Rules - Identity Theft/Fraud Prevention Program. Effective beginning, 2009

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

MCPHS IDENTITY THEFT POLICY

Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008

University of Tennessee's Identity Theft Prevention Program

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

RESOLUTION TO ADOPT IDENTITY THEFT POLICY

DSU Identity Theft Prevention Policy No. DSU

Appalachian State University Identity Theft Prevention Program Procedures

Identity Theft Prevention Program

MARSHALL UNIVERSITY BOARD OF GOVERNORS

University of Alaska. Identity Theft Prevention Program

These rules became effective August 1, 2009, and require certain agencies to implement an identity theft program and policy.

Model Identity Theft Policy and Adopting Resolution

Identity Theft Prevention Program

University of Arkansas at Monticello Identity Theft Prevention Program

identity TheFT PREVENTION Programs and Response

Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009

University of Dayton Red Flag ID Theft Prevention Program

II. F. Identity Theft Prevention

Red Flags Identity Theft Training Program. Fall 2015

Z1.01 Guideline: Identity Theft Prevention Program

IDENTITY THEFT DETECTION POLICY

RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009

Red Flag Rules and Aging Services: What You Need to Know

ORDINANCE NUMBER 644 AN ORDINANCE ESTABLISHING THE TOWN OF YORKTOWN IDENTITY THEFT PREVENTION PROGRAM

RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM

Identity Theft Prevention Policy and Procedure

University of North Dakota. Identity Theft Prevention Program

CATAWBA COUNTY IDENTITY THEFT RED FLAGS POLICY

City of Caro Identity Theft Prevention Policy

Identity Theft Prevention Policy. Effective Date: January 1, Policy Statement

IDENTITY THEFT PREVENTION

Transcription:

I. INTRODUCTION Under Regulation S-ID, SEC registered investment advisers are required to adopt formal programs to detect and prevent identity theft if they directly or indirectly hold "transaction accounts" belonging to individuals. Investment advisers hold transaction accounts if they have the ability to direct payments or transfers from an individual s account to third parties upon the individual s instructions. In addition, investment advisers to private funds may directly or indirectly hold transaction accounts if an individual invests money in a private fund and the adviser to the fund has the authority to direct the individual s investment proceeds to third parties upon instructions received from the investor. Formal programs to detect and prevent identity theft should be designed to detect, prevent, and mitigate identity theft in connection with the opening of a "covered account" or any existing "covered account". A covered account includes an investment advisory account offered or maintained by an SEC registered investment adviser (primarily for personal, family, or household purposes) that involves or is designed to permit multiple payments or transactions, such as wire transfers and other payments to third parties. A covered account also includes any other account offered or maintained by an SEC registered investment adviser for which there is a foreseeable risk to customers (i.e., individuals and business entities) or to the safety and soundness of the SEC registered investment adviser from identity theft. II. [RIA]'S WRITTEN IDENTITY THEFT PREVENTION PROGRAM [RIA] is required to establish a written identity theft prevention program (the "Program") since it offers or maintains one or more "covered accounts". Identity theft means a fraud committed or attempted using the identifying information of another person without authority. Identifying information means any name or number that may be used, alone or in conjunction with any other information, to identify a specific person, including any: 1. Name, Social Security number, date of birth, official State or government issued driver s license or identification number, alien registration number, government passport number, employer or taxpayer identification number; 2. Unique biometric data, such as fingerprint, voice print, retina or iris image, or other unique physical representation; 3. Unique electronic identification number, address, or routing code; or 4. Telecommunication identifying information or access device. The policies and procedures below are designed to detect, prevent, and mitigate identity theft in connection with the opening of a covered account or any existing covered account. Page 1 of 7

A. Detecting Red Flags A "red flag" means a pattern, practice, or specific activity that indicates the possible existence of identity theft. In connection with the opening of covered accounts and existing covered accounts, [RIA] will conduct the activities listed below in order to aid in the detection of red flags. 1. Obtain identifying information about, and verify the identity of, a person opening a covered account (e.g., following the policies and procedures regarding identification and verification set forth in the customer identification program ("CIP") rules. 2. Authenticate customers. 3. Monitor transactions in covered accounts. 4. Verify the validity of change of address requests. B. Responding to Red Flags In the event that a red flag is detected, [RIA] will respond in a manner appropriate given the degree of risk posed with respect to possible identify theft. In determining an appropriate response, [RIA] considers aggravating factors that may heighten the risk of identity theft, such as a data security incident that results in unauthorized access to a customer s account records held by [RIA] or notice that a customer has provided information related to a covered account to someone fraudulently claiming to represent [RIA] or to a fraudulent website. Appropriate responses may include those listed below. 1. Monitoring a covered account for evidence of identity theft. 2. Contacting the customer. 3. Changing any passwords, security codes, or other security devices that permit access to a covered account. 4. Reopening a covered account with a new account number. 5. Not opening a new covered account. 6. Closing an existing covered account. 7. Not attempting to collect on a covered account or not selling a covered account to a debt collector. 8. Notifying law enforcement. 9. Determining that no response is warranted under the particular circumstances. C. Identifying Red Flags [RIA] and its supervised persons must be vigilant with respect to the identification of red flags. Supervised persons are required to immediately report all red flags to the Chief Compliance Officer. You should consult the Chief Compliance Officer if you have any questions with respect to whether a particular circumstance should be considered a "red flag". Page 2 of 7

In order to assist supervised persons in identifying red flags, [RIA] has incorporated Appendix A as part of this policy which contains examples of possible red flags. Although Appendix A contains numerous examples, this should not be construed by supervised persons as a list of all possible red flags. III. PROGRAM ADMINISTRATION In connection with the continued administration of the Program, [RIA] has designated [the board of directors, an appropriate committee thereof, or a designated employee at the level of senior management] (i.e., the "Program Administrator") in the oversight, development, implementation and administration of the Program. It is the responsibility of the Program Administrator to conduct the functions described below. A. Periodic Identification of Covered Accounts The Program Administrator will periodically determine whether [RIA] offers or maintains covered accounts. As a part of this determination, the Program Administrator will conduct a risk assessment, taking into consideration: 1. The methods it provides to open its accounts; 2. The methods it provides to access its accounts; and 3. Its previous experiences with identity theft. B. Identification of Relevant Red Flags The Program Administrator will initially and periodically review and update, where necessary, the examples of relevant red flags contained in Appendix A, taking into consideration: 1. The types of covered accounts [RIA] offers or maintains; 2. The methods [RIA] provides to open covered accounts; 3. The methods [RIA] provides to access covered accounts; and 4. [RIA]'s previous experiences with identity theft. The Program Administrator will also incorporate relevant red flags from sources such as: 1. Incidents of identity theft that [RIA] has experienced; 2. Methods of identity theft that [RIA] has identified that reflect changes in identity theft risks; and 3. Applicable regulatory guidance. Page 3 of 7

C. Oversight of Service Provider Arrangements A service provider means a person that provides a service directly to [RIA]. When engaging a service provider to perform an activity in connection with one or more covered accounts, [RIA] takes steps to ensure that the activity of the service provider is conducted in accordance with reasonable policies and procedures designed to detect, prevent, and mitigate the risk of identity theft. For example, [RIA] may require the service provider by contract to have policies and procedures to detect relevant red flags that may arise in the performance of the service provider s activities, and either report the red flags to [RIA] or take appropriate steps to prevent or mitigate identity theft. The Program Administrator is responsible for ensuring that [RIA] conducts appropriate oversight of such service providers. D. Reporting 1. On an annual basis, the Program Administrator will prepare a report addressing material matters related to the Program and evaluate issues such as: a. The effectiveness of the policies and procedures of [RIA] in addressing the risk of identity theft in connection with the opening of covered accounts and with respect to existing covered accounts; b. Service provider arrangements; c. Significant incidents involving identity theft and management s response; and d. Recommendations for material changes to the Program. 2. On an annual basis, the Program Administrator will provide a report to the [board of directors, an appropriate committee of the board, or a designated employee at the level of senior management] addressing [RIA]'s compliance with Regulation S-ID. E. Updating 1. The Program Administrator will periodically update the Program (including the red flags determined to be relevant as listed in Appendix A) to reflect any changes in risks to customers or to the safety and soundness of [RIA] from identity theft. The Program Administrator will consider the factors listed below during such periodic reviews. a. The experiences of [RIA] with identity theft. b. Changes in methods of identity theft. c. Changes in methods to detect, prevent, and mitigate identity theft. d. Changes in the types of accounts that [RIA] offers or maintains. e. Changes in the business arrangements of [RIA], including mergers, acquisitions, alliances, joint ventures, and service provider arrangements Page 4 of 7

F. Training The Program Administrator will train staff, as necessary, in order to effectively implement the Program G. Approval The Program Administrator will obtain approval of the initial written Program, and any amendments, from [either its board of directors or an appropriate committee of the board of directors]. IV. PROGRAM OVERSIGHT [The board of directors, an appropriate committee of the board, or a designated employee at the level of senior management] is responsible for the oversight of the program. Oversight by [the board of directors, an appropriate committee of the board, or a designated employee at the level of senior management] requires the completion of a number of activities, including those activities listed below. 1. Assigning specific responsibility for the Program s implementation; 2. Reviewing reports regarding compliance by [RIA] with Regulation S-ID; and 3. Approving material changes to the Program as necessary to address changing identity theft risks. NorthPoint Notes with respect to tailoring these policies and procedures to your business: The Program must be appropriate to the size and complexity of the RIA and the nature and scope of its activities. In designing the Program, an RIA may incorporate, as appropriate, its existing policies, procedures, and other arrangements that control reasonably foreseeable risks to customers or to the safety and soundness of the RIA from identity theft. With respect to identifying red flags, RIAs need only include red flags that are relevant to the firm. The ID Red Flags Rule requires that certain elements be considered in developing Identity Theft Red Flags Policies and Procedures. The adopting release for the rule can be found at the following link: http://www.sec.gov/rules/final/2013/34-69359.pdf. This Template is not a substitute for reading and understanding the ID Red Flags Rule; RIAs utilizing this template are encouraged to review the rules and the adopting release. Page 5 of 7

APPENDIX A "RED FLAGS" Note: Additional red flags relevant to the RIA should also be listed. Alerts, notifications, or other warnings received from consumer reporting agencies or service providers, such as fraud detection services 1. A fraud or active duty alert is included with a consumer report. 2. A consumer reporting agency provides a notice of credit freeze in response to a request for a consumer report. 3. A consumer reporting agency provides a notice of address discrepancy. 4. A consumer report indicates a pattern of activity that is inconsistent with the history and usual pattern of activity of an applicant or customer, such as: a) A recent and significant increase in the volume of inquiries; b) An unusual number of recently established credit relationships; c) A material change in the use of credit, especially with respect to recently established credit relationships; or d) An account that was closed for cause or identified for abuse of account privileges by a financial institution or creditor. The presentation of suspicious documents 1. Documents provided for identification appear to have been altered or forged. 2. The photograph or physical description on the identification is not consistent with the appearance of the applicant or customer presenting the identification. 3. Other information on the identification is not consistent with information provided by the person opening a new covered account or customer presenting the identification. 4. Other information on the identification is not consistent with readily accessible information that is on file with [RIA], such as a signature card or a recent check. 5. An application appears to have been altered or forged, or gives the appearance of having been destroyed and reassembled. The presentation of suspicious personal identifying information, such as a suspicious address change 1. Personal identifying information provided is inconsistent when compared against external information sources used by [RIA]. For example: a) The address does not match any address in the consumer report; or b) The Social Security Number (SSN) has not been issued, or is listed on the Social Security Administration s Death Master File. 2. Personal identifying information provided by the customer is not consistent with other personal identifying information provided by the customer. For example, there is a lack of correlation between the SSN range and date of birth. 3. Personal identifying information provided is associated with known fraudulent activity as indicated by internal or third-party sources used by [RIA]. For example: a) The address on an application is the same as the address provided on a fraudulent application; or b) The phone number on an application is the same as the number provided on a fraudulent application. Page 6 of 7

4. Personal identifying information provided is of a type commonly associated with fraudulent activity as indicated by internal or third-party sources used by [RIA]. For example: a) The address on an application is fictitious, a mail drop, or a prison; or b) The phone number is invalid, or is associated with a pager or answering service. 5. The SSN provided is the same as that submitted by other persons opening an account or other customers. 6. The address or telephone number provided is the same as or similar to the address or telephone number submitted by an unusually large number of other persons opening accounts or by other customers. 7. The person opening the covered account or the customer fails to provide all required personal identifying information on an application or in response to notification that the application is incomplete. 8. Personal identifying information provided is not consistent with personal identifying information that is on file with [RIA]. 9. For financial institutions and creditors that use challenge questions, the person opening the covered account or the customer cannot provide authenticating information beyond that which generally would be available from a wallet or consumer report. The unusual use of, or other suspicious activity related to, a covered account 1. Shortly following the notice of a change of address for a covered account, [RIA] receives a request for a new, additional, or replacement means of accessing the account or for the addition of an authorized user on the account. 2. A covered account is used in a manner that is not consistent with established patterns of activity on the account. There is, for example: a) Nonpayment when there is no history of late or missed payments; b) A material increase in the use of available credit; c) A material change in purchasing or spending patterns; or d) A material change in electronic fund transfer patterns in connection with a deposit account. 3. A covered account that has been inactive for a reasonably lengthy period of time is used (taking into consideration the type of account, the expected pattern of usage and other relevant factors). 4. Mail sent to the customer is returned repeatedly as undeliverable although transactions continue to be conducted in connection with the customer s covered account. 5. [RIA] is notified that the customer is not receiving paper account statements. 6. [RIA] is notified of unauthorized charges or transactions in connection with a customer s covered account. Notice from customers, victims of identity theft, law enforcement authorities, or other persons regarding possible identity theft in connection with covered accounts held by [RIA]. 1. [RIA] is notified by a customer, a victim of identity theft, a law enforcement authority, or any other person that it has opened a fraudulent account for a person engaged in identity theft. Page 7 of 7