NCUA LETTER TO CREDIT UNIONS



Similar documents
NCUA LETTER TO CREDIT UNIONS

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

IDENTITY THEFT RESOURCE KIT

Dear Concerned Consumer,

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Financial Crime Report

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

Reclaiming your identity

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

NCUA LETTER TO CREDIT UNIONS

Citi Identity Theft Solutions

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:

Red Flags Identity Theft Training Program. Fall 2015

Identity Theft: Your Good Name Gone Bad!

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen

31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003,

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

Red Flag Identity Theft Financial Policy 1.10

MCPHS IDENTITY THEFT POLICY

Identity Theft Victim Guide

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

Identity Theft. Emergency Repair Kit

Detecting, Preventing, and Mitigating Identity Theft

Identity Theft Victim Checklist

Identity Theft/Credit Fraud Kit

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority

How to Dispute Credit Report Errors

Responding to New Identity Theft Laws

Identity Theft Victim Checklist

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

KANSAS STATE UNIVERISTY

This policy applies to all GPC units that process, transmit, or handle cardholder information in a physical or electronic format.

ARE YOU A VICTIM OF AN IDENTITY CRIME?

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

What is Identity Theft?

Credit Reports and How to Dispute Credit Report Errors

NCUA LETTER TO CREDIT UNIONS

NCUA LETTER TO CREDIT UNIONS

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

Identity Theft Prevention Program

College of DuPage Information Technology. Information Security Plan

TOURO UNIVERSITY WORLDWIDE AND TOURO COLLEGE LOS ANGELES IDENTITY THEFT PREVENTION POLICY 1.0 POLICY/PROCEDURE 2.0 PURPOSE 3.0 SCOPE 4.

HIPAA and Privacy Policy Training

Protect Yourself From Identity Theft

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and

How to Dispute Credit Report Errors Y

KCSO IDENTITY THEFT KIT

Pasco County Sheriff's Office Economic Crime Unit. Identity Theft Guide

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

BERKELEY COLLEGE DATA SECURITY POLICY

Information to Protect Our Customers From Identity Theft

David Coble Internal Control Officer

EL/Civics Lesson Plan

Disputing Errors on Credit Reports

York County Sheriff's Office Identity Theft Victim s Packet

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information

Identity Theft Repair Kit

Transcription:

NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: May 2000 LETTER NO.: 00-CU-02 TO: SUBJ: All Credit Unions Identity Theft Prevention The purpose of this advisory is to bring to your attention the rising occurrence of identity theft in the financial marketplace. Identity theft occurs when someone hijacks a consumer s personal identifying information, such as their name, address, credit card or social security number, and uses the data to open new charge accounts, order merchandise, or borrow money. Many consumers have been victimized by identity theft already and the number of victims is rising exponentially. Congress addressed this concern with the passage of the Identity Theft and Assumption Deterrence Act of 1998. This act supplements existing laws that criminalize fraud by specifically addressing misappropriation of another s identity for criminal purposes. The Federal Trade Commission (FTC), the Federal agency that investigates and concerns itself with such threats to consumers, is calling for increased private and public efforts to combat this crime. They have taken the lead in coordinating the efforts of government agencies and organizations to develop and disseminate comprehensive consumer education materials for victims of identity theft, and those concerned with preventing identity theft. The National Credit Union Administration (NCUA) recently participated in an FTC sponsored National Summit on Identity Theft. I have enclosed information, from that event, on preventative measures that may help protect your members from identity theft. Please also be aware that if you suspect an illicit attempt to obtain information concerning a member s identity, you should report the matter to the appropriate authorities and file a Suspicious Activity Report (SAR). If you encounter victims of identity theft, refer them to the FTC Consumer Response Center at 1-877-FTC- HELP, for assistance in addressing their problems.

We encourage credit unions to proactively protect their members when dealing with information in commerce. Sensitivity to privacy and identity theft protection is a good business strategy. Sincerely, /s/ Norman E. D Amours Chairman National Credit Union Administration Board Enclosure

Enclosure IDENTITY THEFT PREVENTION Best Practices These best practice suggestions offer guidance based on experience from actual identity theft. Not all of these suggestions will work for your credit union. Evaluate each suggestion and balance the privacy protection risk with the credit union s resources and products to develop privacy protection strategies and policies that are right for your credit union. Develop a comprehensive written privacy protection policy that includes responsible information handling practices. The privacy policy should address privacy and information handling for all the sensitive data held by the credit union, including data gathered from a website. The policy should cover all staff and officials of the credit union and their dealings with persons outside the credit union. It is beyond the scope of this Letter to provide comprehensive information on security and privacy strategies. However, we have appended some informational websites from experts in the field and encourage you to investigate further at libraries and technical bookstores. Display your credit union s Privacy Protection Policy in your literature and on your website. All staff, including credit union volunteers, should be trained on the credit union s security measures and privacy protection policies. Review and update the policies routinely and provide follow-up training. Even temporary and part-time employees, independent consultants, and vendors should have information on, and be subject to, the written policies. Conduct criminal and civil background checks before hiring employees who will have access to sensitive personal information. This includes screening services and temporary firms that the credit union uses, such as after hours cleaning companies. Limit the credit union s data collection to the information that is necessary for the stated purpose, and nothing more. Limit data disclosure. Restrict the addition of unnecessary data on printed documents. For example, social security numbers printed on documents such as pay or loan distribution checks, parking permits, staff badges, time sheets, mailing labels, account statements, etc.

Prohibit using birth dates, social security, or driver s license numbers as account or personal identifier numbers. Restrict sensitive personal data to only those who have a legitimate need to know. Implement electronic audit trails and impose strict penalties for browsing and illegitimate access. Conduct better identity verification for instant credit, especially when an address is recently changed or is different from the credit report. Don t rely solely on social security numbers. Supplement with utility bills, tax records, etc. Train your staff to recognize and address incidents in which identify thieves use persuasive social engineering skills to obtain necessary pieces of information to enable them to complete identify theft. Put photographs on credit cards and staff business cards. Truncate digits on account numbers printed on transactions slips at point of sale terminals. Use account profiling systems to detect unusual activity. Notify members of potential fraudulent activity. Avoid mass mailing pre-approved offers of credit. Keep all information about employees locked in cabinets or encrypted data files. Establish data security procedures for those with legitimate access to the files. Encrypt sensitive personal and confidential information. Conduct systems penetration tests to determine if systems are hacker proof. Ensure the credit union protects itself from business identity theft, such as mimic websites that entice your members to believe they are interacting online with the credit union. Adopt secure methods of disposing of sensitive personal information. Consider industrial shredders, locked garbage bins, etc. If disposal is outsourced, assure such companies have strict security procedures. Consider shredding software to delete confidential information from electronic data files. Train designated staff about security procedures in sending sensitive personal information via fax. Such faxes should have a confidential cover

letter (prohibiting re-disclosure), and the recipient should be called before sending, and called after, to confirm receipt. Prohibit the transmission of sensitive personal information by voicemail, cellular phones, pagers, answering machines, or e-mail, unless encrypted or sent via a secure network. None of these means of transmission is private or secure. Train customer service or fraud department staff how to work with identity theft victims. By helping the victim clear their record, you will limit your legal exposure to the victim. Don t share, sell, or transmit data about members without their permission. Guarding that information will limit your legal exposure if that information subjects your member to identity theft. Allow your members to inspect and correct their personal information. This practice will not only increase member s trust in your information handling practices, it will improve the accuracy of your files. Take every opportunity to become informed about financial fraud and identity theft. Join a local financial crimes group. Your local police or sheriff s department can inform you of such groups. Relevant Publications Identity Theft: What to Do if it Happens to You Available at: www.pirg.org. Identity Theft: When Bad Things Happen to Your Good Name Available at: www.consumer.gov/idtheft. Websites That Provide Further Guidance and Information Federal Trade Commission - www.consumer.gov/idtheft and www.ftc.gov U.S. PIRG and CALPIRG - www.pirg.org Privacy Rights Clearing House www.privacyrights.org Identity Theft Survival Kit www.identitytheft.org Better Business Bureau www.bbbonline.org