Oregon DMV Fraud Prevention Program Tom McClellan, DMV Administrator.

Slides:



Advertisements
Similar presentations
MONITORING OF SUBGRANTEES
Advertisements

Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Effective Contract Management Planning
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Red Flag Rules: What they are? & What you need to do
Environmental Management System Implementation
1 Auditing in the Public Interest Records Management in the Victorian Public Sector Audit objective Audit had two objectives : The first objective was.
Control and Accounting Information Systems
Hazard Prevention Program
Protecting Personal Information Guidance for Business.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Auditing Computer-Based Information Systems
California Integrated Waste Management Board Agreement with Air Resources Board for Surveillance Assistance Special Waste Committee Meeting May 10, 2006.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Center for Health Care Quality Licensing & Certification Program Evaluation 1 August 2014 rev.
Purpose of the Standards
Network security policy: best practices
BRIEFING TO THE PORTFOLIO COMMITTEE ON THE DPSA’S RISK MANAGEMENT STRATEGY PRESENTATION TO THE PORTFOLIO COMMITTEE 12 MAY
SAS 112: The New Auditing Standard Jim Corkill Controller Accounting Services & Controls.
 Voter ID Laws GROUP 24 Joyce Anderson, Douglas Grant Caitlyn Smith, & Alice Willis.
Safety Management Strategies for Extended Care Facilities.
Internal Auditing and Outsourcing
Hazard Identification
DMV’s Service Transformation Program AASHTO Auditor’s Conference Tom McClellan, DMV Administrator and Dawn Farr, Interim STP Lead Oregon Department of.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
9 Closing the Project Teaching Strategies
An Educational Computer Based Training Program CBTCBT.
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Module 2.1 Finance and Administration Cabinet Organizational Changes and Agency Impact March
2015 ANNUAL TRAINING By: Denise Goff
Course: European Criminal Law SS 2009 Hubert Hinterhofer.
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
AUDITOR-GENERAL Presentation to the Public Service and Administration Portfolio Committee on the appointment and utilisation of consultants Report of the.
Department of Human Services
© 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
Avoid Disputes, Not Complaints Presented by: Stuart Ayres and Derek Pullen Stuart Ayres, Scheme Manager Derek Pullen, Scheme Adjudicator.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Continuous Auditing at Unibanco Washington Lopes
UMBC POLICY ON ESH MANAGEMENT & ENFORCEMENT UMBC Policy #VI
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
Quentis Scott IT Specialist - Section 508 Coordinator General Services Administration Office of the Chief Information Officer Washington, D.C. Developing.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Chapter 3-Auditing Computer-based Information Systems.
1 Identity Theft Prevention and the Red Flag Rules.
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Protection of CONSUMER information
Internal Controls.
GDPR - New Data Protection Regulation
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
Government Data Practices & Open Meeting Law Overview
Internal Audit Who? What? When? How? Why? In brief . . .
Internal Audit’s Role in Preventing Fraud and Corruption
Internal Controls.
SPOT CHECKS 2016.
Internal Controls.
Presentation transcript:

Oregon DMV Fraud Prevention Program Tom McClellan, DMV Administrator

 Background ◦ Program created in 2004 ◦ Collective efforts to prevent, detect and investigate incidents of DMV-related fraud ◦ Everyone at Oregon DMV plays a role

Goal: ◦ Prevent incidents of DMV-related fraud Objectives: ◦ Develop fraud related policies and procedures ◦ Increase understanding of how DMV processes may unintentionally contribute to fraud ◦ Improve fraud prevention, detection and investigation through manager and employee training ◦ Partner with law enforcement to investigate incidents of DMV-related fraud

 Proactive prevention and detection will guide planning, policy formation and service delivery  Impacts to customer service and operational efficiency will be considered when responding to fraud related risks  Policies and procedures will be comprehensive and comply with applicable state and federal laws/rules  Program will continue to change and adapt to new requirements as the nature of fraud activity evolves  Fraud Prevention Section will support and not replace DMV managers’ responsibilities

 Purpose: FPS facilitates and supports the agency’s Fraud Prevention Program  Staff: Manager, Program Coordinator, Office Assistant, Fraud Examiner, Investigators (non-sworn)  Staff Responsibilities: ◦ Evaluate Fraud Prevention Program effectiveness ◦ Conduct risk assessments - DMV work processes and systems ◦ Investigate incidents of DMV-related fraud ◦ Develop fraud-related policies for DMV Management Team approval ◦ Serve on implementation teams to identify fraud related impacts to new systems and work processes

Fraud Investigation TypesNumber of Investigations Facial Recognition System (FRS)319 * It’s Not Me100 Vehicle Title and Registration104 DL/ID Fraud59 Internal Fraud3 Multiple Categories10 “Other”3 Bribery1 CDL Fraud1 TOTAL : 600 * FRS Cases: 1,087 since September ‘08

 Policy Statement ◦ Comply with state and department policies and procedures ◦ Take appropriate administrative action against employees ◦ Involve law enforcement when appropriate  Purpose ◦ Provide guidance to managers in responding to internal fraud  Guidelines/Philosophy ◦ Share information with only those who have a need to know – discretion is a key principle ◦ Management decides what information is shared with employees at the conclusion of the investigation

 Early Stages of an Investigation ◦ Don’t talk to employees involved ◦ Keep the investigation quiet to avoid alerting suspected employees and to prevent damage to innocent employees ◦ Oregon Department of Justice and law enforcement may be contacted to conduct a criminal investigation, if appropriate  First Stage in Responding ◦ Notify supervisor (Section or Region Manager) ◦ Gather needed information and evaluate the situation ◦ Determine worse-case scenario ◦ Consult with DMV Human Resources Manager & Fraud Prevention Manager, if appropriate

 New Employee Orientation ◦ Fraud Prevention Program Brochure ◦ Data Breach Policy  Fraud Prevention Newsletter  FEWS Alerts  Management Team Meetings & Briefings

 Small Field Offices ◦ Scope:  Observe work processes  Review policies and procedures ◦ Risks/Recommendations:  Identified 39 risks and made 27 recommendations  Automate posting of knowledge test scores  Regularly rotate employees between field offices  Conduct unannounced audits by region managers  Install video cameras  Replace bank deposit bags

 Social Security Numbers ◦ Scope:  Employee use of SSN to complete customer transactions  Observe work processes  Review policies and procedures ◦ Risks/Recommendations:  Identified 17 risks and made 37 recommendations  Remove SSN field from forms when not required  Secure access to Microfilm Unit  Remove SSN from reports when not required  Display truncated version on computer screens (last four digits)

 Investigatory Tools ◦ FastData Skip Tracing Tool ◦ Oregon Judicial Information Network (OJIN) ◦ Facebook & Internet ◦ Law Enforcement Data System (LEDS) ◦ ACL Data Mining Software  Prevention & Detection Methods ◦ Establish a “perception of detection” ◦ Conduct unannounced field office audits ◦ Require separation of duties whenever practical

 Manager reports suspected breach ◦ Intranet-based form is available  After verifying an actual breach, DMV Record Services notifies all affected customers in writing ◦ Recommend customers monitor financial accounts and obtain copy of credit report ◦ Customer may place freeze on credit files ◦ Special DMV phone number is provided to customers impacted by data breach

 Skimming Schemes ◦ Late Title Presentation Fees ◦ Replacement License Fees  Driver License Fraud Scheme ◦ Collusion with external parties to provide driver licenses to undocumented immigrants

 FRS Investigations ◦ Case files delivered to DOJ investigators weekly  Federal investigations – SSA & U.S. Department of State  Internal/external fraud investigations ◦ Good response to requests for assistance  DMV/LE Coordinating Committee ◦ Quarterly meetings to discuss topics of mutual interest

 Evaluate DMV Fraud Prevention Program ◦ Assess progress toward program objectives ◦ Address issues identified ◦ Consider recommendations to improve