UNC Asheville Red Flag Rule and NC Identity Protection Act Information.

Slides:



Advertisements
Similar presentations
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
Advertisements

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
Protecting Personal Information Guidance for Business.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Identity Theft Prevention Program Fighting Fraud at The University of Montana Red Flags Rules.
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
©2012 CliftonLarsonAllen LLP Red Flags- Why This Matters to You An overview of the FACT Act Identity Theft Red Flag Rule and its current impact.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
© Chery F. Kendrick & Kendrick Technical Services.
Red Flag Rule User Training
What You Need to Know Customer Service 1 08/09/2012.
Detecting, Preventing, and Mitigating Identity Theft
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
House Committee on Business and Industry House Bill Implementation of Closed Account Notification System Texas Department of Banking April 22, 2008.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Chapter 9-Section 1 Resolving Credit Problems. Disputing Charges—Credit Card Statement  Disputing Charges—the process of informing a credit card company.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
CHAPTER 9 CREDIT PROBLEMS AND LAWS LESSON 9-1: RESOLVING CREDIT PROBLEMS Learning Goals -Explain how to dispute errors on billing statements and list ways.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
UW Whitewater Procurement Card Program. Overview The purpose of UW-Whitewater Procurement Card Program is to establish a more efficient, cost- effective.
Protecting Your Assets By Preventing Identity Theft
Protecting Your Credit Identity
UW Whitewater Procurement Card Program
University of St. Thomas
Red Flag Rules: Identity Theft Protection.
Protecting Personal Information Guidance for Business.
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Procurement Card Program
Clemson University Red Flags Rule Training
Your Credit and the Law Chapter 27 5/24/2019.
FACT Act Training for Staff Identity Theft “Red Flags”
Colorado “Protections For Consumer Data Privacy” Law
Getting the Green Light on the Red Flags Rule
Presentation transcript:

UNC Asheville Red Flag Rule and NC Identity Protection Act Information

Why Should UNC Asheville be Concerned? The Federal Trade Commission (FTC) regulates financial transactions at UNC Asheville The FTC has defined UNC Asheville as a creditor. The FTC has determined that all creditors must comply with the Red Flags regulation and by law must train certain respective employees that could come in contact with a “Red Flag”.

What Should I Learn? Knowledge of what is a Red Flag Knowledge of what is a “covered account” Knowledge of the different types of Red Flags and how they can present themselves Knowledge of what to look for and where to look in detecting a Red Flag Knowledge of what process to follow in case you should detect a Red Flag Knowledge of whom to contact

What is a Red Flag? In simple terms, a Red Flag is an indication or warning that a fraudulent transaction or event could be occurring as a result of identity theft.

Why is This Information Important? Identity thieves use personal identifying information to open new accounts and misuse existing accounts, creating havoc and fraud, costing consumers and businesses billions of dollars every year. Even though we continually put safeguards in place to prevent ID theft, criminals are becoming more sophisticated and educated every day in obtaining this information fraudulently. The Red Flag regulation is designed to assist in detecting when ID theft might be happening and reduce its consequences. The Federal Government requires us to comply with this regulation.

What Does the FTC (Federal Trade Commission) Require? According to the FTC, by law, we must be able to do the following: Identify areas of exposure to ID theft and what types of events within those areas could be interpreted as Red Flags (i.e. what to look for) Detect when these Red Flag indicators might be present Reduce the exposure of financial or personal loss to the University and to the customer who might have been a victim of ID theft by investigating the detected Red Flags for actual fraud and responding quickly and appropriately if fraud does indeed exist Train our employees on how to accomplish all of this

The FTC - UNC Asheville - Covered Accounts How Is It All Related? The Federal Trade Commission’s Red Flag Rules apply to UNC Asheville. UNC Asheville must identify “Covered Accounts” as outlined in the FTC’s Red Flag Rule UNC Asheville must implement a written Identity Theft Prevention Program designed to detect the warning signs — or "red flags" — of identity theft in their day-to-day operations

What is a “Covered Account”? A “covered account” is a customer account that has been identified as having the possibility of a Red Flag occurrence and must be monitored for the detection of a Red Flag. There are 2 types of covered accounts. The first type deals with individuals. Any account that allows an individual to pay for a service or product over time with multiple payments is considered a covered account. An example is an extended payment schedule for tuition costs. The second type deals with any customer account that allows small businesses or individuals to purchase products or services that are not paid in full at the time of the service or sale. These accounts could be considered covered accounts, depending upon the overall risk factors involved.

UNC Asheville Covered Accounts The following are possible university “covered accounts”: Student Accounts The Campus OneCard Short Term Student Loans

What Types of Data Do Identity Thieves Want? Address Telephone number Social Security number Date of Birth Government issued driver’s license or identification number Alien registration number Government passport number Employer or taxpayer identification number Individual identification number Computer’s Internet Protocol address Bank or other financial account routing code Student identification number issued by the University So we need to pay attention to them…..

How Should We Be on the Lookout? Red Flags may indicate that identity theft has occurred and fraud could be in progress. Red Flags come in 5 CATEGORIES NOTIFICATIONS AND WARNINGS FROM CONSUMER REPORTING AGENCIES SUSPICIOUS DOCUMENTS SUSPICIOUS PERSONAL IDENTIFYING INFORMATION SUSPICIOUS COVERED ACCOUNT ACTIVITY ALERTS FROM OTHERS

Notifications and Warnings from Consumer Reporting Agencies Examples: A fraud alert has been included with a consumer credit report from a credit bureau A notice of a credit freeze has been provided in response to a request for a consumer credit report from a credit bureau A consumer credit bureau provides a notice of address discrepancy A consumer credit bureau reports unusual credit activity, such as an increased number of accounts or inquiries

Suspicious Documents Examples: Documents provided for identification that appear to be altered or forged Photograph on ID does not match the appearance of the individual or does not look like the individual Information on ID does not match the information provided by the person opening the account Application appearing forged, altered, or destroyed and reassembled

Suspicious Personal Identifying Information Examples: Information on an ID does not match any address in the consumer report The Social Security number has not been issued or appears on the Social Security Administration's Death Master File (a file of information associated with Social Security numbers of those who are deceased) There is a lack of correlation between the Social Security number provided and the range for the date of birth Personal identifying information that is provided is associated with known fraud activity

More Suspicious Personal Identifying Information More Examples: A suspicious address is supplied, such as a mail drop or prison A duplicate Social Security number is provided that matches one submitted by another person opening an account or another customer with an existing account Duplicate addresses or phone numbers that match others are supplied by a large number of applicants

More Suspicious Personal Identifying Information General Examples: The person opening the account is unable to supply identifying information when told that the application is incomplete The applicant’s personal information is inconsistent with information already on file The person opening an account or an existing customer is unable to correctly answer challenge questions

Suspicious Covered Account Activity Examples: Shortly after a change of address on an account, you receive a request for additional users of the account You notice a drastic change in payment patterns, use of available credit, or spending patterns on an account You notice that an account that has been inactive for a long time suddenly has lots of unusual activity

More Suspicious Covered Account Activity More Examples: You notice that mail that has been sent to a customer is repeatedly returned as undeliverable despite transactions continuing to occur on the account You are notified that a customer is not receiving his/her account statements You are notified of unauthorized charges or transactions on a customer's account

Alerts from Others Example: You receive some notification from a third party (such as law enforcement, an attorney, a credit bureau) that there is a fraudulent account being used at the University by a person engaged in identity theft

Where Can Red Flags be Detected? The opening of a customer account, such as a student long term or short term loan, or the activation of a new OneCard The ongoing monitoring of one of these customer accounts for suspicious activities General correspondence with a customer - written or verbal Information received from Credit Agencies or Credit Bureaus that might lead you to be suspicious that there could be an identity theft problem

Detection From General Correspondence All correspondence, written or verbal, both to and from a customer, vendor, or supplier, could indicate a Red Flag and possible ID fraud. The following are examples of such correspondence: Mail sent to a customer/vendor/supplier is repeatedly returned as undeliverable despite ongoing transactions on an active account. You are notified that a customer/vendor/supplier is not receiving account statements or payments. You are notified of unauthorized charges, transactions, or modifications on customer/vendor/supplier accounts. You are notified that a fraudulent account for a person engaged in identity theft has been opened at the University.

Risks of Third Party Contracts All managers/supervisors must exercise appropriate and effective oversight of service provider or third party arrangements. There are certain service providers who may be the only ones that are able to detect Red Flags. Examples are debt collectors that may be hired to contact customers for outstanding debts. Another example could be an agency that collects payments for the University. These types of service providers must have a defined and implemented Red Flag Program and must certify as such to the University via the contract agreement. Examples within the University of such service providers may include, but are not limited to: Student Loan Management Extended Tuition Payment Services Credit Checks

How Can I Help Detect Red Flags? Verify identities when opening customer accounts or performing customer transactions Monitor ongoing transactions of customer accounts, such as OneCard transactions Verify the validity of any change to address or bank routing information or other relevant information to a customer account Watch for credit bureau report warnings Be aware – identity fraud is all around us

What Should I Do? You need to act quickly First, consult your University business and departmental procedures for individual departmental instructions or guidance Gather all related information and documentation associated with the situation Escalate to a supervisor or manager if your investigation does not eliminate the possibility that a fraud or ID theft may be occurring If your investigation determines that the Red Flag is triggered by a normal and usual customer request or a general mistake, no action may be necessary –other than correcting the item in question.

What Happens Next? You or your Supervisor report the potential issue using an to if the situation cannot be resolved, or if it is determined that a possible fraud or ID theft may be The issue will be reviewed by the Program Administrator, who is responsible for the operation of the University Red Flag Program Others on the Red Flag Committee or Technical Experts will be consulted as needed If it is determined that a fraud or ID theft has actually been detected, then the owner of any compromised account MUST be notified by the Program Administrator

And Then? Subsequent actions by the Program Administrator may include: Notifying in writing the original customer/vendor/supplier/student of all ongoing investigations and outcomes Notifying proper government or law enforcement entities and utilizing such for an ongoing investigation Taking all actions required by law in handling a fraudulent account as defined by the FTC, the University, and any local, state, or federal laws Maintaining all incident reports and pertinent information for reporting purposes and future references

Help Us Protect Identity If you believe that there are other accounts that could qualify as covered accounts and should be included in the Red Flag Program, please contact the Program Administrator or any member of the Red Flag Rules Committee. Contact information is located within the Contact and References section of this training module.

Contacts UNC Asheville Identity Theft Prevention Program Red Flag Committee Suzanne Bryson – AVC Finance, Program Administrator Mary Hall – Controller Jeff Brown – Chief Information Officer Adam Reagan – Associate Chief Information Officer Monique Taylor – Internal Audit Director (Advisory Capacity)

References UNC Asheville Identity Theft Prevention Program ( ram.pdf( ram.pdf) NC Identity Theft Prevention Act ( FTC Red Flag General Information ( FTC 16 CFR Part 313 -Gramm-Leach-Bliley Act -Privacy ( FTC 16 CFR Part 314 -Gramm-Leach-Bliley Act –Safeguarding Customer Information ( FTC 16 CFR Part 681 -Identity Theft Rules (