Red Flags Rule An Introduction County College of Morris

Slides:



Advertisements
Similar presentations
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Advertisements

Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
WELCOME Iowa State University Identity Theft Prevention Program
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
Springfield Technical Community College Security Awareness Training.
Protecting Personal Information Guidance for Business.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Identity Theft Prevention Program Fighting Fraud at The University of Montana Red Flags Rules.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
Detecting, Preventing, and Mitigating Identity Theft
General Awareness Training
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Copyright 2007, Integrated Compliance Solutions, LLC FACT Act Red Flags Bank Compliance Association of Connecticut September 3, 2008 Copyright 2007, Integrated.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Protection of CONSUMER information
Florida Information Protection Act of 2014 (FIPA)
HIPPA/HITECH Act Requirements Under the Business Associate Agreement Between CNI and Military Health Services.
UGA Extension Credit Card Processing Training
Florida Information Protection Act of 2014 (FIPA)
University of St. Thomas
Chapter 3: IRS and FTC Data Security Rules
Red Flag Rules: Identity Theft Protection.
Protecting Personal Information Guidance for Business.
DATA BREACHES & PRIVACY Christine M
RECORDS AND INFORMATION
Red Flag Review and Updates
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
Data Security Julie D. Wilson Sr
HQ Expectations of DOE Site IRBs
FACT Act Training for Staff Identity Theft “Red Flags”
Colorado “Protections For Consumer Data Privacy” Law
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Red Flags Rule An Introduction County College of Morris

What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed to detect the warning signs – “red flags” – of identity theft in day-to-day operations, take steps to prevent the crime, and mitigate the damage it inflicts Enforced by the Federal Trade Commission (FTC)

How have we responded at CCM? The Board of Trustees approved policy 2.2018 “Identity Theft Prevention Program” on November 17, 2010. A document “Measures for Identity Theft Prevention” has been developed. Training program has been developed and is being made available beginning March 2011.

Related Definitions “Identity theft” – fraud committed or attempted using the identifying information of another person without authority. “Red flag” – a pattern, practice, or specific activity that indicates the possible existence of identity theft. “Covered account” An account that the college offers or maintains that involves or is designed to permit multiple payments or transactions for students, faculty, and/or staff Any other account or database that the college offers or maintains for which there is a reasonably foreseeable risk of identity theft to its students, faculty, staff, constituents or customers. “Identifying information” – any name or number that may be used, alone or in conjunction with any other information, to identify a specific person. “Service Provider” – a person or business entity that provides a service directly to the College.

What is required? IDENTIFY – Identify relevant red flags DETECT – Detect red flags RESPOND – Prevent and mitigate identity theft REPORT – Report attempts of identity theft REVIEW – Monitor and update compliance

Indicators to IDENTIFY Red Flags Notifications and warnings from third-party agencies (e.g. credit agency, law enforcement) Suspicious documents (e.g. apparent forgeries, altered documents, physical description or photo does not match person presenting documentation) Suspicious identification (e.g. inconsistent statements such as birth dates) Unusual use of account (e.g. sudden change in password or mailing address, returned mail, breach in computer security)

How to DETECT Red Flags Require identifying information before providing access to records online, over the phone, or in person. Verify identity of student/ employee in person when possible. Verify significant changes in a student/ employee account with the account holder. If any of the identifying information appears suspicious you may have detected a red flag.

How to RESPOND to Red Flags Once detected, take one or more of the following steps depending upon the severity in order to prevent and mitigate identity theft: Alert your supervisor and coordinate a response/notification to the appropriate department of origin for the record/ account. Contact the individual (student, applicant, employee, donor, etc). Change any passwords, security codes or other security devises that permit/prohibit access to the account. Do not open a new account for the individual until the red flag has been cleared. Continue to monitor the account for evidence of identity theft. Determine no response is warranted under the particular circumstance.

How to RESPOND to Red Flags (continued) IN ALL CASES notify one of the following officials in writing (and copy Program Administrator – Director of Budget and Compliance): Registrar – for student account issues Bursar – for student financial account issues Director of Admissions – for admission issues Director of Financial Aid – for student financial aid issues

How to RESPOND to Red Flags (continued) IN ALL CASES notify one of the following officials in writing (and copy Program Administrator – Director of Budget and Compliance): Executive Director of Information Systems – for college data issues Director of Human Resources – for employee account issues Executive Director for Advancement & Planning – for donor related issues Vice President for Business & Finance – for vendor and other customer related issues

How to REPORT incidents if identity theft Manager/director of the office for which the discovery was made shall complete and submit to the Program Administrator the Identity Theft Detection form.

REVIEW Your Current Procedures/ Practices Secure documents that contain identifying or protected information. Avoid the use of social security number as an identifier and limit access to Social Security numbers to employees approved by the Program Administrator. Ensure that your departmental website, or related portal, is secure through consultation with the Information Systems Department. Follow college policies and procedures for data security. Ensure complete and secure destruction of documents and computer files containing account information in accordance with the college’s record retention policies and procedures. Ensure that all college systems and computers are password protected and virus definitions and protections are up-to-date.

REVIEW Your Current Procedures/ Practices (continued) Sensitive data should not be distributed via email or stored on external drives (USB, Thumb, Flash, etc.). Sensitive data stored on portable computing devices and storage media must be encrypted. Personally owned drives and devices should never be used to store sensitive institutional data. Require and keep only information that is necessary for your business purpose. Share this information with employees new to your department and third-party service providers.

The County College of Morris. The protection of student/ employee information is the job of every employee at The County College of Morris. These procedures set the minimum requirements for an effective college response. Departments are encouraged to adopt more specific rules/ procedures/ protections to assist in the implementation of these measures.

Questions