Identity Theft Prevention Program Training

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
WELCOME Iowa State University Identity Theft Prevention Program
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
Springfield Technical Community College Security Awareness Training.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Identity Theft Prevention Program Fighting Fraud at The University of Montana Red Flags Rules.
The New Rules of F&I with Peter Jones The New Rules of F&I What are the Rules? Red Flag Rule Graham / Leach / Bliley Act Privacy Notice Safeguard Rule.
Presented By Drexel and FMFCU.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
©2012 CliftonLarsonAllen LLP Red Flags- Why This Matters to You An overview of the FACT Act Identity Theft Red Flag Rule and its current impact.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
What You Need to Know Customer Service 1 08/09/2012.
Detecting, Preventing, and Mitigating Identity Theft
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
FAIR CREDIT REPORTING ACT.  Serves the following principal purposes:  To regulate the consumer-reporting industry.  To prohibit unfair actions from.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
Identity Theft How bad people get good credit. Lindsey Bertugli.
UNC Asheville Red Flag Rule and NC Identity Protection Act Information.
Lesson 10A: The Three D’s of Identify Theft
University of St. Thomas
Red Flag Rules: Identity Theft Protection.
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
FACT Act Training for Staff Identity Theft “Red Flags”
Protecting Yourself from Fraud including Identity Theft
Colorado “Protections For Consumer Data Privacy” Law
Getting the Green Light on the Red Flags Rule
Identity Theft and Credit Safety
Presentation transcript:

Identity Theft Prevention Program Training Red Flags Rule Identity Theft Prevention Program Training Developed in part based on materials published or provided by the Federal Trade Commission (FTC) and National Association of College and University Business Officers (NACUBO)

Purpose Establish processes that: Identify Red Flags for new and existing Covered Accounts Detect Red Flags Respond appropriately to any Red Flags to prevent and mitigate Identity Theft Ensure the program is updated periodically

Definitions “Identity Theft” is a “fraud committed or attempted using the identifying information of another person without authority.” A “Red Flag” is a “pattern, practice, or specific activity that indicates the possible existence of Identity Theft.” A “Covered Account” is any consumer account used for personal purposes that involves multiple payments transactions or one offered or maintained that has a reasonable risk of identity theft as determined by the University.

Definitions (cont.) “Program Administrator” is the individual designated with primary responsibility for oversight of the program. This is the Vice President for Finance and Administration. “Identifying information” is any name or number that may be used, alone or in conjunction with any other information, to identify a specific person, including name, address, telephone number, social security number, date of birth, government issued driver’s license or identification number, alien registration number, government passport number, employer or taxpayer identification number, student identification number (UCA ID), computer’s Internet Protocol (IP) address, or routing code.

Red Flag Identification Notifications and Warnings from Credit Reporting Agencies (Experian, Equifax, TransUnion) Suspicious Documents Suspicious Personal Identifying Information Suspicious Covered Account Activity or Unusual Use of Account Alerts from Others

Red Flag Identification Examples A student requests information from Student Accounts and provides an ID that does not resemble the student. Financial Aid mails correspondence to the student’s address on file and it is returned as undeliverable multiple times. A student notifies Student Accounts an expected financial aid refund was not received. Student Accounts notices the direct deposit information was recently changed.

Detecting Red Flags Areas of Concern and Action Student Enrollment Require identifying information and verify student’s identity Existing Accounts Verify identity & validity of requests for account changes Consumer (“Credit”) Report Requests Require written verification that the address provided is accurate at the time of a request

Preventing and Mitigating Identity Theft If a Red Flag is detected, take one of more of the following steps as necessary: Continue to monitor the account(s) Contact the student or applicant Change passwords or other security measures that permit access to Covered Accounts Do not open a new Covered Account Provide the student with a new ID number Notify the Program Administrator Notify Law Enforcement File or assist in filing a Suspicious Activities Report (“SAR”) Determine that no response is needed

Preventing and Mitigating Identity Theft To prevent the likelihood of Identity Theft, UCA will: Ensure that its website is secure and provide notice if it is not secure Ensure paper documents and computer files are discarded in accordance with UCA’s Document Retention Guidelines Ensure that office computers are password protected Avoid use of social security numbers when possible Ensure computer virus protection is up to date Require and keep only student information considered necessary

Non–disclosure of Specific Practices For the effectiveness of the Program: Knowledge about specific Red Flag identification, detection, mitigation, and prevention practices may be limited to the Program Administrator and those employees with a need to know them, and Any documents produced in order to develop or implement this Program are considered “confidential” and should not be shared with other UCA employees or the public unless required by the Arkansas Freedom of Information Act.

The Most Important Element of the Program: YOU! By detecting “Red Flags” associated with identity theft, you can do your part to help prevent it Remember to request and verify all required information Thank you for keeping our students’ information safe!

Sources Educause®; ID Theft Red Flags. https://library.educause.edu/topics/policy-and-law/id-theft-red-flags. Published September 23, 2008. Accessed April 23, 2018. Federal Trade Commission; Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business. https://www.ftc.gov/tips-advice/business-center/guidance/fighting-identity-theft-red-flags-rule-how-guide-business. Published May 2013. Accessed June 11, 2018. National Association of College and University Business Officers; FTC Red Flags Rule. https://www.nacubo.org/Topics/Other-Business-Areas/Privacy-Intellectual-Property/FTC-Red-Flags-Rule. Published November 28, 2011. Accessed May 31, 2018.