Compliance with Federal Trade Commission’s “Red Flag Rule”

Slides:



Advertisements
Similar presentations
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Advertisements

Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
WELCOME Iowa State University Identity Theft Prevention Program
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
© Chery F. Kendrick & Kendrick Technical Services.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Detecting, Preventing, and Mitigating Identity Theft
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Protecting Yourself Against Identity Theft By Sierra Monif Next.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Identity Theft.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Presented By Plano Police Department Crime Prevention Unit.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
University of St. Thomas
When you get caught for Identity Theft
Protecting Your Credit
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
FACT Act Training for Staff Identity Theft “Red Flags”
Getting the Green Light on the Red Flags Rule
Identity Theft and Credit Safety
Presentation transcript:

Compliance with Federal Trade Commission’s “Red Flag Rule”

Background Identify Theft is one of the fastest growing areas of white collar crime U.S. Congress passed Fair and Accurate Credit Transactions of 2003 (FACT Act) Act charged Federal Trade Commission (FTC) to address identity theft FTC issued “Red Flags Rules”

Primarily designed for banks and financial institutions Red Flags Rules requires “financial institutions” and “creditors” that hold “covered accounts” to develop and implement “an identity theft prevention program”

Why Lehigh? We meet the criteria because of loan programs, installment payment plans, use of credit reports. For example: ◦Federal Perkins Loans ◦University Loans ◦Bursar’s Office Installment Payment Plans ◦Lehigh credit and/or background checks

University systems maintain and communicate confidential personal information, consider for example: W-2’s 1098-T’s Loan Notes Offer Letters Why Lehigh?

Implementation of the Program Board of Trustees has approved Lehigh’s Identity Theft Prevention Program Oversight by Peggy Plympton Training appropriate University staff is part of the program New hires will be trained in coordination with Banner training

Questions to Consider: What’s a common method used to gain information about someone in order to “steal” their identity? What’s a thief’s common strategy to delay someone from discovering their identity has already been stolen?

Answer: Change their address

Why are you being trained? You have access to change addresses in BANNER using one of the following forms: 1. SPAIDEN 2. PPAIDEN 3. FOAIDEN 4. APAIDEN

Lehigh is already “ahead of the curve” The University has already established policies and procedures that include very good controls to safeguard identity and financial information

Purpose of the training To raise your level of awareness To help you maximize the effectiveness of your department’s policies and procedures To make sure your day-to-day practices = your policies and procedures To know what to do if you encounter a red flag

Three Key Rules 1) Debit and credit card issuers must develop policies and procedures to assess validity of a request for change of address 2) Users of consumer reports must develop reasonable policies and procedures to apply when they receive notice of an address discrepancy from a consumer reporting agency 3) Financial institutions and creditors holding “covered accounts” must develop and implement a written identity theft prevention program

How can you help? Identify relevant “red flags” you may encounter Detect those “red flags” Respond appropriately to detected red flags Update the procedures periodically

“Red Flags” that could occur at Lehigh Documents provided for identification appearing altered or forged Photograph on ID inconsistent with appearance of customer Personal information inconsistent with information already on file at Lehigh

More red flags: Mail sent to customer repeatedly returned as undeliverable despite being an active account A fraud alert included with a consumer report A consumer reporting agency providing a notice of address discrepancy

Making an address change Preferred method of making student address changes is for the individual to make his/her own changes via Banner self-service. See Registrar’s Office website for complete instructions

Requests made In-Person Acceptable identity verification: Government issued Picture ID Additional confirming information is required if : Picture ID is issued by non-government organization (ex: employer-issued ID card) OR ID does not include a picture(ex: Social Security Card) NOTE: All requests for change of address must be in writing!

Requests made by Acceptable by Itself: ◦ from a “lehigh.edu” account Additional Confirmation is Required If: ◦ is sent from any other account

Requests by Mail or Fax All such requests must be signed. If any question about validity, take additional steps to confirm, for example: Photocopy of driver’s license Copy of utility bill Send sample mail to address to confirm Phone directory Internet directories

Requests by Phone No address should be changed without having something in writing from the customer. This is for your protection as well as the customer’s.

Red Flags are not Black & White! Before concluding you have an identity theft situation, consider the “big picture”: Did a payment accompany the updated information? How much was the payment? How/who benefited from the payment? Can the individual answer questions only student would know? Have you ever temporarily forgotten some of your personal information?

What to Do If You Suspect Identify Theft Delay opening new account Suspend access to an existing account Attempt to contact customer at the last known legitimate address/phone number If you’ve done the above and still suspect identity theft, contact Lehigh Police

Why you should be concerned Fines from the government Costs to Lehigh to help mitigate damages Possible lawsuit Damage to Lehigh’s reputation Its the right thing to do!

Where to go for more Information Contact Mike King, Bursar See Federal Trade Commission website: