Red Flags Rule BAS Forum August 18, 2010. What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
WELCOME Iowa State University Identity Theft Prevention Program
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
Springfield Technical Community College Security Awareness Training.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Protecting Personal Information Guidance for Business.
Information Privacy and Compliance Training For All Brigham Young University– Idaho Employees.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Identity Theft Prevention Program Fighting Fraud at The University of Montana Red Flags Rules.
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
Developing a Records & Information Retention & Disposition Program:
What You Need to Know Customer Service 1 08/09/2012.
Network security policy: best practices
Detecting, Preventing, and Mitigating Identity Theft
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
General Awareness Training
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Electronic Records Management: What Management Needs to Know May 2009.
Copyright 2007, Integrated Compliance Solutions, LLC FACT Act Red Flags Bank Compliance Association of Connecticut September 3, 2008 Copyright 2007, Integrated.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
UMBC POLICY ON ESH MANAGEMENT & ENFORCEMENT UMBC Policy #VI
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
Western Asset Protection
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
University of St. Thomas
Red Flag Rules: Identity Theft Protection.
Protecting Personal Information Guidance for Business.
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
Data Security Julie D. Wilson Sr
FACT Act Training for Staff Identity Theft “Red Flags”
Colorado “Protections For Consumer Data Privacy” Law
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Red Flags Rule BAS Forum August 18, 2010

What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed to – detect the warning signs – “red flags” – of identity theft in day-to-day operations, – take steps to prevent the crime, and – mitigate the damage it inflicts In effect since January 1, 2008 – Enforcement deferred currently to December 31, 2010 Enforced by the Federal Trade Commission (FTC)

How have we responded at KSU? The Board of Trustees approved policy University policy regarding identity theft prevention on September 16, (Available in the University Policy Register thru Flashline or the BAS Forum website.) A document University Measures for Identity Theft Prevention has been developed. (Will be made available on the BAS Forum website.) This training has been developed and is being made available beginning August (Will be made available on the BAS Forum website.)

Related Definitions “Identity theft” – fraud committed or attempted using the identifying information of another person without authority “Red flag” – a pattern, practice, or specific activity that indicates the possible existence of identity theft “Covered account” – An account that the university offers or maintains that involves or is designed to permit multiple payments or transactions for students, faculty, and/or staff – Any other account that the university offers or maintains for which there is a reasonably foreseeable risk of identity theft “Identifying information” – any name or number that may be used, alone or in conjunction with any other information, to identify a specific person

What is required? IDENTIFY – Identify relevant red flags DETECT – Detect red flags RESPOND – Prevent and mitigate identity theft REVIEW – Monitor and update compliance

Indicators to IDENTIFY Red Flags Notifications and warnings from third-party agencies (e.g. credit agency, law enforcement) Suspicious documents (e.g. apparent forgeries, altered documents, physical description or photo does not match person presenting documentation) Suspicious identification (e.g. inconsistent statements such as birth dates) Unusual use of account (e.g. sudden change in password or mailing address, returned mail, breach in computer security)

How to DETECT Red Flags Require identifying information before providing access to records online, over the phone, or in person. Verify identity of student/ employee in person when possible. Verify significant changes in a student/ employee account with the account holder. If any of the identifying information appears suspicious you may have detected a red flag.

How to RESPOND to Red Flags Once detected, take one or more of the following steps depending upon the severity of the breach and department policy: – Alert your supervisor and coordinate your response. – Continue to monitor the account for evidence of identity theft. – Notify the appropriate office of origin for the record/ account. – Contact the student, applicant, or employee. – Contact the Office of Security and Access Management in IS to change any passwords or other security devices that permit/ prohibit access to the account. – Do not open a new account for the student/ employee until the red flag has been cleared. – Provide the student/ employee with a new Banner identification number if necessary. – In severe instances, notify the Kent State Police Department.

How to RESPOND to Red Flags (continued) – IN ALL CASES notify one of the following officials (and copy Program Administrator – Associate Vice President for Business and Administration Services): University Registrar – for student account issues University Bursar – for student financial account issues Director of Admissions – for admission issues Director of Financial Aid – for student financial aid issues Vice President for Information Services – for university data issues Vice President for Human Resources – for employee account issues

REVIEW Your Current Procedures/ Practices Secure documents that contain identifying or protected information. Ensure that your departmental website, or related portal, is secure through consultation with the Office of Security and Access Management. Follow university policies for data security. Guidelines available at Ensure complete and secure destruction of documents and computer files containing account information in accordance with the university’s record retention policy and schedules. (Available thru the BAS Forum website.) Ensure that all university systems and computers are password protected and virus definitions and protections are up-to-date.

REVIEW Your Current Procedures/ Practices (continued) Sensitive data should not be stored on external drives (USB, Thumb, Flash, etc.). Sensitive data stored on portable computing devices and storage media must be encrypted. Personally owned drives and devices should never be used to store sensitive institutional data. Avoid use of the social security number as an identifier. It is also advisable to avoid using a combination of name, date of birth, address for identification purposes. Share this information with employees new to your department and third-party service providers.

The protection of student/ employee information is the job of every employee at Kent State University. These procedures set the minimum requirements for an effective university response. Departments are encouraged to adopt more specific rules/ procedures/ protections to assist in the implementation of these measures.

The university has several resources available to assist with the protection of university records/ data. If you have a questions concerning these red flag requirements or identity theft prevention in general please contact one of the following university offices: Office of AVP for Business and Admin Services (x 20984) Office of Security and Access Management (x 25566) Office of the University Counsel (x 22982)

Questions