Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
Springfield Technical Community College Security Awareness Training.
Protecting Personal Information Guidance for Business.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Identity Theft Prevention Program Fighting Fraud at The University of Montana Red Flags Rules.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
Discover Ways To Protect Yourself From Identity Theft.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
What You Need to Know Customer Service 1 08/09/2012.
Detecting, Preventing, and Mitigating Identity Theft
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
INTERNAL CONTROLS What are they? Why should I care?
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Protecting Your Assets By Preventing Identity Theft
Protection of CONSUMER information
Chapter 3: IRS and FTC Data Security Rules
Protecting Your Identity:
Protecting Personal Information Guidance for Business.
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
UCA Gramm-Leach Bliley Act (GLBA) Safeguards Rule Compliance Training Effective June 12, 2018 Adapted from materials published by the Federal Trade Commission.
Clemson University Red Flags Rule Training
Protecting Your Credit Identity
FACT Act Training for Staff Identity Theft “Red Flags”
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech

2 Training Objective: Ensure staff understand their responsibility to protect sensitive information, and know the steps to prevent, detect and respond to identity theft. This training is required as part of the Montana Tech Identity Theft Prevention Program.

Montana Tech - Identity Theft Prevention Program 3 Agenda Background Why me? What information are we talking about? Preventing Identity Theft How do I secure sensitive information to make sure this doesn’t happen? Detecting Identity Theft What is a Red Flag, and how do I know one when I see one? Responding to Identity Theft I found a Red Flag… now what do I do? For more information… Where can I learn more?

Montana Tech - Identity Theft Prevention Program 4 Background Failure to protect sensitive data can lead to identity theft or other harm to consumers — and also can harm Montana Tech, not just financially but also in loss of public trust. The amount of data captured and stored by businesses doubles every months. Information Week $221 billion a year is lost by businesses worldwide due to identity theft. The Aberdeen Group As many as 10 million Americans a year are victims of identity theft. Identity Theft Resource Center, The Aftermath Study

Montana Tech - Identity Theft Prevention Program The Gramm-Leach-Bliley Act’s Safeguards Rule requires financial institutions to provide reasonable safeguards for customer data. Under the Act, “financial institution” includes any entity that allows deferred payment for services (for example, attending class before tuition and fees are paid in full). – In other words… This includes all affiliated campuses of The University of Montana, their contractors and sub-contractors. Background

Montana Tech - Identity Theft Prevention Program 6 Existing laws require us to: – “Implement measures that are reasonable and appropriate under the circumstances to protect sensitive consumer information,” and – Notify affected customers if there's a data breach. Examples of protected sensitive information include social security number, account information and information derived from credit reports. Background FTC Disposal Rule Fair and Accurate Credit Transaction Act (FACT) Gramm-Leach-Bliley Act Fair Credit Reporting Act Health Insurance Portability and Accountability Act (HIPAA) Federal Educational Right to Privacy Act (FERPA) Drivers Privacy Protection Act (DPPA)State Laws Federal Trade Commission Act

Montana Tech - Identity Theft Prevention Program7 What is Personally Identifiable Information? Information that can be used alone, or in conjunction with other information, to identify a specific person. Some examples: Name Address Social security number Birth date Drivers license number Other identification number (799) Passport number

Montana Tech - Identity Theft Prevention Program8 Are you keeping information secure? Safeguarding sensitive information on your computers and in your files is YOUR RESPONSIBILITY, and is critical in preventing identity theft. A sound information security plan is built on five principles: Take stock – know what you have Scale down – keep only what you need Lock it – protect the information in your care Pitch it – properly dispose of what you don’t need Plan ahead – know how to respond to incidents

Montana Tech - Identity Theft Prevention Program9 Take Stock Check files and computers for what information you have and where it is stored. – Don’t forget portable devices and offsite locations, including employees’ home computers. For example, an employee s to a personal account, or copies to USB storage, sensitive information for use while working from home. Trace the flow of information from data entry, receipt/filing to disposal. At every stage, determine who has access – and who should have access.

10 Scale Down Collect only what you need, and keep it only for the time you need it. Be cautious of what you store on devices connected to the internet! For receipts you give to customers, eliminate sensitive or personally identifying information (for example, 799 number or credit card number). Do not collect social security numbers out of habit or convenience. Only collect them when needed (for example, payroll reporting to IRS). Montana Tech - Identity Theft Prevention Program

11 Lock It Lock offices, desks, store rooms and file drawers, and train employees to keep them that way. Limit access to databases, computer files and storage areas with sensitive files to only those people required to use that information as part of their job duties. Don’t store sensitive information on a workstation or mobile device. Secure data that is shipped or stored offsite.

Montana Tech - Identity Theft Prevention Program12 Pitch It Shred paper records you don’t need. Make sure you’ve met any applicable retention requirements! State Records Retention Schedules State Records Retention Schedules Use disk wiping utility programs on computers and portable storage devices before disposing of them. MUS Board of Regents Policy 1308 (Disposal of Computer Storage Devices) MUS Board of Regents Policy 1308

Montana Tech - Identity Theft Prevention Program13 Plan Ahead Put together a “What if?” plan to detect and respond to a security incident. Designate a senior staff member to coordinate your response. Investigate right away and know how to preserve evidence, such as computer logs and files, and original documents. Take steps to close off vulnerabilities, for example disconnect compromised computers from the Internet. Inform the Identity Theft Program Administrator for your campus and Public Safety or law enforcement.

Montana Tech - Identity Theft Prevention Program 14 Training and Oversight Train your employees! Oversee contractors and service providers Use good hiring practices (check references, and consider background checks in security-sensitive positions) Build information security training into orientation.

Montana Tech - Identity Theft Prevention Program15 What is a Red Flag? “A pattern, practice, or specific activity that indicates the possible existence of Identity Theft” In other words… – A Red Flag helps us detect Identity Theft. – A Red Flag is a warning that something may be wrong. – It can be something one says, does, or gives you that makes you suspect he or she is not who they claim to be. – It can be something that happens on an account that is unusual or suspicious.

Montana Tech - Identity Theft Prevention Program16 Five Categories of Red Flags An alert, notification or warning from a consumer reporting agency Suspicious documents Suspicious personally identifying information Unusual use of, or suspicious activity related to, a covered account Notification by a victim of identity theft, a law enforcement authority, or other person, that the account is being used for identity theft

Montana Tech - Identity Theft Prevention Program17 What are covered accounts? Any account that the University offers or maintains that is designed to permit multiple payments or transactions. Other types of accounts if there is a reasonably foreseeable risk of fraud or identity theft risk to customers or The University. Student Accounts Payroll Accounts Student Loans & Financial Aid Campus ID Cards! (Digger Card)

18 Suspicious Documents Documents that appear to be altered or forged. A photo ID that does not reasonably resemble the person presenting it. Information on an ID that does not agree with other information being provided, for example different names or birth dates, or signatures that are not reasonably alike. Information that does not agree with data already on file. Hmm … Montana Tech - Identity Theft Prevention Program

19 PII provided: -Is not consistent when compared with external sources -Is not consistent with other PII provided by the customer -Is associated with known fraudulent activity -Is a type commonly associated with fraudulent activity -Is not consistent with other PII on file with the University The social security number provided is the same as that submitted by someone else The address or telephone number provided is the same as an unusually large number of other people The person attempting to open a new account fails to provide all required PII on request Suspicious Personally Identifying Information

Montana Tech - Identity Theft Prevention Program20 Shortly following the notice of a change of address, the University receives a request for a new card or additional authorized users of an account The covered account is used in a manner that is not consistent with established patterns of activity Mail is repeatedly returned as undeliverable though transactions continue to be conducted on the account An account that has been inactive for a relatively long period of time is used The University is notified that the account holder is no longer receiving paper account statements The University is notified of unauthorized changes or transactions in connection with a covered account. Examples of Unusual Use or Suspicious Activity

Montana Tech - Identity Theft Prevention Program 21 Follow your department’s procedures for verifying the identity of your customer. Offices and departments should also incorporate identity theft experience of the University, office or school into their procedures, such as: Actual past incidents of identity theft Additional methods the University has identified that reflect changes in identity theft risks Updates to the Identity Theft Prevention Program Ask your Identity Theft Prevention Program Administrator for help in making sure your procedures are sufficient. University Experience and Guidance

Montana Tech - Identity Theft Prevention Program 22 Student Enrollment Offices (new accounts) – Require certain identifying information such as name, date of birth, academic records, home address or other identification. – Verify the student’s identity when you issue the student ID card (with drivers license or other government-issued photo identification) Ask your supervisor for information on the specific documents that are (and are not!) acceptable to verify identity. When should I look for Red Flags?

Montana Tech - Identity Theft Prevention Program 23 For Existing Accounts – Verify the identification of students if they request any information about their records or account, regardless of whether the request is in person, by phone, by fax or by . – Verify the validity of any request to change billing address, and provide the student a reasonable means of promptly reporting incorrect billing address changes. – Verify any request to change banking information given for billing and payment purposes. When should I look for Red Flags?

Montana Tech - Identity Theft Prevention Program 24 What do I do if I suspect identity theft? 1.Notify your supervisor. 2.Investigate to the extent needed to determine if identity theft is likely or a data breach has occurred. 3.Assess whether a response is needed and take immediate action if necessary. 4.Notify your Identity Theft Prevention Program Administrator and Public Safety or local law enforcement (if applicable), and plan your response.

Montana Tech - Identity Theft Prevention Program 25 Actions to Consider (depending on circumstances) : Cancel the suspected fraudulent transaction if possible Contact the person who “owns” the account (for example, the student) Change any passwords or security codes/devices that permit access to the account Monitor activity on the account Place a hold on the account

Montana Tech - Identity Theft Prevention Program 26 Actions to Consider (depending on circumstances): Close the account Reopen the account with a new account number Refuse to open a new account Refuse payments on an account Other actions based on advice from -Identity Theft Prevention Program Administrator for your campus -Public Safety or local law enforcement -IT Security Officer -Internal Audit

Montana Tech - Identity Theft Prevention Program 27 For More Information Policies and Procedures – MUS Board of Regents Policy (Identity Theft Prevention Program) MUS Board of Regents Policy – MUS Board of Regents Policy (Information Security) MUS Board of Regents Policy – Montana Tech Policy – Montana Tech Identity Theft Prevention Program Other Resources for Businesses (to help us protect our customers) – Federal Trade Commission Fighting Fraud with the Red Flags Rule: A How-To Guide for Business Fighting Back Against Identity Theft Information Compromise and the Risk of Identity Theft: Guidance for your Business – US Department of the Treasury, President’s Task Force on Identity Theft, Combating Identity Theft: A Strategic PlanCombating Identity Theft: A Strategic Plan – Department of Defense, Personally Identifiable Information TrainingPersonally Identifiable Information Training

Montana Tech - Identity Theft Prevention Program 28 For More Information (cont.) Other Resources for Consumers (to help you protect yourself!) – Federal Trade Commission, Avoid Identity Theft videoAvoid Identity Theft – Federal Trade Commission, Take Charge: Fighting Back Against Identity TheftTake Charge: Fighting Back Against Identity Theft – OnGuard OnLine, ID Theft Face Off online game/quizID Theft Face Off – National Consumers League National Consumers League

Montana Tech - Identity Theft Prevention Program 29 Questions/Comments? Identity Theft Prevention Program Administrator Marlene McMillan (Montana Tech), Mark Pullium (UM, IT Security Officer Mike Kukay (Montana Tech),

Quiz