1 FACTA ID Theft Programs Auditing for Compliance Steven Nyren, CRCM Sheshunoff Consulting & Solutions BCAC Program – September 2008.

Slides:



Advertisements
Similar presentations
North Carolina Office of the State Auditor Honesty Integrity Professionalism.
Advertisements

. . . a step-by-step guide to world-class internal auditing
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Continuous Auditing Global Technology Auditing Guide 3 Twelfth Continuous Auditing and Reporting Symposium Rutgers Business School November.
Information System Assurance Practices in China Key players doing IS Assurance In China Regulatory Regime and Professional Organizations -Regulatory AuthoritiesRegulatory.
Internal Audit Awareness
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Institute of Municipal Finance Officers & Related Professions
Purpose of the Standards
State Examinations Have No Fear, Help is Here. Risk-Focused Financial Condition Exams NAIC mandated for state insurance departments beginning 1/1/2010.
Best Practices for User Access Controls and Segregation of Duties Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars.
Internal Auditing and Outsourcing
Compliance System Validation - An Audit Based Approach December 2012 Uday Gulvadi, CPA, CIA, CISA, CAMS Director - Internal Audit, Risk and Compliance.
Performance Audit Fraud management in local government Report 19: David Toma Manager 24 July 2015.
1.  The views expressed are those of the speaker and do not necessarily reflect the views of the Federal Reserve Board of Governors, or the Federal Reserve.
Regulatory Requirements & Compliance: Ensuring Effective Outcomes Presented By: John E. Palmer, CPA Managing Director/Principal.
Auditing an EMS for Conformance with EO 13423
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Bank Secrecy Act Staying One Step Ahead of Your BSA Examiner September 2009 AMLA Chicago Chapter Event.
DAA and GEP Orlando Audit & Compliance or Audit vs. Compliance.
D-1 McGraw-Hill/Irwin ©2005 by the McGraw-Hill Companies, Inc. All rights reserved. Module D Internal, Governmental, and Fraud Audits “I predict that audit.
Copyright 2007, Integrated Compliance Solutions, LLC FACT Act Red Flags Bank Compliance Association of Connecticut September 3, 2008 Copyright 2007, Integrated.
BA 427 – Assurance and Attestation Services Exam 2.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Fundamental Auditing Concepts. Materiality Evidence Independence Audit risk IS and general audit responsibilities for fraud Assurance.
1 The Auditor’s Perspective Division of Sponsored Research Research Administration Training Series Presented by: Joe Cannella Audit Manager,
2008 New York - Member Forum Council for Responsible Jewellery Practices, Ltd. Overview of CRJP.
Corporate Responsibility and Compliance A Resource for Health Care Boards of Directors By Debbie Troklus, CHC and Michael C. Hemsley, Esq.
HOTLINE: The Value of internal Audit at Georgia Tech 1 Department of Internal Auditing.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Practice Management Quality Control
Guidance on EITI Requirements 12 and 13 EITI International Secretariat April 2011.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
INTERNAL AUDIT AND INVESTIGATION SERVICES PRESENTATION TO THE PORTFOLIO COMMITTEE ON THE UNIT’S ACTIVITIES FOR THE YEAR ENDING 31 MARCH 2006 Z MXUNYELWA,
1 Internal Audit. 2 Definition Is an independent activity established by management to examine and evaluate the organization’s risk management processes.
1 Topic# 2 – Planning and Control Readings: All of chapter 4 and pages 115 – 119 of chapter 5.
Balance Between Audit/Compliance and Risk Management- Best Practices FIRMA 21 st National Training Conference Julia Fredricks, U.S. Chief Compliance Officer.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
Internal Controls Christina Urias Managing Director – International Regulatory Affairs NAIC.
Effective Bank Secrecy Act/ Anti-Money Laundering Audits Presented by K.D. Mehra, CAMS, CRCM Managing Director September 22, 2011.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Internal Auditing ISO 9001:2015
Audit Management from a Monitoring perspective 20 September 2014.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
May 3, 2016 Presented by: Jamila Piracci, Vice President, OTC Derivatives Alessandra Riccardi, Director of Capital and Risk NFA Webinar: Margin Model Approval.
Quality assessment of internal audit activities performed on a periodical basis Nikolina Bibić, Ministry of Finance, Central Harmonization Unit Republic.
CPA Gilberto Rivera, VP Compliance and Operational Risk
PLANNING, MATERIALITY AND ASSESSING THE RISK OF MISSTATEMENT
Financial Service Centers of America
How to Survive an External Quality Assessment
Presentation to the Portfolio Committee on Finance
Self Identified Issues
Air Carrier Continuing Analysis and Surveillance System (CASS)
Understanding the entity
Red Flags Rule An Introduction County College of Morris
Federal Reserve Retail Payments Risk Forum
2017 Administration and Finance Conference
Risk Management: why and how to protect your health center
Quality Assurance and Improvement Program
Agenda Why this group exists Who is behind it
Relationship between World Bank and Romanian EA requirements
Internal Audit Who? What? When? How? Why? In brief . . .
Internal Audit’s Role in Preventing Fraud and Corruption
Presentation transcript:

1 FACTA ID Theft Programs Auditing for Compliance Steven Nyren, CRCM Sheshunoff Consulting & Solutions BCAC Program – September 2008

2 ID Theft “Obviously crime pays, or there’d be no crime” - G. Gordon Libby

3 The Challenge: Each institution must develop and implement a program to: –detect –prevent, and –mitigate identity theft

4 IDENTITY THEFT PROGRAMS THE $100,000 QUESTION: How do we know we’ve accomplished our goal?

5 IDENTITY THEFT PROGRAM Ways to validate your program: Monitoring Audit

6 Monitoring Use of Periodic Reviews: –Monitoring Checklists, where applicable –Testing to confirm compliance –Performed by line unit and/or compliance professional –Object is to identify and resolve issues before an audit or exam

7 Validating the Program Auditing –More detailed scope and less frequent than monitoring –Independent perspective –May be conducted by Internal auditor and/or outside auditor or other qualified third party

8 Auditing for Compliance Process Documentation Risk Assessment Controls Response Program Training Administration

9 RED FLAG CHECK UP Are you ready for the examiners? Is the Program fully documented? Does it make sense? Does practice match policy? Is it effective?

10 Risk Assessment Does it consider? Methods of opening Covered Accounts Methods of accessing Covered Accounts The Bank’s history with identity theft Current fraud controls Inherent and residual risks The Bank’s overall ID Theft risk

11 Controls Are controls adequately documented? Are all applicable red flags addressed? Are they working as intended?

12 Response Program Is the method of documenting response actions to red flag incidents adequate? What is management’s oversight method – centralized; department level? Are the responses adequate?

13 Training Was it comprehensive? Has it been documented? Has it been completed?

14 Resources Regulatory Guidance Industry Websites (Bankersonline.com, ABA.com, etc.) Seminars and webinars

15 Can It All Be Done? “Energy and persistence conquer all things.” - Benjamin Franklin

16 Conclusion Questions?