Welcome to. New Employee Orientation Business Services Tim Michalski Director of Business Services Institutional Compliance Officer

Slides:



Advertisements
Similar presentations
Presented (insert date) By (insert organizations name)
Advertisements

Identity Theft A CyberAngels Quick Tutorial A CyberAngels Quick Tutorial Adapted from the Federal Trade Commission Website Press the Next Button to Continue.
How to Deter, Detect & Defend Against Identity Theft Presented by: Kira Buffa Marketing Associate Richmond Brothers Financial Management Specialists, Inc.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Red Flag Rules: What they are? & What you need to do
Identity Theft Ta’Mar Boyd Adam Devin. What is Identity Theft  Identity theft occurs when someone uses your personally identifying information, like.
© Chery F. Kendrick & Kendrick Technical Services.
1616 Guadalupe Street, UTA (512) ▪ (512) (fax)
Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
Real expectations. Code of Conduct. What is the Code of Conduct? Purpose: Outline and explain the expected behaviors, values and standards that guide.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
The University of Houston Institutional Compliance Program Rev July 2011.
Identity Theft Stefany K. Watson Brandon K. Mosley.
Red Flags Rule & Municipal Utilities
FRAUD DETERRENCE Core Orientation/Core Annual Refresher The following presentation is intended for SCS employees. This presentation will provide a broader.
© Chery F. Kendrick & Kendrick Technical Services.
WELCOME Annual Meeting & Compliance Seminar. Code of Conduct - Impact on Corporate Culture by Andy Greenstein Knight Capital Group, Inc.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
What Can YOU Do to Prevent Healthcare Fraud? Funded by: This project is supported in part by grant numbers 90MP0026 and 90MP0127 from the U.S. Administration.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
WELCOME New Safety Coordinators! New Safety Coordinator Spring Orientation January 24, 2012.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Internet Safety Dr. Steve Broskoske Misericordia University.
Christie Stelling, CPA, CIA Assoc. Director, Finance Financial Controls.
2015 ANNUAL TRAINING By: Denise Goff
An Educational Computer Based Training Program CBTCBT.
Institutional Research Compliance Juliann Tenney, JD Research Compliance and Privacy Officer Director, Institutional Research Compliance Program.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
AUDITS What you should know - a campus perspective. Franz Lozano Director/Budget Officer (former Internal Auditor) San Francisco State University Academic.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
DEPARTMENT OF MANAGEMENT SERVICES OFFICE OF INSPECTOR GENERAL.
Professional Values and Basic Business Legislation.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Oregon Consumer Identity Theft Protection Act Communications Forum Theresa Masse, Chief Information Security Officer Department of Administrative Services.
Identity Theft Project Erin L. Caraway Jacob Locke.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
Protecting Your Identity Anders Olson Computers III September 18, 2008.
By Austin Kellogg DeterDetectDefend 1.RealReal 2.VirtualVirtual 3.FTCFTC.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Identity Theft Project By: Timmy Townsend And Eric Fields.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
TYLER GROUP
Fraud: Identity Theft G.1 List and explain consumer protection laws, including credit reporting, debt collection, and privacy. G.2 Define common, unfair.
A Bank’s Challenge to Protect Customers Sharon Vance.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
IDENTITY THEFT.
Advanced Income Tax Law
Code of Conduct/ Fraud, Waste & Abuse
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Red Flags Rule An Introduction County College of Morris
Chapter 8 Developing an Effective Ethics Program
Clemson University Red Flags Rule Training
CONVERCENT INCIDENT REPORTING Employee Training
Identity Theft and Credit Safety
Presentation transcript:

Welcome to

New Employee Orientation Business Services Tim Michalski Director of Business Services Institutional Compliance Officer Susie Motal Business Services Coordinator University West, Room 107

Business Services Functions of the Department Contract Administration Institutional Compliance Mail Services Safety & Risk Management Record Retention Purchasing and HUB Services ProCard Campus Parking Public Information Request Facility Sales Campus Vending Student Financial Services Paw Pass Card

New Employee Orientation Business Services Introduction to Institutional Compliance & Government Program on Fraud & Waste Prevention MySafeCampus/Fraud Awareness/Confidential Reporting Employee Standards of Conduct, Policy C-8 Texas Public Information Act Personally Identifiable Information

Business Services Institutional Compliance Program Mission: To promote and support a culture at the University of Houston- Victoria which builds compliance consciousness into the daily activities of University personnel and encourages employees to conduct University business with honesty and integrity.

INSTITUTIONAL COMPLIANCE

Institutional Compliance What? – Good ethical business practices When? – Compliance Program began in 2002 Why? – To reduce risks to acceptable levels What is my role?  Do the right thing  Understand the risks and the proper way to respond  Stay up with campus policies  Personally Identifiable Information  Credit Card Information Full list of Frequently Asked Questions on our website.Frequently Asked Questions Questions and Answers

Institutional Compliance Understanding Fraud – What is Fraud? Understanding Fraud MySafeCampus – 85% of fraud reported anonymously MySafeCampus  A secure 3 rd party anonymous reporting system  To submit a report, call or online at Confidentially Reporting Fraud, Waste, and Abuse  Why do we have this program?  What happens when I submit a report?  What should I report? Fraud Awareness and Reporting

Institutional Compliance Employees of UHV are public servants and have a responsibility to adhere to the highest ethical standards. UHV Policy C-8, Employee Standards of Conduct outlines the responsibilities of all employees.Employee Standards of Conduct FAQ Manager – Quickly find answers to common Compliance questions. FAQ Manager Standards of Conduct

Open Records Request Texas Government Code, Chapter 552, gives a requestor the right to access government records, commonly referred to as an Open Records Request. Rights of Requestors Responsibilities of Governmental Bodies Procedures to Obtain Information The Public Information Act Texas Public Information Act

Business Services The Federal Trade Commission states identity theft is a serious crime and offers advise on how to protect yourself.  Deter - identity thieves by safeguarding your information.  Detect - suspicious activity by routinely monitoring your financial accounts and billing statements.  Defend - against ID theft as soon as you suspect it. To learn more visit,  You are entitled to a free credit report from one or all of the nationwide consumer reporting companies, visit Personally Identifiable Information

Questions? Business Services Tim Michalski Director of Business Services Institutional Compliance Officer Susie Motal Business Services Coordinator University West, Room 107