FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,

Slides:



Advertisements
Similar presentations
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
Advertisements

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
WELCOME Iowa State University Identity Theft Prevention Program
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
T OWN OF M OORESVILLE I DENTITY T HEFT P OLICY Effective November 1, 2008.
Springfield Technical Community College Security Awareness Training.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Information Privacy and Compliance Training For All Brigham Young University– Idaho Employees.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Identity Theft Prevention Program Fighting Fraud at The University of Montana Red Flags Rules.
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
©2012 CliftonLarsonAllen LLP Red Flags- Why This Matters to You An overview of the FACT Act Identity Theft Red Flag Rule and its current impact.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
What You Need to Know Customer Service 1 08/09/2012.
Detecting, Preventing, and Mitigating Identity Theft
© Chery F. Kendrick & Kendrick Technical Services.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
The FTC’s Red Flag Rule. FTC Red Flag Regulations Why the Red Flag Regulations?
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
Proof of Identity Training Guide 1 This Red Flag Identification and Detection Plan is designed to assist automotive dealers in the detection of the Federal.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Red Flag Training 3/14/13. Partners for the Path Ahead HomeBridge has created the following fraud prevention “red flags” training tool to help detect.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
UNC Asheville Red Flag Rule and NC Identity Protection Act Information.
Protecting Your Assets By Preventing Identity Theft
University of St. Thomas
Red Flag Rules: Identity Theft Protection.
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
FACT Act Training for Staff Identity Theft “Red Flags”
Protecting Yourself from Fraud including Identity Theft
Getting the Green Light on the Red Flags Rule
Presentation transcript:

FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit, and even endanger their medical treatment. The “Red Flags” Rule, in effect since January 1, 2008, requires many businesses and organizations to implement a written Identity Theft Prevention Program designed to detect the warning signs – or “red flags” – of identity theft in their day-to-day operations, take steps to prevent the crime, and mitigate the damage it inflicts.

COVERED ACCOUNT Any account that a financial institution or creditor offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the financial institution or creditor from identity theft, including financial, operational, compliance, reputation, or litigation risks.

What Departments on Campus are Affected? ALL DEPARTMENTS Business Services Student Accounts/Accounts Receivable Perkins Procurement Cards Admission and Records Student Records Campus ID Systems Financial Aid Human Resources Payroll

Preventing identity theft requires a 360° approach. Data security plays an essential role in keeping people’s sensitive information from falling into the wrong hands. Protect what you have a legitimate business reason to keep and securely dispose of what you no longer need. WHAT ARE WE CURRENTLY DOING TO PREVENT IDENTITY THEFT? FERPA - Federal Family Educational Rights and Privacy Act GLB – Gramm/Leach/Bliley Act PCI DSS – Payment Card Industry Data Security Standards And since October of 2011 Identity Theft Prevention Program

Fraud alert Credit freeze Unusual activity Collections skip-trace A fraud consumer report. A notice to freeze accounts. A notice of address discrepancy. A notice of inconsistent activity. A recent and significant increase in the volume of inquiries. A material change in the use of credit, especially with respect to recently established credit relationships. An account that was closed for cause or identified for abuse of account privileges by a financial institution or creditor. RED FLAG 1 - THIRD PARTY REPORTS

Many times paperwork has the telltale signs of identity theft. Documents provided for identification appear to have been altered or forged. The photograph or physical description on the identification is not consistent with the appearance of the applicant or customer presenting the identification. Other information on the identification is not consistent with information provided by the person opening a new covered account or customer presenting the identification. Other information on the identification is not consistent with readily accessible information that is on file with the financial institution or creditor, such as a signature card or a recent check. An application appears to have been altered or forged. An application has the appearance of having been destroyed and reassembled. Red Flag 2 – Suspicious Documents

Deceased!Not Valid! Out of Range! Can Not Verify! Address does not match any address on file Social Security Number comes back as unissued or deceased Social Security Number is duplicate Address or phone number is same or similar to other fraudulent applications Address or phone number is fictitious, a mail drop, or a prison Person fails to provide all required personal information on an application Person cannot provide answers to personal security questions such as elementary school attended, pet’s name, etc. RED FLAG 3 - Suspicious Personal Identifying Information

SUSPICIOUS ACTIVITY ON ACCOUNT Shortly following the notice of a change of address for a covered account, receives a request for new, additional, or replacement goods or services, or for the addition of authorized users on the account. A new revolving credit account is used in a manner commonly associated with known patterns of fraud patterns. For example: o The customer fails to make the first payment, or o Makes an initial payment but no subsequent payments. A covered account is used in a manner that is not consistent with established patterns of activity on the account. There is, for example: o Nonpayment when there is no history of late or missed payments; o A material change in purchasing or usage patterns; A covered account that has been inactive for a reasonably lengthy period of time is used (taking into consideration the type of account, the expected pattern of usage and other relevant factors). Mail sent to the customer is returned repeatedly as undeliverable although transactions continue to be conducted in connection with the covered account. The University is notified that the customer is not receiving documents. The University is notified of unauthorized charges or transactions in connection with a covered account. RED FLAG 4 - Suspicious Account Activity

Red Flag 5 – Notification Customers Victims of Identity Theft Law Enforcement Authorities Other Persons Regarding Possible Identity Theft

WHO DO YOU REPORT SUSPECTED RED FLAG VIOLATIONS? Report immediately to your supervisor any suspected violations of the RED FLAG RULE. Per MSU policy the most senior financial administrator for each campus is responsible for the administration and reporting of the program. Currently that is the ADMINISTRATIVE SERVICES VICE CHANCELLOR at MSUB. REPORTING VIOLATIONS

   Policies and/or Procedures 246, 246.1,   RED FLAG RULE RELATED MATERIALS