University of St. Thomas

Slides:



Advertisements
Similar presentations
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
Advertisements

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
WELCOME Iowa State University Identity Theft Prevention Program
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
The New Rules of F&I with Peter Jones The New Rules of F&I What are the Rules? Red Flag Rule Graham / Leach / Bliley Act Privacy Notice Safeguard Rule.
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
©2012 CliftonLarsonAllen LLP Red Flags- Why This Matters to You An overview of the FACT Act Identity Theft Red Flag Rule and its current impact.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
What You Need to Know Customer Service 1 08/09/2012.
Detecting, Preventing, and Mitigating Identity Theft
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
The FTC’s Red Flag Rule. FTC Red Flag Regulations Why the Red Flag Regulations?
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
UNC Asheville Red Flag Rule and NC Identity Protection Act Information.
Protecting Your Assets By Preventing Identity Theft
Protecting Your Credit Identity
When you get caught for Identity Theft
Red Flag Rules: Identity Theft Protection.
Protecting Your Credit
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Red Flags Rule An Introduction County College of Morris
Red Flag Review and Updates
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
Hands-On: FSA Assessments For Foreign Schools
FACT Act Training for Staff Identity Theft “Red Flags”
Protecting Yourself from Fraud including Identity Theft
Getting the Green Light on the Red Flags Rule
Presentation transcript:

University of St. Thomas Red Flags Rule University of St. Thomas The following power point presentation is meant to be a self-guided overview of the Red Flags Rule and relative policies and procedures at the University of St. Thomas. September 18, 2018

In case you are interested in the regulatory history… Issued by the Federal Trade Commission (FTC) on November 9, 2007 Implements Sections 114 and 315 of the Fair and Accurate Credit Transactions Act (FACT Act) of 2003 Higher Education required to be compliant with the regulations by November 1, 2009

What does the FTC have to do with UST? The Red Flags Rule applies to all financial institutions and CREDITORS that have “covered accounts.” UST is a CREDITOR that indeed has covered accounts!

So what is a “covered account?” A consumer account that involves multiple payments or transactions, such as a loan or account that is billed or payable in installments Also included are any other accounts for which there is a reasonably foreseeable risk of identity theft UST covered accounts include: Participation in the Federal Perkins Loan Program Refund of credit balances, with/without PLUS loans Payment plans for student accounts Deferment of tuition payments Emergency loan funds Use of credit reports

I’m convinced we have to comply…what exactly is this Red Flags Rule? Purpose – to detect and stop identity thieves from using someone else’s identifying information at UST to commit fraud Requirements for UST: Implement a written Identity Theft Prevention Program to assist members of the UST community in detecting, preventing, and mitigating identity fraud by recognizing and responding to applicable “red flags” The program must cover both new and existing accounts and be appropriate to the size and complexity of UST The program must be updated periodically to address changing risks

How is this any different from all the other regulations we have to comply with? Most other current legislation governing UST at this time (FERPA, PCI DSS, GLB) focuses on data security in order to avoid theft of personal, confidential information The Red Flags Rule is supposed to pick-up where the others leave off – requiring businesses to be proactive in trying to stop identity thieves from actually being able to use the information they have already stolen for their nefarious endeavors

Just to make sure we are on the same page - tell me what a “red flag” is when it comes to this rule. Red flag – a pattern, practice, or specific activity that indicates the possible existence of identity theft Common categories of red flags (included, but not limited to): Alerts, notifications, and warnings from a credit reporting company Suspicious documents Suspicious personal identifying information Suspicious account activity Notice from other sources

Why is it so important that I learn about this rule? As a faculty, staff, or student employee of St. Thomas, it is your responsibility to help prevent identity fraud from occurring through business conducted in your department You will need to be able to identify common potential red flags for the activities in your department You will need to be able to detect when suspicious activity takes place (i.e., spot “red flags”) You will need to understand the correct action to take if you spot any red flags (responding and/or reporting)

I’m no McGruff®. How am I supposed to help take a bite out of crime? Because each department operates differently, only some of the more basic red flags will be covered here. However, there is a more extensive (though not exhaustive) list of red flags included in the written Identity Theft Prevention Program available on the UST website at www.stthomas.edu/business office/redflags

How about some specific examples? Suspicious Documents: Identification documents appear to have been altered or forged ID photo/description doesn’t appear to match the person presenting it Information on the ID differs from what the person is telling you or what is currently on file An application that looks like it has been altered, forged, or torn up and reassembled

More examples! Suspicious Personal Identifying Information Personal information provided (address, SSN, birth date, etc…) inconsistent with records already on file or with other verification resources SSN that is inconsistent with data provided by the SSA An address or phone number used by several others or is known to be invalid The applicant/customer fails to provide all required personal identifying information as requested, even after being reminded

Even more examples! Suspicious Account Activity Change of address request shortly followed by a name change request Mail sent is repeatedly returned as undeliverable to address Account used in a way inconsistent with prior usage Notice is given by account holder that they are not receiving mail sent by UST Notice is given that there has been unauthorized account activity

Still more examples! Alerts, notifications and warnings from a credit reporting company: A fraud or active duty alert on a credit report A notice of credit freeze in response to a request for a credit report A notice of address discrepancy provided by a credit reporting agency A credit report indicating a pattern of activity inconsistent with the personal history of the customer (for example – a sudden increase in establishing new credit relationships)

And the examples continue! Notice From Other Sources – UST may be given notice about identity theft from various sources The identity theft victim Another student/applicant/customer Law enforcement authority Miscellaneous others

Now I know some of the red flags. What am I supposed to do about them? Obtain and verify the identity of applicants/customers before conducting business Review the authenticity of any identifying documentation provided Review account activity for consistency Examine your department procedures for any security gaps and update as needed Keep in mind that a red flag is only an indicator of suspicious activity, not confirmation that fraud actually exists

So what if something does seem fishy…what do I do next? Use your best judgment and discretion to determine the appropriate course of action, which may include some of the following: Monitor the account in question for evidence of identity theft Contact the account owner Change passwords, security settings, and any other access Close the existing account Open a new account with a new number Keep account closed Notify Public Safety More tips available in the written Program online

Is that it? A few more items worth noting: If UST engages a third party service provider to act on a covered account, then UST should obtain a written agreement to ensure that the activity is conducted in accordance with the Red Flags Rule. Responsibility and liability for each party should be explicit in the contract. The written Identity Theft Protection Program at UST was approved by the Board of Trustees on July 7, 2009. The program is administered by a committee reporting to the VP of Business Affairs & Chief Financial Officer The written program is available online at www.stthomas.edu/businessoffice/redflags

Good! Done and Done! Not so fast… Surprise – pop quiz!

1. A true fact about Red Flags Rule is: It doesn’t apply to UST because it is an FTC regulation It’s called Red Flags because Black Flag was already taken It only applies to employees in the Business Office Covered accounts include both new and existing accounts

2. A red flag is defined as: The symbol of a small island nation An insecticide An indication of a penalty at a sporting event A pattern, practice, or specific activity that indicates the possible existence of identity theft

3. Where is the written Identity Theft Prevention Program found at UST? The back left corner of the third level of the library www.stthomas.edu/businessoffice/redflags In a 3-ring-dust-collecting binder in the Controller’s Office It varies between the Minneapolis and St. Paul campus depending on the day of the week

4. Which of the following is not an example of a red flag? A student requesting a name change after getting married An address that is to a mail drop or prison Inconsistent birthdates when comparing an ID to an application A student ID that has a picture of the student from last year’s spring break trip to Cancun

5. Which of the following would not be an appropriate response when a red flag is detected? Notify Public Safety Start screaming “Gotchya!” at the applicant Monitor activity on the account Verify account information with other resources

End of quiz Answers to follow

Answers D B A