Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Compliance with Federal Trade Commission’s “Red Flag Rule”
WELCOME Iowa State University Identity Theft Prevention Program
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
Springfield Technical Community College Security Awareness Training.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Identity Theft Prevention Program Fighting Fraud at The University of Montana Red Flags Rules.
Presented By Drexel and FMFCU.
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
What You Need to Know Customer Service 1 08/09/2012.
Detecting, Preventing, and Mitigating Identity Theft
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
1 Identity Theft Prevention and the Red Flag Rules.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
Identity Theft How bad people get good credit. Lindsey Bertugli.
UNC Asheville Red Flag Rule and NC Identity Protection Act Information.
Protecting Your Assets By Preventing Identity Theft
University of St. Thomas
Red Flag Rules: Identity Theft Protection.
Protecting Your Identity:
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
FACT Act Training for Staff Identity Theft “Red Flags”
Protecting Yourself from Fraud including Identity Theft
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office

 To explain the federal rules intended to prevent Identity Theft and how they apply to the University,  To identify risks that alert you to a potential fraudulent activity,  To assist you in detecting when these risks occur on a student’s account, and  To review how you should respond once you’ve detected a potential fraudulent activity.

A fraud committed or attempted using the identifying information of another person without authority.

A pattern, practice, or specific activity that indicates the possible existence of identity theft.

 In November 2007, final rules were issued to implement the Identity Theft Red Flags Rule.  The Rule applies to financial institutions and creditors that offer or maintain accounts.  The Rule requires the implementation of a written Identity Theft Prevention Program. All procedures must be fully implemented by June 2010! FLAG RED RULERULE

Under the law, you are a creditor if you sell customer services now and bill them later. The Installment Payment Plan offered to students makes SIUE a creditor and subject to the Red Flags Rule. Financial aid like short term loans and Perkins loans are also creditor activities that SIUE administers.

 Offices throughout campus access and update customer records.  Red Flags Rule is about protecting customer records in order to prevent, detect and mitigate identity theft.

 The Rule’s goal is to detect, prevent, and mitigate identity theft in certain covered accounts.  A covered account is a continuing relationship established to provide a financial product or service and includes all consumer accounts or loans that are administered by the University.  Student account information on Banner and CougarNet are “covered accounts”.

 Risks may arise when updating accounts already established in Banner and CougarNet.  Risks may arise when creating new accounts.  How are new accounts created? ◦ When apply for admission to the University ◦ When apply for campus housing ◦ When a service is rendered and billed for later ◦ When fines are imposed (parking, library, etc.) ◦ When apply for financial aid and loans

A Red Flag, or any situation closely resembling one, should be investigated for verification. The following are potential indicators of fraud:  Identification document or ID card that appears to be forged, altered or inauthentic;  Identification document or card on which a person’s photograph or physical description is not consistent with the person presenting the identification;  Other information on the identification is not consistent with existing student information;

 Application for service that appears to have been altered or forged;  Social security number presented that is the same as one given by another student;  A person fails to provide complete personal identifying information on an application when reminded to do so;

 A person’s identifying information is not consistent with the information that is on file for the student;  A person’s identifying information provided is inconsistent when compared against external information sources;

 University is notified that the University has opened or is maintaining a fraudulent account for a person engaged in Identity Theft.  This notice may come from... a student, an Identity Theft victim, law enforcement, or other person.

The address does not match any address on record; The address on a document is the same as the address provided on a known fraudulent document; The address on a document is fictitious, a mail drop, or a prison; and The phone number is invalid or is associated with a pager or answering service.

…a SSN provided for an account is the same as one provided by another person for a different account? How would you know? …the person opening a Covered Account fails to provide all the required personal identifying information on an application and then doesn’t respond to notices that the application is incomplete? What do you do next? …a person requesting access to a Covered Account cannot answer the security questions (mother’s maiden name, pet’s name, etc.)? How do you handle this?

Do you know what to do if…  … mail sent to the account-holder is returned repeatedly as undeliverable although transactions continue to be conducted in connection with the Student Account?  …the University is notified that a customer is not receiving documents, even though they were mailed and not returned?

 Do you know what to do when… ◦ …the University receives a notice regarding possible identity theft in connection with a student??? ◦ …the University is notified that your department has opened a fraudulent account for a student engaged in identity theft???

 What red flags might you detect in your department?  Do you know what to do if you suspect something fraudulent?  How can you best protect your customers?

 Report known and suspected fraudulent activity immediately to your supervisor.  Gather information and documentation on the activity;  Continue to monitor a Covered Account for evidence of Identity Theft.  Notify the student that you suspect Identity Theft involving their University account.  Change any passwords or other security devices that permit access to the accounts  Notify Campus Police.  Inform the Bursar’s Office.

◦ Store restricted information on secure servers, never on your workstation. ◦ Password protect your computer and set your screensaver to come on automatically. ◦ Do not send restricted information via . ◦ Cross-shred all restricted data documents before throwing them away. ◦ Keep conversations quiet, make sure they cannot be overheard when exchanging restricted data.

Visit the Red Flags Website: The Federal Trade Commission's information page.

Questions? Contact the Bursar’s Office Dawn Sparks Cathy Foland