FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.

Slides:



Advertisements
Similar presentations
University of Minnesota
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
© Chery F. Kendrick & Kendrick Technical Services.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
T OWN OF M OORESVILLE I DENTITY T HEFT P OLICY Effective November 1, 2008.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Springfield Technical Community College Security Awareness Training.
Protecting Personal Information Guidance for Business.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
© Chery F. Kendrick & Kendrick Technical Services.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Detecting, Preventing, and Mitigating Identity Theft
Protecting Sensitive Information PA Turnpike Commission.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Electronic Records Management: What Management Needs to Know May 2009.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Privacy Act United States Army (Managerial Training)
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
Payment Card Industry (PCI) Rules and Standards
Protection of CONSUMER information
Citi fraud/identity theft TRAINING
Protecting Personal Information Guidance for Business.
Red Flags Rule An Introduction County College of Morris
Disability Services Agencies Briefing On HIPAA
County HIPAA Review All Rights Reserved 2002.
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
UCA Gramm-Leach Bliley Act (GLBA) Safeguards Rule Compliance Training Effective June 12, 2018 Adapted from materials published by the Federal Trade Commission.
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Lesson 1: Introduction to HIPAA
Protecting Yourself from Fraud including Identity Theft
Getting the Green Light on the Red Flags Rule
Presentation transcript:

FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud

Objectives  Introduction to the law and why it applies to the University  Understand what the law requires  Understand what type of information is used in identity theft  Understand the types of Red Flags  What do to do if a Red Flag surfaces  Security of information  Describe the role of UW central office support  Provide resources regarding Red Flag rules

FACTA - Red Flag Rules The Financial Institution Regulators have issued a final rule (the Red Flag Rule) under sections 114 and 315 of the Fair and Accurate Credit Transactions Act (FACTA), which amended the Fair Credit Reporting Act (FCRA). The Red Flag Rule requires financial institutions (the University of Washington is considered a financial institution) and creditors that hold covered accounts (e.g..; student loan) to develop and implement an identity theft prevention program for new and existing accounts.

Requirements of the Law  Identify risks that signify potentially fraudulent activity  Detect risks  Respond to risks to determine if fraudulent activity has occurred  Update the program periodically

Personally Identifiable Information Consumer’s  First, middle, or last name  Date of birth  Address  Telephone or wireless numbers  Social Security number  Maiden name  Account numbers Credit card information  Account number (whole or part)  Expiration date  Cardholder name  Cardholder address Medical information for any customer  Doctor names and claims  Insurance claims  Prescriptions  Treatment or diagnoses  Any related personal medical information

Red Flag Alerts  Documents provided for identification appear to have been altered or forged  The photograph or physical description on the identification is not consistent with the appearance of the applicant or customer presenting the identification  An application appears to have been altered or forged, or gives the appearance of having been destroyed and reassembled.  Personal identifying information provided is inconsistent when compared against external information.  The Social Security number provided is the same as that submitted by others.  Social Security numbers do not match on all documents.  The customer fails to provide all required personal identifying information on an application or in response to notification that the application is incomplete  Personal identifying information provided is not consistent with personal identifying information on file.  Excessive address changes.  Unusual number of inquires on the account.  A student asking for their student number because they lost their ID card.

What To Do When A Red Flag Surfaces?  Most important - notify your manager immediately  Gather all related documentation  Write a description of the situation  Monitor the account involved  Contact the customer  Change passwords if needed  Notify law enforcement  Or determine no response is warranted in this case

Protection of Customer Information The University is committed to providing protection from identity theft. It is the law:  The Gramm Leach-Bliley Act (GLB) requires protection of customers’ information  The Family Educational Rights and Privacy Act(FERPA) of 1974 (20 U.S.C. §1232g ; 34 CFR Part 99) is a federal law that protects the privacy of students

Information Safeguards Safeguards to protect the security, confidentiality, and integrity of customer information fall into 3 basic categories:  Administrative  Technical  Physical A department that handles non-public personal information must assume responsibility for safeguard procedures. Each department must have a security policy to comply with the law requirements for safeguarding information. Employees must adhere to those safeguard procedures.

Information Safeguards Administrative Safeguards focus on departmental processes and include, but are not limited to:  Adhering to standards for handling customer information  Following basic steps to protect customer information (see next slide)  Promoting awareness and knowledge about applicable policies and expectations  Limiting access to customer information to employees who have a business need to see it  Referring calls or requests for customer information to staff trained to respond to such requests  Being alert to fraudulent attempts to obtain customer information and reporting these to management for referral to appropriate law enforcement agencies

Information Safeguards Technical Safeguards: Technical safeguards regarding hardware and networking are generally designed and provided to campus by Computing and Communications. Department staff must be aware and knowledgeable regarding how their digital customer information is safeguarded.

Information Safeguards Technical Safeguards – Your Workstation:  Use anti-virus software that updates automatically  Maintain up-to-date firewalls if your department manages them internally, particularly if your department uses broadband Internet access or allows staff to connect to the network from home  Use a password protected screensaver or logoff the computer each time you step away  Do not store non-public personal information on personal workstations, use the University network only  Do not send non-public personal information via

Information Safeguards Technical Safeguards – Your Passwords :  Do not post your passwords on or near your terminal  Do not give your passwords out to anyone  Change your passwords periodically (see C&C recommendations on MyUW)  Use complex passwords

Information Safeguards Technical Safeguards – Physical Environment:  Lock and Secure rooms and file cabinets where customer information is kept and limit access to authorized employees  Ensure that storage areas are protected against damage from physical hazards, like fire or floods  Do not leave credit card slips, bank documents or other similar documents in public view  Dispose of information appropriately (see next slide)

Information Safeguards Physical Safeguards –Appropriate disposal:  Designate a trained staff member to supervise the disposal of records containing customer personal information  Shred or recycle customer information recorded on paper and store it in a secure area until the shredding/recycling service picks it up  Erase all data when disposing of computers, diskettes, magnetic tapes, hard drives or any other electronic media that contains customer information  Promptly dispose of outdated customer information within record retention policies  Shred printed material containing financial or personal information once it is no longer needed  NEVER throw documents containing Credit Card, banking, or other non-public personal information directly into the trash or recycling

UW Support The University of Washington provides support by:  periodically assessing security risks  communicating through this training program  providing guidelines for secure computer data  providing resource and educational materials  providing security tools and software  providing support for safeguard failure response

Every Department Plays a Role Each department:  is required to have a security policy  is responsible for training staff  needs to be aware of red flags  needs to assure that staff are familiar with the web sites for safeguarding information of these three types:  administrative  technical  physical The University of Washington central office staff provide support and resources for you to help protect non-public personal information.

Resources Available resources : Many policies, procedures and resources are available that support our efforts to protect non-public personal information. A list of related resources can be found on the University of Washington Information Security Program web page.