Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, 2008. These.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

JPMorgan Chase Purchasing Card Training
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
T OWN OF M OORESVILLE I DENTITY T HEFT P OLICY Effective November 1, 2008.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
What You Need to Know Customer Service 1 08/09/2012.
Check It Out 1. 2 Introductions Instructor and student introductions Module overview.
1 Raymond Doray Conflicts between the new Canadian Money Laundering Act and the rules of professional conduct and ethics September 13, 2002.
Detecting, Preventing, and Mitigating Identity Theft
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
Check It Out 1. 2 Purpose Check It Out will teach you how to use a checking account responsibly.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
Proof of Identity Training Guide 1 This Red Flag Identification and Detection Plan is designed to assist automotive dealers in the detection of the Federal.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Using credit is a way of life. People use credit online and for everyday purposes. Some do it so they don’t have to carry cash. Some use it to buy things.
Red Flag Training 3/14/13. Partners for the Path Ahead HomeBridge has created the following fraud prevention “red flags” training tool to help detect.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Red Flag Rules Identity Theft Prevention Tips for Ambulance Personnel -
WHO’s IN YOUR “WALLET” WHO’s IN YOUR “WALLET” YOU BETER “RECOGNIZE” YOU BETER “RECOGNIZE” STEPPING $2o0 $300 $400 $500 $400 $300 $200 $500 $400 $300.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
You. are at risk for the fastest growing crimes crime.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
TAKE CHARGE OF YOUR FINANCIAL FUTURE. 1.WHAT IS CREDIT? 2.WHY DO WE NEED CREDIT? 3.HOW DO WE GET CREDIT?
UNC Asheville Red Flag Rule and NC Identity Protection Act Information.
Protecting Your Credit Identity
University of St. Thomas
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
FACT Act Training for Staff Identity Theft “Red Flags”
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Red Flags 101

What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These sections of the Fair and Accurate Credit Transaction Act, required financial institutions to establish a written program, develop policies and procedures and train appropriate personnel. That’s You!!

Section 114 deals with the Red Flag Guidelines which are designed to help detect, prevent and mitigate Identity Theft issues that may arise during the course of business. Section 315 deals with address discrepancies and steps that must be taken to reconcile the matter.

What It Means To You As an employee of this institution, it is essential that all the necessary steps are taken to protect our customer’s from Identity Theft and be there for them, should an instance of ID Theft occur. How can you do this? Easy! Watch for the Red Flags and follow policies and procedures!

So, what are these Red Flags There are 26 Red Flags lumped in to 5 categories:  Alerts, Notifications or Warnings from a consumer reporting agency  Suspicious documents  Suspicious personal identifying information  Unusual use of, or suspicious activity related to the covered account  Notice from Customers, Victims of Identity Theft, Law Enforcement Authorities, or Other Persons Regarding Possible Identity Theft in Connection with Covered Accounts Held by the Financial Institution or Creditor ???

Alerts, Notifications or Warnings From a Consumer Reporting Agency 1 - A fraud alert or active duty alert is included with a consumer report. 2 – A consumer reporting agency provides a notice of credit freeze in response to a request for a consumer report. 3 - A consumer reporting agency providing a notice of address discrepancy.

Alerts, Notifications or Warnings From a Consumer Reporting Agency 4 – A consumer report indicates a pattern of activity that is inconsistent with the history and usual pattern of activity of an applicant or customer, such as: a. A recent and significant increase in the volume of inquiries; b. An unusual number of recently established credit relationships; c. A material change in the use of credit, especially with respect to recently established credit relationships; or d. An account that was closed for cause or identified for abuse of account privileges by a financial institution or creditor.

Suspicious Documents 5. Documents provided for identification appear to have been altered or forged. 6. The photograph or physical description on the identification is not consistent with the appearance of the applicant or customer presenting the identification. 7. Other information on the identification is not consistent with information provided by the person opening a new covered account or customer presenting the identification.

Suspicious Documents 8. Other information on the identification is not consistent with readily accessible information that is on file with the financial institution or creditor, such as a signature card or a recent check. 9. An application appears to have been altered or forged, or gives the appearance of having been destroyed and reassembled.

Suspicious Personal Identifying Information 10. Personal identifying information provided is inconsistent when compared against external information sources used by the financial institution or creditor. For example: a. The address does not match any address in the consumer report; or b. The Social Security Number (SSN) has not been issued, or is listed on the Social Security Administration’s Death Master File.

Suspicious Personal Identifying Information 11. Personal identifying information provided by the customer is not consistent with other personal identifying information provided by the customer. For example, there is a lack of correlation between the SSN range and date of birth. 12. Personal identifying information provided is associated with known fraudulent activity as indicated by internal or third-party sources used by the financial institution or creditor. For example: a. The address on an application is the same as the address provided on a fraudulent application; or b. The phone number on an application is the same as the number provided on a fraudulent application.

Suspicious Personal Identifying Information, continued… 13. Personal identifying information provided is of a type commonly associated with fraudulent activity as indicated by internal or third-party sources used by the financial institution or creditor. For example: a. The address on an application is fictitious, a mail drop, or a prison; or b. The phone number is invalid, or is associated with a pager or answering service.

Suspicious Personal Identifying Information, continued… 14. The SSN provided is the same as that submitted by other persons opening an account or other customers. 15. The address or telephone number provided is the same as or similar to the account number or telephone number submitted by an unusually large number of other persons opening accounts or other customers.

Suspicious Personal Identifying Information, continued… 16. The person opening the covered account or the customer fails to provide all required personal identifying information on an application or in response to notification that the application is incomplete. 17. Personal identifying information provided is not consistent with personal identifying information that is on file with the financial institution or creditor.

Suspicious Personal Identifying Information, continued… 18. For financial institutions and creditors that use challenge questions, the person opening the covered account or the customer cannot provide authenticating information beyond that which generally would be available from a wallet or consumer report.

Unusual use of, or suspicious activity related to, the covered account 19. Shortly following the notice of a change of address for a covered account, the institution or creditor receives a request for a new, additional, or replacement card or a cell phone, or for the addition of authorized users on the account.

Unusual use of, or suspicious activity related to, the covered account 20. A new revolving credit account is used in a manner commonly associated with known patterns of fraud patterns. For example: a. The majority of available credit is used for cash advances or merchandise that is easily convertible to cash (e.g., electronics equipment or jewelry); Or b. The customer fails to make the first payment or makes an initial payment but no subsequent payments.

Unusual use of, or suspicious activity related to, the covered account, cont… 21. A covered account is used in a manner that is not consistent with established patterns of activity on the account. There is, for example: a. Nonpayment when there is no history of late or missed payments; b. A material increase in the use of available credit; c. A material change in purchasing or spending patterns; d. A material change in electronic fund transfer patterns in connection with a deposit account; or e. A material change in telephone call patterns in connection with a cellular phone account.

Unusual use of, or suspicious activity related to, the covered account, cont… 22. A covered account that has been inactive for a reasonably lengthy period of time is used (taking into consideration the type of account, the expected pattern of usage and other relevant factors). 23. Mail sent to the customer is returned repeatedly as undeliverable although transactions continue to be conducted in connection with the customer’s covered account.

Unusual use of, or suspicious activity related to, the covered account, cont… 24. The financial institution or creditor is notified that the customer is not receiving paper account statements. 25. The financial institution or creditor is notified of unauthorized charges or transactions in connection with a customer’s covered account.

Notice from Customers, Victims of Identity Theft, Law Enforcement Authorities, or Other Persons Regarding Possible Identity Theft in Connection with Covered Accounts Held by the Financial Institution or Creditor 26. The financial institution or creditor is notified by a customer, a victim of identity theft, a law enforcement authority, or any other person that it has opened a fraudulent account for a person engaged in identity theft.

By now, you should be familiar with these red flags and the new policies and procedures that are in place to help this institution detect, prevent and mitigate Identity Theft. Let’s Try Some Scenario's!

An individual comes to you and says they would like to open a new account. While getting the necessary documents needed to open the account, you notice that the photo on the drivers license differs greatly from the appearance of the person in front of you. This is considered a Red Flag. What should you do? A. Ignore it. You’re sure everything is fine. B. Turn to Bank procedure, as this is a indicator of possible ID Theft. Possible outcomes: SAR will be filed and the account will not be opened until the identity of the individual can be firmly determined.

Mr. Smith has been a long time customer of yours. He always pays his payments on time but this month, he appears on your late payment report. Is this considered a Red Flag? Yes! Mr. Smith’s normal pattern and practice has deviated and should not be taken lightly. Turn to policies and procedures for the appropriate steps to take. This may include contacting the customer and thoroughly documenting the conversation.

A consumer credit report is pulled for an applicant. The report states that there is an address discrepancy but you personally know the applicant and the address given is the correct one. Do you need to do anything? Of course! It is your responsibility to report the correct address to the consumer credit reporting agency and document that you took the necessary steps to identify the correct address. This may involve completing a checklist on how the correct address was established. Policy and procedure should direct you explicitly.

Mr. Foster notifies you that he hasn’t been getting his statements lately. He states that it’s probably just the new mail carrier and not to worry; He’ll just take a print-out of his account. He’s not worried. Should you be? YES! This is considered a Red Flag and should be investigated. Perhaps Mr. Foster’s missing statements are due to his identity being stolen and not just the new mail carrier. Look to Bank policies and procedures for the necessary steps to take.

From the scenario’s provided, you can clearly see that Red Flags can affect all areas of the institution from the teller line to the closing table; from consumer to commercial customers. Don’t be afraid to question something that doesn’t feel right. You may be saving someone from becoming the next victim of Identity Theft!