Red Flags Compliance How It Has Changed Customer Policies & Procedures Teresa Corlew, Vice President Customer Care Nashville Electric Service September.

Slides:



Advertisements
Similar presentations
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Advertisements

Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Red Flag Rules: What they are? & What you need to do
© Chery F. Kendrick & Kendrick Technical Services.
Review Questions Business 205
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
Springfield Technical Community College Security Awareness Training.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Gramm-Leach-Bliley Act for Financial Aid Val Meyers Associate Director Michigan State University.
Protecting Personal Information Guidance for Business.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
The New Rules of F&I with Peter Jones The New Rules of F&I What are the Rules? Red Flag Rule Graham / Leach / Bliley Act Privacy Notice Safeguard Rule.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Red Flags Rule & Municipal Utilities
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
PRIVACY A Consumer Reporting Agency Perspective. Collect and Sell Information on People Credit Bureaus – Equifax, Experian & TransUnion – are CRA’s But.
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
© Chery F. Kendrick & Kendrick Technical Services.
Developing a Records & Information Retention & Disposition Program:
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
What Will My Records Retention Schedule Look Like ?
1Copyright Jordan Lawrence. All rights reserved. Annual In-House Symposium Practical Steps to Minimize Privacy Risks: Understanding The Intersection.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Sharing Low-Income Customer Information Water & Energy Utilities LIOB Meeting - January 2009 Seaneen M Wilson Division of Water & Audits.
Electronic Records Management: What Management Needs to Know May 2009.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
© Chery F. Kendrick & Kendrick Technical Services, LLC.
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
1 Texas Regional Entity 2008 Budget Update May 16, 2007.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
1 st Choice Document Destruction th Avenue, Milaca, Minnesota Office: Cell:
Unit 9 Seminar Business Organizations. Things to do this unit: UNIT 9 – Read Chapter 13 and 14 – Respond to the Discussion Board – Attend the Weekly Seminar.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Is Your Background Check Process Compliant?. 2 © Copyright 2015 ADP, LLC. Proprietary and Confidential Information. Agenda Privileged & Confidential.
Managing Chapter Funds Brent Woods, Esq., CAE, SPHR NIGP Executive Director for Business Operations and Finance.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Copyright, Intellectual Property, and Privacy 1 Lesson Plan: BMM A9-4.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
1 Identity Theft Prevention and the Red Flag Rules.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Protection of CONSUMER information
Chapter 3: IRS and FTC Data Security Rules
Protecting Personal Information Guidance for Business.
Red Flags Rule An Introduction County College of Morris
Disability Services Agencies Briefing On HIPAA
County HIPAA Review All Rights Reserved 2002.
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Government Data Practices & Open Meeting Law Overview
Chapter 6 Powers and Functions of Administrative Agencies.
Lesson 1: Introduction to HIPAA
Government Data Practices & Open Meeting Law Overview
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Red Flags Compliance How It Has Changed Customer Policies & Procedures Teresa Corlew, Vice President Customer Care Nashville Electric Service September 15, 2009

1 Nashville Electric Service  NES among 12 largest public electric utilities in U.S.  Approximately 357,000 customers over 700 square miles  Serves Nashville, Tenn., and portions of 6 surrounding counties  Approximately 1,000 employees

2 Surprised by a federal law  NES has lobbyists & lawyers who monitor local, state and federal laws that could affect us  Typically have long advance notice of proposed legislation  Learned about a year ago that utilities must comply with FACT Act of 2003  Deadline for compliance has been extended several times

3 What is the FACT Act (Red Flags) Law? Fair & Accurate Credit Transaction (FACT) Act Passed by Congress and enforced by the Federal Trade Commission (FTC) Utilities #3 on the list of favorite places for ID thieves to troll for information (behind only credit card & cell phone companies) Red Flag – a pattern, practice or specific activity that triggers belief that identify theft has occurred 26 specific “flags” included in law

4 Swing into action  Notified Exec. Mgt. of federal guidelines  Shoot the messenger – I was appointed Privacy Officer  Formed internal committee  Attended training  Hired outside legal counsel  Drafted policy (approved by board Oct. 2008)

5 NES committee make-up Privacy Officer (VP Customer Care) Mgr. Facilities & Security Mgr. Accounting Paralegal Strategic Applications Software Tech Trainer (Customer Relations) VP Human Resources

6 Immediate actions taken by committee  Reviewed NES policies & procedures & compared to Red Flags guidelines  Legal dept. reviewed vendor & contractor contracts to be sure safeguards in place to provide protection of confidential customer data  Added a laptop computer security policy  Removed SS & banking #s from many computer screens  Investigated CSR internet access

7 Immediate actions cont. Investigated off-site storage procedure for back- up files Investigated back-door access to controlled information Investigated outside access to controlled information Examined existing trash disposal process Reviewed areas where confidential information is stored

8 Immediate actions cont. Contracted with document mgt. service to dispose of papers containing confidential information Required all employees with access to confidential information to sign confidentiality statement Removed ring-down phones in customer lobbies Placed privacy screens on all customer service computers

9 Long-term actions & effects  Previously, took customers’ word when calling to sign up for service or request info on acct  Decision made to contract with CRA to provide identity checks, as well as credit checks  CRA contract process painfully slow; signed contract July 09 that includes all Metro Nashville government agencies that must comply with Red Flags rules

10 Long-term actions & effects cont. Expensive – NES estimated cost nearly $600,000 for 5 years New accts (requiring both credit & identity checks) = 4,500 annually Changes/questions on active accts (requiring either identity or credit check, but not both) = 4,200 annually Does not include turn-off orders & automatic turn-ons for apartment complexes

11 Long-term actions & effects cont. Long-term project underway to review mainframe security rights of all employees Mammoth task; review still underway Process in place to have manager review access requests before access is granted

12 Training  Compiled list of about 100 employees who need Red Flags training  Training scheduled for December 09; delayed due to contract delay; IT programming  Training conducted by in-house trainer; will include training on how to use CRA info  Follow Red Flag procedures on how much training and to whom

13 Other considerations  NES elected not to do a “scrub” of records  NES elected not to put details about the length and frequency of training in official policy

Thank You