Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a Red Flag: Understanding the Fair and Accurate Credit Transactions Act, the Red Flag.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
WELCOME Iowa State University Identity Theft Prevention Program
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
T OWN OF M OORESVILLE I DENTITY T HEFT P OLICY Effective November 1, 2008.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Identity Theft Prevention Program Fighting Fraud at The University of Montana Red Flags Rules.
The New Rules of F&I with Peter Jones The New Rules of F&I What are the Rules? Red Flag Rule Graham / Leach / Bliley Act Privacy Notice Safeguard Rule.
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
©2012 CliftonLarsonAllen LLP Red Flags- Why This Matters to You An overview of the FACT Act Identity Theft Red Flag Rule and its current impact.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
What You Need to Know Customer Service 1 08/09/2012.
Detecting, Preventing, and Mitigating Identity Theft
© Chery F. Kendrick & Kendrick Technical Services.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
FAIR CREDIT REPORTING ACT.  Serves the following principal purposes:  To regulate the consumer-reporting industry.  To prohibit unfair actions from.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
The FTC’s Red Flag Rule. FTC Red Flag Regulations Why the Red Flag Regulations?
Proof of Identity Training Guide 1 This Red Flag Identification and Detection Plan is designed to assist automotive dealers in the detection of the Federal.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Red Flag Training 3/14/13. Partners for the Path Ahead HomeBridge has created the following fraud prevention “red flags” training tool to help detect.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
How to Use Online Registration – Student Quick Reference Guide This quick reference guide contains step by step instructions on how to: 1.Register online.
Red Flag Rules Identity Theft Prevention Tips for Ambulance Personnel -
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
4. Select Student Services & Financial Aid Menu and Click on Online Registration menu How to Use Online Registration – Student Quick Reference Guide This.
UNC Asheville Red Flag Rule and NC Identity Protection Act Information.
Compliance With the Red Flags Rule in Higher Education
University of St. Thomas
Citi fraud/identity theft TRAINING
Red Flag Rules: Identity Theft Protection.
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
FACT Act Training for Staff Identity Theft “Red Flags”
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Red Flag Rules Training Class SD 428

Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines put forth by the Federal Trade Commission. 2

Red Flag Rules SD 428 In response to the growing threat of Identity theft, the United States Congress passed the Fair and Accurate Credit Transactions Act of 2003 (FACTA). On November 9,2007, the Federal Trade Commission circulated the final rules, know as the “Red Flag Rules”. In response to the growing threat of Identity theft, the United States Congress passed the Fair and Accurate Credit Transactions Act of 2003 (FACTA). On November 9,2007, the Federal Trade Commission circulated the final rules, know as the “Red Flag Rules”. 3

Red Flag Rules SD 428 The University has developed a policy for the identification, detection and prevention of identity theft. The policy is located in the FMOG, Section 2-Red Flag Rules. The FTC also requires users to “train staff, as necessary, to effectively implement the program”. The University has developed a policy for the identification, detection and prevention of identity theft. The policy is located in the FMOG, Section 2-Red Flag Rules. The FTC also requires users to “train staff, as necessary, to effectively implement the program”. 4

Red Flag Rules SD 428 Why Universities? According to the FTC, any business that handles a “covered account” is responsible to follow the Red Flag Rules. What is a Covered account? An account that involves or is designed to permit multiple payments or transactions, which is primarily for personal, family or household purposes. It is also any account for which there is a reasonably foreseeable risk of identity theft. Examples of Covered Accounts include, but are not limited to:   Student loan and tuition accounts   Patient medical service accounts   Accounts associated with employee benefits, student debit cards and meal plans. 5

Red Flag Rules SD 428 UTSA departments identified as being responsible for opening -directly or indirectly – covered accounts include. Business Affairs:   Administration: Business Auxiliary Services Operations   Financial Affairs: Financial Services and University Bursar, Perkins Student Loans, Fiscal Services Office   UTSA Police Department Student Affairs:   Admissions   Registrar   Student Enrollment Services Center   Student Financial Aid UTSA departments identified as being responsible for opening -directly or indirectly – covered accounts include. Business Affairs:   Administration: Business Auxiliary Services Operations   Financial Affairs: Financial Services and University Bursar, Perkins Student Loans, Fiscal Services Office   UTSA Police Department Student Affairs:   Admissions   Registrar   Student Enrollment Services Center   Student Financial Aid 6

Red Flag Rules SD 428 What are “Red Flags”? Red flags are suspicious patterns or practices, or specific activities that indicate the possibility that identity theft may occur. This may include.   Alerts, notifications or warning from consumer reporting agencies   Suspicious documents   Suspicious personal identifying information   Unusual use of or suspicious activity related to covered accounts. What are “Red Flags”? Red flags are suspicious patterns or practices, or specific activities that indicate the possibility that identity theft may occur. This may include.   Alerts, notifications or warning from consumer reporting agencies   Suspicious documents   Suspicious personal identifying information   Unusual use of or suspicious activity related to covered accounts. 7

Red Flag Rules SD Examples include   Address discrepancy is received in response to a request for a consumer report   ID documents or card that appears to have been altered or forged   ID photograph or physical description is not consistent with the appearance of the customer presenting the documents   Inconsistent birth dates on identifying documents   Social Security Number or Banner ID is the same as submitted by another customer. Examples include   Address discrepancy is received in response to a request for a consumer report   ID documents or card that appears to have been altered or forged   ID photograph or physical description is not consistent with the appearance of the customer presenting the documents   Inconsistent birth dates on identifying documents   Social Security Number or Banner ID is the same as submitted by another customer.

Red Flag Rules SD 428 9

This is a open enrollment course. Any employee with access to the My Training website will be able to take the course. There is a Course Acknowledgment at the end of the course. Training and Development will be sending out notices to current employees in the identified departments once the course is available. New employees will also be required to take the course. This is a open enrollment course. Any employee with access to the My Training website will be able to take the course. There is a Course Acknowledgment at the end of the course. Training and Development will be sending out notices to current employees in the identified departments once the course is available. New employees will also be required to take the course. 10

QuestionsQuestions 11