“Red Flags Rule”
Click here to download Red Flags Incident Report Form (Word File)
Purpose and Scope
To establish an Identity Theft Prevention Program designed to detect, prevent, and mitigate identity theft in connection with the opening of a covered account or an existing covered account and to provide continued administration of the Program in compliance with Federal Trade Commission (FTC) 16 C.F.R. Part 681.
http://www.ftc.gov/os/fedreg/2007/november/071109redflags.pdf
Elements of the Program include:
ADMINISTRATION OF THE PROGRAM
The Vice President for Planning, Budget and Finance shall be responsible for the development, implementation, oversight, and continued administration of the Program. Under the direction of the VP, the Red Flags Committee shall be responsible for performing and conducting the annual risk assessment, providing training, and reviewing and responding to identity theft incidences. The annual report is provided to the Board of Trustees for review.
Definitions
Account. -- A continuing relationship established by a person with a financial institution
or creditor to obtain a product or service for personal, family, household, or business
purposes. Account includes an extension of credit, such as the purchase of property
or services involving a deferred payment, and a deposit account.
Card Issuer. -- Financial institution or creditor that issues a debit or credit card.
Consumer Reporting Agency. -- Entities that collect and disseminate information about consumers to be used for credit evaluation and certain other purposes.
Consumer Reports. -- Any written, oral, or other communication of any information by a consumer reporting agency bearing on a consumer’s credit worthiness, credit standing, credit capacity, character, general reputation, personal characteristics, or mode of living.
Covered Accounts. -- (1) An account that a financial institution or creditor offers or maintains, primarily for personal, family, or household purposes, that involves or is designed to permit multiple payments or transactions, such as a credit card account, mortgage loan, automobile loan, margin account, cell phone account, utility account, checking account, or savings account; and, (2) Any other account that the financial institution or creditor offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the financial institution or creditor from identify theft, including financial, operational, compliance, reputation, or litigation risks.
Creditor. -- Any person, corporation, government or governmental subdivision or agency, trust, estate, partnership, cooperative, or association who regularly extends, renews, or continues credit; any person who regularly arranges for the extension, renewal, or continuation of credit; or any assignee of an original creditor who participates in the decision to extend, renew, or continue credit.
Customer. -- A person that has a covered account with a financial institution or creditor.
Debit Card. -- Any card issued by a financial institution to a consumer for use in initiating an electronic fund transfer from the account of the consumer at such financial institution for the purpose of transferring money between accounts or obtaining money.
Identity Theft. -- A fraud committed or attempted using the identifying information of another person without authority.
Red Flag. -- A pattern, practice, or specific activity that indicates the possible existence of identity theft.
PROCEDURES
University Agents
Each University department which offers or maintains Covered Accounts will be responsible for managing and protecting information related to covered accounts. Each department will be responsible for taking the proper action to detect, prevent, and mitigate Identity Theft in connection with opening of a Covered Account, which is appropriate to the department’s size, complexity, and the scope of its activities. Specifically, each department should:
Identifying Covered Account Transactions and Requests
The following situations must be monitored closely for Red Flags:
Identifying Red Flags
The following list represents the general potential Red Flags:
Detection of Red Flags
The department shall address the detection of red flags in connection with the opening of covered accounts and existing covered accounts, such as:
Responding to Red Flags
The Program shall provide for appropriate responses to detected red flags to prevent and mitigate identity theft. The response shall be commensurate with the degree of risk posed.
Once potentially fraudulent activity is detected, an employee must act quickly as a rapid appropriate response can protect customers and the University from damages and loss. The employee must gather all related documentation and write a description of the situation. This information must be presented to a department supervisor for determination. The supervisor will complete additional authentication to determine whether the attempted transaction was fraudulent or authentic. All incidences will be reported to the Red Flags Committee using the University’s Incidence Report Form.
Appropriate responses to the detection of red flags include:
Red Flags Committee
The Red Flags Committee will be responsible for the following:
ANNUAL REVIEW OF THE PROGRAM
The program will be re-evaluated annually to determine whether all aspects of the Program are up to date and applicable in the current business environment. This re-evaluation will include:
Red Flag Rules Risk Assessment Training
An Overview
1) What is a “Red Flag”?
A “Red Flag” is defined as a pattern, practice, or specific activity that indicated the possible existence of identity theft. Examples of “Red Flag” incidents include presentation of suspicious identity documents or frequent address changes.
The law requires that a Red Flag policy (from which a Red Flag program will be developed) be approved by the organization’s governing board. Oversight of the program is to be assigned to a senior management level staff member, with program reviews conducted annually.
2) What is the rule regarding Red Flags?
The Red Flag rule requires any organization that maintains a “covered account” to establish, document, and maintain an identity theft prevention program that identifies potential Red Flags, detects the occurrence of Red Flags, and appropriately responds to Red Flags.
3) What is a “Covered Account”?
“Covered accounts” are defined as accounts a creditor holds which are designed to allow multiple payments or transactions after services have been delivered.
Specifically, covered accounts are:
4) What is a “creditor”?
Under the Rules, a creditor is defined as:
5) UVU and Red Flags:
UVU is subject to Red Flag rules because we participate in or offer:
Procedures for Each Department
1) University Agents
Each University department which offers or maintains covered accounts will be responsible for managing and protecting information related to covered accounts as well as for taking the proper action to detect, prevent, and mitigate identity theft in connection with opening a covered account, which is appropriate to the department’s size, complexity, and the scope of its activities.
2) Policies, Procedures, and Documentation
Each department should document and include policies and procedures to:
3) Identifying Covered Accounts Transactions and Requests
The following situations must be monitored closely for Red Flags:
4) Identifying Red Flags
The following list represents the general potential Red Flags:
5) Detection of Red Flags
The department shall address the detection of Red Flags in connection with the opening of covered accounts and existing covered accounts, such as:
6) Responding to Red Flags
Once potentially fraudulent activity is detected, an employee must act quickly as a rapid appropriate response can protect customers and the University from damage and loss. The employee must gather all related documentation and write a description of the situation. This information must be presented to a department supervisor for determination. The supervisor will complete additional authentication to determine whether the attempted transaction was fraudulent or authentic. All incidences will be reported to the Red Flags Committee using the University’s Red Flags Incidence Report Form.
Appropriate responses to the detection of Red Flags include: