1,707
edits
Line 53: | Line 53: | ||
== Detecting Red Flags == | == Detecting Red Flags == | ||
The following actions will be taken as appropriate to confirm the identity of customers when they open and/or access Covered Accounts: | #The following actions will be taken as appropriate to confirm the identity of customers when they open and/or access Covered Accounts: | ||
#* Obtain appropriate personal identifying information (e.g. photo identification, date of birth, academic status, user name and password, address, etc.) prior to opening or allowing access to a covered account; or prior to issuing a new or replacement ID card. | |||
* Obtain appropriate personal identifying information (e.g. photo identification, date of birth, academic status, user name and password, address, etc.) prior to opening or allowing access to a covered account; or prior to issuing a new or replacement ID card. | #* When certain changes are made to Covered Accounts online, the account holder shall receive notification to confirm the change is valid. | ||
* When certain changes are made to Covered Accounts online, the account holder shall receive notification to confirm the change is valid. | #* Verify the accuracy of changes made to Covered Accounts that appear to be suspicious. | ||
* Verify the accuracy of changes made to Covered Accounts that appear to be suspicious. | #Information systems containing Covered Account information shall be monitored by the appointed information system custodian/administrator to detect any unusual user activity that could indicate improper access to and/or use of consumer information. | ||
Information systems containing Covered Account information shall be monitored by the appointed information system custodian/administrator to detect any unusual user activity that could indicate improper access to and/or use of consumer information. | |||
== Responding to Red Flags == | == Responding to Red Flags == | ||