Red Flag Identity Theft Prevention Program: Difference between revisions

Line 53: Line 53:
== Detecting Red Flags ==
== Detecting Red Flags ==


The following actions will be taken as appropriate to confirm the identity of customers when they open and/or access Covered Accounts:
#The following actions will be taken as appropriate to confirm the identity of customers when they open and/or access Covered Accounts:          
           
#* Obtain appropriate personal identifying information (e.g. photo identification, date of birth, academic status, user name and password, address, etc.) prior to opening or allowing access to a covered account; or prior to issuing a new or replacement ID card.
* Obtain appropriate personal identifying information (e.g. photo identification, date of birth, academic status, user name and password, address, etc.) prior to opening or allowing access to a covered account; or prior to issuing a new or replacement ID card.
#* When certain changes are made to Covered Accounts online, the account holder shall receive notification to confirm the change is valid.
* When certain changes are made to Covered Accounts online, the account holder shall receive notification to confirm the change is valid.
#* Verify the accuracy of changes made to Covered Accounts that appear to be suspicious.
* Verify the accuracy of changes made to Covered Accounts that appear to be suspicious.<br /><br />
#Information systems containing Covered Account information shall be monitored by the appointed information system custodian/administrator to detect any unusual user activity that could indicate improper access to and/or use of consumer information.
Information systems containing Covered Account information shall be monitored by the appointed information system custodian/administrator to detect any unusual user activity that could indicate improper access to and/or use of consumer information.  
 
   
== Responding to Red Flags ==
== Responding to Red Flags ==