Identity Theft Protection (Red Flag) Program

  • Responsible Oversight Executive:ÌýVice President for Administration and Finance
  • Date of Current Revision or Creation:ÌýOctober 30, 2017
  • Download Policy PDF

The purpose of this policy is to implement an Identity Theft Prevention Program pursuant to the Federal Trade Commissions' Red Flags Rule under the Fair Credit Reporting Act to detect, prevent and mitigate incidents of identity theft in order to protect its students, employees and others who entrust their personal information with the University.

, grants authority to the Board of Visitors to make rules and policies concerning the institution. Section 6.01(a)(6) of theÌýBoard of Visitors BylawsÌýgrants authority to the President to implement the policies and procedures of the Board relating to University operations.

Rules issued by the Federal Trade Commission pursuant to theÌýFair Credit Reporting Act ("FCRA") 15 U.S.C. §1681

Regulations issued by the Federal Trade Commission,Ìý

Covered AccountÌý- All student accounts or loans administered by the University.

Credit TransactionÌý- Any transaction where the University loans, defers payment, or extends credit to an individual.

Debit CardsÌý- Any card that allows a balance to decline and/or be refreshed for use in purchase transactions.

Identity TheftÌý- A fraud committed or attempted using the personally identifiable information (PII) of another person without authority.

Personally Identifiable Information (PII)Ìý- Any information used to identify a specific person, including, but not limited to, name, address, and telephone number when combined with social security number, date of birth, government-issued numbers (such as passport, driver's license, alien registration or taxpayer identification), medical record number, or a unique electronic or account number in combination with any required security code, access code or password, or unique biometric data such as fingerprint, voice print, or retina or iris image.

Red FlagÌý- A transaction that a reasonable person should suspect that they may be interacting with an individual using someone else's identity. A pattern, practice or specific activity that indicates a possible existence of identity theft.

Suspicious Activities Report (SAR)Ìý- A report of suspicious activity that arises when a University employee is confronted with a Red Flag. The report shall be in writing and forwarded to the Associate Controller and shall specifically state the party or parties involved, the conduct creating the red flag, and the action or refusal to take action that was a result of the suspicious behavior.

This policy applies to all employees and employees of affiliated organizations who are paid through the University. Employees include all staff, administrators, faculty, full- or part-time, and classified or non-classified persons who are paid by the University. Affiliated organizations are separate entities that exist for the benefit of the University through an operating agreement and include the Foundations, the Community Development Corporation, and the Alumni Association.

¹ÏÉñÍø is committed to complying with Federal regulations concerning the detection, prevention and mitigation of identity theft. In accordance with the Fair Credit Reporting Act (FCRA) and the subsequent "Red Flags Rule" of 2007, the University is required to establish and maintain an Identity Theft Protection Program (hereinafter referred to as "Program") to detect, prevent and mitigate identity theft in connection with new and existing covered accounts.

This policy applies in three applications affecting diverse University constituencies. The first application occurs in the use of criminal background checks performed to employ an individual. The second application occurs in any credit transaction. The third application occurs in the issuance, reissuance or refilling of debit cards.

Each department or unit within the University that conducts background checks or performs any credit or debit transaction shall develop reasonable written policies and procedures to:

  1. Identify relevant Red Flags for new and existing covered accounts and incorporate those Red Flags into the Program;

  2. Detect Red Flags that have been incorporated into the Program;

  3. Respond appropriately to any Red Flags that are detected to prevent and mitigate identity theft; and

  4. Ensure the Program is reviewed at least annually in order to identify and address changes in risks to students, employees, and/or job applicants or to the safety and soundness of the student, employee, and/or job applicant from identity theft.

Ìý

  1. Identification of Red Flags

    In order to identify relevant Red Flags, the University considers the types of accounts that it offers and maintains, methods it provides to open its accounts, methods it provides to access its accounts, and its previous experiences with identity theft. The University identifies the following Red Flags in each of the listed categories:

    1. Notifications and Warnings from Reporting Agencies

      Red Flags:

      1. Receipt of a notice of address discrepancy in response to a report request;

      2. Non-approval of a credit transaction due to possible fraudulent usage.

    2. Suspicious Documents

      Red Flags:

      1. Identification document or card that appears to be forged, altered or inauthentic;

      2. Identification document or card on which a person's photograph or physical description is not consistent with the person presenting the document;

      3. Other document with information that is not consistent with existing student, employee, or job applicant information; and

      4. Application for service that appears to have been altered or forged.

    3. Suspicious Personally Identifiable Information (PII)

      Red Flags:

      1. PII presented that is inconsistent with other information the student,Ìýemployee, or job applicant provides (example: inconsistent birth dates);

      2. PII presented that is inconsistent with other sources of information (for instance, an address not matching an address on a loan application);

      3. PII presented that is the same as information shown on other applications that were found to be fraudulent;

      4. PII presented that is consistent with fraudulent activity (such as an invalid phone number or fictitious billing address);

      5. Social security number presented that is the same as one given by another student, employee, or job applicant;

      6. An address or phone number presented that is the same as that of another person;

      7. A person fails to provide complete PII on an application when reminded to do so; and

      8. A person's PII is not consistent with the information that is on file for the student,Ìýemployee, or job applicant.

    4. Suspicious Covered Account Activity or Unusual Use of Account

      Red Flags:

      1. Change of address for an account followed by a request to change the student's, employee's,Ìýor job applicant'sÌýname;

      2. Payments stop on an otherwise consistently up-to-date account;

      3. Account used in a way that is not consistent with prior use;

      4. Mail sent to the student, employee or job applicant that is repeatedly returned as undeliverable;

      5. Notice to the University that a student, employee or job applicant is not receiving mail sent by the University;

      6. Notice to the University that an account has unauthorized activity;

      7. Breach in the University's computer system security involving PII; and

      8. Unauthorized access to or use of student account information.

    5. Alerts from Others

      Red Flags:

      Notice to the University from a student, employee, job applicant, identity theft victim, law enforcement or other person that the University has opened or is maintaining a fraudulent account for a person engaged in Identity Theft.

  2. Detecting Red Flags

    1. Student Enrollment

      In order to detect any of the Red Flags identified above associated with the enrollment of a student, University personnel will take the following steps to obtain and verify the identity of the person opening the account:

      1. Require certain PII such as name, date of birth, academic records, home address or other identification; and

      2. Verify the student's identity at time of issuance of student identification card (review of driver's license or other government-issued photo identification).

    2. Existing Accounts

      In order to detect any of the Red Flags identified above for an existing covered account, University personnel will take the following steps to monitor transactions on an account:

      1. Verify the identification of students if they request information (in person, via telephone, via facsimile, via email);

      2. Verify the validity of requests to change billing addresses by mail or email and provide the student a reasonable means of promptly reporting incorrect billing address changes; and

      3. Verify changes in banking information given for billing and payment purposes.

    3. Criminal Background Check Requests

      In order to detect any of the Red Flags identified above for employment in a position for which a criminal background report is sought, University personnel will take the following steps to assist in identifying address discrepancies:

      1. Require written verification from any jobÌýapplicant that the address provided by the applicant is accurate at the time the request for the background check is made; and

      2. In the event that notice of an address discrepancy is received, verify that the background check pertains to the jobÌýapplicant for whom the requested report was made.

  3. Preventing and Mitigating Identity Theft

    In the event University personnel detect any identified Red Flags, such personnel shall take one or more of the following steps, depending on the degree of risk posed by the Red Flag:

    1. Prevent and Mitigate:
      1. Continue to monitor a covered account for evidence of identity theft;

      2. Contact the student, employee or jobÌýapplicant;

      3. Change any passwords or other security devices that permit access to covered accounts;

      4. Do not open a new covered account;

      5. Provide the student, employee or jobÌýapplicant with a new identification number;

      6. Notify the Program Administrator for determination of the appropriate step(s) to take;

      7. Notify law enforcement;

      8. File or assist in filing a Suspicious Activities Report ("SAR"); or

      9. Determine that no response is warranted under the particular circumstances.

    2. Protect Personally Identifiable Information (PII):

      In order to further prevent the likelihood of identity theft occurring with respect to covered accounts, the University will take the following steps with respect to its internal operating procedures to protect PII:

      1. Ensure that its website containing PII is secure or provide clear notice that the website is not secure;

      2. Ensure complete and secure destruction of paper documents and computer files containing student, employee or job applicant account information when a decision has been made to no longer maintain such information; ensure that those records containing PII are destroyed within six months of the expiration of their retention period;

      3. Ensure the computer systems follow the IT Security Program and that systems handling PII are reviewed for risk, classified appropriately, and that appropriate controls are used;

      4. Avoid use of social security numbers;

      5. Require and keep only the kinds of student, employee and jobÌýapplicant information that are necessary for University purposes; and

      6. Adhere toÌý, for all PII maintained in any electronic format.

  4. Program Administration

    1. Oversight

      Responsibility for developing, implementing and updating this Program lies with the Associate Controller.

    2. Staff Training and Reports

      Each department or unit that conducts background checks, issues debit cards or issues credit transactions is responsible for ensuring that staff are trained as necessary, to effectively implement the Program. University employees are expected to notify the Associate Controller once they become aware of an incident of identity theft or of the University's failure to comply with this Program.

      Each department or unit within the University that conducts background checks, issues debit cards or issues credit transactions shall annually (prior to November 1) provide the Associate Controller a copy of the written procedures and sign-in sheet used at the annual training session. The Associate Controller shall provide a summary of all procedures and training to the Audit Committee of the Board of Visitors for their review with recommendations, if any, of suggested changes to better identify and react to Red Flags.

    3. Service Provider Arrangements

      In the event the University engages a service provider to perform an activity in connection with one or more covered accounts, the University will take the following steps to ensure the service provider performs its activity in accordance with reasonable policies and procedures designed to detect, prevent and mitigate the risk of identity theft.

      1. Require, by contract, that service providers have such policies and procedures in place; and

      2. Require, by contract, that service providers review the University's Program and report any Red Flags to the Associate Controller or the University employee with primary oversight of the service provider relationship.

    4. Program Updates

      The Associate Controller will periodically review and update this Program to reflect changes in risks to students, employees and jobÌýapplicants. In doing so, the Associate Controller will consider the University's experiences with identity theft situations, changes in identity theft methods, changes in identity theft detection and prevention methods, and changes in the University's business arrangements with other entities. After considering these factors, the Associate Controller will determine whether changes to the Program, including the listing of Red Flags, are warranted. If warranted, the Associate Controller will update the Program.

Applicable records must be retained for three years and then destroyed in accordance with theÌý.

Assistant Vice President for Finance/University Controller

Policy History

Policy Formulation Committee (PFC) & Responsible Officer Approval to Proceed:

/s/ÌýMary Deneen


Responsible Officer


October 18, 2017


Date


Policy Review Committee (PRC) Approval to Proceed:

/s/ÌýDonna W. Meeks


Chair, Policy Review Committee (PRC)


April 11, 2017


Date


Executive Policy Review Committee (EPRC) Approval to Proceed:

/s/ÌýGregory E. DuBois


Responsible Oversight Executive


October 23, 2017


Date


University Counsel Approval to Proceed:

/s/ÌýR. Earl Nance


University Counsel


October 24, 2017


Date


Presidential Approval:

/s/ÌýJohn R. Broderick


President


October 30, 2017


Date

Previous Revisions: June 24, 2010; October 30, 2017

Scheduled Review Date: October 30, 2022