Red Flags for Identity Theft (2024)

twoColumn twoLeft

Purpose and Scope of Red Flag Rules

  • What is the purpose and why do we need Red Flag rules?

    The purpose of Red Flag rules is to establish an identity theft program to detect, prevent and mitigate identity theft pursuant to the Federal Trade Commission (FTC) Red Flag rules.

    Red Flags program is aimed at having companies set up procedures to look for and respond to "Red Flags" that indicate an identity thief is trying to use someone else's information. By doing so, Red Flag rules seek to reduce the damage identity thieves can inflict on victims of identity theft and on businesses left with accounts receivable balances that they'll never be able to collect. Companies set up procedures to look for and respond to "Red Flags" that indicate an identity thief is trying to use someone else's information

  • What are the definitions of the terminology used in Red Flag Rules?

    "Account"--means a continuing relationship established by a person with a creditor to obtain a product or service for personal, family, household or business purposes. It includes:

    • an extension of credit, such as the purchase of property or services involving a deferred payment (payment plan)
    • a deposit account

    "Covered Account" is:

    • an account that a creditor offers or maintains, primarily for personal, family, or household purposes, that involves or is designed to permit multiple payments or transaction and
    • any other account that the creditor offers to maintain for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the creditor from identity theft, including financial, operational, compliance, reputation, or litigation risks

    "Identity Theft" is a fraud committed or attempted using the identifying information of another person without authority

    "Red Flag" is a pattern, practice, or specific activity that indicates the possible existence of identity theft

    "Service Provider" is a person that provides a service directly to the financial institution or creditor

  • What are some examples of Red Flags?
    1. Notifications and Warnings from Credit Reporting Agencies
      1. Report of fraud accompanying a credit report
      2. Notice or report from a credit agency of a credit freeze on an applicant
      3. Notice or report from a credit agency of an active duty alert for an applicant
      4. Receipt of a notice of address discrepancy in response to a credit report request
      5. Indication from a credit report of activity that is inconsistent with an applicant's usual pattern or activity
    2. Suspicious Documents:
      1. Identification document or card that appears to be forged, altered, or inauthentic
      2. identification document or card on which a person's photograph or physical description is inconsistent with the person presenting the document
      3. Other document with information that is inconsistent with existing identifying information
      4. Application for service that appears to have been altered or forged
    3. Suspicious Personal Identifying Information
      1. Identifying information presented that is inconsistent with other information provided (ex.-inconsistent birth dates)
      2. Identifying information presented that is inconsistent with other sources of information (such as an address not matching an address on a loan application)
      3. Identifying information presented that is the same as information shown on other applications that were found to be fraudulent
      4. Identifying information presented that is consistent with fraudulent activity (such as an invalid phone number or fictitious billing address)
      5. Social Security number presented that is the same as one given by another person
      6. An address or phone number presented that is the same as that of another person
      7. A person fails to provide complete personal identifying information on an application when reminded to do so
      8. A person's identifying information is inconsistent with the information that is on file for that person
    4. Suspicious Covered Account Activity or Unusual Use of Account
      1. Change of address for an account followed by a request to change the person's name
      2. Payments stop on an otherwise consistently up-to date account
      3. Account used in a way that is inconsistent with prior use
      4. Mail sent to the individual is repeatedly returned as undeliverable
      5. Notice to the University that a person is not receiving mail sent by the University
      6. Notice to the University that an account has unauthorized activity
      7. Notice to the University that an account has unauthorized activity
      8. Breach in the University's computer system security
      9. Unauthorized access to or use of student account information
    5. Alerts from Others
      1. Notice to the University from an individual, identity theft victim, law enforcement official, or other person that the University has opened or is maintaining a fraudulent account for a person engaged in identity theft
  • What are some examples of Covered Accounts that apply to the University?

    Examples of Covered Accounts that apply to the University are:

    • Student Billing and Receivables
    • Accounts in collection
    • Payment plans, including housing payment plans
    • Repayment plans
    • Student Refunds
    • Student Records
    • Student ID card (Osprey card)
    • Payroll advances
    • Credit bureau data
  • How are Red Flags typically detected?

    Enrollment

    1. Require certain identifying information such as photo identification, name, date of birth, academic records, home address, or other identification before opening a covered account or allowing access to a covered account

    Business Services

    1. Verify the person's identity at time of issuance of identification card (review of driver's license or other government-issued photo identification to ensure the photo, name, address, date of birth matches)

    Existing Accounts

    1. Verify the identification of the individual if they request information (in person, via telephone, via facsimile, via email)
    2. Verify the validity of requests to change billing addresses by mail or email and provide a reasonable means of promptly reporting incorrect billing address changes
    3. When certain changes are made online, students and individuals holding covered accounts shall receive notification to confirm the change was valid and to provide instruction in the event the change is invalid
    4. Verify changes in banking information given for billing and payment purposes
    5. Any suspicious changes made to covered accounts that relate to an account holder's identity, administration of the account, and billing and payment information shall be verified

    Consumer Credit Report Requests

    1. Require written verification from any applicant that the address provided by the applicant is accurate at the time the request for the credit report is made to the consumer reporting agency
    2. In the event that notice of an address discrepancy is received, verify that the credit report pertains to the applicant for whom the requested report was made and report to the consumer reporting agency an address for the applicant that the University has reasonably confirmed to be accurate

University Staff Roles and Responsibilities

  • How do I find out if the Red Flags policy applies to my department?

    Red Flags policy applies to your department if your department engages in any of the following activities:

    • Enters or alters personally identifying information in a university system or database
    • Maintains systems that generate personally identifying information
    • Offers goods or services that individuals can pay for later on an account administered by, or on behalf of, your office
    • Administers billing, declining balance, debit, or other accounts whether on behalf of your own department or another university department
    • Makes loans, such as short-term loans to students, faculty, or staff
    • Administers student loans
    • Issues cards to individuals that can be used to access accounts
    • Uses consumer credit reports such as Experian, Transunion or Equifax
    • Reports information to credit reporting agencies
    • Bills for fines
    • Pursues debt collection
    • Offers leases to individuals for personal/non-business purposes
    • Sells or transfers debts to a third party
  • What is the University's Policy regarding identifying and mitigating Identity Theft?

    It is the University's Policy to:

    • Identify covered accounts
    • Verify identification for any student, faculty or staff member requesting services. Look to see if the identification appears to have been altered or forged
    • Verify the picture and physical description match the appearance of the person presenting the identification
    • Verify the information on the identification is consistent with other information on file at the University
    • Verify requests for information updates have not been altered or forged, or that the paperwork does not appear to have been destroyed and reassembled
    • Decline to share any information over the phone, or in person without picture ID, if the student has a "Confidential" marker on his/her account
    • Investigate the correctness of unauthorized charges or transactions assessed in connection with a student's account
    • University departments that are responsible for unique types of covered accounts should establish additional policies and procedures for detecting and responding to Red Flags
    • Include standard contractual language requiring entities that provide services associated with covered accounts to have policies and procedures to detect, prevent, and mitigate the risk of identity theft
  • What training is required?

    All personnel who play a role in processing of transactions related to covered accounts are required to take course on Red Flags-ID Theft Protection. This is an annual training requirement.

    Department managers with covered accounts should conduct training for their staff to reinforce knowledge, discuss any changes to the program caused by internal business processes or the identification of new Red Flags, perform procedures to evaluate the effectiveness of the Red Flags program and implement changes, if needed.

  • As a staff member, is it my responsibility to notify appropriate University personnel that a Red Flag has been detected?

    Yes. As a University employee, it is your duty to comply with University programs and policies. You must act if you observe a violation of the Red Flags Rule.

  • I may have detected a red flag. What do I do now?
    1. Make sure to follow your department's Red Flags program in determining the appropriate response and steps for risk mitigation
    2. Fill out the Red Flags Incident Report and email it to the Program Administrator
    3. Depending on the degree of risk posed by the red flag, the following may b recommended:
      1. Continue to monitor the covered account for evidence of identity theft
      2. Contact the individual (for which the credit report was run)
      3. Change any passwords or other security devices that permit access to covered accounts
      4. Do not open a new covered account
      5. Provide a new identification number
      6. Attempt to identify the cause and source of the Red Flag
      7. Notify the program administrator for determination of the appropriate steps to take
      8. Notify law enforcement
      9. File or assist in filing a Suspicious Activities Report
      10. Determine that no response is warranted under the particular circ*mstances
  • My office responded to a Red Flags incident and successfully prevented a potential case of identity theft. Am I still required to file an incident report?

    Yes. One of the many benefits the University will have by your filing an incident report will be the opportunity to review the incident and offer advice to other departments who may experience similar Red Flags.

  • What steps must be taken to protect personal identifying information?

    In order to further prevent the likelihood of identity theft occurring with respect to covered accounts, the University will take the following steps related to its internal operating procedures to protect identifying information:

    • Ensure that its website is secure or provide clear notice that the website is not secure
    • Subject to state record retention requirements, ensure complete and secure destruction of paper documents and computer files containing account information when a decision has been made to no longer maintain such information
    • Ensure that office computers with access to covered account information are password protected
    • Avoid use of Social Security numbers
    • Ensure that computer virus protection is up-to-date
    • Require and keep only the kinds of individual information that are necessary for University purposes
  • Should I worry about third-party providers?

    If they process personal identifying information related to covered accounts, then we are responsible to ensure that they are Red Flag compliant. Language regarding their compliance is included in purchasing agreements.

  • What are the consequences to the University if it fails to comply with the Red Flags Rule?

    An incident of identity theft can have serious consequences to the University:

    1. The FTC can seek both monetary civil penalties and injunctive relief for violations of the Red Flags Rule
    2. Where the complaint seeks civil penalties, the US Department of Justice (DOJ) typically files a lawsuit in federal court on behalf of the FTC
    3. Each instance in which the University violated the rule is a separate violation
    4. Injunctive relief often requires the parties being sued to comply with the law in the future and provide reports, retain documents, and take other steps to ensure compliance with both the rule and court order. Failure to comply with the court order could subject the parties to further penalties and injunctive relief

    Moreover, an incident of identity theft would be damaging to the University and your department's reputation. It would be detrimental to have fraud associated to the University in any way. A successful Red Flag program helps the University guard against damage to our reputation.

  • Where can I find more information?
Red Flags for Identity Theft (2024)

FAQs

What are the red flags that may indicate identity theft? ›

Identification documents provided by the customer appears altered or forged. Photograph on ID card is inconsistent with the appearance of the customer present. Information on ID card such as name or address is inconsistent with information provided by the person opening account.

Which of the following could be a red flag regarding identity theft? ›

Red Flags may also be identified through warnings received by consumer reporting agencies; the presentation Page 2 of suspicious documents or personal identifying information; the unusual use of an account; or a notice from customers, victims of identity theft, law enforcement authorities, or other persons regarding ...

What are some requirements of the fact act identity theft red flag? ›

The Red Flags Rule requires specified firms to create a written Identity Theft Prevention Program (ITPP) designed to identify, detect and respond to “red flags”—patterns, practices or specific activities—that could indicate identity theft.

What are red flags in identification? ›

Suspicious Documents
  • Documents provided for identification appear to have been altered or forged.
  • The photograph or physical description on the identification is not consistent with the appearance of the customer presenting the identification.

What is a key indicator of identity theft? ›

Unfamiliar inquiries on your credit report could be an indication that a criminal has applied for credit using your personal information. If an identity thief uses your information to apply for a new credit card or loan, you may end up with unpaid debts in your name that could tarnish your credit record.

What is a red flag investigation? ›

A Red Flag Investigation (RFI) is a quantitative analysis of infrastructure, water, hazardous materials, historical features, and other data within a half-mile of a proposed transportation project.

What action should be taken if a red flag is detected? ›

Some appropriate responses to unresolved red flags would be to:
  1. Not continue the transaction.
  2. Use additional resources to verify the customer's identity.
  3. Notify law enforcement.
  4. Determine that no response is warranted.

What 4 pieces of information does an identity theft need? ›

What they want are account numbers, passwords, Social Security numbers, and other confidential information that they can use to loot your checking account or run up bills on your credit cards. Identity thieves can take out loans or obtain credit cards and even driver's licenses in your name.

What is a red flag violation? ›

“Red flag laws are a tool law enforcement and others can use when somebody is clearly at high risk of doing something with a firearm, but they can't be arrested because no crime has been committed and they don't appear to need a mental health hold or qualify for one,” Amy Barnhorst said.

What's a common red flag? ›

Jennifer Klesman, a licensed clinical social worker and therapist in Chicago, defines a red flag as a behavior trait or value that shows your future incompatibility with a person. This can be anything from someone having a history of infidelity to conflicting lifestyles and beyond.

What is potential red flags? ›

A red flag refers to some warning signal that points to a potential threat, real or perceived—and which warrants further investigation. In investing, a red flag is a threat to a company's share price, which can appear on a company's financials, via headlines, or through social media.

What are red flags of possible suspicious activity? ›

Firms should look out for activity that is inconsistent with their expected behavior, such as large cash payments, unexplained payments from a third party, or use of multiple or foreign accounts. These are all AML red flags.

What are red flags indicate? ›

Red flags are warning signs that indicate unhealthy or manipulative behavior. They are not always recognizable at first — which is part of what makes them so dangerous. However, they tend to grow bigger and become more problematic over time.

Which of the following are signs that identity theft may have happened to you? ›

10 Warning Signs of Identity Theft

Unexplained withdrawals from your bank account. You are no longer receiving bills and other mail that you normally receive. Debt collectors call you about debts that aren't yours. You find unfamiliar accounts or charges on your credit report.

What are the red flags for synthetic identity theft? ›

High number of recent credit inquiries, which could indicate the fraudster is attempting to quickly build credit. Mismatch between the accountholder's age and duration of credit history. Inflation of credit file depth. Suspicious mailing address.

Top Articles
Latest Posts
Article information

Author: Margart Wisoky

Last Updated:

Views: 6606

Rating: 4.8 / 5 (58 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Margart Wisoky

Birthday: 1993-05-13

Address: 2113 Abernathy Knoll, New Tamerafurt, CT 66893-2169

Phone: +25815234346805

Job: Central Developer

Hobby: Machining, Pottery, Rafting, Cosplaying, Jogging, Taekwondo, Scouting

Introduction: My name is Margart Wisoky, I am a gorgeous, shiny, successful, beautiful, adventurous, excited, pleasant person who loves writing and wants to share my knowledge and understanding with you.