![]() Identity Theft Prevention (Red Flags Rules) PolicyUnit: Compliance, Ethics, and Regulatory Affairs | ||
PurposeThe University of Alabama (UA), also referred to herein as "University," recognizes some of its activities are subject to the Federal Trade Commission's (“FTC”) Red Flags Regulation (16 CFR § 681.2), which implements Section 114 of the Fair and Accurate Credit Transactions (FACT) Act of 2003 and the final rules implementing section 315 of the FACT Act. Under these regulations, The University is considered a creditor and must periodically determine, by conducting a risk assessment, whether it offers or maintains “covered accounts.” Upon identifying any covered account(s), the University is required to develop and implement a written Identity Theft Prevention Program (Program) to detect, prevent, and mitigate identify theft in connection with the opening of certain new accounts and the maintenance of certain existing accounts. This policy and the accompanying Red Flags Identification and Detection Grid implements UA’s Identity Theft Prevention Program and provides additional information to employees when developing internal procedures to help prevent and mitigate a security incident, as well as guidance for reporting a known or suspected security incident. PolicyThe University’s Identity Theft Prevention Program must contain reasonable policies and procedures to:
I. Program AdministrationA. OversightEach University department with covered accounts that maintains, disseminates, or disposes of Personally Identifiable Information (PII) data shall designate an individual who will serve as the department’s Identity Theft Prevention Officer. This Officer will coordinate with the Program Administrator to implement the requirements of this policy. The Executive Director for Institutional Compliance in the Office of Compliance, Ethics, and Regulatory Affairs shall serve as the Program Administrator. The Program Administrator shall work with the Identity Theft Prevention Officers designated by the departments to develop, implement, and monitor the effectiveness of this Program and policy. Also, the Program Administrator shall communicate policy changes and needed Program updates to the Identity Theft Prevention Officers. Changes in federal regulations may require immediate changes to this policy. The Program Administrator will periodically provide a report to University Administration addressing:
B. Staff TrainingThe Program Administrator will provide basic training on this policy and on the requirements of the Red Flags Regulations. In addition, the individual designated as the Identity Theft Prevention Officer for a department shall provide the staff training necessary to detect, prevent, and mitigate identity theft in their area. C. Compliance ReportsAnnually, or as requested by the Program Administrator, each department’s Identity Theft Prevention Officer shall submit a report to the Program Administrator documenting the status of their area’s compliance with this Program. This report should address the effectiveness of the department’s procedures against the risk of identity theft and should include any recommendations for changes to the Program. D. Service Provider Arrangements/Contractual AgreementsIn the event the University engages a service provider to perform an activity in connection with one or more covered accounts, the University, through its contract review process, shall take the following steps to ensure the service provider performs its activity in accordance with reasonable policies and procedures designed to detect, prevent, and mitigate the risk of identity theft:
E. Non-Disclosure of Specific PracticesFor the effectiveness of the University’s Identity Theft Prevention Program, knowledge about specific red flag identification, detection, mitigation, and prevention practices should be limited to the Program Administrator, Identity Theft Prevention Officers, and departmental employees responsible for the implementation of this policy. Any documents that may be reviewed or produced to develop or implement this Program that lists or describe such specific security practices and the information those documents contain are considered confidential and should not be posted online, shared with other non-involved employees, or the public. All documents reviewed or produced as a result of identity theft, or in the investigation of potential identity theft, are considered confidential. II. Identification of Red FlagsTo enable the identification of relevant red flags, University departments should consider the business practices associated with all the types of accounts their department offers or maintains. This should include methods used to open accounts, methods used to access accounts, and any previous experiences with identity theft. Each department shall review current policies and procedures to address the detection of red flags for each type of covered account, focusing on verifying identity, authenticating customers, monitoring transactions, and verifying the validity of change of address requests, as well as previous experiences with identity theft. Categories of red flags include:
Additional information to be considered in assessing business processes for red flags is provided in the Red Flags Identification and Detection Grid. Each area should complete their own grid, specific to their red flags, utilizing the Red Flags Identification and Detection Grid Template, including any other red flags identified in the department’s procedures to prevent, detect, and mitigate identity theft. III. Detecting Red FlagsA. Areas to AssessIn order to detect red flags, University personnel should review departmental procedures associated with:
Detailed guidance to assist in assessing each of these areas is provided in the Red Flags Identification and Detection Grid. The Program Administrator can provide assistance in developing or reviewing procedures, if needed. B. Social Security NumbersIn all cases, special care should be taken to avoid asking for a Social Security Number unless its collection has been explicitly authorized by administration and is required for an approved business purpose. C. Special CasesA data security incident that results in unauthorized access to a customer’s account record or notice that a customer has provided information related to a covered account to someone fraudulently claiming to represent the University or to a fraudulent website may heighten the risk of identity theft and should be considered red flags. IV. Preventing and Mitigating Identity TheftIn the event University personnel detect any identified red flags, such personnel shall notify their supervisor or the individual designated as the department’s Identity Theft Prevention Officer. Departments should take steps to prevent and/or mitigate any possible concerns and to protect covered account information and PII. Detailed guidance to assist in developing the appropriate responses to accomplish this is provided in the Red Flags Identification and Detection Grid. An employee who knows or suspects that a security incident has occurred shall immediately notify their appropriate supervisor and the Identity Theft Prevention Officer and complete a Red Flags Detection Report. The ITPO will report to the Program Administrator as needed. If fraud is known or reasonably suspected, contact the University of Alabama Police Department. V. Address DiscrepancyIf any area conducting background screenings receives a “Notice of Address Discrepancy” from the Background Investigation Vendor, the following measures will be taken:
ScopeManaging and protecting data are responsibilities shared by all members of the University community. This policy complements existing University policies related to data security, data protection, and information disclosure. This and other related policies combine to promote UA’s effort to comply with the Health Insurance and Portability and Accountability Act (HIPAA), the Family Educational Rights and Privacy Act (FERPA), Gramm Leach Bliley Act (GLBA), Payment Card Industry (PCI) standards, the EU General Data Protection Regulation (GDPR), and other applicable federal and state laws. DefinitionsAccount: A continuing relationship established by a person with a financial institution or creditor to obtain a product or service for personal, family, household or business purposes. Covered Account: (i) Any account the University offers or maintains primarily for personal, family or household purposes, that allows multiple payments or transactions, including one or more deferred payments; and (ii) any other account the University identifies as having a reasonably foreseeable risk to customers or the safety and soundness of the University from identity theft. A current listing of University departments with covered accounts is maintained on the Identity Theft Prevention Program webpage. Identity Theft: A fraud committed or attempted using the identifying information of another person without authority. Identity Theft Prevention Officer: Someone designated by a department with covered accounts to serve as a liaison to the Program Administrator and is responsible for ensuring that the requirements of the Identity Theft Prevention Policy are incorporated in departmental procedures. This person also may be responsible for ensuring the implementation of other University policies that safeguard and protect data from unauthorized access, use, and disclosure. Personal Identifying Information (PII): Any name or number that may be used, alone or in conjunction with any other information, to identify a specific person. Below are examples of data fields that are considered PII:
Program Administrator: The individual designated with primary responsibility for oversight of the Identity Theft Prevention Policy. Red Flag: A suspicious pattern, practice, or specific activity that indicates the possible existence of identity theft. Service Provider: A person or company that provides a service directly to the University. | ||
Office of the Vice President of Finance and OperationsApproved by Cheryl Mowdy, Assistant Vice President for Finance and Operations, 10/15/2021 |