Top Banner
7/29/2019 Policy and Law (166371228) http://slidepdf.com/reader/full/policy-and-law-166371228 1/14 New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE
14

Policy and Law (166371228)

Apr 14, 2018

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 1/14

New Identity Theft Rules

Rodney J. Petersen, J.D.Government Relations Officer

Security Task Force Coordinator

EDUCAUSE

Page 2: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 2/14

Big Picture of New Rules

It’s not about privacy of personallyidentifiable informationIt’s not about the security of information systemsIt’s about protecting individuals fromidentity theft once their identity hasbeen assumed by another individual Thus, RED FLAGS! ~ a pattern,practice,or specific activity that indicates thepossible existence of identity theft

Page 3: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 3/14

Statutory Basis

 The Fair and Accurate Credit Transactions Act of 2003 (FACT Act)amended the Fair Credit Reporting

Act (FCRA)

Sections 114 and 315 of the FACT Act

Page 4: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 4/14

Rulemaking

 Joint rulemaking

Final rules published November 9,2007Rules: 72 Fed. Reg. 63718 (November 9, 2007)http://www.ftc.gov/os/fedreg/2007/november/071109redflags.pdf 

Full compliance originally required byNovember 1, 2008

Deadline extended to May 1, 2009

Page 5: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 5/14

New ID Theft Rules

Users of Consumer Reports (Sec.681.1)

Financial Institutions and Creditors

holding “covered accounts” (Sec.681.2)

Debit and Credit Card Issuers (Sec.681.3)

Page 6: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 6/14

Use of Consumer Reports

Effective November 1, 2008

Duties of users regarding addressdiscrepancies

 Triggered by a notice of addressdiscrepancy sent from a consumerreporting agency to an institution toinform them of a “substantial

difference between the address forthe consumer” that the institutionprovided

Page 7: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 7/14

Policies and Procedures

Institutions must develop and implementreasonable policies and proceduresdesigned to enable the institution to form areasonable belief that a consumer reportrelates to the consumer

Comparing the information in the consumerreport with:Information the institution obtains and uses toverify the consumer’s identityMaintains in its own records, such asapplications, change of address notifications,

other customer account records, etc.; orObtains from third-party sources.Verifying the information in the consumerreport provided by the consumer reportingagency with the consumer.

Page 8: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 8/14

Consumer’s Address

Institutions must develop and implementreasonable policies and procedures for furnishingan address for the consumer that the institutionhas reasonably confirmed is accurate to the

consumer reporting agency from whom itreceived the notice of address discrepancy

Examples of confirmation methods:

Verifying the address with the consumer

Reviewing its own records to verify the address

Verifying the address through third-party sources; orUsing other reasonable means

Page 9: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 9/14

Creditors Holding “Covered Accounts”

Effective May 1, 2009Creditor - any entity that regularlyextends, renews, or continues credit

Conduct periodic risk assessments todetermine if the institution has“covered accounts”

 Jurisdiction of FTC- “Where non-profitand government entities deferpayment for goods or services, they,too, are to be considered creditors.”

FTC Business Alert, June 2008

Page 10: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 10/14

Covered Account

Credit card accounts

Mortgage loans

Automobile loans

Margin accountsCell phone accounts

Utility accounts

Checking accounts

Savings accountsAny account for which there is “aforeseeablerisk of identity theft”

Page 11: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 11/14

Application to Higher Ed

Participating in the Federal Perkins Loanprogram,

Participating as a school lender in theFederal Family Education Loan Program,

Offering institutional loans to students,faculty, or staff, or

Offering a plan for payment of tuitionthroughout the semester rather than

requiring full payment at the beginningof the semester

Page 12: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 12/14

ID Theft Prevention Program

Include reasonable policies and proceduresto detect or mitigate identity theft and enablea creditor to:

Identity relevant “red flags” (patterns, practices,and specific activities that signal possibleidentity theft) and incorporate them into theprogram;Detect the red flags that the programincorporates;Respond appropriately to detected red flags to

prevent and mitigate identity theft; andEnsure that the Program is updated periodicallyto reflect changes in risks

Page 13: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 13/14

Administration and Maintenance

 The board of directors (or appropriateboard committee) must approve the initialwritten program.Involve the board, committee, or

designated employee at the level of seniormanagement in the oversight,development, implementation, andadministration of the program Train staff, as necessary, to effectively

implement the Program; andExercise appropriate and effectiveoversightof service provider arrangements.

Page 14: Policy and Law (166371228)

7/29/2019 Policy and Law (166371228)

http://slidepdf.com/reader/full/policy-and-law-166371228 14/14

Conclusion

 This is clearly a legal and regulatorycompliance issue

 This is mostly about business processes There will be implications for IT – but what???

Information Privacy and SecurityTechnology Support of Business Processes

Programs, Policies, Procedures, and Training

Management of Identities to Prevent Fraud