IDENTITY THEFT PREVENTION PROGRAM

Similar documents
Seattle University Identity Theft Prevention Program. Purpose. Definitions

Identity Theft Prevention Program. Effective beginning August 1, 2009

Prevention of Identity Theft in Student Financial Transactions AP 5800

[Utility Name] Identity Theft Prevention Program

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

Red Flag Policy and Identity Theft Prevention Program

Red Flags/Identity Theft Prevention Policy: Purpose

( Utility Name ) Identity Theft Prevention Program

Ouachita Baptist University. Identity Theft Policy and Program

Identity Theft Prevention Policy

IDENTITY THEFT PREVENTION Policy Statement

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program

University of North Texas System Administration Identity Theft Prevention Program

The Southern Baptist Theological Seminary IDENTITY THEFT RED FLAGS AND RESPONSE INSTRUCTIONS IDENTITY THEFT AND PREVENTION PROGRAM As of June 2010

Red Flags Program. Purpose

RED FLAGS IDENTITY THEFT PREVENTION PROGRAM

Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT

Identity Theft Policies and Procedures

Information Security Incident Response Plan

Starflow Token Sale Privacy Policy

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification

Token Sale Privacy Policy

Information Security Incident Response Plan

FIRESOFT CONSULTING Privacy Policy

Elders Estates Privacy Notice

Privacy & Information Security Protocol: Breach Notification & Mitigation

POMONA EUROPE ADVISORS LIMITED

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

Regulation P & GLBA Training

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES

Credit Card Data Compromise: Incident Response Plan

VISTRA NETHERLANDS PRIVACY NOTICE

Identity Theft Victim s Complaint and Affidavit

FinFit will request and collect information in order to determine whether you qualify for FinFit Loans*.

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019

Privacy Policy. I. How your information is used. Registration and account information. March 3,

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests.

Elements of a Swift (and Effective) Response to a HIPAA Security Breach

Donor Credit Card Security Policy

University of Wisconsin-Madison Policy and Procedure

Plus500UK Limited. Website and Platform Privacy Policy

e180 Privacy Policy July 2018

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

Payment Card Industry Data Security Standard (PCI DSS) Incident Response Plan

Vistra International Expansion Limited PRIVACY NOTICE

UNIFORM REPORT IDENTITY FRAUD/THEFT

Breach Notification Assessment Tool

Summary Comparison of Current Data Security and Breach Notification Bills

Information Privacy Statement

1. Muscat & Co Mortgage Solutions Ltd - Privacy Notice

Shaw Privacy Policy. 1- Our commitment to you

We offer background check and identity verification services to employers, businesses, and individuals. For example, we provide:

Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts

1. provide and communicate with you about the Services or your account with us,

Application for Certification

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:

Online Batch Services

PRIVACY POLICY. Personal Information Our Company Collects and How It Is Used

Ferrous Metal Transfer Privacy Policy

Information you give us when you sign up to the World Merit Hub. In addition, when you sign up to the World Merit Hub, we will usually ask for:

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018

RETIREMENT ACCOUNT APPLICATION FORM. Share Dealing

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ):

nanopay Privacy Notice and Policy

Federal Reserve Bank of Dallas

Consolidated Privacy Notice

Privacy Policy KPMG Australia

Virginia Commonwealth University School of Medicine Information Security Standard

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY

As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above.

We will ask you for certain kinds of personal information ( Personal Information ) to provide the services you request. This information includes:

YOUR PRIVACY RIGHTS Privacy Policy General Col ection and Use voluntarily

Subject: Kier Group plc Data Protection Policy

OPTIMAL BLUE, LLC PRIVACY POLICY

Privacy Policy. Implemented on: November 2, 2017

Privacy Policy Statement Last update 25 th May 2018.

Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ):

VISTRA (CYPRUS) LTD. PRIVACY NOTICE

Privacy Breach Policy

This website is managed by Club Systems International on behalf of the Hoburne and Burry and Knight Groups.

PPR TOKENS SALE PRIVACY POLICY. Last updated:

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Group means any company within the STB Leasing Limited s group of companies and/or the ThinkSmart group of companies.

Why does JB Hi-Fi collect, hold, use and disclose personal information?

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

The University of British Columbia Board of Governors

Rowing Canada Aviron. Online Registration System - Protection of Personal Privacy. Policy Statement

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database

Online Batch Services

SYDNEY FESTIVAL PRIVACY POLICY

RBC Royal Bank Online Application Terms and Conditions

This Questionnaire contains the Privacy Policy Statement; Part A: General Information of Respondents; and Part B: Consultation Questions.

General Data Protection Regulation Frequently Asked Questions (FAQ) General Questions

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Beam Technologies Inc. Privacy Policy

Transcription:

IDENTITY THEFT PREVENTION PROGRAM COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT JULY 1, 2013 COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT, located in SAN ANTONIO, TX 78258 developed the following Identity Theft Prevention Program to detect, prevent and mitigate identity theft in connection with the opening of a covered account, to ensure the program is updated periodically to reflect changes in risks or to the safety and soundness of the creditor from identity theft, and to fulfill the intent of the Identity Theft Red Flags Rule that implements section 114 of the Fair and Accurate Credit Transactions Act (FACT Act). RED FLAGS RULE DEFINITIONS USED IN THIS PROGRAM The Red Flags Rule defines Identity Theft as fraud committed using the identifying information of another person and a Red Flag as a pattern, practice, or specific activity that indicates the possible existence of Identity Theft. Covered Accounts is defined as all mortgage applications and loans. Identifying Information is defined as any name or number that may be used, alone or in conjunction with any other information, to identify a specific person. This will include name, address, telephone number, social security number, date of birth, government issued driver s license or identification number, alien registration number, government passport number, employer or taxpayer identification number. IDENTIFYING RED FLAGS Relevant red flags for the covered accounts were identified by reviewing incidents and methods of identity theft which has been evaluated to identify the following risk factors: Alerts, notifications, or other warnings received from consumer reporting agencies or service providers such as fraud detection services. The presentation of suspicious. The presentation of suspicious personal identifying information. The unusual use of, or other suspicious activity related to, a covered account. Notice from account holders, victims of identify theft, law enforcement authorities or other persons regarding possible identity theft in connection with covered accounts.

UPDATING THE IDENTITY THEFT PROGRAM The Identity Theft Prevention Program will be reviewed and updated on an annual basis to reflect changes in risks to customers and the safety and soundness of our company from identity theft. In doing so, the Program Administrator will consider: The experiences of this company with identity theft. Changes in methods of identity theft. Changes in methods to detect, prevent and mitigate identity theft. Changes in the types of accounts this company offers or maintains. Changes in the business arrangements with other entities including mergers, acquisitions, alliances, joint ventures and service provider arrangement. PROGRAM ADMINISTRATION The Identity Theft Prevention Program is supervised by the Program Administrator who is responsible for: Assigning specific responsibility for the program s implementation. Reviewing staff reports regarding the detection of Red Flags. Reviewing steps for preventing and mitigating Identity Theft. Determining which steps of prevention and mitigation should be taken in particular circumstances. Annual evaluation and consideration of periodic changes to the Program. STAFF TRAINING AND REPORTS The Staff responsible for implementing the Program shall be trained either by or under the direction of the Program Administrator in the detection of Red Flags and steps to be taken when a Red Flag is detected. Staff will be required to submit to Program Administrator a written report on all incidents and suspicions of Identity Theft (SAR Suspicious Activity Report), compliance with the Program and the effectiveness of the Program. SERVICE PROVIDER ARRANGEMENTS As applicable, any service provider engaged to perform an activity in connection with covered accounts, steps will be taken to ensure that the activity of the service provider is conducted in accordance with reasonable policies and procedures designed to detect, prevent and mitigate the risk of identity theft.

IDENTITY THEFT PREVENTION STEPS COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT JULY 1, 2013 RED FLAG IDENTIFICATION APPLICABLE DETECTION STEPS ONE OR ALL MAY BE NECESSARY PREVENTING & MITIGATING DETERMINE APPROPRIATE RESPONSE/S CREDIT REPORTING AGENCY WARNINGS Fraud Alert on Credit Report Validate identifying information with external databases such as Fraud Guard Notify the Program Administrator Active Duty Alert on Credit Report Contact consumer if indicated to do so within the Fraud Alert or Activity Duty Alert Determine that a Suspicious Activity Report (SAR) should be filed Alert - Name Discrepancy Request additional identification Refuse to proceed with application Alert - Address Discrepancy Inspect identification document presented and verify it is government issued Investigate other applications/accounts if applicable Alert - Social Security Number Discrepancy Notify law enforcement Credit/Security Freeze on Credit Report Determine that no response is warranted under the particular circumstances Deceased Indicator Indication of inconsistent activity compared to customer's usual pattern Inconsistent Social Security Number verification - Year and State Issued (SafeScan, Hawk or Fraud Shield)

RED FLAG IDENTIFICATION APPLICABLE DETECTION STEPS ONE OR ALL MAY BE NECESSARY PREVENTING & MITIGATING DETERMINE APPROPRIATE RESPONSE/S SUSPICIOUS DOCUMENTS Inconsistent Name on identification such as driver's license, social security card, etc. Validate identifying information with external databases such as Fraud Guard Notify the Program Administrator Inconsistent Address on identification such as driver s license, etc. Request additional identification Determine that a Suspicious Activity Report (SAR) should be filed Inconsistent Social Security Number on identification Inspect identification document presented and verify it is government issued Refuse to proceed with application Address or phone commonly associated with fraudulent activity, used by unusually large number of other persons, etc. Investigate other applications/accounts if applicable Documents appear to be altered or forged Notify law enforcement Photograph or physical description not consistent with applicant Determine that no response is warranted under the particular circumstances

DISCLAIMER The information contained in this document is not intended to be legal, accounting or other professional advice. Please consult with your legal or compliance advisor before taking any action on information contained in this document.