2.01.13    SALT LAKE CITY IDENTITY THEFT PREVENTION POLICY

 

RESPONSIBLE CITY AGENCY: Administrative Services Department, department directors

 

KEYWORDS: red flag, identity theft, covered account, Identity Theft Committee, Identity Theft Prevention Program, Finance Director

 

1.      General

1.1     The purpose of the policy is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection with the opening of a covered account or an existing covered account and to provide for continued administration of the Program in compliance with the Federal Trade Commission’s Red Flag Rule (Part 681 of Title 16 of the Code of Federal Regulations) implementing Sections 114 and 315 of the Fair and Accurate Credit Transaction Act (FACTA) of 2003.

 

1.2     Under the Red Flag Rule, every financial institution and creditor is

required to establish an “Identity Theft Prevention Program” tailored to its size, complexity and the nature of its operation.  Each program must contain reasonable policies and procedures to:

           

a.  Identify relevant Red Flags for new and existing covered accounts and

incorporate those Red Flags into the Program;

b.  Detect Red Flags that have been incorporated into the Program;

c.  Respond appropriately to any Red Flags that are detected to prevent and mitigate identity theft; and

d.   Ensure the Program is updated periodically, to reflect changes in risk to

      customers or to ensure the safety and soundness of the creditor from identity

      theft.

 

2.      Definitions

2.1       Identifying information means any name or number that may be used, alone or in conjunction with any other information, to identify a specific person, including: name, address, telephone number, social security number, date of birth, government issues driver’s license or identification number, alien registration number, government passport number, employer or taxpayer identification number, unique electronic identification number, computer s Internet Protocol address, or routing code.

 

2.2       Identity Theft means fraud committed or attempted using the identifying information of another person without authority.

 

2.3      A covered account means:

     a. An account that a financial institution or creditor offers or maintains, primarily for personal, family, or household purposes that involves or is designed to permit multiple payments or transactions.  Covered accounts include credit card accounts, mortgage loans, automobile loans, margin accounts, cell phone accounts, utility accounts, checking accounts and saving accounts; and

 

     b. Any other account that the financial institution or creditor offers or maintains  for which there is a reasonably foreseeable risk to the customer or to the safety and      soundness of the financial institution or creditor from identity theft, including financial, operational, compliance, reputation or litigation risks.

 

2.4  A Red Flag means a pattern, practice or specific activity that indicates the possible existence of identity theft

 

3.     Identification of Red Flags

3.1      The City identifies the following red flags, in each of the listed categories:

 

 (1) Suspicious Documents

i. Identification document or card that appears to be forged, altered or inauthentic;

ii. Identification document or card on which a person’s photograph or physical description is not consistent with the person presenting the document;

iii. Other document with information that is not consistent with existing customer information (such as is a person’s signature on a check appears forged); and

iv. Application for service that appears to have been altered or forged.

 

          (2)  Suspicious Personal Identifying Information

i. Identifying information presented that is inconsistent with other information the customer provides (example: inconsistent birth dates);

ii. Identifying information presented that is inconsistent with other sources of information (for instance, an address not matching an address on a credit report);

iii. Identifying information presented that is the same information shown on other applications that were found to be fraudulent;

iv. Identifying information presented that is consistent with fraudulent activity (such as an invalid phone number or fictitious billing address);

v. Social security number presented that is the same one given by another customer;

vi. An address or phone number presented that is the same as that of another person;

vii. A person fails to provide complete personal identifying information on an application when reminded to do so (however, by law social security numbers must not be required); and

viii.         A person’s identifying information is not consistent with the information that is on file for the customer.

 

 

      

          (3)  Suspicious Account Activity or Unusual Use of Account

i. Change of address for an account followed by a request to change the account holders name,

ii. Payment stop on an otherwise consistently up-to-date account;

iii. Account used in a way that is not consistent with prior use (example: very high activity);

iv. Mail sent to the account holder is repeatedly returned as undeliverable

v. Notice to the City that a customer is not receiving mail sent by the City;

vi. Notice to the City that an account has unauthorized activity;

vii. Breach in the City’s computer system security; and

viii.         Unauthorized access to or use of customers account information

 

        (4)    Alerts from Others

i. Notice to the City from a customer, identity theft victim, law enforcement or other person that is has opened or is maintaining a fraudulent

   account for a person engaged in identity theft.

 

4.    Detecting Red Flags

4.1    New Accounts. In order to detect any of the Red Flags identified above associated    

         with the opening of a new account, City personnel will take the following steps to

         obtain and verify the identity of the person opening the account.

i.   Require certain identifying information such as name, date of birth, residential or business address, principal place of business for an entity, driver’s license or other identification;

ii.   Verify the customer’s identity (for instance, review a driver’s license or other identification card);

iii.  Review documentation showing the existence of a business entity; and/or

iv.  Independently contact the customer

4.2. Existing Accounts. In order to detect any of the Red Flags identified above for an  

         existing account, City personnel will take the following steps to monitor

         transactions with an account:

i.   Verify the identification of customers if they request information (in person, via telephone, via facsimile, via email);

ii.   Verify the validity of request to change billing addresses; and

iii.  Verify changes in banking information given for billing and payment purposes.

 

5.    Preventing and Mitigating Identity Theft

5.1    In the event City personnel detect and identify Red Flags, such personnel shall take one or more of the following steps, depending on the degree of risk posed by the Red Flag:

        (1)   Prevent and Mitigate

i.   Continue to monitor an account for evidence of identity theft;

ii.   Contact the customer;

iii.  Change any passwords or other security devices that permit access to accounts;

iv.  Not open a new account;

v.  Close an existing account;

vi.  Reopen an account with a new number

vii. Notify the Finance Director for determination of the appropriate step(s) to take;

viii. Notify law enforcement; and/or

ix.  Determine that no response is warranted under the particular circumstances

 

       (2) Protect customer identifying information

i.   In order to further prevent the likelihood of identity theft occurring with respect to City accounts, the City will take the following steps with respect to its internal operating procedures to protect customer identifying information:

ii.   Ensure that its website is secure or provide clear notice that the website is not secure;

iii.  Ensure complete and secure destruction of paper documents and computer files containing customer information;

iv.  Ensure that office computers are password protected and that computer screens lock after a set period of time;

v.  Keep offices clear of papers containing customer information;

vi.  Request only the last 4 digits of social security numbers are listed (it any);

vii. Ensure computer virus protection is up to date; and

viii. Require and keep only the kinds of customer information that are necessary for utility purposes.

 

6.    Program Updates

6.1    This Program will be periodically reviewed and updated to reflect changes in risks to customers and the soundness of the City from identity theft.

 

6.2  The Identity Theft Committee will consider the City’s experiences with identity theft situations, changes in identity  theft methods, changes in identity theft detection and prevention methods, changes in types of accounts they City maintains and changes in the City’s business arrangements with other entities. After considering these factors, the Identity Theft Committee will determine whether changes to the Program, including the listing of Red Flags, are warranted.  If warranted, the Identity Theft Committee will present to the Mayor their recommended changes and the Mayor will make a determination of whether to accept, modify or reject those changes to the Program.

 

7.    Program Administration

7.1    Oversight. Responsibility for developing, implementing and updating this Program  lies with an Identity Theft Committee for the City. The Committee will be comprised of the Finance Director, City Treasurer and Information Systems Director (or their designees).  The Committee will be responsible for Program administration, for ensuring appropriate training of City staff on the Program, for reviewing any staff reports regarding the detection of Red Flags and the steps for preventing and mitigating identity theft, determining which steps of prevention and mitigation should be taken in particular circumstances and considering periodic changed to the Program.

 

7.2  Staff Training and Reports.  City staff responsible for implementing the

Program shall be trained either by or under the direction of the Identity Theft

Committee in the detection of Red Flags, and the responsive steps to be taken

when a Red Flag is detected.  City staff are required to provide reports to the

Committee on incidents of identity theft, the City’s compliance with the Program

and the effectiveness of the Program.

 

7.3  Specific Program Elements and ConfidentialityFor the effectiveness of

identity theft prevention Programs, the Red Flag Rule envisions a degree of

confidentiality regarding the City’s specific practices relating to identity theft

detection, prevention and mitigation.  Therefore, under this Program, knowledge

of such specific practices are to be limited to the Identity Theft Committee and

those employees who need to know them for purposes of preventing identity theft.

Because this Program is to be adopted by the Mayor and thus publicly available,

it would be counterproductive to list these specific practices here.  Therefore,

only the Program’s general red flag detection, implementation and prevention

practices are listed in this document.

 

8.   Authority & Revisions

This policy is enacted immediately upon approval of the Mayor.

 

 

CURRENT REFERENCES:   

 

EFFECTIVE DATE (Date signed by the Mayor): December 18, 2009