11.07.2015 Views

Policies & Procedures Manual - Elizabeth City State University

Policies & Procedures Manual - Elizabeth City State University

Policies & Procedures Manual - Elizabeth City State University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

400.3.1.21Adopted: 04/23/09Page 2 of 7o Employer or taxpayer identification numbero Individual identification numbero Computer’s Internet Protocol addresso Bank or other financial account routing codeD. “Identity Theft” means a fraud committed or attempted using the Identifying Information of anotherperson without authority.E. “Program Administrator” means the individual designated with primary responsibility foroversight of the Program.F. “Red Flag” means a pattern, practice, alert or specific activity that indicates the possible existence ofIdentity Theft.G. “Service Provider” means a person or entity that provides a service directly to the <strong>University</strong>.3. Identification of Red FlagsIn order to identify relevant Red Flags, the <strong>University</strong> considers the types of Covered Accounts it offers ormaintains, the methods it provides to open its Covered Accounts, the methods it provides to access itsCovered Accounts, and its previous experiences with Identity Theft.Red Flags may be detected while implementing existing account opening and servicing procedures such as:individual identification, caller authentication, third party authorization, and address changes.The <strong>University</strong> identifies the following Red Flags in each of the listed categories:A. Notifications and Warnings from Consumer Reporting Agencieso Report of fraud accompanying a credit report;o Notice or report from a credit agency of a credit freeze on an applicant;o Notice or report from a credit agency of an active duty alert for an applicant;o Receipt of a notice of address discrepancy in response to a credit report request; ando Indication from a credit report of activity that is inconsistent with an applicant’s usual patternor activity.B. Suspicious Documentso Identification document or card that appears to be forged, altered or inauthentic;o Identification document or card on which a person’s photograph or physical description is notconsistent with the person presenting the document;o Other document with information that is not consistent with existing individual information;ando Application for service that appears to have been altered or forged.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!