Identifying and Responding to Red Flags
Effective: | 08/01/09 | Approved By: Senior Associate Vice President for Financial Affairs and Chief Financial Officer | |
Revised: | 11/16/20 |
For Assistance Contact: Assistant Vice President of Financial Services & University Bursar
|
Purpose/Scope
This guideline provides guidance for identifying and responding to "Red Flags" in accordance with the University of Texas at San Antonio (UTSA) Identity Theft Prevention Program found in HOP 9.39.
All UTSA areas, departments, colleges and schools that hold personally identifiable student financial records and information and/or covered accounts (see HOP 9.39) must comply with the requirements of this guideline.
Authority
- Code of Federal Regulations Title 16 Part 681 (16 CFR 681)
- UTSA Handbook of Operating Procedures (HOP) 9.39 — Red Flag Rules Compliance for Identity Theft Detection
University Guidelines
Table of Contents
- Overview
- Identifying and Responding to Red Flags
- Alerts, notifications or warnings from consumer reporting agencies
- Suspicious documents
- Suspicious personal identifying information
- Unusual use of or suspicious activity related to covered accounts
- Notice from consumers, victims of identity theft, law enforcement or others regarding possible identity theft.
- Other
A. Overview
UTSA is required to develop, implement and maintain a written Identity Theft Prevention Program to identify, prevent and mitigate identity theft in accordance with 16 CFR 681, the Federal Trade Commission’s Red Flag Rules.
The Assistant Vice President of Financial Services and University Bursar is the program administrator and is responsible for developing, implementing and maintaining the Identity Theft Prevention Program.
The detailed program, including specific responsibilities and procedures, is found in HOP 9.39.
B. Identifying and Responding to Red Flags
Red Flags are suspicious patterns or practices, or specific activities that indicate the possibility that identity theft may occur. All UTSA departments must follow these guidelines and report their actions to the program administrator if identity theft is suspected.
1. Alerts, notifications or warnings from consumer reporting agencies
Red Flag | Required Response/Action |
---|---|
A fraud or active duty alert accompanies a consumer report requested by UTSA. |
|
A notice of a credit freeze is received in response to a request for a consumer report. |
|
A notice of address discrepancy is received in response to a request for a consumer report. |
|
Indication from a consumer report of a pattern of activity inconsistent with the history and usual pattern of activity of an applicant or consumer. |
|
2. Suspicious documents
Red Flag | Required Response/Action |
---|---|
Identification documents or card provided appears to have been altered or forged. |
|
Identification documents or card provided on which the photograph or physical description is not consistent with the appearance of the customer presenting the documents. |
|
Identification documents or card provided on which other identifying information is not consistent with information provided by the customer or other readily accessible information that is on file. For example, a birth date doesn't match appearance of customer. |
|
Request for information, applications, or other documents presented appear to have been altered or forged, or gives the appearance of having been destroyed and reassembled. |
|
3. Suspicious personal identifying information
Red Flag | Required Response/Action |
---|---|
Identifying information is inconsistent with other external information sources. For example, an address that does not match the address printed on a loan application. |
|
Identifying information is inconsistent with other information provided by the customer. For example, inconsistent birth dates. |
|
Identifying information is associated with known fraudulent activity. For example, an address or phone number being used is also known to be associated with a fraudulent application. |
|
Identifying information is of the type commonly associated with fraudulent activity. For example, an address is fictitious or the phone number is invalid. |
|
Social Security (SSN) or Banner ID number is the same as that submitted by another customer. |
|
Address or phone number is the same as that presented by an unusually large number of other customers. |
|
A customer fails to provide all of the required personal identifying information on an application or in response to notification that the application is incomplete. |
|
Identifying information is inconsistent with internal information sources on file. |
|
Customer cannot provide information in response to challenge questions beyond that which generally would be available from a wallet or consumer report. |
|
4. Unusual use of or suspicious activity related to covered accounts
Red Flag | Required Response/Action |
---|---|
Change of address for an account that is followed shortly by a request for a name change |
|
An account is used in a manner inconsistent with established patterns of activity on that account. For example, payments are no longer made on an otherwise consistently up-to-date account. |
Banner automatically places financial hold and restricts any services from being provided until the hold has been removed by Office of Financial Services and University Bursar or Fiscal Services. If situation appears fraudulent, report to UTSA Police Department (UTSAPD) and the UTSA Institutional Compliance & Risk Services. |
Mail sent to customer is returned repeatedly although transactions continue to be conducted. |
|
Customer notifies UTSA — via phone, e-mail or in-person — that the customer is not receiving mail. |
|
Customer notifies UTSA — via phone, e-mail or in-person — that an account has unauthorized activity. |
|
Customer notifies UTSA — via phone, e-mail or in-person — that unauthorized use of MyUTSA Account has occurred based on last logon date posted. For example, they did not attempt access during the time/date indicated on the date stamp. |
|
Customer notifies UTSA — via phone, e-mail or in-person — that unauthorized use of MyUTSA Account has occurred. For example, the customer was automatically logged off during an online session due to multiple log on attempts. |
|
5. Notice from customers, victims of identity theft, law enforcement or others regarding possible identity theft
Red Flag | Required Response/Action |
---|---|
Customer notifies UTSA — via phone, e-mail or in-person — that an account has been opened fraudulently or is being maintained by UTSA for a person engaged in identity theft. |
|
Customer reports — via phone, e-mail or in-person — receiving a bill for another individual or for a service that the customer denies receiving. |
|
Customer reports — via phone, e-mail or in-person — their personal information has been compromised. |
|
6. Other
Red Flag | Required Response/Action |
---|---|
Customer reports — via phone, e-mail or in-person — that an unauthorized change has occurred to direct deposit information stored on the BAnner Direct Deposit screen (GXADIRD). |
|
Customer reports — via phone, e-mail or in-person — than an unauthorized change has occurred to the student address information on Banner Address screen (TUIADDR). |
|
Related Forms
None at this time.
Revision History
Date | Description |
---|---|
11/16/20 | Updates to links and position titles. Editorial updates for clarity. |
11/16/16 | Complete overhaul of FMOG. |