red flag procedures
DESCRIPTION
Red Flag Procedures. for the Prevention, Detection, & Mitigation of Identity Theft. Presented by Training. Objective. Know how to identify, report, and respond to ID Theft Red Flags. Agenda. Introduction Section 1: Why is this Important? Section 2: Prevention Section 3: Mitigating - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/1.jpg)
Red Flag Procedures
for the Prevention, Detection, & Mitigation of Identity Theft
Presented by Training
![Page 2: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/2.jpg)
Objective
1. Know how to identify, report, and respond to ID Theft Red Flags.
![Page 3: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/3.jpg)
Agenda
• Introduction• Section 1: Why is this Important?• Section 2: Prevention• Section 3: Mitigating• Section 3: Detecting Red Flags:
Procedures• Section 4: Reporting• Summary
![Page 4: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/4.jpg)
Section 1:
Why is this Important?
![Page 5: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/5.jpg)
What’s in it for me?
• Keeping current on laws helps you– Avoid risks– Avoiding Penalties– Avoid Disciplinary action
• Suspension or termination if you are found non-compliant
![Page 6: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/6.jpg)
• Responding appropriately reduces risks to the CU and to you– Noncompliance Risk
• Civil & Criminal• $ Penalties and fines
– Reputation Risk• Penalties are public knowledge
– Would you want to do business with a non-compliant institution?
![Page 7: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/7.jpg)
Why? Why? Why?
• NCUA requires – “to detect, prevent, and mitigate identity theft”
• At account opening • While servicing accounts
• Basically, the NCUA wants to– Keep identity theft from happening– Find it! (when it does happen)– Lessen, ease impact
![Page 8: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/8.jpg)
Collecting Member Information
• At account opening– Name, address, DOB, telephone numbers– Identifying numbers (DL #, Tax ID #, SSN)
• Member requests loan– In addition to above, information related to:
• Employment, income• Assets, liabilities• Credit
![Page 9: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/9.jpg)
• Maintaining / servicing accounts– Balances, OD, non-sufficient funds, – Payment history – Address changes– Credit changes
• Email correspondence
• See our Privacy Policy & Guidelines
![Page 10: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/10.jpg)
What are the Threats We Face?
• Counterfeit Official Checks• Robberies• Fraud and Forgery Schemes• Unauthorized banking• Phishing• ID Theft
![Page 11: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/11.jpg)
Possible Responses to a Threat
Depending on our analysis:
• Issue alerts to the employees• Post info. on website
![Page 12: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/12.jpg)
• Contact members– Mail letters, brochures, or other literature– Send emails – Phone call
• Review procedures & implement necessary changes
• Contact law enforcement• File a SAR
![Page 13: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/13.jpg)
Section 2:
Prevention
![Page 14: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/14.jpg)
Verify Identity
• Opening Accounts • Before completing a transaction• Giving out information• Updating /changing account information
– Address changes– Email address updates– Security Questions
![Page 15: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/15.jpg)
For All Other Reasons
• In person: Photo I.D. • Over phone: Security information• Via fax: Signed request w/ copy of photo I.D. • Via email: Security information
Before you help someone, VERIFY ID!
![Page 16: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/16.jpg)
Obtain Written Authorization
• Before providing information to a 3rd Party– Mail or fax– Funds verification– Verification of Deposit – Over the phone
![Page 17: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/17.jpg)
Mailing
![Page 18: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/18.jpg)
Faxing
• Before faxing statements or account history:
![Page 19: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/19.jpg)
Address Changes
![Page 20: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/20.jpg)
Security Questions
![Page 21: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/21.jpg)
Section 3:Mitigation
Lessening, Easing the Impact of Identity Theft
![Page 22: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/22.jpg)
Procedures: A Potential Victim
![Page 23: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/23.jpg)
Procedures: An Actual Victim
1
![Page 24: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/24.jpg)
Procedures: A non-member Victim
![Page 25: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/25.jpg)
Section 4:
Detection
![Page 26: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/26.jpg)
What is the Red Flags Rule?
• FI must update identity-theft prevention programs periodically – to reflect changes in risks of identity theft
• to customers (members)• to the enterprise's (McCoy’s) safety and soundness
![Page 27: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/27.jpg)
Red Flags Defined
• Red Flags – Patterns, practices, or specific
activities that indicate the possible existence of identity theft
![Page 28: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/28.jpg)
6 Categories of Red Flags
1. Alerts, Notifications, or Warnings from a Consumer Reporting Agency
2. Suspicious or unusual account activity
3. Presentation of suspicious documents
![Page 29: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/29.jpg)
4. Presentation of suspicious identifying information
5. Unusual use or suspicious activity related to an account
6. Notice of possible Identity theft in connection with account
– From members– Possible ID theft victims– Law enforcement– Or others
![Page 30: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/30.jpg)
Alerts, Notifications, or Warnings from Consumer Reporting Agency
• CRA or service providers give– Alerts– Notifications– Warnings
![Page 31: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/31.jpg)
The Red Flags: On the Credit Report
1. Fraud or active duty alert 2. Notice of credit freeze 3. Notice of address discrepancy
![Page 32: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/32.jpg)
4. A pattern of activity inconsistent with the history and usual pattern of activity of an applicant or member, such as:
– Recent & significant increase in inquiries – Unusual number of recently established
credit relationships– Material change in use of credit
• Especially recently established credit relationships
– Account closed for cause or for abuse of account • by financial institution or creditor
![Page 33: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/33.jpg)
Suspicious or unusual account activity
• Fraud alert • Late payments without previous history of late
payments• Numerous credit inquiries in a short period of
time• Higher-than-usual monthly
credit balances• Recent change of address
together with other signs– Replacement card requests
![Page 34: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/34.jpg)
The Red Flags: Suspicious Documents
5. Identification documentation appears altered or forged
6. Photograph or physical description on ID not consistent with appearance of applicant or member
7. Other information on ID not consistent with information provided by person opening account or member presenting ID
![Page 35: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/35.jpg)
8. Other information on ID not consistent with readily accessible information on file
• Signature card • Recent check
9. Application appears altered, forged, or destroyed and reassembled
![Page 36: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/36.jpg)
The Red Flags: Suspicious Personal Identifying Information
10.Personal identifying information inconsistent compared to external sources used
• Address does not match address in consumer report
• SSN has not been issued or listed on SS Administration’s Death Master File
![Page 37: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/37.jpg)
11. Personal identifying information provided by member not consistent with other personal identifying information provided by the member.
• No correlation between SSN range and date of birth
![Page 38: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/38.jpg)
12. Personal identifying information is associated with known fraudulent activity
– Address on application = address on fraudulent application
– Phone number on application = number on fraudulent application
![Page 39: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/39.jpg)
13.Personal identifying information is of a type commonly associated with fraudulent activity
– Address on application is• Fictitious• Mail drop• Prison
– Phone number is • Invalid• Associated with pager or
answering service
![Page 40: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/40.jpg)
14. SSN provided = SSN submitted – by other persons opening an account– or other members
15.Address or telephone number = or is similar to address or telephone number submitted
– by an unusually large number of other persons opening accounts
– or other members.
![Page 41: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/41.jpg)
16.Failure to provide all required identifying information
– Person opening account or the member – On application, or in response to notification
17. Personal identifying information provided ≠ personal identifying information on file with the credit union.
![Page 42: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/42.jpg)
18. When using challenge questions, person opening account or member cannot provide authenticating information
– beyond that which would be available from wallet or consumer report
![Page 43: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/43.jpg)
Unusual Use of orSuspicious Activity Related tothe Covered Account
19.Shortly following notice of a change of address, the institution or creditor receives a request for
– New, additional, or replacement card – Addition of authorized users on the account.
![Page 44: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/44.jpg)
20.A new revolving credit account used in a manner commonly associated with known patterns of fraud
– Majority of available credit used for• Cash advances • Merchandise easily converted to cash
– Electronics equipment or jewelry
– Member fails to make• First payment • Makes an initial payment
but no subsequent payments
![Page 45: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/45.jpg)
21.Account is used in a manner not consistent with established patterns of activity
– Nonpayment when no history of late or missed payments
– Increase in use of available credit – Change in purchasing or spending patterns– Change in electronic fund transfer patterns in
connection with a deposit account
![Page 46: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/46.jpg)
22. Inactive account for a lengthy period of time is used
– The address on an application is fictitious, a mail drop, or prison
23.Mail is returned repeatedly as undeliverable although transactions continue to be conducted
![Page 47: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/47.jpg)
24.McCoy is notified that member is not receiving paper statements.
25.McCoy is notified of unauthorized charges or transactions in connection with account.
![Page 48: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/48.jpg)
Section 4:
Reporting Red Flags &
Suspicious Activities
![Page 49: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/49.jpg)
What’s New?
• What’s the greatest impact to your job?
• Now you have to report red flags
![Page 50: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/50.jpg)
Summary
• Preventing & Mitigating ID Theft – Our procedures appropriately address the
Red Flags we detect– Appropriate responses may include:
![Page 51: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/51.jpg)
– Other responses could be:
![Page 52: Red Flag Procedures](https://reader036.vdocuments.net/reader036/viewer/2022070502/5681306c550346895d964be2/html5/thumbnails/52.jpg)
Summary
• Red Flags Program in place to help you– Identify red flags– Detect red flags indicating possible ID Theft
• Patterns• Practices• Activities
– Respond appropriately