Rule 3341-6-56 | Theft prevention policy (red flag rules).
(A) Policy statement and purpose
Bowling Green state university has developed an identity theft prevention program pursuant to the federal trade commissions (FTC) red flag rules, found at 16 C.F.R. 681.2, which implements Section 114 of the Fair and Accurate Credit Transactions Act (FACTA) of 2003. The universitys program is designed to detect, prevent and mitigate identify theft in connection with the opening of a covered account or any existing covered accounts within the university, and is appropriate to the size and complexity of the university as a creditor and the nature and scope of its activities.
The red flag rules require a creditor to periodically determine, by conducting a risk assessment, whether it offers or maintains covered accounts. The university adopts this identity theft prevention program to detect, prevent, and mitigate identity theft in connection with the opening of a "covered account" or any existing "covered account," and to provide for continued administration of the program. Upon identifying any covered account(s), the creditor is required to develop and implement a written identity theft prevention program designed to:
(1) Identify patterns, practices, or specific activities ("red flags") that indicate the possible existence of identity theft with regard to new or existing covered accounts;
(2) Detect red flags that have been incorporated into the program;
(3) Respond appropriately to any red flags that are detected under the program;
(4) Ensure periodic updating of the program, including reviewing the accounts that are covered and the identified red flags that are part of the program; and
(5) Promote compliance with state and federal laws and regulations regarding identity theft protection.
(B) Policy definitions
(1) "Identity theft" refers to fraud committed or attempted using the identifying information of another person without authority.
(2) "Account" refers to a continuing relationship established by a person with a creditor to obtain a product or service for personal, family, household or business purposes. It includes
(a) An extension of credit, such as the purchase of property or services involving a deferred payment, and
(b) A deposit account.
(3) "Covered account" refers to
(a) An account that a creditor offers or maintains, primarily for personal, family, or household purposes, that involves or is designed to permit multiple payments or transactions and
(b) Any other account that the creditor offers to maintain for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the creditor from identity theft, including financial, operational, compliance, reputation, or litigation risks.
(4) "Red flag" refers to a pattern, practice or specific activity that indicates the possible existence of identity theft.
(5) "Identifying information" refers to any name that may be used, alone or in conjunction with any other information, to identify a specific person.
(6) "Service provider" refers to a person that provides a service directly to the financial institution or creditor.
(1) The controllers office will identify and inventory all covered accounts and service providers to be included in the red flags program.
(2) BGSU will identify relevant red flags based on the criteria listed below and will include them in the red flags program for training and awareness.
(a) Types of covered accounts offered and maintained
(b) Methods provided for opening and accessing each of those accounts
(c) Prior experiences with identity theft
(d) Size, complexity, nature and scope of our institution and its activities.
(3) BGSU will implement processes and procedures to validate identities of covered account owner prior to opening a new account or allowing access to an existing covered account.
(4) Upon detection of possible identity theft of a BGSU covered account, university personnel involved in the administration of the covered accounts will take appropriate steps to investigate, prevent, mitigate and/or resolve occurrences of identity theft.
(5) University departments, delegated responsibility for the development, implementation and administration of this program with respect to specific covered accounts, should develop and implement plans to effectively train their staff in the identification, detection, prevention and mitigation of the red flags identified above that are unique to their specific covered accounts. Staff training should be conducted on a regular basis and as necessary under the circumstances related to the administration of the particular covered account.
(D) Oversight of the program
Successful implementation of the identity theft program ultimately is the responsibility of each office, the employees of each office that maintains accounts or databases covered by the program, and the university community as a whole. As permitted by the red flags rule regulations, responsibility for overseeing the administration of the program has been delegated by the board of trustees to the vice president for finance and administration and chief financial officer of the university.
The program administrator will be responsible for day-to-day administration, ensuring appropriate training of university staff on the program, reviewing any staff reports regarding the detection of red flags and the steps for preventing and mitigating identity theft, determining which steps of prevention and mitigation should be taken in particular circumstances, and considering periodic changes to the program.
(E) Oversight of service provider arrangements
The university shall take steps to ensure that the activity of a service provider is conducted in accordance with reasonable policies and procedures designed to detect, prevent and mitigate the risk of identity theft whenever the organization engages a service provider to perform an activity in connection with one or more covered accounts. The university will require, by contract, that service providers have such policies and procedures in place and report any red flags to the program administrator.
(F) Approval by the board of trustees
Under the red flags regulations, implementation and oversight of the identify theft program is the responsibility of the governing body or an appropriate committee of such governing body. Approval of the initial plan must be appropriately documented and maintained. After its initial approval of the program, however, the governing body may delegate its responsibility to implement and oversee the identify theft program. As the governing body of Bowling Green state university, the board of trustees, through is audit committee, as of the date below, hereby approved the initial identity theft program. Having made such initial approval, the board of trustees hereby delegates the responsibility for implementing, monitoring, and overseeing the universitys identity theft program to the vice president for finance and administration and chief financial officer.