(a) Fulfilling requirements of the red flags rule.
Under
the red flags rule, every financial institution and creditor is required
to establish an “identity theft prevention program” tailored
to its size, complexity, and the nature of its operation. Each program
must contain reasonable policies and procedures to:
(1) Identify relevant red flags for new and existing covered accounts
and incorporate those red flags into the program;
(2) Detect red flags that have been incorporated into the program;
(3) Respond appropriately to any red flags that are detected to prevent
and mitigate identity theft; and
(4) Ensure the program is updated periodically, to reflect changes in
risks to customers or to the safety and soundness of the creditor
from identity theft.
(b) Red flags rule definitions used in this program.
(1) The red flags rule defines “identity theft” as “fraud
committed using the identifying information of another person”
and a “red flag” as “a pattern, practice, or specific
activity that indicates the possible existence of identity theft.”
(2) According to the rule, a city is a creditor subject to the rule requirements.
The rule defines creditors “to include finance companies, automobile
dealers, mortgage brokers, utility companies, and telecommunications
companies. Where non-profit and government entities defer payment
for goods or services, they, too, are to be considered creditors.”
(3) City accounts held by customers of the city used mostly for personal,
family, or household purposes, and that involve multiple payments
or transactions are covered by the rule. Under the rule, a “covered
account” is:
(A) Any account the city offers or maintains primarily for personal,
family or household purposes, that involves multiple payments or transactions;
and
(B) Any other account the city offers or maintains for which there is
a reasonably foreseeable risk to customers or to the safety and soundness
of the city from identity theft.
(4) “Identifying information” is defined under the rule as
“any name or number that may be used, alone or in conjunction
with any other information, to identify a specific person,”
including: name, address, telephone number, Social Security number,
date of birth, government issued driver’s license or identification
number, employer or taxpayer identification number, unique electronic
identification number, computer’s internet protocol address,
or routing code.”
(Ordinance 5573 adopted 11/3/08)
The city evaluated the effectiveness of its current procedures
in identifying, detecting, and responding to identity theft. The city
also identified the areas most susceptible to identify theft:
(1) New
accounts opened in person.
(2) New
accounts opened via telephone.
(3) New
accounts opened via fax.
(4) New
accounts opened via web.
(5) Account
information accessed in person.
(6) Account
information accessed via telephone (person).
(7) Account
information accessed via website.
(8) Identity
theft occurred in the past from someone falsely opening a city account.
(Ordinance 5573 adopted 11/3/08)
In order to identify relevant red flags, the city considers
the types of accounts that it offers and maintains, the methods it
provides to open its accounts, and the methods it provides to access
its accounts. The city identifies the following red flags, in each
of the listed categories:
(1) Suspicious documents.
(A) Identification document or card that appears to be forged, altered
or inauthentic;
(B) Identification document or card on which a person’s photograph
or physical description is not consistent with the person presenting
the document;
(C) Other document with information that is not consistent with existing
customer information (such as if a person’s signature on a check
appears forged); and
(D) Application for service that appears to have been altered or forged.
(2) Suspicious personal identifying information.
(A) Identifying information presented that is inconsistent with other
information the customer provides;
(B) Identifying information presented that is inconsistent with other
sources of information;
(C) Identifying information that is inconsistent with information on
the customer’s file/account;
(D) Identifying information presented that is the same as information
shown on other applications or accounts;
(E) Identifying information presented that is consistent with fraudulent
activity (such as an invalid phone number or fictitious billing address);
(F) Identification presented that is the same as one given by another
customer; and
(G) A person fails to provide complete personal identifying information
on an application when reminded to do so (however, by law, Social
Security numbers must not be required).
(3) Suspicious account activity or unusual use of account.
(A) Change of address for an account followed by a request to change
the account holder’s name;
(B) Mail sent to the account holder is repeatedly returned as undeliverable;
(C) Notice to the city that a customer is not receiving mail sent by
the city;
(D) Notice to the city that an account has unauthorized activity; and
(E) Breach in the city’s computer system security.
(4) Alerts from others.
(A) Notice to the city from a customer, identity theft victim, law enforcement
or other person that it has opened or is maintaining a fraudulent
account for a person engaged in identity theft.
(Ordinance 5573 adopted 11/3/08)
(a) New accounts.
In order to detect any of the red flags
identified above associated with the opening of a new account, city
personnel shall take the following steps to obtain and verify the
identity of the person opening the account:
(1) Require certain identifying information such as name, residential
or business address, principal place of business for an entity, valid
driver’s license or other state issued identification;
(2) Verify the customer’s identity (for instance, review a driver’s
license or other identification card);
(3) Review documentation showing the existence of a business entity;
and
(4) Independently contact the customer.
(b) Existing accounts.
In order to detect any of the red
flags identified above for an existing account, city personnel shall
take the following steps to monitor transactions with an account:
(1) Verify the identification of customers if they request information
(in person, via telephone, via facsimile, via email);
(2) Verify the validity of requests to change billing addresses; and
(3) Verify changes in banking information given for billing and payment
purposes.
(Ordinance 5573 adopted 11/3/08)
In the event city personnel detects any identified red flags,
such personnel shall take one or more of the following steps, depending
on the degree of risk posed by the red flag:
(1) Prevent and mitigate.
(A) Continue to monitor an account for evidence of identity theft;
(B) Contact the customer and/or property owner;
(C) Change any passwords or other security devices that permit access
to accounts;
(E) Close an existing account;
(F) Reopen an account with a new number;
(G) Notify the program administrator for determination of the appropriate
step(s) to take;
(H) Notify law enforcement; or
(I) Determine that no response is warranted under the particular circumstances.
(2) Protect customer identifying information.
In order to further prevent the likelihood of
identity theft occurring with respect to city accounts, the city shall
take the following steps with respect to its internal operating procedures
to protect customer identifying information:
(A) Only specially identified employees with a legitimate need shall
have access to secured areas/cabinets.
(B) Files containing personally identifiable information shall be kept
in a locked area/cabinet except when an employee is working on the
file.
(C) Employees shall not leave sensitive papers out on their desks when
they are away from their workstations.
(D) Access to off-site storage facilities shall be limited to employees
with a legitimate business need.
(E) Visitors who must enter areas where sensitive files are kept shall
be escorted by an employee of the city/department.
(F) No visitor shall be given any entry codes or allowed unescorted access
to the office.
(G) Access to sensitive information shall be controlled using “strong”
passwords. Employees shall choose passwords with a mix of letters,
numbers, and characters. User names and passwords shall be different.
Passwords shall be changed every 90 days.
(H) Individual passwords shall not be shared; system passwords shall
not be posted near workstations.
(I) Password-activated screen savers shall be used to lock employee computers
after a period of inactivity.
(J) When installing new software, vendor-supplied default passwords shall
be changed to a more secure strong password.
(K) Sensitive information that is sent to third parties over public networks
shall be encrypted.
(L) Anti-virus programs shall be run on individual computers and on servers
daily.
(M) Personal identification information shall not be sent via email.
(N) When sensitive data is received or transmitted, secure connections
shall be used.
(O) Laptop users shall not store sensitive information on their laptops.
(P) The computer network shall have a firewall where the laptop user’s
network connects to the internet.
(Q) Any wireless network in use shall be secured.
(R) Before employees are hired who will have access to sensitive data,
references and background checks will be performed.
(S) New employees shall sign an agreement to follow the company’s
confidentiality and security standards for handling sensitive data.
(T) Access to customer’s personal identity information shall be
limited to employees with a “need to know.”
(U) When an employee leaves or transfers to another department, access
to systems and sensitive information shall be immediately disabled.
(V) Employees shall be trained on identifying and responding to red flags.
(W) Employees shall be alert to attempts at phone phishing.
(X) Employees shall be required to notify the program administrator immediately
if there is a potential security breach.
(Y) Employees who violate security policy shall be subjected to discipline,
up to and including dismissal.
(Z) Service providers shall notify the employee of any security incidents
they experience, even if the incidents may not have led to an actual
compromise of the city’s data.
(AA) Paper records shall be shredded before being placed into the trash.
(BB) Any data storage media shall be disposed of by shredding, punching
holes in, or incineration.
(Ordinance 5573 adopted 11/3/08)
The program administrator shall periodically review and update
this program to reflect changes in risks to customers and the soundness
of the city from identity theft. In doing so, the program administrator
shall consider the city’s experiences with identity theft situations,
changes in identity theft methods, changes in identity theft detection
and prevention methods, and changes in the city’s business arrangements
with other entities. After considering these factors, the program
administrator shall determine whether changes to the program, including
the listing of red flags, are warranted. If warranted, the program
administrator shall update the program or present the city council
with his or her recommended changes; and the city council will make
a determination of whether to accept, modify, or reject those changes
to the program.
(Ordinance 5573 adopted 11/3/08)
(a) Oversight.
Responsibility for developing, implementing,
and updating this program shall lie with an identity theft committee
for the city, headed by a program administrator. The program administrator
shall be responsible for the program administration, for ensuring
appropriate training of city staff on the program, for reviewing any
staff reports regarding the detection of red flags and the steps for
preventing and mitigating identity theft, for determining which steps
of prevention and mitigation should be taken in particular circumstances,
and for considering periodic changes to the program.
(b) Staff training and reports.
City staff responsible for
implementing the program shall be trained either by or under the direction
of the program administrator in the detection of red flags and the
responsive steps to be taken when a red flag is detected.
(c) Service provider arrangements.
In the event the city
engages a service provider to perform an activity in connection with
one or more accounts, the city shall take the following steps to ensure
the service provider performs its activity in accordance with reasonable
policies and procedures designed to detect, prevent, and mitigate
the risk of identity theft.
(1) Require, by contract, that service providers have such policies and
procedures in place; and
(2) Require, by contract, that service providers review the city’s
program and report any red flags to the program administrator.
(Ordinance 5573 adopted 11/3/08)