My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Agenda Package - 07-20-09
public access
>
Clerk
>
AGENDA PACKAGES
>
2009
>
Agenda Package - 07-20-09
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
10/29/2009 9:39:53 AM
Creation date
10/29/2009 9:31:08 AM
Metadata
Fields
Template:
Admin-Clerk
Document Type
Agenda
Committee
Board of Commissioners
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
223
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
('SO <br />0 2 <br />3. <br />• <br />4. <br />s <br />Technology Breach - The following are indications that there has <br />been unauthorized access to sensitive and confidential information <br />via a technology breach. Other activities may occur that are also <br />technological breaches that are not included in this listing. <br />a. Unknown or unauthorized name in the computer logon window. <br />b. Disconnected computer cables or power cables. <br />c. Missing computer equipment (desktop, laptop) <br />d. Evidence that electronic files have been accessed by unknown <br />or unauthorized individuals or are missing. <br />e. Devices or media attached to the computer that are not known <br />or authorized. <br />f. Unusual programs running, icons, or windows that appear that <br />are not known and are not part of the normal work process. <br />g. Any other suspicious activity which indicates an attempt to use <br />technology without approval. <br />Suspicious Documents. The following are indications that there has <br />been unauthorized access to sensitive and confidential information <br />from physical documents provided by third parties. Other activities <br />may occur that are also breaches that are not included in this listing. <br />a. Identification document or card that appears to be forged, <br />altered or inauthentic. <br />b. Identification document or card on which a person's photograph <br />or physical description is not consistent with the person <br />presenting the document. <br />c. Other document with information that is not consistent with <br />existing customer information (such as if a person's signature <br />on a check appears forged). <br />d. Application for service that appears to have been altered or <br />forged. <br />Suspicious Person Identifying Information. The following are <br />indications that persons may be attempting to create or use fictitious <br />identities. Other activities may occur that are also breaches that are <br />not included in this listing. <br />a. Identifying information presented that is inconsistent with other <br />information the customer provides (example: inconsistent birth <br />dates), <br />b. Identifying information presented that is inconsistent with other <br />sources of information (for instance, an address not matching <br />an address on a credit report). <br />c. Identifying information presented that is the same as <br />information shown on other applications that were found to be <br />fraudulent. <br />d. Identifying information presented that is consistent with <br />fraudulent activity (such as an invalid phone number or <br />fictitious billing address). <br />e. An address or phone number presented that is the same as <br />that of another person. <br />Identity ThefVRed Flag Rules Page 6 <br />
The URL can be used to link to this page
Your browser does not support the video tag.