Laserfiche WebLink
BOOK 22 mE S$3 <br />Take reasonable measures when destroying sensitive data that will prohibit <br />the information from being read or reconstructed. Documents with sensitive <br />data should be shredded by the individual who has authorized access to the <br />data or by another employee while in the presence of the authorized <br />employee. The County may enter into a written contract with a third party in <br />the business of record destruction to destroy sensitive information in a <br />manner consistent with this policy. <br />(c) In order to protect sensitive and confidential information, the County will only release <br />sensitive information to the account holder or individual(s) who own the information <br />upon confirmation of personal identifying information or a valid picture ID. The <br />confirmed account holder or individual may authorize the release of sensitive <br />information to a third party. Confidential information will only be released in <br />accordance with state statute. The only exception will be the release of specified <br />information pursuant to a court order, warrant, subpoena or other requirement by <br />law. <br />2. Identification of Red Flags <br />The Red Flags rule defines "Identity Theft" as "fraud" using "identifying information" of <br />another person. "Identifying information" includes: name, address, telephone number, <br />social security number, date of birth, government issued driver's license or identification <br />number, alien registration number, government passport number, employer or taxpayer <br />identification number, unique electronic identification number, computer's internet <br />protocol address, routing code. <br />In order to identify relevant Red Flags, the County considers the types of accounts that is <br />offers and maintains, the methods it provides to open its accounts, the methods it <br />provides to access its accounts, and any previous experiences with Identity Theft. <br />(a) Steo 1. Employees shall be aware of the following "Red Flags: that suggest a breach <br />of sensitive or confidential information as occurred. <br />1. Physical Breach - The following are indications that there has been <br />unauthorized access to sensitive and confidential information via a <br />physical breach. Other activities may occur that are also physical <br />breaches that are not included in this listing. <br />a. Evidence of lock tampering on file cabinets or office doors. <br />b. Evidence of unauthorized entry in an area where sensitive and <br />confidential information is stored. <br />c. Missing files or documents that contain sensitive information. <br />Identity Theft/Red Flag Rules Page 5 <br />