My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2009 - 07-20-09 Regular Meeting
public access
>
Clerk
>
MINUTES
>
2009
>
2009 - 07-20-09 Regular Meeting
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
8/20/2009 2:46:15 PM
Creation date
8/20/2009 2:38:51 PM
Metadata
Fields
Template:
Admin-Clerk
Committee
Board of Commissioners
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
95
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
BOOK 22 Pace 985 <br />f. A person fails to provide complete personal identifying <br />information on an application when reminded to do so. <br />g. A person's identifying information is not consistent with the <br />information that is on file for the customer. <br />5. Suspicious Activity of Unusual Use of an Account. The following are <br />indications that persons may be attempting to create or use fictitious <br />accounts. Other activities may occur that are also breaches that are <br />not included in this listing. <br />a. Change of address for an account followed by a request to <br />change the account holder's name. <br />b. Payments stop on an otherwise consistently up-to-date account. <br />c. Account used in a way that is not consistent with prior use. <br />(example: very high activity) <br />d. Mail sent to the account holder is repeatedly returned as <br />undeliverable. <br />e. Notice to the County that a customer is not receiving mail sent <br />by the County. <br />f. Notice to the County that an account has unauthorized activity. <br />g. Breach in the County's computer system security. <br />In. Unauthorized access to or use of customer account <br />information. <br />6. Alerts from Others. Notice to the County from a customer, identity <br />theft victim, law enforcement or other person that is has opened or is <br />maintaining a fraudulent account for a person engaged in Identity <br />Theft. An example of an alert could be a "notice of address <br />discrepancy" from a nationwide consumer reporting agency (NCRA). <br />(b) Step 2. Detection of Red Flags. <br />1. New Accounts. In order to detect any of the red flags identified <br />above associated with the opening of a new account, employees shall <br />take the following steps to obtain and verify the identity of the person <br />opening the account: <br />a. Require certain identifying information such as name, date of <br />birth residential or business address, principal place of <br />business for an entity, driver's licenses or other identification. <br />b. Verify the customer's identity (for instance, review a driver's <br />license or other identification card). <br />c. Review documentation showing the existence of a business <br />entity. <br />d. Independently contact the customer if the application is not <br />made in person by the customer. <br />Identity Theft/Red Flag Rules Page 7 <br />
The URL can be used to link to this page
Your browser does not support the video tag.