\n
BETWEEN THE FLAGS PROJECT OFFICERLocation:New South WalesDemonstrated ability to manage multip. Catch a Job Australia hiring jobs. MR, Detect Junior, Sepsis kills Program.The Project Officer will be responsible. Development and use of a computer program to detect potentially inappropriate prescribing in older adults residing in. A computer program can accurately and automatically detect inappropriate prescribing in. FTC Red Flags Rule : University of Dayton, Ohio. Download a PDF version of the FTC Red Flags Rule Policy (. Purpose. The purpose of this policy is to establish an Identity Theft Prevention Program to detect, prevent, and mitigate identity theft in connection with the opening of a covered account or an existing covered account and to provide for continued administration of the Program. The Program shall include reasonable policies and procedures to: Identify relevant red flags for covered accounts it offers or maintains and incorporate those red flags into the program. Detect red flags that have been incorporated into the Program.
Respond appropriately to any red flags that are detected to prevent and mitigate identity theft. Ensure the Program is updated periodically to reflect changes in risks to customers and to the safety and soundness of the creditor from identity theft. The program shall, as appropriate, incorporate existing policies and procedures that control reasonably foreseeable risks. Identify relevant red flags for covered accounts it offers or maintains and incorporate those red flags into the program; Detect red flags that have. Paediatric Quality Program; Between the Flags; Sepsis Kills; End of Life Care. 8.2 NSW Health Between the Flags Paediatric CERS and Escalation Matrix. The company or between the company and outsiders. Welcome to Flag Detective! When you do discover the flags information, let us know at \'Webmaster FlagDetective.com\' so we can work to update our site! But before you leave our site without the answers you were looking. Between the Flags: The NSW Approach to Recognition and Management of Clinical Deterioration. DETECT junior education package Between the Flags Team Visits to LHD’s. There is a discrepancy between the address on the application and the credit report.Policy History. Effective Date: April 2. Approval: December 1. Policy History: Approved in Original Form: April 2. Approved as Amended: December 1. Maintenance of Policy: Chief Information Officer. Scope. This policy applies to all units of the University of Dayton, as well as contracted service providers, involved in the administration of covered accounts. Definitions(a) . Account includes: An extension of credit, such as the purchase of property or services involving a deferred payment. A deposit account. The University of Dayton has identified ten types of accounts, five of which are covered accounts administered by the University and five that are administered by a service provider. University covered accounts: Refund of credit balances involving loans. Refund of credit balances, without loans. Deferment of tuition payments. Emergency loans. University non- student business accounts(c) . Service Provider Arrangements below. Collection agency used for delinquent invoices: Diversified Credit Service, Inc. The University identifies the following red flags, in each of the listed categories: A. Suspicious Documents. Red Flags. Identification document or card that appears to be forged, altered or inauthentic. Identification document or card on which a person’s photograph or physical description is not consistent with the person presenting the document. Other document with information that is not consistent with existing customer information (such as if a person’s signature on a check appears forged)Application for service that appears to have been altered or forged. C. Suspicious Personal Identifying Information. Red Flags. Identifying information presented that is inconsistent with other information the customer provides (example: inconsistent birth dates)Identifying information presented that is inconsistent with other sources of information (for instance, an address not matching an address on a credit report)Identifying information presented that is the same as information shown on other applications that were found to be fraudulent. Identifying information presented that is consistent with fraudulent activity (such as an invalid phone number or fictitious billing address)Social security number presented that is the same as one given by another customer. An address or phone number presented that is the same as that of another person. A person fails to provide complete personal identifying information on an application when reminded to do so (however, by law social security numbers must not be required)A person’s identifying information is not consistent with the information that is on file for the customer. D. Suspicious Account Activity or Unusual Use of Account. Red Flags. Change of address for an account followed by a request to change the account holder\'s name. Payments stop on an otherwise consistently up- to- date account. Account used in a way that is not consistent with prior use (example: very high activity)Mail sent to the account holder is repeatedly returned as undeliverable. Notice to the University that a customer is not receiving mail sent by the University. Notice to the University that an account has unauthorized activity. Breach in the University’s computer system security. Unauthorized access to or use of customer account information E. Alerts from Others. Red Flags. Notice to the University from a customer, identity theft victim, law enforcement or other person that it has opened or is maintaining a fraudulent account for a person engaged in Identity Theft. New Accounts. In order to detect any of the Red Flags identified above associated with the opening of a new account, University personnel will take the following steps to obtain and verify the identity of the person opening the account: Detect. Require certain identifying information such as name, date of birth, residential or business address, principal place of business for an entity, driver\'s license or other identification. Verify the customer\'s identity (for instance, review a driver\'s license or other identification card)Review documentation showing the existence of a business entity; and. Independently contact the customer. B. Existing Accounts. In order to detect any of the Red Flags identified above for an existing account, University personnel will take the following steps to monitor transactions with an account: Detect. Verify the identification of customers if they request information (in person, via telephone, via facsimile, via email)Verify the validity of requests to change billing addresses. Verify changes in banking information given for billing and payment purposes. Preventing And Mitigating Identity Theft. In the event University personnel detect any identified Red Flags, such personnel shall take one or more of the following steps, depending on the degree of risk posed by the Red Flag: A. Oversight. Responsibility for developing, implementing and updating this Program lies with an Identity Theft Committee for the University. The Committee is headed by a Program Administrator, who is the Bursar of the University of Dayton. Two or more other individuals appointed by the head of the University or the Program Administrator comprise the remainder of the committee membership. The Program Administrator will be responsible for the Program administration, for ensuring appropriate training of University staff on the Program, for reviewing any staff reports regarding the detection of Red Flags and the steps for preventing and mitigating Identity Theft, determining which steps of prevention and mitigation should be taken in particular circumstances and considering periodic changes to the Program. B. Program Updates This Program will be periodically reviewed and updated to reflect changes in risks to customers and the soundness of the University from Identity Theft. At least annually, the Program Administrator will consider the University’s experiences with Identity Theft situations, changes in Identity Theft methods, changes in Identity Theft detection and prevention methods, changes in types of accounts the University maintains and changes in the University’s business arrangements with other entities. After considering these factors, the Program Administrator will determine whether changes to the Program, including the listing of Red Flags, are warranted. If warranted, the Program Administrator will update the Program or present the President’s Council with his or her recommended changes and the President’s Council will make a determination of whether to accept, modify or reject those changes to the Program. C. Staff Training and Reports. University staff responsible for implementing the Program shall be trained either by or under the direction of the Program Administrator in the detection of Red Flags, and the responsive steps to be taken when a Red Flag is detected. D. Service Provider Arrangements. In the event the University engages a service provider to perform an activity in connection with one or more accounts, the University will take the following steps to ensure the service provider performs its activity in accordance with reasonable policies and procedures designed to detect, prevent, and mitigate the risk of Identity Theft: Use our best efforts to insure that service providers have such policies and procedures in place. And, that service providers review the University’s Program and report any Red Flags to the Program Administrator. E. Specific Program Elements and Confidentiality. For the effectiveness of Identity Theft prevention Programs, the Red Flag Rule envisions a degree of confidentiality regarding the University’s specific practices relating to Identity Theft detection, prevention and mitigation. Therefore, under this Program, knowledge of such specific practices is to be limited to the Identity Theft Committee and those employees who need to know them for purposes of preventing Identity Theft. Because this Program is to be adopted by a public body and thus publicly available, it would be counterproductive to list these specific practices here. Therefore, only the Program’s general red flag detection, implementation and prevention practices are listed in this document. F. The person who is the Bursar will be the Program Administrator of the Red Flag Program. The University of Dayton has determined that the individual who holds the position of University Bursar is the most appropriate individual to be the Program Administrator. Currently that position is held by Gwen Klemmer. Reference Documentshttp: //www. Applicable Regulations. Fair and Accurate Credit Transaction Act of 2. Red Flag Program Clarification Act of 2.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
April 2017
Categories |