30.17 - Identity Theft Protection Policy
Owner:
- Position: Vice President of Information Technology and Chief Information Officer, Information Technologies
- Email: oit-security@uidaho.edu
Last updated: February 28, 2023
Preamble. The U.S. Congress has provided protection for consumers from identity theft by enacting the Fair and Accurate Credit Transactions Act (鈥淔ACTA鈥) and the Fair Credit Reporting Act (鈥淔CRA鈥). FACTA directed the Federal Trade Commission (鈥淔TC鈥) to issue regulations, now generally referred to as the 鈥淩ed Flags Rule鈥 (the Rule), which require financial institutions and creditors to adopt policies and procedures that protect consumers from identity theft.
Accordingly, U of I adopts this policy to identify, prevent and mitigate identity theft in compliance with the Rule; approve and establish an Identity Theft Prevention Program; and appoint a program administrator who has primary responsibility for oversight of the Program.
A. Definitions.
A-1. Creditor: any natural person, corporation or other entity that regularly, and in the ordinary course of business, advances funds to or on behalf of a person, based on an obligation to repay the funds or repayable from specific property pledged by the person.
A-2. Covered Account: an account that the university offers or maintains for individuals that are primarily for personal, family, or household purposes and designed to permit multiple payments or transactions, or is any account that is subject to a reasonably foreseeable risk of identity theft.
A-3. Identifying Information: any name or number that may be used alone or in conjunction with any other information to identify a specific person, including: name, address, telephone number, social security number, date of birth, driver鈥檚 license or identification number, alien registration number, passport number, employer or taxpayer identification number.
A-4. Identity Theft: a fraud committed or attempted using the identifying information of another person without authority.
A-5. Red Flag: a pattern, practice or specific activity that indicates the potential for identity theft.
A-6. Red Flag Rule (the Rule):