Administrative Rule 5090-01
Identity Theft Prevention Program
Purpose
To establish an identity theft prevention program. The program is designed to detect, prevent, and mitigate identity theft. This rule applies to college accounts or procedures that either:
- Allow a person to register, receive financial aid, make payments, or be employed by the college; or
- Present a "reasonably foreseeable risk" of identity theft.
Statement
The college hereby establishes an identity theft prevention program to detect, prevent, and mitigate identity theft.
The college hereby establishes an identity theft prevention program to detect, prevent, and mitigate identity theft. The program includes procedures to:
- Identify red flags for covered records and incorporate those red flags into the program;
- Detect red flags that have been incorporated into the program;
- Respond appropriately to any detected red flags to prevent and mitigate identity theft; and,
- Update the program periodically to reflect changes in risks to students or employees
and to ensure the safety and soundness of the college from identity theft.
Definitions
- Covered Account
- record that the college offers or maintains primarily for registration, financial aid, accounts receivable or payable, or employment; and
- any other record that the college offers or maintains for which there is a reasonably foreseeable risk of identity theft to the person or a risk to the safety and soundness of the college's records, including financial, operational, compliance, reputation, or litigation risks.
- Identify Theft
- Identify Theft, Fraud committed, or attempted using the identifying information of another person without authority.
- Red Flag
- A pattern, practice, or specific activity that indicates the possible existence of identity theft.
- Identifying Information
- Any name or number that may be used, alone or in conjunction, with any other information, to identify a specific person, including name, address, telephone number, social security number, date of birth, government-issued driver's license, or identification number, alien registration number, government passport number, employer or taxpayer identification number, or credit or debit card number.
- Security Information
- Defined as government data, the disclosure would likely substantially jeopardize the
security of identifying information.
- Defined as government data, the disclosure would likely substantially jeopardize the
security of identifying information.
Program Administration
- Oversight and responsibility for developing, implementing, and updating this program
lies with the college's Vice President of Finance and Operations and the Identity
Theft Committee. The Vice President will designate a program administrator. The committee
will be comprised of the following directors or their designees:
-
- Director of Enrollment Services
- Director of Human Resources
- Director of Information Services
- Director of Financial Aid
- Director of Accounting and Budget
- Foundation Executive Director
- Director of Safety and Loss Prevention
-
- The program administrator and the committee will be responsible for:
- Program resources and planning;
- Ensuring appropriate program training of college staff;
- Reviewing any staff reports regarding red flag detection and identification theft mitigation and prevention;
- Determining which steps of prevention and mitigation should be taken in particular circumstances commensurate with the risk posed; and
- Consider periodic changes to the program.
The program administrator and committee will review and update this program annually to reflect changes in risks to students or employees and the soundness of protection of college records from identity theft. In doing so, the program administrator and committee will consider the college's experience with identity theft situations, changes in identity theft methods, changes in identity theft detection and prevention methods, and changes in the college's business arrangements with other entities. After considering these factors, including the degree of identity theft risk posed, the program administrator and committee will determine whether changes to the program, including the listing of new red flags, are warranted. If warranted, the program administrator and committee will update the program or present the College Council with recommended changes, and they will determine whether to accept, modify, or reject those changes to the program.
Department heads are responsible for familiarizing themselves with the program. Department
heads shall meet with their staff annually to assess current compliance. Staff responsible
for implementing the program will be trained by or under the direction of the committee.
Staff will provide timely reports to the committee on all incidents of identity theft
or occurrences of red flags.
Identification of Red Flags
To identify red flags, the college considers the types of records it maintains, the methods it uses to open and access records, and its previous experiences with identity theft. The college has identified the following red flags in each of the listed categories:
- Notifications and Warnings from Credit Reporting or Background Check Agencies
- Red flags
- Report of fraud accompanying a credit or background report;
- Notice or report from a credit agency of a credit freeze on a student, employee, or applicant;
- Notice or report from a credit agency of an active duty alert for an applicant; or
- Indication from a credit report of activity inconsistent with a student’s or employee's usual pattern or activity.
- Red flags
- Suspicious Documents
- Red flags
- Identifying information that appears to be forged, altered, or inauthentic;
- Identifying Information on which a person's photograph or physical description is inconsistent with the person presenting the document;
- Other documents with information that is inconsistent with existing student or employee information (such as if a person's signature on a check appears forged); or
- The application appears to have been altered or forged.
- Red flags
- Suspicious Personal Identifying Information
- Red flags
- Identifying information presented inconsistent with other information the student or employee provides (e.g., inconsistent birth dates);
- Identifying information presented inconsistent with other sources of information ( e.g., an address not matching an address on file);
- Identifying information presented that is the same as information shown on other applications that were found to be fraudulent;
- Identifying information presented that is consistent with fraudulent activity (e.g., an invalid phone number or fictitious billing address);
- Social security number presented that is the same as one given by another student or employee;
- Failure to provide complete personal identifying information on an application when reminded to do so; or
- Identifying information inconsistent with the information on file for the student or employee.
- Red flags
- Suspicious Activity or Unusual Use of Account
- Red flags
- Change of address for a record followed by a request to change the record holder's name;
- Mail sent to the record holder is repeatedly returned as undeliverable;
- Notice to the college that a student or employee is not receiving mail sent by the college;
- Notice to the college that an account has unauthorized activity;
- A breach in the college computer system security; or
- Unauthorized access to or use of student or employee account information.
- Red flags
- Alerts From Others
- Red flag
- notice to the college from a student or employee, identity theft victim, law enforcement,
or other person that the college has opened or is maintaining a fraudulent record
for a person engaged in identity theft.
- notice to the college from a student or employee, identity theft victim, law enforcement,
or other person that the college has opened or is maintaining a fraudulent record
for a person engaged in identity theft.
- Red flag
Detecting Red Flags
-
- New Records, To detect any of the red flags identified above associated with a new
record or which presents a foreseeable risk of identity theft, college personnel will
take the following steps to obtain and verify the identity of the person or business
opening the account:
- Require certain Identifying Information, including:
- Full name;
- Date of birth (for individual);
- Previous and current residential or business address; and
- Identification.
- U.S. citizen
- social security number; and/or
- photo-bearing documents (original required) such as:
- state-issued driver's license; or
- state-issued identification card; or
- United States passport.
- Non-U.S. citizen
- Social security number; and/or
- Photo-bearing documents (original required) such as:
- state-issued driver's license; or
- state-issued identification card; or
- passport from any country; or
- documents containing an alien identification number and country of issuance; or
- any other photo-bearing government-issued document evidencing nationality or residence.
- U.S. citizen
- Review all documentation for red flags; and/or independently contact the student or employee.
- Require certain Identifying Information, including:
- New Records, To detect any of the red flags identified above associated with a new
record or which presents a foreseeable risk of identity theft, college personnel will
take the following steps to obtain and verify the identity of the person or business
opening the account:
- Existing Records. To detect any of the red flags identified above for an existing
record, personnel will take the below steps to monitor transactions. College personnel
can determine the degree of risk posed and act accordingly.
- verify person's identifying information if a person requests any information on the record (this can be done in person, via telephone, via facsimile, or via email);
- verify the validity of requests to change address; and
- verify changes in banking information given for payment purposes.
Preventing and Mitigating Identity Theft
To further prevent the likelihood of identity theft, personnel will take the below steps, commensurate with the degree of risk posed, regarding ongoing internal operating procedures. College personnel can determine the degree of risk posed and act accordingly.
- Ensure that its website is secure or provide clear notice that the website is unsecure.
- Ensure complete and secure destruction of paper documents and computer files containing a person’s identifying information.
- Ensure that office computers are password protected.
- Keep offices clear of papers containing personal information.
- Ensure computer virus protection is up-to-date.
- Require and keep only information necessary for business purposes.
- Transmit identifying information using only approved methods, and include the following
statement on any transmitted identifying information:
- This message may contain confidential and/or proprietary information it is intended for the person/entity to which it was originally addressed. If you have received this email in error, please contact the college and delete the original document. Any use by others is strictly prohibited.
- Do not use or post a person's social security number as an account identifier or on any other documents unless requested by the person or required by federal law (such as W-2 forms).
- Steps to take when you detect a red flag
If college personnel detect red flags, they will take one or more of the below steps, commensurate with the degree of risk posed, to prevent and mitigate the risk of identity theft. College personnel can determine the degree of risk posed and act accordingly.
- Continue to monitor an account for evidence of identity theft;
- Contact the person, either by written notice or telephone;
- Refuse to open a new account;
- Close an existing account;
- Reopen an account with a new number;
- Notify the program administrator to determine the appropriate step(s) to take based on the Oregon Identity Theft Act Best Practices; or
- Determine that no response is warranted under the particular circumstances.
Service Provider Arrangements
In the event the college engages a service provider to perform an activity in connection with a covered account, the college will take one of the following steps to ensure the service provider performs under the program:
- Require, by contract, that service providers have appropriate policies and procedures in place to detect, prevent, and mitigate identity theft.
- Require, by contract, that service providers review this program and report any red flags to the program administrator.
- Require that contracts include indemnification provisions limiting the college's
liability for the service provider's failure to detect, prevent, or mitigate identity
theft.
Non-Disclosure of Specific Practices
Disclosure of specific information or practices regarding red flag identification, detection, mitigation, and prevention practices may be limited to designated college staff and/or policymakers. Documents produced to develop or implement the program that describe specific practices may constitute security information and may be non-disclosable because disclosure would likely jeopardize the security of identifying information and may circumvent the college's identity theft prevention efforts.
Date of Adoption:
4/13/09
12/1/16, 5/3/18, 1/23/25
12/1/16, 5/3/18, 1/7/21, 1/23/25