What else do I need to know?
Definitions
Covered Account: An account that the University maintains under one of its covered activities.
Covered Activities: Activities that the University participates in which require it to comply with the Red Flags Rule include:
- Participation in Federal Perkins Loan Program
- Institutional student loan programs
- Payment plans and promissory notes for covered student accounts
- Background checks/credit reports in employee hiring process and for students enrolled in certain programs
Red Flags Rule: is a set of regulations that require certain businesses and organizations to develop and implement documented plans to protect consumers from identity theft.
Responsible Administrator: For the purpose of this program, the responsible administrator means the following:
- For student financial data, the Director for Student Financial Services
- For student record data, the Registrar
- For employee data, the Director for Labor Relations and Employment Services
Existing Policies and Practices
Many offices at ̽̽ maintain files, both electronic and paper, of student biographical, academic, health, financial, and admission records. These records may also include student billing information, Federal Perkins Loan records, and personal correspondence with students and parents. Policies to ensure compliance with Gramm-Leach-Bliley Act (GLBA), Family Educational Rights and Privacy Act (FERPA), system and application security, and internal control procedures provide an environment where identify theft opportunities are mitigated. Records are safeguarded to ensure the privacy and confidentiality of student, parent, alumni, and employee personal and protected information.
The Division of Human Resources, Diversity and Multicultural Affairs (HRDMA) performs credit and criminal background checks on some applicants prior to hire. Additionally, criminal background checks are performed during the admission process for certain students including those applying to undergraduate and graduate level nursing programs and to the Larner College of Medicine. Certain clinical placement sites may also require background checks for students during clinical/practical training.
The University’s controls over privileged information include:
- Students are given the opportunity to identify a third-party (i.e., a parent or guardian) to whom the student authorizes access to the billing information contained in their student account.
- Access to non-directory student data in ̽̽’s Banner student information system and the Larner College of Medicine's OASIS system is restricted to those employees of the University with a need to properly perform their duties. These employees are trained to know FERPA, GLBA and Red Flag regulations.
- Social Security numbers are not used as primary student identification numbers and this data is classified as non-directory student data.
- Student Financial Services employees managing covered accounts are trained to know FERPA, GLBA and Red Flag regulations.
- The University is sensitive to the personal data (unlisted phone numbers, dates of birth, etc.) that it maintains in its student records and databases. According to FERPA, student record data will not be disclosed, unless an exception applies. Exceptions include:
- upon receipt of a written request, consent form, or authorization signed by the student to whom the personal information pertains;
- if the personal information is “directory information”
- if the disclosure is to a University official and there is a legitimate business "need-to-know"; or
- if the University is required by law to make the disclosure.
- Every effort is made to limit the access to private information to those employees on campus with a legitimate "need-to-know." University employees who have approved access to the administrative information databases are informed of their responsibilities to safeguard this information and to protect against inappropriate use or disclosure.
- Employees with access understand that they are prohibited from using protected information unless such use is to perform job duties for which they are responsible.
- Employees further understand that the inappropriate access, use or disclosure of personal data may result in disciplinary action up to, and including, dismissal from the University.
- The University's official personnel files for all employees are retained in HRDMA. Employees have the right to review the materials contained in their personnel file.
- Departments that are required to obtain background checks for students have policies and procedures relating to obtaining and safeguarding information obtained through these background checks.
- The University has policies that address the safeguarding of various forms of confidential information. Those policies include, but are not limited to:
Detecting & Responding to Red Flag Activity
Detailed procedures relating to the detection and response to suspected Red Flags can be found in ̽̽’s “Identifying and Responding to Suspected Identity Theft” UOP.
The University’s risk assessment has identified the following potential “red flags” as pertaining to its business activities:
- Address discrepancies noted in background check reports;
- Presentation of suspicious documents;
- Photograph or physical description on the identification is not consistent with the appearance of the person presenting the identification;
- Personal identifying information provided is not consistent with other personal identifying information on file with the University;
- Documents provided for identification that appear to have been altered or forged;
- Unusual or suspicious activity related to covered accounts;
- Notification from students, borrowers, law enforcement, or service providers of unusual activity related to a covered account; and
- Notification from a credit bureau of fraudulent activity.
Should an employee identify a “red flag” (patterns, practices and specific activities that signal possible identity theft as identified above), they are instructed to immediately report this to a Responsible Administrator (refer to the “Definitions” section of this Policy.) In consultation with the Chief Privacy Officer, the responsible administrator will investigate the threat of identity theft to determine if there has been a breach and will respond appropriately to prevent future identity theft breaches. The Chief Privacy Officer is responsible to notify the Office of General Counsel and, in the event that electronic data is involved, the Information Security Officer as soon as practicable.
- Additional actions may include notifying and cooperating with appropriate law enforcement, notifying the student or employee of the potential for attempted fraud and notifying background check vendors of any address discrepancies between information contained in the background check report and the University’s records.
Oversight of Service Providers
The University engages in the following activities utilizing third-party service providers:
- ̽̽ employs a third-party loan servicer for the purpose of billing and collection of Federal Perkins and ̽̽ institutional loan payments. The only information that is shared with the loan servicer is information required to properly bill and collect loan payment as established by the Department of Education. This includes student name, address, telephone number, social security number, and date of birth. ̽̽ will collect and maintain on file documents from the loan servicer confirming their compliance with “Red Flag Rules”.
- ̽̽ uses several collection agencies for the purpose of collecting overdue student receivables, defaulted Institutional and Federal Perkins Loans. The only information that is shared with the collection agencies is that information required to perform address searches, and to properly bill and collect payment. This includes student name, address, telephone number, social security number, and date of birth. ̽̽ will collect and maintain on file documents from all collection agencies regarding their compliance with “Red Flag Rules”.
- ̽̽ employs a third-party tuition billing service for monthly tuition payment plans. The only data that is shared with the tuition billing service is information relating to the tuition payment plan established by the student or payor. ̽̽ provides the tuition billing service with the student name, id, University e-mail, phone number, class and address. ̽̽ will collect and maintain on file documents from the tuition billing service confirming its compliance with Red Flag Rules.
- ̽̽ uses a third-party software to process on-line payments for tuition accounts. The only information that is shared with the third-party host is the student id and balance due. ̽̽ will collect and maintain on file documents from the third-party software provider regarding their compliance with Red Flag Rules.
- ̽̽ uses a third-party to print and host our 1098T. The information that is shared with this third-party host is the student name, social security number, address, transactions, and pertinent tax information. ̽̽ will collect and maintain on file documents from the third-party provider regarding their compliance with Red Flag Rules.
- ̽̽ contracts with third parties to perform background checks for employees and students. ̽̽ reviews the vendors’ security policies with regard to information in any background check reports to ensure that the background check contractors adequately safeguard sensitive information.
Periodic Update of Program
This program will be re-evaluated on or about the first day of each calendar year to determine whether all aspects of the program are up to date and applicable in the current business environments, and revise as necessary. Refer to the Identifying and Responding to Suspected Identity Theft UOP for details.
Program Oversight
The Board of Trustees is responsible for annual review and approval of this Red Flag Rule Program. The Responsible Official listed in the About this Policy section is responsible for this Policy. Day-to-day oversight and implementation responsibilities has been delegated to the Responsible Administrators as defined in this Policy.
These operational activities include:
- ensuring appropriate training of University employees on the Red Flags Rule Program and applicable UOPs;
- reviewing employee reports regarding the detection of Red Flags and/or the suspicion of identity theft;
- ensuring that the appropriate steps are taken to prevent and mitigate identity theft;
- determining which steps of prevention and mitigation should be taken in particular circumstances;
- overseeing service provider compliance; and
- initiating the annual review of the Program with recommendations for change to be reported to the Vice Provost for Enrollment Management for consideration and approval.
Non-disclosure of Specific Practices
For the effectiveness of the Red Flag Rule Program, knowledge about specific Red Flag identification, detection, mitigation, and prevention practices may need to be limited to those employees with a need to know. Any documents that may have been produced or are produced in order to develop or implement this program that list or describe such specific practices and the information those documents contain are considered “confidential” and should not be shared with other University employees or with the public. Any such disclosures must be pre-approved by the Program Administrator in consultation with the Chief Privacy Officer and/or General Counsel. The Program Administrator is then responsible to inform those employees with a need to know the information of those documents or specific practices which should be maintained in a confidential manner.
Is there education available?
Training/education related to this policy is as follows:
Training Topic: | Red Flags Rule Training |
---|---|
Training Audience: | Employees Responsible for Implementing the Program |
Method of Delivery: | On-Line |
Delivered By: | Student Financial Services |
Frequency: | Prior to providing access to student financial information. |
Training Topic: | Detecting Identity Theft |
---|---|
Training Audience: | Applicable Employees |
Method of Delivery: | On-Line |
Delivered By: | Student Financial Services |
Frequency: | As Needed/Identified |
Other training as identified by the Responsible Official.