- News
- Events
- Winter Storm Event 2023
-
- Deferred Compensation
- Employee Assistance Program
- eForms
- Email Services
- Benefits
- Employee Self Service
- Lactation Accommodation Request Form
- Dimensions System
- VHR Program
- Employee Safety and Health
- Staying Connected
- Kaiser Occ Health
- Flexible Spending Account
- Disaster Worker
- Trainings
- Drug-Free Workplace
-
- Preface
- 1-1 Advisory Bodies Roles and Relationships
- 1-2 Providing County Support of Grant Applications from Outside Agencies
- 2-1 Policy for Submitting Agenda Items
- 2-2 Departmental Representation at BOS Meetings
- 2-3 Policy for Board Chambers Security
- 3-1 Policy for Appropriation Transfers
- 3-2 Travel and Meal Reimbursements
- 3-3 Interdepartmental Billings for Services Policy
- 3-4 Policy for Memberships to Professional Associations & Organizations – Use of Public Funds
- 4-1 Performance Evaluations
- 4-2 Policy for Position Allocation List
- 4-3 Position Reclassifications
- 4-4 EEO Policy
- 4-5 Departmental/Internal Reorganizations
- 4-6 Policy for Hiring/Retaining Personnel Services in EMP or Ind. Contractor Status - See Civil Service Rules
- 4-7 Policy for Flexible Merit Increases
- 4-8 Advanced Salary Step Appointments
- 4-9 Policy for Relocation Incentives
- 4-10 Medical Leave Policy
- 4-11 Preemployment Preplacement Screening Policy
- 4-12 COVID-19 Vaccination and Testing Policy
- 4-13 Telework Policy
- 4-14 Lactation Policy
- 5-1 Vehicle Use
- 5-2 Policy for Capital Project and Asset Responsibility
- 5-3 Public Art Policy
- 6-1 Records Retention Storage Destruction Policy
- 6-2 Incompatible Activities Policy
- 6-3 TTrD Policy
- 6-4 Safety Management Policy
- 6-5 Identity Theft Prevention Program
- 7-1 Purchasing Policy
- 7-2 Real Property Acquisition and Management Policy
- 8-1 Investigations of Alleged Inappropriate Activities
- 8-2 Reasonable Suspicion Policy
- 8-3 Safety and Security for County Employees
- 8-4 Policy for Receipt and Distribution of Tickets or Passes
- 9-1 Official Use of Social Media Sites Policy
- 9-2 IT Use and Security Policy
- 9-3 Website Accessibility Policy
- 9-4 Information Technology Professionals Policy
- 9-5 Information Technology Governance Policy
- 9-6 Information Technology Artificial Intelligence (AI) Policy
- Employee & Volunteer Engagement & Recognition (EVER)
- Combined Fund Drive
- Website Accessibility Assistance
- Back to Administrative Policy Manual
6-5 Identity Theft Prevention Program
Return to Identity Theft Prevention Program Table of Contents
Approved: Board of Supervisors
Authority: Board of Supervisors and Board of Directors, Community Development Commission
Revised Date: July 21, 2009
What’s on this Page
Appendix A: Categories & Types of Red Flags
The red flags listed below are set forth in the FTC (Federal Trade Commission) Regulations for creditors to consider in adopting their identity theft prevention programs. The types of red flags listed below do not apply to all covered accounts.
- Alerts from consumer reporting agencies, fraud detection agencies or service providers. Examples of alerts include but are not limited to:
- A fraud or active duty alert that is included with a consumer report;
- A notice of credit freeze in response to a request for a consumer report;
- A notice of address discrepancy provided by a consumer reporting agency;
- Indications of a pattern of activity in a consumer report that is inconsistent with the history and usual pattern of activity of an applicant or customer, such as:
- A recent and significant increase in the volume of inquiries;
- An unusual number of recently established credit relationships;
- A material change in the use of credit, especially with respect to recently established credit relationships; or
- An account that was closed for cause or identified for abuse of account privileges by a financial institution or creditor.
- Suspicious documents. Examples of suspicious documents include:
- Documents provided for identification that appear to be altered or forged;
- Identification on which the photograph or physical description is inconsistent with the appearance of the applicant or customer;
- Identification on which the information is inconsistent with information provided by the applicant or customer;
- Identification on which the information is inconsistent with readily accessible information that is on file with the financial institution or creditor, such as a signature card or a recent check; or
- An application that appears to have been altered or forged, or appears to have been destroyed and reassembled.
- Suspicious personal identification, such as suspicious address change. Examples of suspicious identifying information include:
- Personal identifying information that is inconsistent with external information sources used by the financial institution or creditor. For example:
- The address does not match any address in the consumer report; or
- The Social Security Number (SSN) has not been issued, or is listed on the Social Security Administration’s Death Master File.
- Personal identifying information provided by the customer is not consistent with other personal identifying information provided by the customer, such as a lack of correlation between the SSN range and date of birth;
- Personal identifying information or a phone number or address, is associated with known fraudulent applications or activities as indicated by internal or third-party sources used by the financial institution or creditor;
- Other information provided, such as fictitious mailing address, mail drop addresses, jail addresses, invalid phone numbers, pager numbers or answering services, is associated with fraudulent activity;
- The SSN provided is the same as that submitted by other applicants or customers for the same type of covered account;
- The address or telephone number provided is the same as or similar to the account number or telephone number submitted by an unusually large number of applicants or customers for the same type of covered account;
- The applicant or customer fails to provide all required personal identifying information on an application or in response to notification that the application is incomplete;
- Personal identifying information is not consistent with personal identifying information that is on file with the financial institution or creditor; or
- The applicant or customer cannot provide authenticating information beyond that which generally would be available from a wallet or consumer report.
- Personal identifying information that is inconsistent with external information sources used by the financial institution or creditor. For example:
- Unusual use of or suspicious activity relating to a covered account. Examples of suspicious activity include:
- Shortly following the notice of a change of address for an account, the County receives a request for the addition of authorized users on the account.
- A new revolving credit account is used in a manner commonly associated with known patterns of fraud patterns. For example:
- The customer fails to make the first payment or makes an initial payment but no subsequent payments.
- An account is used in a manner that is not consistent with established patterns of activity on the account. There is, for example:
- Non-payment when there is no history of late or missed payments;
- A material change in purchasing or spending patterns;
- An account that has been inactive for a long period of time is used (taking into consideration the type of account, the expected pattern of usage and other relevant factors).
- Mail sent to the customer is returned repeatedly as undeliverable although transactions continue to be conducted in connection with the customer’s account.
- The County or the SCCDC is notified that the customer is not receiving paper account statements.
- The County or the SCCDC is notified of unauthorized charges or transactions in connection with a customer’s account.
- The County or the SCCDC is notified by a customer, law enforcement or another person that it has opened a fraudulent account for a person engaged in identity theft.
- Shortly following the notice of a change of address for an account, the County receives a request for the addition of authorized users on the account.
Notice from customers, law enforcement, victims or other reliable sources regarding possible identity theft or phishing relating to covered accounts.