My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
10-14-08
ArdenHills
>
Administration
>
Commissions, Committees, and Boards
>
Financial Planning and Analysis Committee (FPAC)
>
FPAC Packets
>
2008
>
10-14-08
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
7/9/2024 2:40:30 PM
Creation date
7/2/2024 3:58:22 PM
Metadata
Fields
Template:
General
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
80
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
• Under the Rule, a"covered account" is: <br /> • Any account the Utility offers or maintains primarily for personal, family or <br /> household purposes, that involves multiple payments or transactions; and <br /> • Any other account the Utility offers or maintains for which there is a reasonably <br /> foreseeable risk to customers or to the safety and soundness of the Utility from <br /> Identity Theft. <br /> "Identifying information" is defined under the Rule as "any name or number that may be <br /> used, alone or in conjunction with any other information, to identify a specific person." It <br /> specifically includes all of the items listed below. <br /> • Name <br /> • Address <br /> • Telephone number <br /> • Social security number <br /> • Date of birth <br /> • Government issued driver's license or identification number <br /> • Alien registration number <br /> • Government passport number <br /> • Employer or taxpayer identification number <br /> • Unique electronic identification number <br /> • Computer's Internet Protocol address <br /> • Routing code <br /> The tables on the following two pages are intended as tools to assist your Identity Theft <br /> Prevention Committee in identifying specific Red Flags and procedures at your utility for <br /> incorporation into your utility employee training and, as desired, your written Identity <br /> Theft Prevention Program. The items in each table may be used to generate discussion <br /> about Identity Theft threats and prevention and ought to be modified, expanded or refined <br /> as necessary. <br /> • <br /> Page 2 of 4 <br />
The URL can be used to link to this page
Your browser does not support the video tag.