Laserfiche WebLink
8. Notify law enforcement; or <br /> 11111 9. Determine that no response is warranted under the particular circumstances. <br /> Protect customer identifying information <br /> In order to further prevent the likelihood of Identity Theft occurring with respect to <br /> Utility accounts,the Utility will take the following steps with respect to its internal operating <br /> procedures to protect customer identifying information: <br /> 1. Ensure that its website is secure or provide clear notice that the website is not secure; <br /> 2. Ensure complete and secure destruction of paper documents and computer files <br /> containing customer information; <br /> 3. Ensure that office computers are password protected and that computer screens lock after <br /> a set period of time; <br /> 4. Keep offices clear of papers containing customer information; <br /> 5. Request only the last 4 digits of social security numbers (if any); <br /> 6. Ensure computer virus protection is up to date; and <br /> 7. Require and keep only the kinds of customer information that are necessary for utility <br /> purposes. <br /> VI. PROGRAM UPDATES <br /> The Program Administrator will periodically review and update this Program to reflect <br /> changes in risks to customers and the soundness of the Utility from Identity Theft. In doing so, <br /> the Program Administrator will consider the Utility's experiences with Identity Theft situations, <br /> changes in Identity Theft methods, changes in Identity Theft detection and prevention methods, <br /> and changes in the Utility's business arrangements with other entities. After considering these <br /> factors, the Program Administrator will determine whether changes to the Program, including the <br /> listing of Red Flags, are warranted. If warranted, the Program Administrator will update the <br /> Program or present the [Utility Commission OR City Council]with his or her recommended <br /> changes and the [Utility Commission OR City Council] will make a determination of whether to <br /> accept, modify or reject those changes to the Program. <br /> VII. PROGRAM ADMINISTRATION. <br /> A. Oversight <br /> Responsibility for developing, implementing and updating this Program lies with an <br /> Identity Theft Committee for the Utility. The Committee is headed by a Program Administrator <br /> who may be the head of the Utility or his or her appointee. Two or more other individuals <br /> appointed by the head of the Utility or the Program Administrator comprise the remainder of the <br /> committee membership. The Program Administrator will be responsible for the Program <br /> 6 <br />