Laserfiche WebLink
administration, for ensuring appropriate training of Utility staff on the Program, for reviewing <br /> ID <br /> any staff reports regarding the detection of Red Flags and the steps for preventing and mitigating <br /> Identity Theft, determining which steps of prevention and mitigation should be taken in <br /> particular circumstances and considering periodic changes to the Program. <br /> B. Staff Training and Reports <br /> Utility staff responsible for implementing the Program shall be trained either by or under <br /> the direction of the Program Administrator in the detection of Red Flags, and the responsive <br /> steps to be taken when a Red Flag is detected. (The Utility may include in its Program how often <br /> training is to occur. The Program may also require staff to provide reports to the Program <br /> Administrator on incidents of Identity Theft, the Utility's compliance with the Program and the <br /> effectiveness of the Program.) <br /> C. Service Provider Arrangements <br /> In the event the Utility engages a service provider to perform an activity in connection <br /> with one or more accounts, the Utility will take the following steps to ensure the service provider <br /> performs its activity in accordance with reasonable policies and procedures designed to detect, <br /> prevent, and mitigate the risk of Identity Theft. <br /> 1. Require,by contract, that service providers have such policies and procedures in place; <br /> and <br /> • 2. Require, by contract, that service providers review the Utility's Program and report any <br /> Red Flags to the Program Administrator. <br /> D. Non-disclosure of Specific Practices <br /> (This provision is not required by the Rule, but municipal utilities may find it useful.) <br /> For the effectiveness of this Identity Theft Prevention Program, knowledge about specific <br /> Red Flag identification, detection,mitigation and prevention practices must be limited to the <br /> Identity Theft Committee who developed this Program and to those employees with a need to <br /> know them. Any documents that may have been produced or are produced in order to develop or <br /> implement this program that list or describe such specific practices and the information those <br /> documents contain are considered "security information"as defined in Minnesota Statutes <br /> Section 13.37 and are unavailable to the public because disclosure of them would be likely to <br /> substantially jeopardized the security of information against improper use, that use being to <br /> circumvent the Utility's Identity Theft prevention efforts in order to facilitate the commission of <br /> Identity Theft. <br /> • <br /> 7 <br />