Laserfiche WebLink
2. Any other account the Utility offers or maintains for which there is a reasonably <br /> • foreseeable risk to customers or to the safety and soundness of the Utility from Identity <br /> Theft. <br /> "Identifying information"is defined under the Rule as "any name or number that may be used, <br /> alone or in conjunction with any other information,to identify a specific person,"including: <br /> name, address, telephone number, social security number, date of birth, government issued <br /> driver's license or identification number, alien registration number, government passport <br /> number, employer or taxpayer identification number, unique electronic identification number, <br /> computer's Internet Protocol address, or routing code. <br /> IDENTIFICATION OF RED FLAGS. <br /> In order to identify relevant Red Flags, the City considers the types of accounts that it <br /> offers and maintains, the methods it provides to open its accounts, the methods it provides to <br /> access its accounts, and its previous experiences with Identity Theft. The City identifies the <br /> following red flags, in each of the listed categories: <br /> A. Suspicious Documents <br /> 410 Red Flags <br /> y <br /> l I. Identification document or card that appears to be forged, altered or inauthentic; <br /> 'C 2. Identification document or card on which a person's photograph or physical description is <br /> not consistent with the person presenting the document; and <br /> 3. Other document with information that is not consistent with existing customer <br /> information (such as if a person's signature on a check appears forged). <br /> B. Suspicious Personal Identifying Information <br /> Red Flags <br /> 1. Identifying information presented that is inconsistent with other information the customer <br /> provides (example: inconsistent birth dates); <br /> 2. Identifying information presented that is the same as information shown on other <br /> applications that were found to be fraudulent; <br /> 3. Identifying information presented that is consistent with fraudulent activity(such as an <br /> invalid phone number or fictitious billing address); <br /> 4. An address or phone number presented that is the same as that of another person; and <br /> 5. A person's identifying information is not consistent with the information that is on file <br /> 4, for the customer. <br /> 3 <br />