Laserfiche WebLink
• 1. Any account the NUPUC offers or maintains primarily for personal, family or household <br /> purposes, that involves multiple payments or transactions; and <br /> 2. Any other account the NUPUC offers or maintains for which there is a reasonably <br /> foreseeable risk to customers or to the safety and soundness of the NUPUC from Identity <br /> Theft. <br /> "Identifying information"is defined under the Rule as "any name or number that may be used, <br /> alone or in conjunction with any other information,to identify a specific person," including: <br /> name, address, telephone number, social security number, date of birth, government issued <br /> driver's license or identification number, alien registration number, government passport <br /> number, employer or taxpayer identification number, unique electronic identification number, <br /> computer's Internet Protocol address,or routing code. <br /> III. IDENTIFICATION OF RED FLAGS. <br /> In order to identify relevant Red Flags, the NUPUC considers the types of accounts that it <br /> offers and maintains, the methods it provides to open its accounts,the methods it provides to <br /> access its accounts, and its previous experiences with Identity Theft. The Utility identifies the <br /> following red flags, in each of the listed categories: <br /> A. Suspicious Documents <br /> Red Flags <br /> 1. Identification document or card that appears to be forged, altered or inauthentic; <br /> 2. Identification document or card on which a person's photograph or physical description is <br /> not consistent with the person presenting the document; <br /> 3. Other document with information that is not consistent with existing customer <br /> information(such as if a person's signature on a check appears forged); and <br /> 4. Application for service that appears to have been altered or forged. <br /> B. Suspicious Personal Identifying Information <br /> Red Flags <br /> 1. Identifying information presented that is inconsistent with other information the customer <br /> provides (example: inconsistent phone numbers); <br /> 2. Identifying information presented that is inconsistent with other sources of information <br /> (for instance, a last name that does not match); <br /> 3. Identifying information presented that is the same as information shown on other <br /> applications that were found to be fraudulent; <br /> 4. Identifying information presented that is consistent with fraudulent activity (such as an <br /> • invalid phone number or fictitious billing address); <br /> 3 <br />