Laserfiche WebLink
• 3. Ensure that office computers are password protected and that computer screens <br /> lock after a set period of time; <br /> 4. Ensure computer virus protection is up to date; and <br /> 5. Require and keep only the kinds of customer information that are necessary for <br /> City purposes. <br /> V. Program Updates <br /> This Program will be perio ' a ICY ie � ated t reflect changes i 's s to customers <br /> and the soundness of the ility t'r m I • heft. W never changing i g methods, <br /> changing customer data collection, or violation trends ' dicate a possible eed for revision, the <br /> Program Administrator will consider the City's exp ences with Identity Theft situation, changes <br /> in Identity Theft methods, changes in Identity ft detection and prevention methods, changes <br /> in types of accounts the City maintains and anges in the City's business arrangements with <br /> other entities. After considering these factors, the Program Administrator will determine <br /> whether changes to the Program, including the listing of Red Flags, are warranted. If warranted, <br /> the Program Administrator will update the Program or present the Committee with his or her <br /> recommended changes and the Committee will make a determination of whether to accept, <br /> modify or reject those changes to the Program. <br /> VI. Program Administration <br /> S <br /> A. Oversight <br /> Responsibility for developing, implementing and updating this Program lies with an <br /> Identity Theft Committee for the City. The Committee is headed by a Program <br /> Administrator Two or more <br /> other individuals appointed by the head of the City or the Program Administrator <br /> comprise the remainder of the committee membership. The Program Administrator will <br /> be responsible for the Program administration, for ensuring appropriate training of City <br /> staff on the Program, for reviewing any staff reports regarding the detection of Red Flags <br /> and the steps for preventing and mitigating Identity Theft, determining which steps of <br /> prevention and mitigation should be taken in particular circumstances and considering <br /> periodic changes to the Program. <br /> B. Staff Training and Reports <br /> Utility staff responsible for implementing the Program shall be trained either by or under <br /> the direction of the Program Administrator in the detection of Red Flags, and the <br /> responsive steps to be taken when a Red Flag is detected. <br /> When an instance of identity theft is detected, the staff member(s)involved shall prepare <br /> a narrative of what occurred and the steps taken in the process of resolving the problem. <br /> i <br /> 5 <br />