ࡱ> y{x@ I'bjbjFF "8,, %PPPfzzz8 &$2V(~~~~]]].000000$R3hTz]Y]]]Tzz~~i555]z~z~.5].55vPzz~J yyLRz^0zJTzzzzz ]]5]]]]]TTD IDENTITY THEFT PROCEDURE DEFINITION OF IDENTITY THEFT Financial identity theft occurs when someone uses another consumers personal information (name, social security number, etc.) with the intent of conducting multiple transactions to commit fraud that results in substantial harm or inconvenience to the victim. This fraudulent activity may include opening deposit accounts with counterfeit checks, establishing credit card accounts, establishing lines of credit, or gaining access to the victims accounts with the intent of depleting the balances. This differs from check fraud (forged signature or forged endorsement) or an unauthorized ATM or Debit Card transaction in that it involves more than an isolated single act of fraud. Some examples of Identity Theft include: Account Take Over Account take over is one of the more prevalent forms of Identity Theft. It occurs when a fraudster obtains an individuals personal information (account number and social security number is usually all it takes), and changes the official mailing address with that individuals bank. Once accomplished, the fraudster has established a window of opportunity in which several transactions are conducted without the victims knowledge using the victims personal information. Notice, this involved the intent to take over the victims identity as well as more than one isolated transaction. It can also occur when the fraudster pays employees of various companies and banks to steal account information from the checks that are remitted for payment. The employees will provide the name, address, bank routing number and bank account number. The fraudster will then order checks from a third party check vendor, and begin writing checks on the victims account. Credit Take Over Credit take over is another form of Identity Theft that is becoming more prevalent. It occurs when a fraudster obtains an individuals personal information (social security number is usually all it takes) and establishes credit using that social security number. This may include opening credit card accounts or taking out loans without the victims knowledge. Again, this involves the intent to take over the victims identity as well as more than an isolated transaction. GENERAL GUIDELINES WRITTEN NOTIFICATION The victims request for information must: Be in writing  Be mailed or delivered to the address specified by the bank; and Include relevant information about any transaction alleged to be a result of identity theft that will assist the bank in providing pertinent information in a timely manner, including: If known by the victim (or readily available to the victim), the date of the application or transaction in question; and If known by the victim (or readily available to the victim), any other identifying information such as account or transaction numbers. Any other information that is identified by the manager (that is readily obtainable by the victim) that will assist in locating and providing critical information to the consumer. Be accompanied by proof of a claim of identity theft: XYZ BANK requires the following documentation: A copy of a police report and/or police case number evidencing the claim of the victim of identity theft; and An affidavit of fact that is acceptable to XYZ BANK. IDENTITY THEFT INVOLVING AN XYZ BANK ACCOUNT The following procedures are to be observed when a consumer reports suspected identity theft involving an XYZ BANK account (deposit or credit) WRITTEN NOTIFICATION The customer must notify the bank in writing if they suspect they are victim of identity theft and that it involves an account or loan. If the initial notification is made by phone and the consumer is in the area, they must be required to visit one of our branch locations to complete the Notification of Suspected Identity Theft form. If they are calling from outside the area, you may mail or fax them a form for completion (NOTE: Be certain to inform the consumer that we will not begin an investigation until we receive the completed Notification of Suspected Identity Theft form.) Be certain to include the consumer guidelines for completion in the mailing. If the consumer comes into one or our branch locations, assist them in completing the Notification of Suspected Identity Theft form using the guidelines included in the Guidelines for Consumer Completion. INDENTIFICATION: Make a copy of the consumers photo identification. Attach the copy of the consumers identification and the police report (if provided) to the completed Notification of Suspected Identity Theft. Forward copies to the banks BSA Coordinator and forward the originals to the Fraud Desk Clerk in Deposit Operations Support. IDENTITY THEFT HELP FOR VICTIMS CARD Provide the consumer with the Identity Theft Help for Victims Card and review the information with them. In addition to the Identity Theft Cards, the following website may be helpful to the customer:  HYPERLINK "http://www.consumer.gov/idtheft" www.consumer.gov/idtheft ALERTS/REMARKS Place an alert on account such as Suspected identity theft. Verify identity and review all transactions. The Fraud Desk Clerk will determine, after reviewing details with appropriate management, whether a hard hold or block will be placed on the account(s). PASSWORD Using the Remark section, assign a password to the consumers account(s). Be certain to explain to the consumer that the bank will not discuss any account information without that password. Place both Customer Profile Remarks and Account Profile Remarks on the system. Include information: Do not give out info without Password: xxxxxx Email the Teller Operations Manager located at the Main Banking Center (MBC) or the Teller Supervisor at the MBC. He/she will input the remarks on the First Teller system. Do not give any information regarding the account to the consumer. It is critical that the bank first verify that we are dealing with the victim of identity theft rather than the perpetrator of the crime. Inform the consumer that the banks Fraud Unit will contact them after verifying the Police Case Number. Call the Fraud Unit Clerk x5796 to report the identity theft. In addition, e-mail the XYZ BANKFC-Fraud Unit with the details of the situation. IDENTITY THEFT INVOLVING ACCOUNTS AT OTHER FINANCIAL INSTITUTIONS When our customers suspect they are a victim of identity theft involving accounts at other financial institutions, it will not be unusual for them to contact us for guidance. It is the banks desire to assist our customers as much as possible in these situations, but they will need to resolve the situation with the alleged institutions. Verification of Identity: before discussing any information with the consumer, be certain to verify the identity of the individual to make certain we are speaking with the victim and not the fraudster. Give the customer the Identity Theft Help for Victims Card and review it with them. In addition to the Identity Theft Cards, this website may be helpful for customers for additional information:  HYPERLINK "http://www.consumer.gov/idtheft" www.consumer.gov/idtheft If the consumer has accounts at XYZ BANK, offer to assign a password to those accounts that will be verified for all future inquiries and telephone communications. Place both Customer Profile Remarks and Account Profile Remarks on the system. Include information: Do not give out info without Password: xxxxxx Email the Teller Operations Manager located at the Main Banking Center (MBC) or the Teller Supervisor at the MBC. He/she will input the remarks on the First Teller system.  A sample Notification of Identity Theft Form has been included at the end of this document.  This has been included in the Notification of Suspected Identity Theft form.  A sample copy of the consumers guidelines has been included at the end of this document. Policies & Procedures August 2004 67+ ,   ./0pq()()CD箺纨盺箺hk?5CJ\ ha_5\ hk?5\hk?56>*CJ\] ha_CJjhk?0JCJUhk?5>*CJ\hk?5>*CJ\ hk?aJ hk?>*CJhk?CJOJQJ^J hk?CJhk?hk?5CJ\ hk?CJ47+ ,  k l  0q) & F^  !dxdxh`hdxh^hhdx^hdx$a$&#'H'))D^_1vw & F( & F(hdx^hh^h & F'  !dxdx & F & F & F & F & F &1m)2LM01Bvmn|}/+- w  H"I"b"## $ $ $#$$$F$ŰŰjhk?CJU hk?5\ ha_CJhk?6>*CJ]hk?hk?0JCJjhk?CJUjhk?CJUjhk?0JCJUhk?56CJ\]hk?5CJ\hk?B*CJph hk?CJ5< H"I"##%$&$$$b%&&8^8 & F & F/ & F,dx & F( & Fhdx^hh^h & F(h^hF$N$&&v&w&&&#'F'H'I'hk?jhk?0JU hk?CJ ha_CJ &&&&&&v&&"'#'F'G'H'I'dx  !dx 1h/ =!"#$%DyK www.consumer.gov/idtheftyK @http://www.consumer.gov/idtheftDyK www.consumer.gov/idtheftyK @http://www.consumer.gov/idtheft@@@ NormalCJ_HaJmH sH tH <@< Heading 1$@&>*CJJ@J Heading 2$ & F$@& 5>*CJ\B@B Heading 5$@&^5\N@N Heading 6 & F<@&5CJ\aJDA@D Default Paragraph FontVi@V  Table Normal :V 44 la (k@(No List >B@> Body Text$a$ 5CJ\4@4 Header  !4 @4 Footer  !6U@!6 Hyperlink >*B*ph2>@22 Title$a$5\PC@BP Body Text Indent h^h OJQJ^J6P@R6 Body Text 2CJ<Q@b< Body Text 3 5CJ\RR@rR Body Text Indent 2 h^h 5CJ\LS@L Body Text Indent 3 ^CJ>@>  Footnote TextCJaJ@&@@ Footnote ReferenceH*. LI` I87+,  kl 0 q ) ) D   ^_1vw< HI%&bv"#FGJ00000000 0 0 0 0 0 0 00$ 00 0 0 0 0 0 0 0 0 0 000 0 ' 0 0 0 0 X( 0 01( 01X( 0 0X( 0 0X( 0 00 0 0X( 0 ( 00000, 00/ 00/ 00 0 0000000@0x@0@00m]@0\~000$B]$$$$$'F$I')&I'H'| #IXX8@0(  B S  ?I#GJ `m '#GJ3333    011vvww*+,-wQRFN##:@J#GJ,?jV3oTjTjVUsJ_M&"dGK8b QԏeQC =~d%jVb(t,0<++ =~zE-v[o2:\xiK30R<oo2=jVABjVMHC02G G=hJXМ:BJon{h[l4:a[rT]]jV% _4KYj`ޤS `v`jVe`a Gs*dcdㄬ2gjVZi2j NkP!p8bS^XrܜbgrjVst^/w%rW y88^8`o(.^`o()^`o()pp^p`o(()  ^ `o(()@ @ ^@ `o(()  ^ `o(.^`o(.xx^x`o(.h0^`0>*o(.h88^8`.hL^`L.h  ^ `.h  ^ `.hxLx^x`L.hHH^H`.h^`.hL^`L.hh^h`o(. ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(^`QJo(%^`o()pp^p`o()  ^ `o(()@ @ ^@ `o(()  ^ `o(()^`o(.xx^x`o(.^`o(.hh^h`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.hh^h`o(. ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(^`o(.8^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.h^`CJOJQJo(rh^`QJo(%h pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo( pp^p`OJQJo(^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.h88^8`.h^`CJOJQJo(rh L ^ `L.h  ^ `.hxx^x`.hHLH^H`L.h^`.h^`.hL^`L.88^8`QJo(%^`o()^`o()pp^p`o(()  ^ `o(()@ @ ^@ `o(()  ^ `o(.^`o(.xx^x`o(.^`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.hhh^h`CJOJQJo(rh88^8`CJOJQJo(rhL^`L.h  ^ `.h  ^ `.hxLx^x`L.hHH^H`.h^`.hL^`L.hh^h`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.hh^h`CJOJQJo(r ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(8^`o(.8^`.8pLp^p`L.8@ @ ^@ `.8^`.8L^`L.8^`.8^`.8PLP^P`L.hhh^h`CJOJQJo(rh88^8`.hL^`L.h  ^ `.h  ^ `.hxLx^x`L.hHH^H`.h^`.hL^`L.^`QJo(%^`o()pp^p`o()  ^ `o(()@ @ ^@ `o(()  ^ `o(()^`o(.xx^x`o(.^`o(.^`QJo(%^`o()^`o()pp^p`o(()  ^ `o(()@ @ ^@ `o(()  ^ `o(.^`o(.xx^x`o(.hh^h`CJOJQJo(r ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(hh^h`QJo(%88^8`.L^`L.  ^ `.  ^ `.xLx^x`L.HH^H`.^`.L^`L.h^`.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.h hh^h`OJQJo(h88^8`.hL^`L.h  ^ `.h  ^ `.hxLx^x`L.hHH^H`.h^`.hL^`L.^`CJOJQJo(r ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(^`QJo(%   ^ `OJQJo(o   ^ `OJQJo( xx^x`OJQJo( HH^H`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(hh^h`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.h^h`o()^`o()88^8`o()^`o(()^`o(()pp^p`o(()  ^ `o(.@ @ ^@ `o(.  ^ `o(. pp^p`OJQJo(^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.hh^h`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.^`CJOJQJo(r^`QJo(%88^8`o()^`o(()^`o(()pp^p`o(()  ^ `o(.@ @ ^@ `o(.  ^ `o(.hh^h`>*o(.88^8`.L^`L.  ^ `.  ^ `.xLx^x`L.HH^H`.^`.L^`L.88^8`o(.^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L. hh^h`OJQJo( ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(h^h`o()^`QJo(%88^8`o()^`o(()^`o(()pp^p`o(()  ^ `o(.@ @ ^@ `o(.  ^ `o(.hh^h`o(.88^8`.L^`L.  ^ `.  ^ `.xLx^x`L.HH^H`.^`.L^`L.h ^`OJQJo(h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(^`o(.O^`Oo(.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.h^`CJOJQJo(rh ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(hh^h`o(.^`QJo(%pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.h^h`o()^`o()88^8`o()^`o(()^`o(()pp^p`o(()  ^ `o(.@ @ ^@ `o(.  ^ `o(.^`o(. ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(hhh^h`o(.h88^8`.hL^`L.h  ^ `.h  ^ `.hxLx^x`L.hHH^H`.h^`.hL^`L.hhh^h`.h88^8`.hL^`L.h  ^ `.h  ^ `.hxLx^x`L.hHH^H`.h^`.hL^`L./&b(kYj`s*dZio2j=hJ T 0% _ 0 cd y3eQC :BJn{h[R<E<++MHCiK3st]!po2=ABGKjT`2gd%gr?:a[e`ae`a02Ge`a^/wT]MzE- `TUsJS^XrPQ STNW|P0  70,,Rs        s[        s[        0̇                 ҅HS!                 ҅HS                ҅HS҅HS       0̇        ҅HS                ҅HS        ҅HS        ~z                          ҅HS        !        0̇                          s[        x@l        z                                     \       ҅HS        X-D6~z               0̇                 k?a_#EJ@66w66Ip@UnknownGz Times New Roman5Symbol3& z Arial?5 z Courier New;Wingdings"hHÈF"^2F 5}6}6!24d 3QH(?a_IDENTITY THEFT17458 Andy Zavoina,                           ! " # $ % & ' ( ) * + Oh+'0 $ @ L X dpxIDENTITY THEFTDEN17458TY745745 Normal.dotE Andy ZavoinaT12yMicrosoft Word 10.0@~mg@nc@ @Vx}՜.+,D՜.+,L hp  First National Bank6: IDENTITY THEFT Title4 8@ _PID_HLINKSA :2 http://www.consumer.gov/idtheft:2 http://www.consumer.gov/idtheft  !"#$&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgijklmnoqrstuvwzRoot Entry F y|Data 1Table%WWordDocument"8SummaryInformation(hDocumentSummaryInformation8pCompObjj  FMicrosoft Word Document MSWordDocWord.Document.89q