(a) This program identifies the following red flags as potential indicators of fraud:
(1) Alerts, notifications, or other warnings received from consumer reporting agencies or service providers, such as fraud detection services;
(2) The presentation of suspicious documents. Examples of suspicious documents include:
A. Documents provided for identification that appear to be altered or forged;
B. Identification on which the photograph or physical description is inconsistent with the appearance of the applicant or customer;
C. Identification on which the information is inconsistent with information provided by the applicant or customer;
D. Identification on which the information is inconsistent with readily accessible information that is on file with the Village of Forest; or
E. An application that appears to have been altered or forged, or appears to have been destroyed and reassembled.
(3) The presentation of suspicious personal identifying information. Examples of suspicious documents include:
A. Personal identifying information provided by the customer is not consistent with other personal identifying information provided by the customer, such as lack of correlation between the Social Security Number range and date of birth.
B. Personal identifying information or a phone number or address is associated with known fraudulent applications or activities as indicated by internal or third-party sources used by the Village of Forest.
C. Other information provided, such as fictitious mailing address, mail drop addresses, jail addresses, invalid phone numbers, pager numbers or answering services, is associated with fraudulent activity.
D. The Social Security Number provided is the same as that submitted by other applicants or customers.
(4) The unusual use of, or other suspicious activity related to, a covered account; and
(5) Notice from customers, victims of identity theft, law enforcement authorities, or other persons regarding possible identity theft in connection with covered accounts.
(b) This Program considers the following as risk factors in identifying relevant red flags for covered accounts as appropriate:
(1) The types of covered accounts offered or maintained;
(2) The methods provided to open covered accounts;
(3) The methods provided to access covered accounts; and
(4) Its previous experience with identity theft.
(c) This Program incorporates relevant red flags from sources such as:
(1) Incidents of identity theft previously experienced;
(2) Methods of identity theft that reflect changes in risk; and
(3) Applicable supervisory guidance.
(Ord. 1775. Passed 9-10-09.)