Loading...
§ 54.04 FINDINGS.
   The Federal Trade Commission (“FTC”) requires every utility, including public water and sewer systems, such as the Tontitown Water and Sewer Department to implement an Identity Theft Prevention Program (“ITPP”). The FTC requirements and regulations are necessary because of § 114 of the Fair and Accurate Credit Transactions Act (“FACTA”). The TRC has set forth the ITPP requirement in 16 C.F.R. § 681.2. Identity theft is defined as a fraud committed or attempted using identifying information of another person without authority. The City of Tontitown adopts the program set forth in this chapter to comply with FTC rules and regulations. In drafting its ITPP, the city has considered: (1) the methods it provides to open its accounts; (2) the methods it provides to access its accounts; and (3) its previous experiences with identity theft. Based on these considerations, the City Council hereby determines that the City Water and Sewer Department is a low to moderate risk entity, and as a result develops and implements the streamlined ITPP set forth hereto. Further, the city determines that the only covered accounts offered by the city are those under its water and sewer utilities.
(Ord. 2008-12-327, passed 12-2-08; Am. Ord. 2013-05-423, passed 5-7-13)
§ 54.05 RED FLAGS.
   The FTC regulations identify numerous red flags that must be considered in adopting an ITPP. The FTC has defined a red flag as a pattern, practice, or specific activity that indicates the possible existence of identity theft. The City identifies the following red flags from the examples provided in the regulations of the FTC:
   (A)   Notifications from consumer reporting agencies. The city does not request, receive, obtain or maintain information about its utility customers from any consumer reporting agency.
   (B)   Suspicious documents - possible red flags include:
      (1)   Presentation of documents appearing to be altered or forged;
      (2)   Presentation of photographs or physical descriptions that are not consistent with the appearance of the applicant or customer;
      (3)   Presentation of other documentation that is not consistent with the information provided when the account was opened or existing customer information;
      (4)   Presentation of information that is not consistent with the account application; or
      (5)   Presentation of an application that appears to have been altered, forged, destroyed, or reassembled.
   (C)   Suspicious personal identifying information - possible red flags include:
      (1)   Personal identifying information is being provided by the customer that is not consistent with other personal identifying information provided by the customer or is not consistent with the customer’s account application;
      (2)   Personal identifying information associated with known fraudulent activity;
      (3)   The social security number (if required or obtained) is the same as that submitted by another customer;
      (4)   The telephone number or address is the same as that submitted by another customer;
      (5)   The applicant’s failure to provide all personal identifying information requested on the application; or
      (6)   The applicant or customer’s inability to provide authenticating information beyond that which generally would be available to a consumer.
   (D)   Unusual use or suspicious activity related to an account - possible red flags include:
      (1)   A change of address for an account followed by a request to change the account holder’s name;
      (2)   A change of address for an account followed by a request to add new or additional authorized users or representatives;
      (3)   An account is not being used in a way that is consistent with prior use (such as late or no payments when the account has been timely in the past);
      (4)   A new account is used in a manner commonly associated with known patterns of fraudulent activity (such as customer fails to make the first payment or makes the first payment but not subsequent payments);
      (5)   Mail sent to the account holder is repeatedly returned as undeliverable;
      (6)   The city receives notice that a customer is not receiving his or her paper statements; or
      (7)   The city receives notice of unauthorized activity on the account.
   (E)   Notice regarding possible identity theft - possible red flags include: notice from a customer, an identity theft victim, law enforcement personnel or other reliable sources regarding possible identity theft or phishing related to utility accounts.
(Ord. 2008-12-327, passed 12-2-08; Am. Ord. 2013-05-423, passed 5-7-13)
§ 54.06 RED PROOF OF IDENTITY.
   Any person or entity opening a utility account shall provide a complete application and provide satisfactory evidence of their identity and/or address. The proof may include but not be limited to: a valid driver’s license; passport; state, federal, employer, or school issued identification card; or military identification card. The required application must be completed in its entirety and must be signed in order to establish a utility account.
(Ord. 2008-12-327, passed 12-2-08; Am. Ord. 2013-05-423, passed 5-7-13)
§ 54.07 RED CONFIDENTIALITY OF APPLICATIONS AND ACCOUNT INFORMATION.
   All personal information, personal identifying information, account applications and account information collected and maintained by the city shall be a confidential record of the city and shall not be subject to disclosure unless otherwise required by state and federal law. Additionally, any employee with access to utility customers’ personal information, account applications or account information shall be required to keep such information in confidence and protect the privacy of customers, and may be required to execute and abide by a written confidentiality and non-disclosure policy.
(Ord. 2008-12-327, passed 12-2-08; Am. Ord. 2013-05-423, passed 5-7-13)
§ 54.08 RED ACCESS TO UTILITY ACCOUNT INFORMATION.
   Access to utility account information shall be limited to employees that provide customer service and technical support to the city’s utilities. Any computer that has access to utility customer account or personal identifying information shall be password protected and all computer screens shall lock after not more than 15 minutes of inactivity. All paper and non-electronic based utility account or customer personal identifying information shall be stored and maintained in a locked room or cabinet and access shall only be granted by the Compliance Officer or his or her designee, or in the alternative shall be scanned for secure, password protected, digital storage, and then shredded.
(Ord. 2008-12-327, passed 12-2-08; Am. Ord. 2013-05-423, passed 5-7-13)
§ 54.09 RED CREDIT CARD TRANSACTIONS.
   In the event credit cards are added as a payment option for utility accounts, all internet or telephone credit card payments shall only be processed through a third party service provider which certifies that it has an identity theft prevention program operating and in place. Credit card payments accepted in person shall require a reasonable connection between the person or entity billed for the utility services and the credit card owner.
(Ord. 2008-12-327, passed 12-2-08; Am. Ord. 2013-05-423, passed 5-7-13)
§ 54.10 RED SUSPICIOUS TRANSACTIONS.
   Suspicious transactions include but are not limited to the presentation of incomplete applications; unsigned applications; payment by someone other than the person named on the utility account; presentation of inconsistent signatures, addresses or identification. Suspicious transactions shall not be processed and shall be immediately referred to the Compliance Officer.
(Ord. 2008-12-327, passed 12-2-08; Am. Ord. 2013-05-423, passed 5-7-13)
Loading...