Laserfiche WebLink
Credit Card Payments <br />In the event that credit card payments that are made over the Internet are processed <br />through a third party service provider, such third party service provider shall certify that <br />it has an adequate identity theft prevention program in place that is applicable to such <br />payments. All credit card payments made over the telephone or the City's web site <br />shall be entered directly into the customer's account information in the computer <br />database. Account statements and receipts for covered accounts shall include only the <br />last four digits of the credit or debit card or the bank account used for payment of the <br />covered account. <br />Sources and Types of Red Flags <br />All employees responsible for or involved in the process of opening a covered account <br />or accepting payment for a covered account shall check for red flags as indicators of <br />possible identity theft. Such red flags may include: <br />1. Alerts from consumer reporting agencies, fraud detection agencies, or service <br />providers. Examples of alerts include but are not limited to: <br />a. A fraud or active duty alert that is included with a consumer report; <br />b. A notice of credit freeze in response to a request for a consumer report; <br />c. A notice of address discrepancy provided by a consumer reporting agency; <br />d. Indications of a pattern of activity in a consumer report that is inconsistent with <br />the history and usual pattern of activity of an applicant or customer, such as: <br />i. A recent and significant increase in the volume of inquiries; <br />ii. An unusual number of recently established credit relationships; <br />iii. A material change in the use of credit, especially with respect to recently <br />established credit relationships; or <br />iv. An account that was closed for cause or identified for abuse of account <br />privileges by a financial institution or creditor. <br />2. Suspicious documents. Examples of suspicious documents include: <br />a. Documents provided for identification that appear to be altered or forged; <br />b. Identification on which the photograph or physical description is inconsistent with <br />the appearance of the applicant or customer; <br />c. Identification on which the information is inconsistent with information provided <br />by the applicant or customer; <br />d. Identification on which the information is inconsistent with readily accessible <br />information that is on file with the creditor, such as the application for service; or <br />e. An application that appears to have been altered or forged, or appears to have <br />been destroyed and reassembled. <br />3. Suspicious personal identification, such as suspicious address change. Examples of <br />suspicious identifying information include: <br />a. Personal identifying information that is inconsistent with external information <br />sources used by the financial institution or creditor. <br />~s <br />