Laserfiche WebLink
1. Any account the Utility offers or maintains primarily for personal, family or <br />household purposes, that involves multiple payments or transactions; and <br />2. Any other account the Utility offers or maintains for which there is a reasonably <br />foreseeable risk to customers or to the safety and soundness of the Utility from <br />Identity Theft. <br />"Identifying information" is defined u <br />be used, alone or in conjunction % <br />person," including: name, address, <br />of birth, government issued driver's <br />number, government passport num <br />unique electronic identification nui <br />routing code. <br />nder the Rule as "any name or number that may <br />vith any other information, to identify a specific <br />telephone number, social security number, date <br />license or identification number, alien registration <br />ber, employer or taxpayer identification number, <br />nber, computer's Internet Protocol address, or <br />III. <br />IDENTIFICATION OF RED FLAGS. <br />In order to identify relevant Red Flags, the Utility considers the types of <br />accounts that it offers and maintains, the methods it provides to open its accounts, <br />the methods it provides to access its accounts, and its previous experiences with <br />Identity Theft. The Utility identifies the following red flags, in each of the listed <br />categories: <br />A. Suspicious Documents <br />Red Flaas <br />1. Identification document or card that appears to be forged, altered or <br />inauthentic; <br />2. Identification document or card on which a person's photograph or physical <br />description is not consistent with the person presenting the document; <br />3. Other document with information that is not consistent with existing customer <br />information (such as if a person's signature on a check appears forged); and <br />4. Application for service that appears to have been altered or forged. <br />B. Suspicious Personal Identifvinq Information <br />Red Flaas <br />1. Identifying information presented that is inconsistent with other information the <br />customer provides (example: inconsistent birth dates); <br />2. Identifying information presented that is inconsistent with other sources of <br />information (for instance, an address not matching an address on a credit <br />report); <br />3. Identifying information presented that is the same as information shown on <br />other applications that were found to be fraudulent; <br />~a l l 0 ~t <br />