My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
4.1 ERMUSR 11-12-2019
ElkRiver
>
City Government
>
Boards and Commissions
>
Utilities Commission
>
Packets
>
2014-2024
>
2019
>
11-12-2019
>
4.1 ERMUSR 11-12-2019
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
11/8/2019 2:59:37 PM
Creation date
11/8/2019 2:58:31 PM
Metadata
Fields
Template:
City Government
type
ERMUSR
date
11/12/2019
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
114
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Responsibility for developing, implementing and updating this program lies with an <br /> Identity Theft Committee for the Utility. The Committee is headed by a Program <br /> Administrator(the Finance Director). Two or more other individuals appointed by the <br /> head of the Utility or the Program Administrator comprise the remainder of the <br /> committee membership. The Program Administrator will be responsible for the <br /> Program administration, for ensuring appropriate training of Utility staff on the <br /> Program, for reviewing any staff reports regarding the detection of Red Flags and the <br /> steps for preventing and mitigating Identity Theft, determining which steps of <br /> prevention and mitigation should be taken in particular circumstances and considering <br /> periodic changes to the Program. <br /> B. Staff Training and Reports <br /> Utility staff responsible for implementing the Program shall be trained either by or <br /> under the direction of the Program Administrator in the detection of Red Flags, and <br /> the responsive steps to be taken when a Red Flag is detected. Review with staff <br /> already trained will occur annually. Reporting will be rendered periodically to the Elk <br /> River Utilities Commission at least annually. <br /> C. Service Provider Arrangements <br /> In the event the Utility engages a service provider to perform an activity in <br /> connection with one or more accounts, the Utility will take the following steps to <br /> ensure the service provider performs its activity in accordance with reasonable <br /> policies and procedures designed to detect, prevent, and mitigate the risk of Identity <br /> Theft. <br /> 1. Require, by contract, that service providers have such policies and procedures <br /> in place; and <br /> 2. Require, by contract, that service providers review the Utility's Program and <br /> report any Red Flags to the Program Administrator. <br /> D. Non-disclosure of Specific Practices <br /> For the effectiveness of this Identity Theft Prevention Program,knowledge about <br /> specific Red Flag identification, detection, mitigation and prevention practices must <br /> be limited to the Identity Theft Committee who developed this Program and to those <br /> employees with a need to know them. Any documents that may have been produced <br /> or are produced in order to develop or implement this program that list or describe <br /> such specific practices and the information those documents contain are considered <br /> "security information"as defined in Minnesota Statutes Section 13.37 and are <br /> unavailable to the public because disclosure would be likely to substantially <br /> jeopardize the security of information against improper use,that use being to <br /> circumvent the Utility's Identity Theft prevention efforts in order to facilitate the <br /> commission of Identity Theft. <br /> 116 <br />
The URL can be used to link to this page
Your browser does not support the video tag.