MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

Similar documents
NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009

LOCAL ENFORCEMENT RESPONSE TO ILLEGAL IMMIGRATION : GENERAL GUIDELINES

Cumulative Identity Theft Statutes Updated as of July 26, 2011

Identity Theft Victim s Packet

LOCAL ENFORCEMENT RESPONSE TO ILLEGAL IMMIGRATION: GENERAL GUIDELINES

Virginia Commonwealth University Police Department

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008

MILWAUKEE POLICE DEPARTMENT

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER

TEXARKANA, TEXAS POLICE DEPARTMENT GENERAL ORDERS MANUAL. Amended Date June 1, 2017

Department of Legislative Services

Identity Theft: Trends and Issues

MONTPELIER POLICE DEPARTMENT

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0

STATE OMNIBUS BILLS AND LAWS January 1 June 30, 2011

Chapter 10 The Criminal Law and Business. Below is a table that highlights the differences between civil law and criminal law:

Subscriber Registration Agreement. Signing up is as easy as 1, 2, 3...

DEPARTMENT OF ARKANSAS STATE POLICE ARKANSAS CONCEALED HANDGUN CARRY LICENSE RULES

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

Drivers Privacy Protection Act 18 U.S.C et. seq. (Public Law )

AFFIDAVIT OF SPECIAL AGENT DANA FIANDACA. I, Dana Fiandaca, having been duly sworn, do hereby depose. 1. I am a Special Agent with the United States

RECORDS CONTROL: CRIMINAL HISTORY CHECK GUIDELINES

Chief of Police: Review Date: July 1

Section-by-Section Summary of Legal Workforce Act. Prepared by the American Immigration Lawyers Association Last updated on 9/13/2011- DRAFT VERSION

IMMIGRATION ENFORCEMENT

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY. EFFECTIVE DATE: 1 January 1999 PAGE 1 OF 12

Georgia Computer System Protection Act

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2009 HOUSE DRH10820-LH-6A (11/13) Short Title: Limited Hunting Privilege/Nonviolent Felons.

(Approved December 30, 2010) AN ACT

TEXAS DEPARTMENT OF PUBLIC SAFETY 5805 NORTH LAMAR BOULEVARD POST OFFICE BOX 4087, AUSTIN, TX /

Uniform Crime Reporting State Program Bulletin

ANALYSIS OF 2011 LEGIS. IMMIGRATION RELATED LAWS

AOM CHAPTER S 105. CJIS WorkStations. Table of Contents

CHAPTER 17 - ARREST POLICIES Alternatives to Arrest and Incarceration Criminal Process Immigration Violations

NEVADA COUNTY SHERIFF S OFFICE

Policies and Procedures No. 56

Identity Theft: Trends and Issues

BE IT ORDAINED BY THE CITY COUNCIL OF THE CITY OF BLOOMINGTON:

BILL HORN SUPERVISOR, FIFTH DISTRICT SAN DIEGO COUNTY BOARD OF SUPERVISORS

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

STATE OF NEW JERSEY. SENATE, No th LEGISLATURE

Police Detective (2223) Task List. 1. Reviews investigative reports received from supervising detective in order to determine assigned duties.

CITY OF CLYDE HILL CRIMINAL HISTORY RECORDS INFORMATION POLICY Adopted by Resolution No.

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 5.17

I. PURPOSE DEFINITIONS RESPECT FOR CONSTITUTIONAL RIGHTS. Page 1 of 8

Law of Banking and Security DR. ZULKIFLI HASAN

Case 3:13-cv JE Document 1 Filed 12/20/13 Page 1 of 13 Page ID#: 1

Marquette University Police Department

Fraud. Original Implementation: January 28, 1997 Last Revision: November 2, 2015 INTRODUCTION

What is the current relationship like between the Canby Police Department and the Latino community?

SEX OFFENDER REGISTRATION AND DISSEMINATION POLICY

CITY OF ONALASKA POLICE DEPARTMENT

Eyewitness refers to an individual who personally witnessed the crime under investigation or observed the suspect in the area of the crime scene.

RENO POLICE DEPARTMENT GENERAL ORDER

CHAPTER 376 An Act concerning the regulation of bounty hunters and supplementing Title 45 of the Revised Statutes.

Immigration Violations

Urbana Police Department. Policy Manual

NEW BRUNSWICK POLICE DEPARTMENT POLICY & PROCEDURES

[MUNICIPALITY POLICE DEPARTMENT] GENERAL ORDER. Volume: Chapter: #of Pages: FAIR AND EQUAL POLICING. Effective Date: Supersedes Order #:

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2017 H 1 HOUSE BILL 63. Short Title: Citizens Protection Act of (Public)

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 S 1 SENATE BILL 604. Short Title: NC Illegal Immigration Enforcement Act. (Public) April 19, 2011

18 USC NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

Annotated Code of Maryland BUSINESS REGULATION TITLE LOCKSMITHS SUBTITLE 1. DEFINITIONS; GENERAL PROVISIONS

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2017 SESSION LAW SENATE BILL 824

ARKANSAS STATE POLICE PRIVATE BUSINESS RECOGNITION APPLICATION

A Bill Regular Session, 2017 SENATE BILL 225

Frequently Asked Questions (FAQs) about Expungements and Pardons in South Carolina Courts

EXHIBIT 1 BILOXI MUNICIPAL COURT PROCEDURES FOR LEGAL FINANCIAL OBLIGATIONS AND COMMUNITY SERVICE

TITLE 18. CRIMES AND CRIMINAL PROCEDURE PART I. CRIMES CHAPTER 47. FRAUD AND FALSE STATEMENTS 18 USCS 1030

KANSAS IDENTITY THEFT RANKING BY STATE: Rank 29, 61.0 Complaints Per 100,000 Population, 1694 Complaints (2007) Updated December 15, 2008

KANSAS COMMISSION ON PEACE OFFICERS STANDARDS & TRAINING

S To provide for enhanced Federal, State, and local enforcement of the immigration laws, and for other purposes.

GENERAL ORDER 311A- DIPLOMATIC IMMUNITY

LEGAL PROCESS WRITTEN DIRECTIVE: 14.3 EFFECTIVE DATE: REVISION DATE:

Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland

CHAPTER Committee Substitute for Committee Substitute for Senate Bill No. 2700

Immigration-Related Document Fraud: Overview of Civil, Criminal, and Immigration Consequences

STATE OF ILLINOIS ILLINOIS STATE POLICE ADAM WALSH CHILD PROTECTION ACT USER AGREEMENT BETWEEN THE ILLINOIS STATE POLICE AND

CHAPTER Committee Substitute for Council Substitute for House Bill No. 105

FBI officials have estimated

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE

CALIFORNIA THEFT CRIMES UNDERSTANDING THE OFFENSES AND PENALTIES

One Union Street, Wakefield, Massachusetts, Emergency 911 Business FAX

TekSavvy Solutions Inc.

Supreme Court of Florida

EMPLOYMENT APPLICATION

ARKANSAS STATE POLICE SECURITY OR INVESTIGATION BRANCH LOCATION APPLICATION

CHAPTER 354. (Senate Bill 60)

NH DIVISION OF LIQUOR ENFORCEMENT AND LICENSING ADMINISTRATION & OPERATIONS MANUAL

STATE BUREAU OF INVESTIGATION PROCEDURE 12 POLICY AND PROCEDURE MANUAL JULY 1, 2002 ARREST PROCEDURES

BERKELEY POLICE DEPARTMENT. DATE ISSUED: May 27, 2005 GENERAL ORDER C-10 PURPOSE

ANTIGUA AND BARBUDA THE ELECTRONIC TRANSFER OF FUNDS CRIMES ACT, 2006 ARRANGEMENT OF SECTIONS. Part 1 - Preliminary

This policy outlines the process and procedures to be considered and followed by members when making an arrest.

SECOND REGULAR SESSION [P E R F E C T E D] SENATE BILL NO TH GENERAL ASSEMBLY INTRODUCED BY SENATOR MUNZLINGER.

The Legal Workforce Act 1 Section-by-Section

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR

COMPREHENSIVE SENTENCING TASK FORCE Presented to the Colorado Commission on Criminal and Juvenile Justice November 8, 2013

Transcription:

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY POLICY AND PROCEDURE # 105 SUBJECT: Identity Theft EFFECTIVE DATE: 16 June 2006 PAGE 1 OF 8 REVIEW DATE: 30 November 2017 APPROVED: CHANGE DATE: 8 January 2014 THE POLICES AND PROCEDURES INCLUDED IN THIS MANUAL ARE NOT A CONTRACT OF EMPLOYMENT AND SHOULD NOT BE RELIED ON AS SUCH. THESE POLICIES AND PROCEDURES ARE SUBJECT TO AND MAY BE CHANGED AT ANY TIME BY THE DEPARTMENT OF PUBLIC SAFETY, MEDICAL UNIVERSITY OF SOUTH CAROLINA. A. Purpose B. Policy C. Definitions D. Procedure The purpose of this policy is to provide employees with protocols for accepting, recording and investigating the crime of identity theft. Identity theft is one of the fastest growing and most serious economic crimes in the United States for both financial institutions and persons whose identifying information has been illegally used. Also a tool that terrorist and those who are attempting to evade the law can use to their advantage. Therefore, this agency shall take those measures necessary to record criminal complaints, assist victims in contacting other relevant investigative and consumer protection agencies, and work with other federal, state and local law enforcement and reporting agencies to identify perpetrators. Identity Theft: Identity theft is the wrongful use of another person s identifying information - such credit card, social security or driver s license numbers to commit financial or other crimes. Identity theft is generally a means for committing other offenses such as fraudulently obtaining financial credit or loans, among other crimes. 1. Legal Prohibitions 1

a. Identity theft is punishable under federal law when any person knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a felony under any applicable state or local law. [18 U.S.C. 1028(a)(7)] b. Identity theft is punishable under state law (S.C. Code 16-13-510) which states: c. It is unlawful for a person to commit the offense of financial identity fraud. d. A person is guilty of financial identity fraud when he, without the authorization or permission of another person and with the intent of unlawfully appropriating the financial resources of that person to his own use or the use of a third party: (1) obtains or records identifying information which would assist in accessing the financial records of the other person; or (2) accesses or attempts to access the financial resources of the other person through the use of identifying information as defined is subsection c. (3) Identifying information includes, but is not limited to: a) social security numbers; b) driver s license numbers; c) checking account numbers; d) savings account numbers; e) credit card numbers; f) debit card numbers; g) personal identification numbers; h) electronic identification numbers; i) digital signatures; or j) other numbers or information which may be used to access a person s financial resource. 2

(4) A person who violates the provisions of this section is guilty of a felony and, upon conviction, must be fined in the discretion of the court or imprisoned not more than ten years, or both. The court may order restitution to the victim pursuant to the provisions of Section 17-25-322. 2. Taking Crime Reports (CALEA 42.2.8.a) All sworn police personnel are authorized to take crime reports on identity theft. Recording all relevant information and data in such reports is essential to further investigation. Therefore, officers and / or supervisors should: a. Fully record information concerning criminal acts that may have been committed by illegally using another s personal identity as covered by state and federal law. b. Classify as identity theft fraudulent acts committed against an individual when there is evidence that the following types of unauthorized activities have taken place in the victim s name. 1) Credit card charges, debit cards, ATM cards. 2) Credit card checks written against their account. 3) Credit card accounts opened or account addressed changed. 4) Establishment of a line of credit at a store or obtaining a loan at a financial institution. 5) Goods or services purchased in their name. 6) Gaining access to secure areas. 7) Used as computer fraud. c. Obtain or verify as appropriate identifying information of the victim to include date of birth, social security number, driver s license number, other photo identification, current and most recent prior address, and telephone numbers. d. Document the nature of the fraud or other crime committed in the victim s name. e. Determine what types of personal identifying information may have been used to commit these crimes (i.e., social security number, driver s license number, birth certificate, credit card numbers and state of issuance, etc.) 3

and whether any of these have been lost, stolen or potentially misappropriated. f. Document any information concerning where the crime took place, the financial institutions or related companies involved and the residence or whereabouts of the victim at the time of these events. g. Determine whether the victim authorized anyone to use his or her name or personal information. h. Determine whether the victim has knowledge or belief that specific person or persons have used his or her identity to commit fraud or other crimes. i. Determine whether the victim is willing to assist in the prosecution of suspects identified in the crime. j. Determine if the victim has filed a report of the crime with other law enforcement agencies and whether such agency provided the complainant with a report number. k. If not otherwise provided, document / describe the crime, the documents or information used, and the manner in which the victim s identifying information was obtained. l. Forward the report through the chain of command to appropriate investigative officers and immediately to intelligence agencies and federal agencies, if it appears to have national security implications 3. Assisting Victims (CALEA 42.2.8.c) Officers taking reports of identity theft should take those steps reasonable possible to help victims resolve their problem. This includes providing victims with the following suggestions where appropriate. a. Contact the Federal Trade Commission (FTC) (1-800-877-IDTHEFT)- Which acts as the nation s clearinghouse for information related to identity theft crimes for assistance from trained counselors in resolving credit related problems. b. Cancel each credit and charge card and request new cards with new account numbers. c. Contact the fraud departments of the three major credit reporting agencies [Equifax (1-800-525-6285), Experian (1-888-397-3742), 4

TransUnion (1-800-680-7289)], and ask them to put a fraud alert on the account and add a victims statement requesting creditors to contact the victim before opening new accounts in his or her name. Also request copies of your credit report. d. If bank accounts are involved, report the loss to each financial institution, cancel existing accounts and open new ones with new account numbers. If deemed necessary, place stop payments on outstanding checks and contact creditors to explain. e. If a driver s license is involved, contact the state motor vehicle department. If the driver s license uses the social security number, request a new driver s license number. In such cases, also check with the Social Security Administration to determine the accuracy and integrity of your account. f. Change the locks on your house and cars if there is any indication that these have been copied or otherwise compromised. 4. Identity Theft File The Identity Theft File will serve as a means for law enforcement to "flag" stolen identities and identify the imposter when encountered by law enforcement. When an identity theft victim becomes aware that his/her identity has been stolen and reports the incident to law enforcement, the agency's handling of the identity theft case should parallel the criteria as outlined in NCIC Operating Manual. The Public Safety Officer should complete an incident report and collect pertinent information from the victim to create a victim profile that is entered into the Identity Theft File of NCIC. The agency enters the information only after the victim signs a consent waiver (PSD-202) (CALEA 42.2.8.b). The waiver states that the victim provides permission for the information to be entered in the Identity Theft File. It also acknowledges that the victim may withdraw the consent by providing a written request to the entering agency. At that time, the record will be canceled from the Identity Theft File. The profile should include information such as the victim's name, date of birth, Social Security number, and the type of identity theft. In addition, a password is established either by the victim or the police officer and entered into the Identity Theft File. The password will identify the person as the victim and should be provided to the victim when the police report is filed. (The victim should retain the password to use during any potential future police encounters.) Agencies may also enter a mug shot of the victim into NCIC. The mug shot may be used as an additional form of identification for the victim. When the mug shot is retrieved, it 5

must clearly specify that the mug shot is that of the victim and not that of the offender. During a subsequent encounter by law enforcement, including routine traffic stops, a person s query into NCIC will automatically search the Identity Theft File and, if positive, generate a response to the inquiring agency. The officer will receive a response listing the victim profile, including the password, thereby providing the officer with the information necessary to verify that the person encountered is the victim or that the person may be using a false identity. The officer should be cognizant that the individual should not be arrested or detained based solely upon the information provided in the positive response from the Identity Theft File. The response should be considered along with additional information or circumstances surrounding the encounter before the officer take action. Information on deceased persons may also be entered into the Identity Theft File. If a police officer becomes aware of a deceased person s identity being stolen, that information can be entered into the file noting that the person is deceased. Criteria for Entry: An entry in the Identity Theft File must be supported by an official complaint (electronic or hard copy) recorded by and on file at a law enforcement agency. Documentation for the identity theft complaint must meet the following criteria before an entry can be made into the Identity Theft File: a. Someone is using a means of identification of the victim (denoted in the Identity Theft and Assumption Deterrence Act of 1998 as any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual). b. The identity of the victim is being used without the victim's permission. c. The victim's identity is being used or intended to be used to commit an unlawful activity. d. The victim must sign a consent waiver prior to the information being entered into the Identity Theft File. The following waiver may be used independently or incorporated into a state form e. Information on deceased persons may be entered into the file if it is deemed by the police officer that the victim s information has been stolen. No consent form is required with the entry of deceased person information. 6

If the identity of the thief is known and an arrest warrant has been issued, the agency should enter the victim information in the S/F Fields in the Wanted Person File. Only the agency that takes the identity theft complaint may make an NCIC identity theft entry. The only exception is that any criminal justice agency or regional dispatch center may act as a holder of the record for another agency that has no telecommunications equipment. When such an entry is made, the agency holding the record may place its own Originating Agency Identifier (ORI) in the ORI Field only when there is a written agreement between the two agencies that delineates the legal responsibility of each for the record. Additional information concerning these responsibilities can be found in the ORI File Chapter of NCIC. Procedure for MUSC Communication Center will be as follow: Entry will only be made after the incident report, consent form and all NCIC requirements for entry are made. MUSC Safety Identity Theft Form will be completed by the officer (PSD-203). The entry will be logged in the Hot File (Red Binder) and paperwork will be returned to the Record s Section to be placed into the case file. 5. Investigations (CALEA 42.2.8.d) Investigation of identity theft shall include but not be limited to the following actions where appropriate. a. Review the crime report and conduct any follow-up inquiries of victims or others as appropriate for clarification / expansion of information. b. Contact the FTC Consumer Sentinel law enforcement network and search the database for investigative leads. c. Contact other involved or potentially involved law enforcement agencies for collaboration and avoidance of duplication. These agencies include but are not limited to d. Federal law enforcement agencies such as the U.S. Secret Service, the Federal Bureau of Investigation, and the U.S. Postal Inspection Service as appropriate whether or not the victim has filed a crime report with them. e. Any state and / or local enforcement agency with which the victim has fled a crime report or where there is an indication that the identity theft took place. 7

6. Community Awareness and Prevention (CALEA 42.2.8.e) Where reasonable and appropriate, officers engaged in public education / information forums, community crime prevention and awareness presentations or similar speaking or information dissemination efforts shall provide the public with information on the nature and prevention of identity theft. 8