1 / 12

What You Need to Know Customer Service

What You Need to Know Customer Service. 08/09/2012. What is Identity Theft?. Definition: Fraud committed by using identifying information of another person without authority. Common Forms of Identifying Information: Name Address Social Security Number Birth date Mother’s maiden name

hayley
Download Presentation

What You Need to Know Customer Service

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What You Need to Know Customer Service 08/09/2012

  2. What is Identity Theft? Definition: Fraud committed by using identifying information of another person without authority. Common Forms of Identifying Information: Name Address Social Security Number Birth date Mother’s maiden name Phone number Driver’s License Number

  3. How to Recognize Potential ID Theft at CNP • Caller requests specific information on an account, i.e., address, phone number, SSN, TDL… • Payment activity on account does not match billing or usage history. • The customer says they did not activate the account that now includes their identifying information. • Personal identifying information does not match previous information provided on account.

  4. RED FLAG RULE Red Flag – Apattern, practice or activity that indicates the possible existence of ID theft. Identifying red flags allows the CSR to spot suspicious patterns when they arise. The Red Flag Rule is enforced by the Federal Trade Commission (FTC), the federal bank regulatory agencies, and the National Credit Union Administration. What is the Red Flag Rule? Rule enforced by the Federal Trade Commission (FTC) that requires businesses and organizations to implement a written Identity Theft Prevention Program and training designed to detect the warning signs or “red flags” of identity theft in their day-to-day operations. Businesses are required to take steps to prevent the crime, and lessen the damage it inflicts.

  5. What are the Customer Service Red Flags? • Alerts, notifications or warnings received from a Consumer Reporting Agency when opening an account. • Credit Reporting agencies include: • Experian or Texas DL verification at SGO • Accurint at MNG • Existing accounts having unusual use of or suspicious activity. • Example: Single or multiple payments (usually by Credit Card) that create a credit on an account after which a caller requests a refund of the overpayments. 3. Notice from customers, victims of ID theft, law enforcement authorities, or other persons regarding ID theft.

  6. Identifying and Resolving Cases of Identity Theft Caller reports possible ID Theft event: • CSR verifies ID and address on account • Customer probed: • Did a friend or relative reside at address? • If YES, CSR explains that the customer is responsible for bill. If NO, the customer states the ID Theft is legitimate: • Inform the customer a fraud packet will be mailed to them and properly note the case as to why the customer is claiming ID Theft (Fraud). • For ID Theft/Fraud Cases the case category: “EFMI – Identity Theft Fraud” should be selected. • Using the proper case category provides automation of Identity Theft /Fraud investigations and mailing of fraud packets to the customer. • All Identity Theft CLOGs should be logged using the Class/Action code: “0017/0123 - Identity Theft Investigation” with the reason. • Inform the customer they must complete and return the packet to CNP within (30) business days with all required documents completed.  These include: • ID Theft Report (not just a case#), including the full report filed with Police • ID Theft Affidavit signed and notarized • Proof of Residence form • Copy of other accounts in their name during same time  period (electricity, phone, etc.) • Inform the customer they will be contacted within (5) business days by the Credit Department after their completed packet is received and the investigated.   • Credit will update activity through CLOGs. • If a customer calls for a status report after the packet has been mailed, please refer to the CLOGs on the account for detailed information. If the customer does not agree to complete the packet, explain to the customer they are responsible for the bill.

  7. Work From Home Agents Handling Confidential Information • Agents should have designated work areas in home that can be secured behind a locked door if necessary. • Work area should be equipped with shredder for discarding of proprietary information/documents. • Visitors should not be in area when actively working. • Employee confidential documents should be secured in locked drawer or cabinet. • Examine work area before leaving to ensure precautions have been taken to secure confidential information. • Always password protect PC when leaving area for any length of time • Power down/completely log off computer at end of day. • If customer’s information has been compromised (i.e. home burglary ) the agent must contact the authorities to file a police report, as well as alert CNP management and Corporate Security. Both should be completed within 24 hours.

  8. Protecting Customer Identifying Information It is important that we use standard verification procedures to validate customers through identifying information such as: • Name • Social Security Number • Driver’s License Number • Address/Phone Number • Date of Birth Remember: • Don’t release information without identifying your customer. • Verify identifying information—Never give information • If notes on the customer’s account indicate suspicious activity, do not provide this information to the caller.

  9. Preventing ID Theft Printing • Don’t leave screenshots or documents with confidential information on the printer. • Avoid printing these documents unless absolutely necessary. Shred-It • Properly discard documents that include confidential or identifying information in the shred it bins Workstations • Make sure your PC is password protected when you leave your desk and is “shutdown” when you leave for the day. • Avoid exposing/leaving any customer confidential information on your desktop. Emails • Never email customer sensitive information without “blotting out” identifying or other confidential information first (i.e. Checkbook screens.)

  10. Remember!! • Lock up any customer sensitive information daily. • Store records in a room or cabinet that is locked when unattended. • Shred papers containing customer information so that the information cannot be read or reconstructed (especially papers left at the printers). • Set Fax machines to memory at the end of each day to store any faxes that may be sent after business hours.

  11. Red Flag #1 Alerts, notifications or warnings received from a Consumer Reporting Agency when opening an account.

  12. Red Flag #2 Existing accounts having unusual use of or suspicious activity Red Flag #3 Notice from customers, victims of Identity Theft, law enforcement authorities, or other persons regarding Identity Theft

More Related