According toÌýUniversity Policy 3011, aÌýRed FlagÌýis a transaction that a reasonable person should suspect that they may be interacting with an individual using someone else's identity.
Some examples include:
- Notifications & Warnings from Reporting Agenices
- Suspicious Documents
- Suspicious Personally Identifiable Information (PII)
- Suspicious Covered Account Activity or Unusual Use of Account
- Alerts from Others
If you notice any red flags, please complete aÌýSuspicious Activities Report (SAR). This is a report of suspicious activity that arises when a University employee is confronted with a Red Flag. The report shall be in writing and must be forwarded to the Assistant Vice President for Finance/University Controller in the Office of Finance. The report shall specifically state the party or parties involved, the conduct creating the Red Flag, and the action or refusal to take action that was a result of the suspicious behavior.
A Suspicious Activities Report (SAR) is a report of suspicious activity that arises when a University employee is confronted with a Red Flag. The report shall be in writing and must be forwarded to the Assistant Vice President for Finance/University Controller in the Office of Finance. The report shall specifically state the party or parties involved, the conduct creating the Red Flag, and the action or refusal to take action that was a result of the suspicious behavior.
Ìý
University Policy 1002: 51Ç鱨վ Code of EthicsÌýâ–º
University Policy 3011: Identity Theft Protection (Red Flag) ProgramÌýâ–º