Posts

FTC Red Flags Rule: Is Your Business Ready?

, ,

FTC Red Flags Rule Goes into Effect June 1st, 2010

The FTC  will begin enforcing the Red Flag Rule on June 1st, which states that certain businesses and creditors must help fight identity theft as well as create an identity theft prevention plan. This applies to a very broad class of businesses: those defined as “financial institutions” and those that extend any type of credit to their customers.

In other words, if you don’t receive cash the moment you deliver your product or service to your customer, your business most likely falls under the umbrella of the Red Flags Rule. If you do any billing after the fact (i.e., accounts receivable), you are considered a creditor, and therefore in the group of companies governed by Red Flags.

This includes:

  • Any Business that Extends Credit
  • All Banks
  • Most Brokerage Firms
  • Credit Card Companies
  • Mortgage Lenders
  • Non Traditional lenders (utilities, dealerships, health care providers)

Building an Identity Theft Prevention Plan

According to the FTC, the identity theft prevention plan consists of four main parts:

  1. Identification: The plan needs to provide a process to identify patterns, activities or transactions (i.e. red flags, hence the name) that appear to be leading to identity theft.
  2. Detection: The plan needs to specifically call out processes and procedures that will be used to detect the previously defined red flags.
  3. Response: The plan needs to include a process of responding to red flags as they are detected.
  4. Revision: The plan should specify the process the organization will use to periodically update sections 1-3 as the threat landscape changes

The plan must cover how your organization will ensure that any company to which you are outsourcing to will be compliant. Every organization’s senior employees or board of directors must approve the initial plan and train the appropriate employees.

The FTC has also identified five main categories that an organization’s Red Flags might fall under. They are:

  1. Alerts, notifications, or warnings from a consumer reporting agency.
  2. Suspicious documents.
  3. Suspicious personally identifying information (PII).
  4. Suspicious activity relating to a covered account.
  5. Notices from customers, victims of identity theft, law enforcement authorities, or other entities about possible identity theft in connection with covered accounts.

As with any new plan or program there will be bumps in the road. The FTC won’t be actively auditing organizations, but it will be investigating on the basis of reported issues, and the costs of being found non-compliant can be staggering.  Since most older and more mature organizations already have an Identity Theft Prevention Program in place, it won’t be a huge change. We have already begun to see a connection between the Red Flags Rule and a decrease in the ease with which identities are stolen out of businesses. Hopefully, this trend will continue.

In the meantime, you should get started on designing and implementing your identity theft prevention plan. For help understanding the process and other privacy issues that your and your business face, attend the Privacy Survival Boot Camp for Small Businesses hosted by John Sileo, America’s Top Identity Theft Expert.

_______________________________________________________________________

Bulletproof Your Business Against Data Breach, Identity Theft, and Corporate Espionage

Join John September 17th in Denver, Colorado for his Privacy Survival Boot Camp for Businesses. You will walk away with the Privacy Best Practices Kit:

  • John Sileo’s latest book, Privacy Means Profit
  • A Sample Privacy Policy to guide you through creating your own
  • Guidelines for establishing Social Networking Best Practices
  • A Mobile Data Protection Checklist for your laptop, smart phone, etc.
  • An Action List for Implementing Red Flags Rule compliance

Seats are going fast so don’t miss this opportunity to learn first-hand how to immediately protect your profits!


Identity Theft Speaker: Red Flags Rule How-To Guide

Are you one of the 9 million Americans who will have their credit damaged or their bank account emptied this year? Or perhaps your medical treatment will be affected. The cost of identity theft to individuals and businesses is staggering; hence, the Red Flag Rule, enforced by the FTC, federal bank regulatory agencies and the National Credit Union Administration.

There are always “red flags” that pop into our heads but too often we ignore them.  Call it “intuition” or whatever you want; the vital thing is to pay attention.  To that end, many businesses and organizations are now required to implement the “Red Flags” Rule to implement a written Identity Theft Prevention Program.  The goal is to detect warning signs in day-to-day operations, take steps to prevent the crime and limit any damage.

Are you covered by the Red Flags Rule? Read Fighting Fraud with the Red Flags Rule: A How-To Guide for Business to:

  • Find out if the rule applies to your business or organization;
  • Get practical tips on spotting the red flags of identity theft, taking steps to prevent the crime, and mitigating the damage it inflicts; and
  • Learn how to put in place your written Identity Theft Prevention Program.

By identifying red flags in advance, you’ll be better equipped to spot suspicious patterns when they arise and take steps to prevent a red flag from escalating into a costly episode of identity theft.

I’m encouraged that identity theft is taken seriously enough that banks, credit unions and savings and loans are required to implement the Red Flag Rule. Other businesses and even individuals can use this policy as a guide to reduce their vulnerability. Keep in mind that the Red Flag Rules must keep pace with the ever-creative identity thieves.

Identity Theft Speaker & Expert