SlideShare una empresa de Scribd logo
1 de 12
Red Flags Rule
Fighting Identity Theft with the
Red Flags Rule
Red Flags Rule

The Red Flags Rule was created by the Federal Trade Commission,
along with other government agencies such as the National Credit
Union Administration, to help prevent identity theft.
The rule was passed in January 2008, and was to be in place by
November 1, 2008. But due to push-backs by opposition, the FTC
delayed enforcement until December 31, 2010.
In December 2010, the Red Flags Rule was clarified by the Red Flag
Program Clarification Act of 2010 to exclude most doctors, lawyers,
and other professionals who do not receive full payment at the time
when their service is furnished.
Red Flags Rule

The Red Flags Rule was based on section 114 and 315 of the
Fair and Accurate Credit Transactions Act of 2003.
FACTA was put in place to help Identity Theft Prevention
and Credit History Restoration, Improvements in Use of
and Consumer Access to Credit Information, Enhancing the
Accuracy of Consumer Report Information, Limiting the
Use and Sharing of Medical Information in the Financial
System, Financial Literacy and Education Improvement,
Protecting Employee Misconduct Investigations, and
Relation to State Laws.
Financial Institutions

Financial institution is defined as a state or national bank, a
state or federal savings and loan association, a mutual
savings bank, a state or federal credit union, or any other
entity that holds a “transaction account” belonging to a
consumer
Creditors
FACTA’s definition of “creditor” applies to any entity that
regularly extends or renews credit – or arranges for others
to do so – and includes all entities that regularly permit
deferred payments for goods or services
The definition of a creditor was clarified by the Red Flag
Program Clarification Act of 2010. Under the Clarification
Act, a creditor regularly and in the course of business:
Obtains or uses consumer credit reports
Provides information to consumer reporting agencies
Advances funds which must be repaid in the future (or
against collateral).
Identity Theft Prevention Programs

The Red Flags Rule sets out how certain
businesses and organizations must develop,
implement, and administer their Identity Theft
Prevention Programs. The program must
include four basic elements, which together
create a framework to address the threat of
identity theft
The program has four elements:
Identify Relevant Red Flags:
Identify likely business-specific identity
theft red flags

Detect Red Flags:
Define procedures to detect red flags in
day-to-day operations

Prevent and Mitigate Identity Theft:
Act to prevent and mitigate harm when
red flags are identified

Update Program:
Maintain the red flag program, including
educating operational staff
The Red Flags Rules
provide all financial
institutions and
creditors the
opportunity to design
and implement a
program that is
appropriate to their
size and complexity,
as well as the nature
of their operations.
The red flags fall into five categories:
Alerts, notifications, or warnings from a consumer reporting agency
Suspicious documents
Suspicious identifying information, such as a suspicious address
Unusual use of – or suspicious activity relating to – a covered account[

Notices from customers, victims of identity theft, law enforcement authorities, or
other businesses about possible identity theft in connection with covered accounts[
The Red Flags Rule is published at 16 C.F.R. '
681.1. See also 72 Fed. Reg. at 63,771
(11.9.2007).
http://www.ftc.gov/os/fedreg/2007/november/071109r
edflags.pdf.
Fighting Identity Theft with the Red Flags
Rule: A How-To Guide for Business

http://www.business.ftc.gov/documents/bus23fighting-identity-theft-red-flags-rule-how-guidebusiness
Compiled and designed by Mark Fullbright , Certified
Identity Theft Risk Management Specialist™ (CITRMS)
as a free service for consumers and businesses to
protect themselves online and reduce their exposure
to identity theft.
Stay Safe, Stay Secure
Resources: *Federal Trade Commission

Más contenido relacionado

Más de - Mark - Fullbright

Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 

Más de - Mark - Fullbright (20)

IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 

Último

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 

Red Flags Rule: Fighting Identity Theft with the Red Flags Rule

  • 1. Red Flags Rule Fighting Identity Theft with the Red Flags Rule
  • 2. Red Flags Rule The Red Flags Rule was created by the Federal Trade Commission, along with other government agencies such as the National Credit Union Administration, to help prevent identity theft. The rule was passed in January 2008, and was to be in place by November 1, 2008. But due to push-backs by opposition, the FTC delayed enforcement until December 31, 2010. In December 2010, the Red Flags Rule was clarified by the Red Flag Program Clarification Act of 2010 to exclude most doctors, lawyers, and other professionals who do not receive full payment at the time when their service is furnished.
  • 3. Red Flags Rule The Red Flags Rule was based on section 114 and 315 of the Fair and Accurate Credit Transactions Act of 2003. FACTA was put in place to help Identity Theft Prevention and Credit History Restoration, Improvements in Use of and Consumer Access to Credit Information, Enhancing the Accuracy of Consumer Report Information, Limiting the Use and Sharing of Medical Information in the Financial System, Financial Literacy and Education Improvement, Protecting Employee Misconduct Investigations, and Relation to State Laws.
  • 4. Financial Institutions Financial institution is defined as a state or national bank, a state or federal savings and loan association, a mutual savings bank, a state or federal credit union, or any other entity that holds a “transaction account” belonging to a consumer
  • 5. Creditors FACTA’s definition of “creditor” applies to any entity that regularly extends or renews credit – or arranges for others to do so – and includes all entities that regularly permit deferred payments for goods or services The definition of a creditor was clarified by the Red Flag Program Clarification Act of 2010. Under the Clarification Act, a creditor regularly and in the course of business: Obtains or uses consumer credit reports Provides information to consumer reporting agencies Advances funds which must be repaid in the future (or against collateral).
  • 6. Identity Theft Prevention Programs The Red Flags Rule sets out how certain businesses and organizations must develop, implement, and administer their Identity Theft Prevention Programs. The program must include four basic elements, which together create a framework to address the threat of identity theft
  • 7. The program has four elements: Identify Relevant Red Flags: Identify likely business-specific identity theft red flags Detect Red Flags: Define procedures to detect red flags in day-to-day operations Prevent and Mitigate Identity Theft: Act to prevent and mitigate harm when red flags are identified Update Program: Maintain the red flag program, including educating operational staff
  • 8. The Red Flags Rules provide all financial institutions and creditors the opportunity to design and implement a program that is appropriate to their size and complexity, as well as the nature of their operations.
  • 9. The red flags fall into five categories: Alerts, notifications, or warnings from a consumer reporting agency Suspicious documents Suspicious identifying information, such as a suspicious address Unusual use of – or suspicious activity relating to – a covered account[ Notices from customers, victims of identity theft, law enforcement authorities, or other businesses about possible identity theft in connection with covered accounts[
  • 10. The Red Flags Rule is published at 16 C.F.R. ' 681.1. See also 72 Fed. Reg. at 63,771 (11.9.2007). http://www.ftc.gov/os/fedreg/2007/november/071109r edflags.pdf.
  • 11. Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business http://www.business.ftc.gov/documents/bus23fighting-identity-theft-red-flags-rule-how-guidebusiness
  • 12. Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free service for consumers and businesses to protect themselves online and reduce their exposure to identity theft. Stay Safe, Stay Secure Resources: *Federal Trade Commission