SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
Red Flags Rule


A guide for simple compliance




         www.idsure.org
!!! DEADLINE !!!
The enforcement of Red Flags Rule by the
           FTC commences on

          August 1st, 2009

The Red Flags Rule applies to any business
   that provides a product or service for
 which payment is made after the product
           or service is delivered
                www.idsure.org
What is it all about?
 2008 saw a reported incidence of over
  10 Million US consumers being victimized
  through ID related fraud
 ID thieves conduct their business by
  assuming the identity of another person
 More than 31% of ID thieves possess a
  drivers license that will pass complete
  scrutiny

                 www.idsure.org
The Rationale
  The US government‟s response to the
 increasing number of consumers affected
       by ID fraud has been to place
   responsibility onto the shoulders of all
            relevant businesses

The idea is simply to remove the outlet for
   ID thieves to perpetrate these crimes

                 www.idsure.org
The Cost
   In 2008, the average cost to businesses
    who were unwittingly involved in the
    commission of such offences was over
    $90,000 per instance

   There are a number of examples
    demonstrating that the losses can run into
    hundreds of thousands of $$$

                   www.idsure.org
Think About . . .
 The cost implication of rectifying a
  problem in your firm
 Hours involved
 Lost revenue and earnings
 Reputation and PR
 Loss of malpractice or liability insurance
 and . . Don‟t forget about the State and
  Federal fines (or even those civil claims)
                  www.idsure.org
Some Statistics
   31%    use fraudulent drivers licenses
   5.3%   filed and received a tax return
   9%     moved into new accommodation
   17%    opened up new accounts
   43%    of victims had „other‟ accounts opened
   7%     used legal services
   3.5%   obtained government services

      These are only reported incidences. The true
        number is estimated to be much higher!
                      www.idsure.org
What does the
         Red Flags Rule mean?


 The Red Flags Rule requires businesses and
     organizations to implement a written

     Identity Theft Prevent Program
 to detect the warning signs – or „red flags‟ –
of identity theft in their day-to-day operations

                   www.idsure.org
What is an
      Identity Theft Prevention Program?

The program involves four basic steps…

  1st Identify relevant Red Flags
    Identify the “red flags” of identity theft you‟re
    likely to come across in your business

  2nd Detect Red Flags
    Set up procedures to detect those red flags in
    your day-to-day operations

                      www.idsure.org
What is an
    Identity Theft Prevention Program?

3rd Prevent and mitigate identity theft
  If you spot the red flags you‟ve identified,
  respond appropriately to prevent and mitigate
  potential harm

4th Update the Program
   The risks of identity theft can change rapidly, so
   it‟s important to keep your Program current and
   educate your staff

                    www.idsure.org
The person behind the ID

 The ONLY true way to prevent ID fraud from
       occurring is to get behind the ID

 What this means is quite simply – CHECK the
     information you have been presented

Do NOT assume the ID you have been presented
              with is legitimate!


                 www.idsure.org
How we do it

The consumer‟s
basic data is
entered into our
system




                      www.idsure.org
How we do it
Our system will then query that data against
millions of stored records

Questions will then be generated from that
consumer‟s background

You can be confident that an ID thief is
highly unlikely to know the answers to these
questions


               www.idsure.org
How can you become compliant?

   ID Sure has developed a simple, create your own
    program template based on FTC guidelines for your firm
    to follow

   If you sign up to www.idsure.org we will provide you
    with a FREE Identity Theft Prevention Program

   The average set up time is less than 20 minutes!



                         www.idsure.org
How can ID Sure help you?
ID Sure is made up of law enforcement professionals who
  have spent many years dealing with crimes involving
  Identity Theft

Those same individuals have dedicated many years to the
  designing out of crime through the creation of online and
  technical systems for traditional payments services

The use of our service is an active deterrent to those
  individuals who seek to commit such crimes


                        www.idsure.org
How can ID Sure help you?
   ID Sure LLC is your best option for verifying consumers‟ identities
    as we have access to millions of data records from a variety of
    sources

   Also included is access to the OFAC – SDN list

   You can have the information in front of you in seconds, not hours;
    saving time and money

   No minimum contract required

   We are a one-stop solution for your Red Flags Rule needs



                             www.idsure.org
The bottom line…
   We are committed to helping you stay safe and keeping
    your consumers safe

   Our service has been designed around and is dedicated
    to Attorneys, Accountants, Mortgage Brokers and Title
    Companies and other low risk professionals

   Sign up today by contacting info@idsure.org or complete
    the registration at www.idsure.org and get a FREE
    Identity Theft Prevention Program

   1-866-503-0089

                        www.idsure.org
!!! DEADLINE !!!
The enforcement of Red Flags Rule by the
           FTC commences on


          August 1st, 2009


           Are you ready?

               www.idsure.org

Más contenido relacionado

La actualidad más candente

Tarya - Stolen identities
Tarya - Stolen identitiesTarya - Stolen identities
Tarya - Stolen identitiesCyberX-Labs
 
iDenfy - Identity Verification Presentation
iDenfy - Identity Verification PresentationiDenfy - Identity Verification Presentation
iDenfy - Identity Verification PresentationDomantas Ciulde
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit123
 
Callcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit123
 
iDenfy.com startup pitch deck for investors
iDenfy.com startup pitch deck for investorsiDenfy.com startup pitch deck for investors
iDenfy.com startup pitch deck for investorsDomantas Ciulde
 
Madison Consulting & Investments Llc
Madison Consulting & Investments LlcMadison Consulting & Investments Llc
Madison Consulting & Investments Llctbrown230
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereGoutama Bachtiar
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...Jonathan Care
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesTransUnion
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassThe ID Co.
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryPaul Hobbs
 

La actualidad más candente (19)

Tarya - Stolen identities
Tarya - Stolen identitiesTarya - Stolen identities
Tarya - Stolen identities
 
Security company in Noida redscorpionsecurity.in
Security company in Noida redscorpionsecurity.inSecurity company in Noida redscorpionsecurity.in
Security company in Noida redscorpionsecurity.in
 
iDenfy - Identity Verification Presentation
iDenfy - Identity Verification PresentationiDenfy - Identity Verification Presentation
iDenfy - Identity Verification Presentation
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
Callcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary session
 
iDenfy.com startup pitch deck for investors
iDenfy.com startup pitch deck for investorsiDenfy.com startup pitch deck for investors
iDenfy.com startup pitch deck for investors
 
Madison Consulting & Investments Llc
Madison Consulting & Investments LlcMadison Consulting & Investments Llc
Madison Consulting & Investments Llc
 
Bridge Cyber Crime_March_JB
Bridge Cyber Crime_March_JBBridge Cyber Crime_March_JB
Bridge Cyber Crime_March_JB
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
itsme Digital ID turns 3
itsme Digital ID turns 3itsme Digital ID turns 3
itsme Digital ID turns 3
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony Industry
 

Destacado

red flag Medical_Identity_Theft_Web
red flag Medical_Identity_Theft_Webred flag Medical_Identity_Theft_Web
red flag Medical_Identity_Theft_WebDulcey Whyte
 
Quality Program Indicators 2
Quality Program Indicators 2Quality Program Indicators 2
Quality Program Indicators 2moorhead
 
Cost of Disinvestment Brief Pe Trusts
Cost of Disinvestment Brief Pe TrustsCost of Disinvestment Brief Pe Trusts
Cost of Disinvestment Brief Pe TrustsEarly On Michigan
 
Michigan's LICC Parent Handbook
Michigan's LICC Parent HandbookMichigan's LICC Parent Handbook
Michigan's LICC Parent HandbookEarly On Michigan
 
Inside Pediatrics Winter 2008
Inside Pediatrics Winter 2008Inside Pediatrics Winter 2008
Inside Pediatrics Winter 2008Early On Michigan
 
Skynet Opendoors Cars 2009
Skynet Opendoors Cars 2009Skynet Opendoors Cars 2009
Skynet Opendoors Cars 2009skynetppt
 
121107 los romanticos_emotitoast2
121107 los romanticos_emotitoast2121107 los romanticos_emotitoast2
121107 los romanticos_emotitoast2djpolitzer
 
Sonnet\'s Design, Technical Design Portfolio
Sonnet\'s Design, Technical Design PortfolioSonnet\'s Design, Technical Design Portfolio
Sonnet\'s Design, Technical Design Portfoliosonnitt
 
PC服务器阵列卡管理简易手册 叶金荣@CYOU-20121223
PC服务器阵列卡管理简易手册 叶金荣@CYOU-20121223PC服务器阵列卡管理简易手册 叶金荣@CYOU-20121223
PC服务器阵列卡管理简易手册 叶金荣@CYOU-20121223Jinrong Ye
 
Why Video Over Ip
Why Video Over IpWhy Video Over Ip
Why Video Over Ipdjgood
 
Programming Guide
Programming GuideProgramming Guide
Programming Guideguest63e09c
 
Rute Surabaya Bantul
Rute Surabaya BantulRute Surabaya Bantul
Rute Surabaya Bantulsalafymail
 
MJH STaR Chart
MJH STaR ChartMJH STaR Chart
MJH STaR Chartconstance
 
CreditRiskMonitor Brochure
CreditRiskMonitor BrochureCreditRiskMonitor Brochure
CreditRiskMonitor Brochurekmacdonald2
 

Destacado (20)

Medical Red Flags S.Houck
Medical Red Flags S.HouckMedical Red Flags S.Houck
Medical Red Flags S.Houck
 
red flag Medical_Identity_Theft_Web
red flag Medical_Identity_Theft_Webred flag Medical_Identity_Theft_Web
red flag Medical_Identity_Theft_Web
 
Quality Program Indicators 2
Quality Program Indicators 2Quality Program Indicators 2
Quality Program Indicators 2
 
Cost of Disinvestment Brief Pe Trusts
Cost of Disinvestment Brief Pe TrustsCost of Disinvestment Brief Pe Trusts
Cost of Disinvestment Brief Pe Trusts
 
Michigan's LICC Parent Handbook
Michigan's LICC Parent HandbookMichigan's LICC Parent Handbook
Michigan's LICC Parent Handbook
 
Pearl Necklaces
Pearl NecklacesPearl Necklaces
Pearl Necklaces
 
Inside Pediatrics Winter 2008
Inside Pediatrics Winter 2008Inside Pediatrics Winter 2008
Inside Pediatrics Winter 2008
 
Skynet Opendoors Cars 2009
Skynet Opendoors Cars 2009Skynet Opendoors Cars 2009
Skynet Opendoors Cars 2009
 
Ús ètic de la informació. Citacions i bibliografia
Ús ètic de la informació. Citacions i bibliografiaÚs ètic de la informació. Citacions i bibliografia
Ús ètic de la informació. Citacions i bibliografia
 
121107 los romanticos_emotitoast2
121107 los romanticos_emotitoast2121107 los romanticos_emotitoast2
121107 los romanticos_emotitoast2
 
Sonnet\'s Design, Technical Design Portfolio
Sonnet\'s Design, Technical Design PortfolioSonnet\'s Design, Technical Design Portfolio
Sonnet\'s Design, Technical Design Portfolio
 
PC服务器阵列卡管理简易手册 叶金荣@CYOU-20121223
PC服务器阵列卡管理简易手册 叶金荣@CYOU-20121223PC服务器阵列卡管理简易手册 叶金荣@CYOU-20121223
PC服务器阵列卡管理简易手册 叶金荣@CYOU-20121223
 
Why Video Over Ip
Why Video Over IpWhy Video Over Ip
Why Video Over Ip
 
Programming Guide
Programming GuideProgramming Guide
Programming Guide
 
Rute Surabaya Bantul
Rute Surabaya BantulRute Surabaya Bantul
Rute Surabaya Bantul
 
MJH STaR Chart
MJH STaR ChartMJH STaR Chart
MJH STaR Chart
 
Bunch General
Bunch GeneralBunch General
Bunch General
 
CreditRiskMonitor Brochure
CreditRiskMonitor BrochureCreditRiskMonitor Brochure
CreditRiskMonitor Brochure
 
Prezentacja Foresight 16 06 09
Prezentacja Foresight 16 06 09Prezentacja Foresight 16 06 09
Prezentacja Foresight 16 06 09
 
MiAEYC March 25th, 2010
MiAEYC March 25th, 2010MiAEYC March 25th, 2010
MiAEYC March 25th, 2010
 

Similar a Red Flags Rule General

How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdfHow to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdfBahaa Abdulhadi
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4danc752
 
Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008guestabd20
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber InsuranceJohn Ryan
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From PplSue Tjernlund
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Pplsusantj3
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)guest95afa8
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...IDology, Inc
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse Systemoldshaman
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Identity Advocate
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Identity Theft and Your company
Identity Theft and Your companyIdentity Theft and Your company
Identity Theft and Your companyguest61ff5a
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDjonaspatrick12
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyMark Albala
 
Employer 0409
Employer 0409Employer 0409
Employer 0409dgade
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfVLink Inc
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesShred Station
 

Similar a Red Flags Rule General (20)

How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdfHow to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
 
Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse System
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity Theft
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Identity Theft and Your company
Identity Theft and Your companyIdentity Theft and Your company
Identity Theft and Your company
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyID
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economy
 
Employer 0409
Employer 0409Employer 0409
Employer 0409
 
The 10 best performing regtech solution providers
The 10 best performing regtech solution providersThe 10 best performing regtech solution providers
The 10 best performing regtech solution providers
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Adrs2
Adrs2Adrs2
Adrs2
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for Businesses
 

Último

1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Implementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxImplementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxRich Reba
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration TrainingCalvinarnold843
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressorselgieurope
 
Lessons from Shanavas M.P. (AKA SHAN) For The Mastering in Entrepreneurship
Lessons from Shanavas M.P. (AKA SHAN) For The Mastering in EntrepreneurshipLessons from Shanavas M.P. (AKA SHAN) For The Mastering in Entrepreneurship
Lessons from Shanavas M.P. (AKA SHAN) For The Mastering in EntrepreneurshipDoge Mining Website
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 

Último (20)

1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Implementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxImplementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptx
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration Training
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
 
Lessons from Shanavas M.P. (AKA SHAN) For The Mastering in Entrepreneurship
Lessons from Shanavas M.P. (AKA SHAN) For The Mastering in EntrepreneurshipLessons from Shanavas M.P. (AKA SHAN) For The Mastering in Entrepreneurship
Lessons from Shanavas M.P. (AKA SHAN) For The Mastering in Entrepreneurship
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 

Red Flags Rule General

  • 1. Red Flags Rule A guide for simple compliance www.idsure.org
  • 2. !!! DEADLINE !!! The enforcement of Red Flags Rule by the FTC commences on August 1st, 2009 The Red Flags Rule applies to any business that provides a product or service for which payment is made after the product or service is delivered www.idsure.org
  • 3. What is it all about?  2008 saw a reported incidence of over 10 Million US consumers being victimized through ID related fraud  ID thieves conduct their business by assuming the identity of another person  More than 31% of ID thieves possess a drivers license that will pass complete scrutiny www.idsure.org
  • 4. The Rationale The US government‟s response to the increasing number of consumers affected by ID fraud has been to place responsibility onto the shoulders of all relevant businesses The idea is simply to remove the outlet for ID thieves to perpetrate these crimes www.idsure.org
  • 5. The Cost  In 2008, the average cost to businesses who were unwittingly involved in the commission of such offences was over $90,000 per instance  There are a number of examples demonstrating that the losses can run into hundreds of thousands of $$$ www.idsure.org
  • 6. Think About . . .  The cost implication of rectifying a problem in your firm  Hours involved  Lost revenue and earnings  Reputation and PR  Loss of malpractice or liability insurance  and . . Don‟t forget about the State and Federal fines (or even those civil claims) www.idsure.org
  • 7. Some Statistics  31% use fraudulent drivers licenses  5.3% filed and received a tax return  9% moved into new accommodation  17% opened up new accounts  43% of victims had „other‟ accounts opened  7% used legal services  3.5% obtained government services These are only reported incidences. The true number is estimated to be much higher! www.idsure.org
  • 8. What does the Red Flags Rule mean? The Red Flags Rule requires businesses and organizations to implement a written Identity Theft Prevent Program to detect the warning signs – or „red flags‟ – of identity theft in their day-to-day operations www.idsure.org
  • 9. What is an Identity Theft Prevention Program? The program involves four basic steps… 1st Identify relevant Red Flags Identify the “red flags” of identity theft you‟re likely to come across in your business 2nd Detect Red Flags Set up procedures to detect those red flags in your day-to-day operations www.idsure.org
  • 10. What is an Identity Theft Prevention Program? 3rd Prevent and mitigate identity theft If you spot the red flags you‟ve identified, respond appropriately to prevent and mitigate potential harm 4th Update the Program The risks of identity theft can change rapidly, so it‟s important to keep your Program current and educate your staff www.idsure.org
  • 11. The person behind the ID The ONLY true way to prevent ID fraud from occurring is to get behind the ID What this means is quite simply – CHECK the information you have been presented Do NOT assume the ID you have been presented with is legitimate! www.idsure.org
  • 12. How we do it The consumer‟s basic data is entered into our system www.idsure.org
  • 13. How we do it Our system will then query that data against millions of stored records Questions will then be generated from that consumer‟s background You can be confident that an ID thief is highly unlikely to know the answers to these questions www.idsure.org
  • 14. How can you become compliant?  ID Sure has developed a simple, create your own program template based on FTC guidelines for your firm to follow  If you sign up to www.idsure.org we will provide you with a FREE Identity Theft Prevention Program  The average set up time is less than 20 minutes! www.idsure.org
  • 15. How can ID Sure help you? ID Sure is made up of law enforcement professionals who have spent many years dealing with crimes involving Identity Theft Those same individuals have dedicated many years to the designing out of crime through the creation of online and technical systems for traditional payments services The use of our service is an active deterrent to those individuals who seek to commit such crimes www.idsure.org
  • 16. How can ID Sure help you?  ID Sure LLC is your best option for verifying consumers‟ identities as we have access to millions of data records from a variety of sources  Also included is access to the OFAC – SDN list  You can have the information in front of you in seconds, not hours; saving time and money  No minimum contract required  We are a one-stop solution for your Red Flags Rule needs www.idsure.org
  • 17. The bottom line…  We are committed to helping you stay safe and keeping your consumers safe  Our service has been designed around and is dedicated to Attorneys, Accountants, Mortgage Brokers and Title Companies and other low risk professionals  Sign up today by contacting info@idsure.org or complete the registration at www.idsure.org and get a FREE Identity Theft Prevention Program  1-866-503-0089 www.idsure.org
  • 18. !!! DEADLINE !!! The enforcement of Red Flags Rule by the FTC commences on August 1st, 2009 Are you ready? www.idsure.org