The FTC Red Flags Rule: Is Your Business Ready?
by JohnSileo, Performer
- Created: May 30, 2010, 6:21 am
The FTC will begin enforcing the Red Flag Rule on June 1st, which states that certain businesses and creditors must help fight identity theft as well as create an identity theft prevention plan. This applies to a very broad class of businesses: those defined as;financial institution- and those that extend any type of credit to their customers.
In other words, if you do-t receive cash the moment you deliver your product or service to your customer, your business most likely falls under the umbrella of the Red Flags Rule. If you do any billing after the fact (i.e., accounts receivable), you are considered a creditor, and therefore in the group of companies governed by Red Flags.
- Any Business that Extends Credit
- All Banks
- Most Brokerage Firms
- Credit Card Companies
- Mortgage Lenders
- Non Traditional lenders (utilities, dealerships, health care providers)
Building an Identity Theft Prevention Plan
According to the FTC, the identity theft prevention plan consists of four main parts:
- Identification: The plan needs to provide a process to identify patterns, activities or transactions (i.e. red flags, hence the name) that appear to be leading to identity theft.
- Detection: The plan needs to specifically call out processes and procedures that will be used to detect the previously defined red flags.
- Response: The plan needs to include a process of responding to red flags as they are detected.
- Revision: The plan should specify the process the organization will use to periodically update sections 1-3 as the threat landscape changes
The plan must cover how your organization will ensure that any company to which you are outsourcing to will be compliant. Every organizatio's senior employees or board of directors must approve the initial plan and train the appropriate employees.
The FTC has also identified five main categories that an organizatio's Red Flags might fall under. They are:
- Alerts, notifications, or warnings from a consumer reporting agency.
- Suspicious documents.
- Suspicious personally identifying information (PII).
- Suspicious activity relating to a covered account.
- Notices from customers, victims of identity theft, law enforcement authorities, or other entities about possible identity theft in connection with covered accounts.
As with any new plan or program there will be bumps in the road. The FTC wo't be actively auditing organizations, but it will be investigating on the basis of reported issues, and the costs of being found non-compliant can be staggering. Since most older and more mature organizations already have an Identity Theft Prevention Program in place, it wo't be a huge change. We have already begun to see a connection between the Red Flags Rule and a decrease in the ease with which identities are stolen out of businesses. Hopefully, this trend will continue.
In the meantime, you should get started on designing and implementing your identity theft prevention plan.
About the author: For help understanding the process and other privacy issues that your and your business face, attend the Privacy Survival Boot Camp for Small Businesses hosted by John Sileo, Americ's Top Identity Theft Expert. To further bulletproof yourself and your business, visit John's blog at Sileo.com.
This post was edited to remove a commercial link. Read our discussion policies for more Community best practices.
- Community Home
- Discussion Boards
- Tell Us...
- Discuss Popular Topics
- Developer Resources
- Social Media