Most victims don't have the slightest clue as to how the criminal even got their identity and credit information in the first place. The only way consumers can fight back against identity theft is to take steps to protect themselves. Businesses must also do their part to stop this extensive crime. The Federal Trade Commission issued a Red Flag Policy that mandates most businesses to participate in the effort to prevent identity theft and the source of personal information. The Red Flag Policy requires financial institutions and certain types of creditors to implement an identity theft prevention program.
As of November 1, 2009, all creditors are required to create and implement an identity theft policy, also known as a Red Flag Policy. This policy ensures you are protected as a business, your clients are protected as consumers, and you are compliant with the law. The Red Flag Policy is enforced by the Federal Trade Commission and other regulatory agencies.
The implementation of the Red Flag mandate content is at the discretion of each business and will obviously differ for different companies based on the unique elements which make up that business. There are specific requirements, however, that must be included in the Red Flag Policy. There must be procedures to identify and detect warning signs for potential identity theft (a.k.a. red flags). The policy must also include procedures for how to respond to those warning signs to prevent identity theft. The policy also requires that the identity theft protection program be implemented into day-to-day operations including training. Staff should be trained on how to spot the red flags for identity theft and how to react to them.
The program must also contain a detailed process for updating the policy. Businesses that deal with customers via phone and through the internet are more susceptible to identify theft and fraud and must identify the best way to prevent it. Electronic identity theft is a huge concern and involves significant steps to ensure computer security. Larger companies that have independent branches must take extra precautions to protect sensitive and confidential information.
Many times, and this is why the Red Flag Policy is so critical, identity theft will occur internally. Companies must take the necessary steps to ensure confidential information is secure and locked up in a manner where it would only be accessible to authorized individuals. Every policy should have a program administrator that would be responsible for overseeing the program. It does not need to be burdensome for a company to have to design and implement an information protection program as the Red Flag Policy is intended to protect not only consumers, but the businesses who can incur substantial losses.
As of November 1, 2009, all creditors are required to create and implement an identity theft policy, also known as a Red Flag Policy. This policy ensures you are protected as a business, your clients are protected as consumers, and you are compliant with the law. The Red Flag Policy is enforced by the Federal Trade Commission and other regulatory agencies.
The implementation of the Red Flag mandate content is at the discretion of each business and will obviously differ for different companies based on the unique elements which make up that business. There are specific requirements, however, that must be included in the Red Flag Policy. There must be procedures to identify and detect warning signs for potential identity theft (a.k.a. red flags). The policy must also include procedures for how to respond to those warning signs to prevent identity theft. The policy also requires that the identity theft protection program be implemented into day-to-day operations including training. Staff should be trained on how to spot the red flags for identity theft and how to react to them.
The program must also contain a detailed process for updating the policy. Businesses that deal with customers via phone and through the internet are more susceptible to identify theft and fraud and must identify the best way to prevent it. Electronic identity theft is a huge concern and involves significant steps to ensure computer security. Larger companies that have independent branches must take extra precautions to protect sensitive and confidential information.
Many times, and this is why the Red Flag Policy is so critical, identity theft will occur internally. Companies must take the necessary steps to ensure confidential information is secure and locked up in a manner where it would only be accessible to authorized individuals. Every policy should have a program administrator that would be responsible for overseeing the program. It does not need to be burdensome for a company to have to design and implement an information protection program as the Red Flag Policy is intended to protect not only consumers, but the businesses who can incur substantial losses.