Fair and Accurate Credit Transactions Act of 2003  Red Flag Provisions Brenda Terreault, Esq. NACM Oregon January 14, 2010
SO WHAT IS THE RED FLAGS RULE?
BACKGROUND Joint Rulemaking Final rules published Nov 9, 2007 Compliance required Nov 1, 2008, but enforcement forbearance for the Red Flag Rules until June 1, 2010, for entities under FTC jurisdiction.
Red Flag Provisions RULES: 72 Fed. Reg. 63718 (November 9, 2007) www.ftc.gov/os/fedreg/2007/november/071109redflags.pdf (FTC Rules p.63771-63773, Guidelines p. 63773-63774, Supplement p. 63774)   FACT Act section 114 FCRA section 615 (e) 16 CFR section 681.2 http://www.ftc.gov/bcp/edu/microsites/redflagsrule/get-started.shtm
What is a Red Flag? A “Red Flag” is a pattern, practice, or specific activity that could indicate identity theft.
STRUCTURE OF THE RED FLAGS RULE Risk-based Rule Guidelines (Appendix A) Supplement A - 26 examples of red flags located within the link:  www.ftc.gov/os/fedreg/2007/november/071109redflags.pdf
PURPOSE OF THE RED FLAGS RULE To ensure that your business or organization is on the lookout for the signs that a crook is using someone else’s information, typically to get your products and services with no intention of paying. Not just another Data Security regulation
WHO’S COVERED BY  THE RED FLAGS RULE?
WHO’S COVERED? Financial Institutions Creditors
WHO’S COVERED? From the FCRA, a “financial institution” is: A state or national bank A state or federal savings and loan association A mutual savings bank A state or federal credit union, Or any other person that directly or indirectly holds a transaction account belonging to a consumer.
DEFINITION OF  “TRANSACTION ACCOUNT” From Federal Reserve Act, Section 19(b) – an Account that allows withdrawals by negotiable or transferable instrument, payment orders of withdrawal, telephone transfers, or similar items to make payments or transfers to third persons or others.
FTC Definition of “Creditors” H aving "the same meaning as in 15 U.S.C. 1681a(r)(5), and includes lenders such as banks, finance companies, automobile dealers, mortgage brokers, utility companies, and telecommunications companies."  
FTC Definition of “Creditors” 15 U.S.C. 1681a(r)(5)  Having "the same meaning as in Section 702 of  the Equal Credit Opportunity Act."
FTC Definition of “Creditors” Section 702(e) of  the Equal Credit Opportunity Act – 15 U.S.C. 1691a(e)  “ The term "creditor" means any person who regularly extends, renews, or continues credit; any person who regularly arranges for the extension, renewal, or continuation of credit; or any assignee of an original creditor who participates in the decision to extend, renew, or continue credit.”
FTC Definition of “Creditors” Any person who regularly extends, renews, or continues credit; any person who regularly arranges for the extension, renewal, or continuation of credit; or any assignee of an original creditor who participates in the decision to extend, renew, or continue credit and includes lenders such as banks, finance companies, automobile dealers, mortgage brokers, utility companies, and telecommunications companies.
RECAP - WHO’S COVERED? Any person who regularly extends, renews or continues credit Any person who regularly arranges for extension, renewal or continuation of credit Any assignee of an original creditor and who participates in the decision to extend, renew or continue credit.
WHO’S NOT COVERED? New stuff Businesses at low risk of ID theft Know all their customers personally Provide services at customers’ homes Previous experience with ID theft Industry where ID theft is common Attorney firms and Accountant firms  Court opinion  Amendment
IF WE’RE COVERED BY THE RED FLAGS RULE, WHAT DO WE NEED TO DO?
WHAT DO WE NEED TO DO? Conduct a periodic risk assessment to determine if “covered accounts” exist If covered accounts exist: develop, implement and administer  a written Identity Theft Prevention Program  to detect, prevent and mitigate identity theft in connections with: The opening of a covered account or Transactions in any existing covered account
WHAT IS AN “ACCOUNT”? An “account” is: A continuing relationship  established by a person with a financial institution or creditor  to obtain a product or service for  personal,  household or  business  purpose.
WHAT IS A “COVERED ACCOUNT”? A “covered account” includes: A consumer account  Designed to permit multiple payments or transactions  Offered or maintained by creditor  Primarily for personal, household or family purposes.   (Regulation subsection 3i – consumer accounts)
WHAT IS A “COVERED ACCOUNT”? A “covered account” includes: Any other accounts that based on a reasonably foreseeable risk of ID theft  creditor has designated as a covered account (Regulation subsection 3ii – catch-all regulation)
Risk Assessment of  Covered Accounts Creditor must conduct initial risk assessment and consider,  among other things : Methods used to open accounts Methods to access accounts Previous experiences with ID theft All  creditors must periodically reassess, even if no initial covered accounts, to consider changes in:  Account offerings Regulatory changes and  Changes in methods and patterns of ID theft
HOW DO WE DESIGN AN IDENTITY THEFT PREVENTION PROGRAM?
A Brief Outline of What’s Expected Incorporating existing policies and procedures Identify relevant red flags Set up procedures to detect red flags Respond appropriately to red flags Update your program periodically Administer your program Consider other legal requirements
DESIGNING AN IDENTITY THEFT PREVENTION PROGRAM  STEP BY STEP
DESIGNING YOUR PROGRAM The program must be appropriate to the size and complexity of the financial institution or creditor and the nature and scope of activities The rules require you to consider the guidelines and incorporate appropriate guidelines into your program.
Things to Remember Must be in writing No one-size-fits-all formula Tailored to creditor’s size and complexity Tailored to nature and scope of business activities Based on results of risk assessments
Things to Remember Minimally contain  reasonable   policies/procedures to: Identify what “Red Flags” might be for covered accounts Detect “Red Flags” when they occur Respond to mitigate and prevent ID theft Update program periodically .
DESIGNING YOUR PROGRAM Develop reasonable processes and procedures: Step #1 – Identify relevant red flags likely in your business that indicates a crook is using someone else’s information to get your products or services with no intention of paying
Incorporating existing policies and procedures Evaluate your existing anti-fraud programs Evaluate your information security programs Evaluate your credit policy
Identify relevant red flags Identify red flags according to risk posed to creditor’s business Types of covered accounts offered or maintained Methods provided to open those accounts Methods provided to access those accounts Previous experience with ID theft
Identify relevant red flags Five categories of red flags: Alerts, notifications or other warnings received from credit reporting agencies or service providers Suspicious documents Suspicious personal identifying information Unusual use of or other suspicious activity related to a covered account Notice from customers, victims of identity theft or law enforcement authorities
EXAMPLES OF RED FLAGS (SUPP. A) Warning from credit reporting agencies Inconsistent with external information sources Suspicious documents Documents provided for identification appear to be altered Suspicious personal information Fraud or active duty alert included in consumer report
EXAMPLES OF RED FLAGS (SUPP. A) Unusual use of account Account used in a way inconsistent with historical patterns of activity  Notice from customers Customer notifies you about identity theft
DESIGNING YOUR PROGRAM Develop reasonable processes and procedures: Step #2 – Detect red flags – Set up procedures to detect them in your day-to-day operations
Detecting relevant red flags Two specific times for  detecting red flags When Creditor obtains and verifies identifying information on customer who is opening the account, and  When Creditor authenticates and verifies customer identity when customer makes a change on the account and monitors account transactions afterwards. There may be other times when a red flag may be identified – every industry is different
Detecting relevant red flags Verify identity Authenticate customers Monitor transactions Verify validity of address changes
DESIGNING YOUR PROGRAM Develop reasonable processes and procedures: Step #3- Prevent and mitigate identity theft. When you spot a red flag that you’ve identified, respond appropriately to prevent and mitigate harm
Responding to relevant red flags Reasonable policies and procedures  Appropriate response  Responses must be commensurate with risk posed Aggravating factors, early warning signs Different account types may have different red flags associated with it.
Respond appropriately to red flags Monitor accounts Contact customers Change passwords Close and reopen account Refuse to open account Don’t sell the account or collect on it against the identify theft victim Notify law enforcement In some cases, no response may be warranted
DESIGNING YOUR PROGRAM Develop reasonable processes and procedures: Step #4 – Update your program. The risks of identity theft can change rapidly, so keep your plan current and educate your staff.
Updating for new red flags Sources of Red flags: Episodes of identity theft that have already happened Changes in how crooks are committing identity theft Applicable supervisory guidance
Updating for new red flags Periodically review and evaluate red flags previously incorporated to verify each remains relevant to operation NOTE: Neither regulations, nor guidelines, define the term “periodically” or provide timeframes for conducting  updates. Objective: to be responsive to changing risks
Updating for new red flags Periodic updating required, should consider: Experiences with ID theft Changes in ID theft methods Changes in ID theft detection, prevention and mitigation methods Changes in creditor’s business – growth, mergers, and other business arrangements Changes in types of account creditor offers or maintains
WHAT ABOUT  THE ADDRESS DISCREPANCY RULE?
ADDRESS DISCREPANCY RULE FACT Act Section 315 FCRA Section 605(h) 16 CFR section 681.1
WHO’S COVERED? Users of credit reports  Term to know - “Nationwide Credit Reporting Agency” (NCRA) as defined in FCRA
CONFIRMING ADDRESS Regulatory requirement: The user must have reasonable policies and procedures to furnish a confirmed address for the consumer to the NCRA when the user: Can form a reasonable belief that the report relates to the consumer Establishes a continuing relationship with the consumer Regularly furnishes information to the NCRA
NOTICE OF ADDRESS DISCREPANCY Notice of address discrepancy comes from a nationwide credit reporting agency and notifies the user of a substantial difference between: Address the user provided and Address in the credit reporting company’s files
ENSURING ACCURACY Regulatory requirement: The user must have reasonable policies and procedures to establish a reasonable belief that the credit report relates to the consumer about whom the report was requested
REASONABLE BELIEF Establishing a “reasonable belief” Examples: Compare information in the credit report to information that user: Maintains in its records Gets from third party sources Gets to comply with CIP rules Verify information in the credit report with the consumer
PROGRAM ADMINISTRATION OVERVIEW Red flag rule’s requirements for program administration consists of five elements: Board approval High-level oversight Reporting Staff training Service Provider oversight, if any service provider is hired
PROGRAM ADMINISTRATION ELEMENTS BOARD APPROVAL Initial written program must be approved by Board of Directors or a committee of the Board Once program is established, the Board may designate a senior management employee to oversee: Development, implementation and administration of the program Training of appropriate staff’ Arrangements with Service Providers
PROGRAM ADMINISTRATION ELEMENTS REPORTING At least once a year, creditor staff must report on effectiveness of program to the Board, Committee or senior management employee. Report should cover material aspects of Program, or at minimum Effectiveness of the program policies and procedures Service Provider arrangements if any Identity theft incidents and responses Recommendations for changes in program
PROGRAM ADMINISTRATION ELEMENTS TRAINING Train  relevant  staff as necessary to  Implement program effectively Identify and respond appropriately NOTE: There is no prescription that ALL staff be trained.  Deciding which staff members need training is up to creditor. Consider whether job duties may allow employee to identify, detect, prevent and mitigate ID theft risk
PROGRAM ADMINISTRATION ELEMENTS SERVICE PROVIDER OVERSIGHT Who is a Service Provider?  Ensuring their activities are conducted in accordance with  Reasonable policies and procedures designed  To detect, prevent and mitigate the risk of ID theft.
PROGRAM ADMINISTRATION ELEMENTS SERVICE PROVIDER OVERSIGHT One method - Require written agreement from service provider that provider will detect and respond to ID theft red flags appropriately Service providers are not required to apply each client’s particular program Creditor retains accountability and cannot reduce or eliminate responsibility by outsourcing tasks
CONSEQUENCES OF NON-COMPLIANCE Customer loses confidence Take business elsewhere No private right of action for 16 CFR 681.2 State Attorneys General Can sue - Usually highly publicized and damaging to business even if creditor wins Federal and state regulators can Assess money damages-$2,500 per violation  Issue cease and desist orders Take other legal actions
ENFORCEMENT OF RULES Administrative enforcement under 15 USC 1681s (Section 621 of the FCRA) State Attorneys General No criminal penalties
Advice Don’t Panic! Start with what policies you already have  Ask yourself “what if” It’s meant to be a risk-based, flexible rule Think in terms of what is reasonable, practical and works for you in your business.
Where to go for templates Remember that templates are just starting points-no one-size-fits-all! http://www.ftc.gov/bcp/edu/microsites/redflagsrule/diy-template.shtm Click on the “get started” at the bottom middle of the page FTC anticipates that every business will have at least one red flag because they wrote it in for us. “ Notice from customer, a victim of ID theft, law enforcement agency or someone else that an account has been opened or used fraudulently”
Where to go for templates Remember that templates are just starting points-no one-size-fits-all! Business Credit Magazine, March 2009 Article on page 62 Model plan on page 65 to 68
Questions? [email_address] www.ftc.gov Thank you!

More Related Content

PPT
Fair and Accurate Credit Transactions Act of 2003
PDF
FACTA Red Flag Ruling - Frost Report
PDF
KYC AML regulation in EU
PPT
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib
PPT
Business Intelligence For Anti-Money Laundering
PPTX
KYC - How long can you go?
PPT
Business Intelligence For Aml
PDF
Suspicious Activities Reports, Perceptions and Reality in AML Investigations
Fair and Accurate Credit Transactions Act of 2003
FACTA Red Flag Ruling - Frost Report
KYC AML regulation in EU
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib
Business Intelligence For Anti-Money Laundering
KYC - How long can you go?
Business Intelligence For Aml
Suspicious Activities Reports, Perceptions and Reality in AML Investigations

What's hot (17)

PPTX
Risk based approach
PPT
goAML
PPTX
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
PDF
Risk Based Approach Bachir El Nakib July 2009 [Compatibility Mode]
PPT
Liberty Data Solutions, Know your Client
PPTX
Introduction to Careers in Anti-Money Laundering (AML)
PPT
Know your customer guidelines
PDF
In my honest Opinion: a frank look at client onboarding procedures
PDF
StubbsGazette AML/CFT EBook for Credit Unions
PPTX
Doc procurement anti fraud and anti-corruption
PDF
How to Use a Cyber Loss Model within a Retail Bank
PPTX
Forensic Accounting Topics and Issues
PPT
Identity Theft Prevention
PDF
Procurement Fraud
PDF
How To: Prevent Loan Application Fraud
PDF
Aml red flags for broker
Risk based approach
goAML
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Risk Based Approach Bachir El Nakib July 2009 [Compatibility Mode]
Liberty Data Solutions, Know your Client
Introduction to Careers in Anti-Money Laundering (AML)
Know your customer guidelines
In my honest Opinion: a frank look at client onboarding procedures
StubbsGazette AML/CFT EBook for Credit Unions
Doc procurement anti fraud and anti-corruption
How to Use a Cyber Loss Model within a Retail Bank
Forensic Accounting Topics and Issues
Identity Theft Prevention
Procurement Fraud
How To: Prevent Loan Application Fraud
Aml red flags for broker
Ad

Similar to FACTA Red Flags 2010 (20)

PPT
FACTA Red Flags Rule Compliance
PDF
Red Storm Rising
PPT
IDT 2015
PPT
Employer 0409
PPTX
The Red Flags Rule
PDF
idBUSINESS Red Flag Rules Overview
PDF
Identity Theft Ebook
PPS
Adrs Flip Chart From Ppl
PPS
Adrs Flip Chart From Ppl
PPS
Affirmative Defense Response System (ADRS)
PDF
Kroll. Red Flags Applicability. Think Again.
PPT
Creating Your Red Flags Rule Playbook
PDF
Red Flags Rules Handout
PDF
6 11 Red Flags Fa Qs
PPS
Adrs Presentation March 2008
PPT
Adrs Flip Chart With Red Flags Rev4
PDF
idBUSINESS Red Flag Rules For Dentists
PPT
Affirmative Defense Reponse System
PDF
Red Flag Rules Compliant? Maybe Not...!
PPT
Identity Theft Red Flags Rule for Business
FACTA Red Flags Rule Compliance
Red Storm Rising
IDT 2015
Employer 0409
The Red Flags Rule
idBUSINESS Red Flag Rules Overview
Identity Theft Ebook
Adrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
Affirmative Defense Response System (ADRS)
Kroll. Red Flags Applicability. Think Again.
Creating Your Red Flags Rule Playbook
Red Flags Rules Handout
6 11 Red Flags Fa Qs
Adrs Presentation March 2008
Adrs Flip Chart With Red Flags Rev4
idBUSINESS Red Flag Rules For Dentists
Affirmative Defense Reponse System
Red Flag Rules Compliant? Maybe Not...!
Identity Theft Red Flags Rule for Business
Ad

More from Credit Management Association (20)

PDF
AnscersX Multibureau Business Trade Credit Report presentation
PDF
Business credit for business owners - Credit Management Association
PPTX
Sales Tax Exemption Certificates
PPT
Cross Cultural Communications
PPT
Manage Your Customer's Payment With Speed, Accuracy, Reliability and Savings
PPT
Securing Your Transactions in Latin America and Mexico
PPT
Financial Statement Analysis - Reading the Numbers Correctly
PPT
Efficiency Models and Methods to Improve Credit Department Performance
PPT
Dialing For Dollars
PPT
Analyzing Liquidity Using the Cash Conversion Cycle
PPT
Credit Negotiating, 2014 CreditScape, Western Region Credit Conference Semina...
PPT
Saying Yes to the Sale With Limited Information
PDF
Investigating your Debtor in Mexico, 2014 CreditScape, Western Region Credit ...
PPTX
Coloring your collections, 2014 CreditScape, Western Region Credit Conference...
PPTX
Collections Best Practices seminar, 2014 CreditScape, Western Region Credit C...
PPT
Antitrust: 2014 CreditScape, Western Region Credit Conference Seminar Slide Deck
PPTX
Reliance Credit Network
PPT
Internet Credit (skip tracing) Tools
PDF
Social%20 media wrcc
PPT
Mak to sue or not to sue - nacm presentation-2
AnscersX Multibureau Business Trade Credit Report presentation
Business credit for business owners - Credit Management Association
Sales Tax Exemption Certificates
Cross Cultural Communications
Manage Your Customer's Payment With Speed, Accuracy, Reliability and Savings
Securing Your Transactions in Latin America and Mexico
Financial Statement Analysis - Reading the Numbers Correctly
Efficiency Models and Methods to Improve Credit Department Performance
Dialing For Dollars
Analyzing Liquidity Using the Cash Conversion Cycle
Credit Negotiating, 2014 CreditScape, Western Region Credit Conference Semina...
Saying Yes to the Sale With Limited Information
Investigating your Debtor in Mexico, 2014 CreditScape, Western Region Credit ...
Coloring your collections, 2014 CreditScape, Western Region Credit Conference...
Collections Best Practices seminar, 2014 CreditScape, Western Region Credit C...
Antitrust: 2014 CreditScape, Western Region Credit Conference Seminar Slide Deck
Reliance Credit Network
Internet Credit (skip tracing) Tools
Social%20 media wrcc
Mak to sue or not to sue - nacm presentation-2

Recently uploaded (20)

PDF
Vinod Bhatt - Most Inspiring Supply Chain Leader in India 2025.pdf
PDF
Business Communication for MBA Students.
DOCX
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
PDF
Communication Tactics in Legal Contexts: Historical Case Studies (www.kiu.ac...
PPTX
IMM.pptx marketing communication givguhfh thfyu
PPTX
Chapter 2 strategic Presentation (6).pptx
PDF
533158074-Saudi-Arabia-Companies-List-Contact.pdf
PDF
Tortilla Mexican Grill 发射点犯得上发射点发生发射点犯得上发生
PPTX
33ABJFA6556B1ZP researhchzfrsdfasdfsadzd
DOCX
Center Enamel A Strategic Partner for the Modernization of Georgia's Chemical...
DOCX
Handbook of entrepreneurship- Chapter 7- Types of business organisations
PPTX
2 - Self & Personality 587689213yiuedhwejbmansbeakjrk
PPTX
IMM marketing mix of four ps give fjcb jjb
PDF
Value-based IP Management at Siemens: A Cross-Divisional Analysis
PPTX
CTG - Business Update 2Q2025 & 6M2025.pptx
DOCX
Hand book of Entrepreneurship 4 Chapters.docx
PPTX
chapter 2 entrepreneurship full lecture ppt
PPTX
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
PDF
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
PDF
Kishore Vora - Best CFO in India to watch in 2025.pdf
Vinod Bhatt - Most Inspiring Supply Chain Leader in India 2025.pdf
Business Communication for MBA Students.
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
Communication Tactics in Legal Contexts: Historical Case Studies (www.kiu.ac...
IMM.pptx marketing communication givguhfh thfyu
Chapter 2 strategic Presentation (6).pptx
533158074-Saudi-Arabia-Companies-List-Contact.pdf
Tortilla Mexican Grill 发射点犯得上发射点发生发射点犯得上发生
33ABJFA6556B1ZP researhchzfrsdfasdfsadzd
Center Enamel A Strategic Partner for the Modernization of Georgia's Chemical...
Handbook of entrepreneurship- Chapter 7- Types of business organisations
2 - Self & Personality 587689213yiuedhwejbmansbeakjrk
IMM marketing mix of four ps give fjcb jjb
Value-based IP Management at Siemens: A Cross-Divisional Analysis
CTG - Business Update 2Q2025 & 6M2025.pptx
Hand book of Entrepreneurship 4 Chapters.docx
chapter 2 entrepreneurship full lecture ppt
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
Kishore Vora - Best CFO in India to watch in 2025.pdf

FACTA Red Flags 2010

  • 1. Fair and Accurate Credit Transactions Act of 2003 Red Flag Provisions Brenda Terreault, Esq. NACM Oregon January 14, 2010
  • 2. SO WHAT IS THE RED FLAGS RULE?
  • 3. BACKGROUND Joint Rulemaking Final rules published Nov 9, 2007 Compliance required Nov 1, 2008, but enforcement forbearance for the Red Flag Rules until June 1, 2010, for entities under FTC jurisdiction.
  • 4. Red Flag Provisions RULES: 72 Fed. Reg. 63718 (November 9, 2007) www.ftc.gov/os/fedreg/2007/november/071109redflags.pdf (FTC Rules p.63771-63773, Guidelines p. 63773-63774, Supplement p. 63774) FACT Act section 114 FCRA section 615 (e) 16 CFR section 681.2 http://www.ftc.gov/bcp/edu/microsites/redflagsrule/get-started.shtm
  • 5. What is a Red Flag? A “Red Flag” is a pattern, practice, or specific activity that could indicate identity theft.
  • 6. STRUCTURE OF THE RED FLAGS RULE Risk-based Rule Guidelines (Appendix A) Supplement A - 26 examples of red flags located within the link: www.ftc.gov/os/fedreg/2007/november/071109redflags.pdf
  • 7. PURPOSE OF THE RED FLAGS RULE To ensure that your business or organization is on the lookout for the signs that a crook is using someone else’s information, typically to get your products and services with no intention of paying. Not just another Data Security regulation
  • 8. WHO’S COVERED BY THE RED FLAGS RULE?
  • 9. WHO’S COVERED? Financial Institutions Creditors
  • 10. WHO’S COVERED? From the FCRA, a “financial institution” is: A state or national bank A state or federal savings and loan association A mutual savings bank A state or federal credit union, Or any other person that directly or indirectly holds a transaction account belonging to a consumer.
  • 11. DEFINITION OF “TRANSACTION ACCOUNT” From Federal Reserve Act, Section 19(b) – an Account that allows withdrawals by negotiable or transferable instrument, payment orders of withdrawal, telephone transfers, or similar items to make payments or transfers to third persons or others.
  • 12. FTC Definition of “Creditors” H aving "the same meaning as in 15 U.S.C. 1681a(r)(5), and includes lenders such as banks, finance companies, automobile dealers, mortgage brokers, utility companies, and telecommunications companies."  
  • 13. FTC Definition of “Creditors” 15 U.S.C. 1681a(r)(5) Having "the same meaning as in Section 702 of  the Equal Credit Opportunity Act."
  • 14. FTC Definition of “Creditors” Section 702(e) of  the Equal Credit Opportunity Act – 15 U.S.C. 1691a(e) “ The term "creditor" means any person who regularly extends, renews, or continues credit; any person who regularly arranges for the extension, renewal, or continuation of credit; or any assignee of an original creditor who participates in the decision to extend, renew, or continue credit.”
  • 15. FTC Definition of “Creditors” Any person who regularly extends, renews, or continues credit; any person who regularly arranges for the extension, renewal, or continuation of credit; or any assignee of an original creditor who participates in the decision to extend, renew, or continue credit and includes lenders such as banks, finance companies, automobile dealers, mortgage brokers, utility companies, and telecommunications companies.
  • 16. RECAP - WHO’S COVERED? Any person who regularly extends, renews or continues credit Any person who regularly arranges for extension, renewal or continuation of credit Any assignee of an original creditor and who participates in the decision to extend, renew or continue credit.
  • 17. WHO’S NOT COVERED? New stuff Businesses at low risk of ID theft Know all their customers personally Provide services at customers’ homes Previous experience with ID theft Industry where ID theft is common Attorney firms and Accountant firms Court opinion Amendment
  • 18. IF WE’RE COVERED BY THE RED FLAGS RULE, WHAT DO WE NEED TO DO?
  • 19. WHAT DO WE NEED TO DO? Conduct a periodic risk assessment to determine if “covered accounts” exist If covered accounts exist: develop, implement and administer a written Identity Theft Prevention Program to detect, prevent and mitigate identity theft in connections with: The opening of a covered account or Transactions in any existing covered account
  • 20. WHAT IS AN “ACCOUNT”? An “account” is: A continuing relationship established by a person with a financial institution or creditor to obtain a product or service for personal, household or business purpose.
  • 21. WHAT IS A “COVERED ACCOUNT”? A “covered account” includes: A consumer account Designed to permit multiple payments or transactions Offered or maintained by creditor Primarily for personal, household or family purposes. (Regulation subsection 3i – consumer accounts)
  • 22. WHAT IS A “COVERED ACCOUNT”? A “covered account” includes: Any other accounts that based on a reasonably foreseeable risk of ID theft creditor has designated as a covered account (Regulation subsection 3ii – catch-all regulation)
  • 23. Risk Assessment of Covered Accounts Creditor must conduct initial risk assessment and consider, among other things : Methods used to open accounts Methods to access accounts Previous experiences with ID theft All creditors must periodically reassess, even if no initial covered accounts, to consider changes in: Account offerings Regulatory changes and Changes in methods and patterns of ID theft
  • 24. HOW DO WE DESIGN AN IDENTITY THEFT PREVENTION PROGRAM?
  • 25. A Brief Outline of What’s Expected Incorporating existing policies and procedures Identify relevant red flags Set up procedures to detect red flags Respond appropriately to red flags Update your program periodically Administer your program Consider other legal requirements
  • 26. DESIGNING AN IDENTITY THEFT PREVENTION PROGRAM STEP BY STEP
  • 27. DESIGNING YOUR PROGRAM The program must be appropriate to the size and complexity of the financial institution or creditor and the nature and scope of activities The rules require you to consider the guidelines and incorporate appropriate guidelines into your program.
  • 28. Things to Remember Must be in writing No one-size-fits-all formula Tailored to creditor’s size and complexity Tailored to nature and scope of business activities Based on results of risk assessments
  • 29. Things to Remember Minimally contain reasonable policies/procedures to: Identify what “Red Flags” might be for covered accounts Detect “Red Flags” when they occur Respond to mitigate and prevent ID theft Update program periodically .
  • 30. DESIGNING YOUR PROGRAM Develop reasonable processes and procedures: Step #1 – Identify relevant red flags likely in your business that indicates a crook is using someone else’s information to get your products or services with no intention of paying
  • 31. Incorporating existing policies and procedures Evaluate your existing anti-fraud programs Evaluate your information security programs Evaluate your credit policy
  • 32. Identify relevant red flags Identify red flags according to risk posed to creditor’s business Types of covered accounts offered or maintained Methods provided to open those accounts Methods provided to access those accounts Previous experience with ID theft
  • 33. Identify relevant red flags Five categories of red flags: Alerts, notifications or other warnings received from credit reporting agencies or service providers Suspicious documents Suspicious personal identifying information Unusual use of or other suspicious activity related to a covered account Notice from customers, victims of identity theft or law enforcement authorities
  • 34. EXAMPLES OF RED FLAGS (SUPP. A) Warning from credit reporting agencies Inconsistent with external information sources Suspicious documents Documents provided for identification appear to be altered Suspicious personal information Fraud or active duty alert included in consumer report
  • 35. EXAMPLES OF RED FLAGS (SUPP. A) Unusual use of account Account used in a way inconsistent with historical patterns of activity Notice from customers Customer notifies you about identity theft
  • 36. DESIGNING YOUR PROGRAM Develop reasonable processes and procedures: Step #2 – Detect red flags – Set up procedures to detect them in your day-to-day operations
  • 37. Detecting relevant red flags Two specific times for detecting red flags When Creditor obtains and verifies identifying information on customer who is opening the account, and When Creditor authenticates and verifies customer identity when customer makes a change on the account and monitors account transactions afterwards. There may be other times when a red flag may be identified – every industry is different
  • 38. Detecting relevant red flags Verify identity Authenticate customers Monitor transactions Verify validity of address changes
  • 39. DESIGNING YOUR PROGRAM Develop reasonable processes and procedures: Step #3- Prevent and mitigate identity theft. When you spot a red flag that you’ve identified, respond appropriately to prevent and mitigate harm
  • 40. Responding to relevant red flags Reasonable policies and procedures Appropriate response Responses must be commensurate with risk posed Aggravating factors, early warning signs Different account types may have different red flags associated with it.
  • 41. Respond appropriately to red flags Monitor accounts Contact customers Change passwords Close and reopen account Refuse to open account Don’t sell the account or collect on it against the identify theft victim Notify law enforcement In some cases, no response may be warranted
  • 42. DESIGNING YOUR PROGRAM Develop reasonable processes and procedures: Step #4 – Update your program. The risks of identity theft can change rapidly, so keep your plan current and educate your staff.
  • 43. Updating for new red flags Sources of Red flags: Episodes of identity theft that have already happened Changes in how crooks are committing identity theft Applicable supervisory guidance
  • 44. Updating for new red flags Periodically review and evaluate red flags previously incorporated to verify each remains relevant to operation NOTE: Neither regulations, nor guidelines, define the term “periodically” or provide timeframes for conducting updates. Objective: to be responsive to changing risks
  • 45. Updating for new red flags Periodic updating required, should consider: Experiences with ID theft Changes in ID theft methods Changes in ID theft detection, prevention and mitigation methods Changes in creditor’s business – growth, mergers, and other business arrangements Changes in types of account creditor offers or maintains
  • 46. WHAT ABOUT THE ADDRESS DISCREPANCY RULE?
  • 47. ADDRESS DISCREPANCY RULE FACT Act Section 315 FCRA Section 605(h) 16 CFR section 681.1
  • 48. WHO’S COVERED? Users of credit reports Term to know - “Nationwide Credit Reporting Agency” (NCRA) as defined in FCRA
  • 49. CONFIRMING ADDRESS Regulatory requirement: The user must have reasonable policies and procedures to furnish a confirmed address for the consumer to the NCRA when the user: Can form a reasonable belief that the report relates to the consumer Establishes a continuing relationship with the consumer Regularly furnishes information to the NCRA
  • 50. NOTICE OF ADDRESS DISCREPANCY Notice of address discrepancy comes from a nationwide credit reporting agency and notifies the user of a substantial difference between: Address the user provided and Address in the credit reporting company’s files
  • 51. ENSURING ACCURACY Regulatory requirement: The user must have reasonable policies and procedures to establish a reasonable belief that the credit report relates to the consumer about whom the report was requested
  • 52. REASONABLE BELIEF Establishing a “reasonable belief” Examples: Compare information in the credit report to information that user: Maintains in its records Gets from third party sources Gets to comply with CIP rules Verify information in the credit report with the consumer
  • 53. PROGRAM ADMINISTRATION OVERVIEW Red flag rule’s requirements for program administration consists of five elements: Board approval High-level oversight Reporting Staff training Service Provider oversight, if any service provider is hired
  • 54. PROGRAM ADMINISTRATION ELEMENTS BOARD APPROVAL Initial written program must be approved by Board of Directors or a committee of the Board Once program is established, the Board may designate a senior management employee to oversee: Development, implementation and administration of the program Training of appropriate staff’ Arrangements with Service Providers
  • 55. PROGRAM ADMINISTRATION ELEMENTS REPORTING At least once a year, creditor staff must report on effectiveness of program to the Board, Committee or senior management employee. Report should cover material aspects of Program, or at minimum Effectiveness of the program policies and procedures Service Provider arrangements if any Identity theft incidents and responses Recommendations for changes in program
  • 56. PROGRAM ADMINISTRATION ELEMENTS TRAINING Train relevant staff as necessary to Implement program effectively Identify and respond appropriately NOTE: There is no prescription that ALL staff be trained. Deciding which staff members need training is up to creditor. Consider whether job duties may allow employee to identify, detect, prevent and mitigate ID theft risk
  • 57. PROGRAM ADMINISTRATION ELEMENTS SERVICE PROVIDER OVERSIGHT Who is a Service Provider? Ensuring their activities are conducted in accordance with Reasonable policies and procedures designed To detect, prevent and mitigate the risk of ID theft.
  • 58. PROGRAM ADMINISTRATION ELEMENTS SERVICE PROVIDER OVERSIGHT One method - Require written agreement from service provider that provider will detect and respond to ID theft red flags appropriately Service providers are not required to apply each client’s particular program Creditor retains accountability and cannot reduce or eliminate responsibility by outsourcing tasks
  • 59. CONSEQUENCES OF NON-COMPLIANCE Customer loses confidence Take business elsewhere No private right of action for 16 CFR 681.2 State Attorneys General Can sue - Usually highly publicized and damaging to business even if creditor wins Federal and state regulators can Assess money damages-$2,500 per violation Issue cease and desist orders Take other legal actions
  • 60. ENFORCEMENT OF RULES Administrative enforcement under 15 USC 1681s (Section 621 of the FCRA) State Attorneys General No criminal penalties
  • 61. Advice Don’t Panic! Start with what policies you already have Ask yourself “what if” It’s meant to be a risk-based, flexible rule Think in terms of what is reasonable, practical and works for you in your business.
  • 62. Where to go for templates Remember that templates are just starting points-no one-size-fits-all! http://www.ftc.gov/bcp/edu/microsites/redflagsrule/diy-template.shtm Click on the “get started” at the bottom middle of the page FTC anticipates that every business will have at least one red flag because they wrote it in for us. “ Notice from customer, a victim of ID theft, law enforcement agency or someone else that an account has been opened or used fraudulently”
  • 63. Where to go for templates Remember that templates are just starting points-no one-size-fits-all! Business Credit Magazine, March 2009 Article on page 62 Model plan on page 65 to 68