we are red flag rules instructors at gotplates.com


Red Flags Rule

From Wikipedia, the free encyclopedia
Not to be confused with Red Flag Act

The Red Flags Rule was created by the Federal Trade Commission (FTC), along with other government agencies such as the National Credit Union Administration (NCUA), to help preventidentity theft. The rule was passed in January 2008, and was to be in place by November 1, 2008. But due to push-backs by opposition, the FTC has delayed enforcement (five times); the current deadline is December 31, 2010.[1][dated info]



How the Red Flags Rule was Created

The Red Flags Rule was based on section 114 and 315 of the Fair and Accurate Credit Transactions Act of 2003.[2] FACTA was put in place to help Identity Theft Prevention and Credit History Restoration, Improvements in Use of and Consumer Access to Credit Information, Enhancing the Accuracy of Consumer Report Information, Limiting the Use and Sharing of Medical Information in the Financial System, Financial Literacy and Education Improvement, Protecting Employee Misconduct Investigations, and Relation to State Laws.[3]

Who This Rule Applies To

There are two different groups that this rule applies to: Financial Institutions and Creditors.[4] Financial institution is defined as a state or national bank, a state or federal savings and loan association, a mutual savings bank, a state or federal credit union, or any other entity that holds a “transaction account” belonging to a consumer.[5] FACTA’s definition of “creditor” applies to any entity that regularly extends or renews credit – or arranges for others to do so – and includes all entities that regularly permit deferred payments for goods or services [6]

Just because you don’t think you are a creditor, does not mean that the rule doesn’t apply. For example, law firms and accounting firms that receive payment after a service is completed are considered creditors. Another example is if you are a utility company. You provide the utilities and receive payment for your services rendered at the end of the month, rendering you a creditor.

There are many different companies that this rule applies to: this list includes, but is not limited to finance companies, automobile dealers, mortgage brokers, utility companies, telecommunications companies, medical practices, hospitals, and law firms; or any other company that performs a service, then receives payment once the work is complete.

What the Red Flags Rule States

The Red Flags Rule sets out how certain businesses and organizations must develop, implement, and administer their Identity Theft Prevention Programs. Your Program must include four basic elements, which together create a framework to address the threat of identity theft.[7][8]

The four basic elements to the program are:

1) Identify Relevant Red Flags

  • Identify the red flags of identity theft you’re likely to come across in your business

2) Detect Red Flags

  • Set up procedures to detect those red flags in your day-to-day operations

3) Prevent and Mitigate Identity Theft

  • If you spot the red flags you’ve identified, respond appropriately to prevent and mitigate the harm done

4) Update your Program

  • The risks of identity theft can change rapidly, so it’s important to keep your Program current and educate your staff

The Red Flags Rules provide all financial institutions and creditors the opportunity to design and implement a program that is appropriate to their size and complexity, as well as the nature of their operations.[5]

The red flags fall into five categories:

  • alerts, notifications, or warnings from a consumer reporting agency[5]
  • suspicious documents[5]
  • suspicious kk identifying information, such as a suspicious address[5]
  • unusual use of – or suspicious activity relating to – a covered account[5]
  • notices from customers, victims of identity theft, law enforcement authorities, or other businesses about possible identity theft in connection with covered accounts[5]

Ways that a business can comply

The FTC has a created a template for your business that can be populated to meet your companies needs. The template can be found on the FTC website. This template however is for small, very low risk businesses. There are also a number of other companies that will create a Program for your business to follow for a fee.

The Red Flag Rule as a cause of Identity Theft

As the Red Flag rule widely defines creditors, many businesses (such as utilities)[9] }are not required to collect personal information (such as SSN and Driver’s License Numbers) that they do not need and have no use for. This policy is precisely contrary to the FTC’s advice to consumers that they should disclose their social security number to others only when absolutely necessary.[10] This aspect of the Red Flag rule has the unintended consequences of increasing the number of business that hold consumers’ Social Security numbers thereby putting consumers at greater risk for identity theft through data theft.


  1. ^http://ftc.gov/opa/2010/05/redflags.shtm
  2. ^http://ftc.gov/opa/2007/10/redflag.shtm
  3. ^FAIR AND ACCURATE CREDIT TRANSACTIONS ACT OF 2003, Public, Law 108-159, 108th Congress, retrieved 2009-02-02
  4. ^http://www.ftc.gov/opa/2008/07/redflagsfyi.shtm
  5. abcdefghttp://www.ftc.gov/bcp/edu/pubs/business/alerts/alt050.shtm
  6. ^http://www.ftc.gov/opa/2009/04/redflagsrule.shtm
  7. ^http://www.ftc.gov/bcp/edu/pubs/business/idtheft/bus23.pdf
  8. ^ “Identity theft” means a fraud committed or attempted using the identifying information of another person without authority. See 16 C.F.R. § 603.2(a). “Identifying information” means “any name or number that may be used, alone or in conjunction with any other information, to identify a specific person, including any – (1) Name, Social Security number, date of birth, official State or government issued driver’s license or identification number, alien registration number, government passport number, employer or taxpayer identification number; (2) Unique biometric data, such as fingerprint, voice print, retina or iris image, or other unique physical representation; (3) Unique electronic identification number, address, or routing code; or (4) Telecommunication identifying information or access device (as defined in 18 U.S.C. 1029(e)).” See 16 C.F.R. § 603.2(b).
  9. ^“Start or Install Service”.
  10. ^ ftc.gov. “Deter Minimize Your Risk”.


Red Flag Rules Program

car dealer nurse