idbusiness red flag rules overview
DESCRIPTION
In this presentation, we walk through the WHAT - what are the FTC's Red Flag Rules; the HOW - how to become compliant using the idBUSINESS Red Flag Compliance Module; and most importantly, the WHY - why is this a good idea for my business?TRANSCRIPT
![Page 1: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/1.jpg)
Platform OverviewMay 6, 2009
Welcome!
![Page 2: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/2.jpg)
Our goals today
![Page 3: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/3.jpg)
Our goals today
‣ To give you the WHAT…
![Page 4: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/4.jpg)
Our goals today
‣ To give you the WHAT…
‣ The FTC’s Red Flag Rules
![Page 5: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/5.jpg)
Our goals today
‣ To give you the WHAT…
‣ The FTC’s Red Flag Rules
‣ ...review the HOW…
![Page 6: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/6.jpg)
Our goals today
‣ To give you the WHAT…
‣ The FTC’s Red Flag Rules
‣ ...review the HOW…
‣ demo the idBUSINESS Red Flag Compliance Module
![Page 7: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/7.jpg)
Our goals today
‣ To give you the WHAT…
‣ The FTC’s Red Flag Rules
‣ ...review the HOW…
‣ demo the idBUSINESS Red Flag Compliance Module
‣ but also give you the WHY
![Page 8: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/8.jpg)
Our goals today
‣ To give you the WHAT…
‣ The FTC’s Red Flag Rules
‣ ...review the HOW…
‣ demo the idBUSINESS Red Flag Compliance Module
‣ but also give you the WHY
‣ Why information security should be a part of your business
![Page 9: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/9.jpg)
Frame of reference
Fewer than 30% of covered entities were compliant with the law on May 1, 2009
An estimated 11 million US businesses are covered entities
![Page 10: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/10.jpg)
What this means
![Page 11: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/11.jpg)
What this means
‣ Lack of awareness and understanding
‣ Does not mean that FTC won’t be enforcing
![Page 12: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/12.jpg)
What this means
‣ Lack of awareness and understanding
‣ Does not mean that FTC won’t be enforcing
‣ Early birds will get the worm
‣ Opportunity for competitive advantage
![Page 13: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/13.jpg)
The facts
• Since 2/15/05, over 251,000,000 Americans have had identities or other personal information compromised
40%
60%
Business has suffered breachBusiness has yet to incur a breach
30%
70%
Thief is employee or knows employeeThief is unknown
![Page 14: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/14.jpg)
The facts
The average breach and its impact on customer confidence is growing.
Source: Ponemon Institute, 2008.
58% of customers said they lost confidence in a business following that business’ breach.
31% immediately severed their relationship with the business upon notification of the breach.
![Page 15: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/15.jpg)
The Red Flag Rules
![Page 16: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/16.jpg)
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act
![Page 17: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/17.jpg)
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act
‣ Applies to you if:
![Page 18: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/18.jpg)
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act
‣ Applies to you if:
‣ you hold “covered accounts”
![Page 19: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/19.jpg)
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act
‣ Applies to you if:
‣ you hold “covered accounts”
‣ your customer records present a “reasonably foreseeable risk of identity theft”
![Page 20: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/20.jpg)
Red Flag Compliance
![Page 21: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/21.jpg)
Red Flag Compliance
1. A Written Information Security Program
![Page 22: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/22.jpg)
Red Flag Compliance
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with identity theft
![Page 23: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/23.jpg)
Red Flag Compliance
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with identity theft
3. Must be administered by a board of directors or a member of senior management
![Page 24: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/24.jpg)
Red Flag Compliance
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with identity theft
3. Must be administered by a board of directors or a member of senior management
4. Must deliver compliance report on at least an annual basis
![Page 25: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/25.jpg)
Red Flag Compliance
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with identity theft
3. Must be administered by a board of directors or a member of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees
![Page 26: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/26.jpg)
Red Flag Compliance
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with identity theft
3. Must be administered by a board of directors or a member of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees
6. Must contain an incident response capability
![Page 27: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/27.jpg)
Red Flag Compliance
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with identity theft
3. Must be administered by a board of directors or a member of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees
6. Must contain an incident response capability7. Must ensure that vendors and suppliers are also compliant
![Page 28: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/28.jpg)
“What happens if I don’t comply?”• Noncompliance carries several penalties
– Civil Liability
– Class-Action Lawsuits
– Federal Fines
– State Fines
![Page 29: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/29.jpg)
The solution
‣ The idBUSINESS Red Flag Compliance Module‣ Built on real-world forensic fieldwork‣ Includes tools & benefits that actively involve
employees in your compliance efforts
‣ Transitions information security from a compliance issue into a competitive advantage
![Page 30: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/30.jpg)
The Red Flag Compliance Module
‣ Secure online interface
![Page 31: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/31.jpg)
The Red Flag Compliance Module
‣ Learning tools available as text or video webinar
![Page 32: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/32.jpg)
The Red Flag Compliance Module
‣ Risk Assessment tool provides ranking of your company in 12 key focus areas
![Page 33: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/33.jpg)
The Red Flag Compliance Module
‣ Customizable checklist of 26 Red Flags to meet requirements of FACT Act
![Page 34: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/34.jpg)
The Red Flag Compliance Module
‣ Employee training automated & easy, integrates automatically with your compliance report
![Page 35: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/35.jpg)
The Red Flag Compliance Module
‣ Ability to evaluate supplier compliance practices using
![Page 36: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/36.jpg)
The Red Flag Compliance Module
‣ Access individual identity recovery protection using FraudStop and Restore from ID Experts
‣ Available as employee benefit, cafeteria-style add-on, customer blanket, or new revenue stream
‣ In the event of a breach, one-click access to best-in-breed data breach services and forensic services
![Page 37: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/37.jpg)
So I’m compliant...
‣ NOW WHAT?
‣ Don’t let it sit on a shelf
‣ Talk to your employees
‣ Talk to your customers
‣ Use your policy as a business-building tool
![Page 38: idBUSINESS Red Flag Rules Overview](https://reader033.vdocuments.net/reader033/viewer/2022052908/55953c391a28abd4268b45f4/html5/thumbnails/38.jpg)
Thank you!
‣ Any questions?