Translate

Friday, March 15, 2013

The Identity Theft Red Flags Rule

Now that many businesses have to abide by the identity theft red flags rule, it's a bit easier to fix identity theft problems

Most of us would agree that an ounce of prevention is worth a pound of cure, which is where the new identity theft "red flags rule" comes into play. These days, many businesses are required to inform you immediately if ID theft occurs during the implementation of their commerce.

That way, you can start working immediately on your identity theft fix, rather than finding out months or years later that someone's stolen your life.

Um, "These Days"?

No legally-mandated red flags rule existed before November 2009, when the Federal Trade Commission started enforcing their new identity theft regulations. 

Prior to that, most companies would immediately contact their clients if they knew or suspected that someone had tapped into their files and stolen information that could be used for identity theft. Some even took steps to help clients mitigate the effects of the potential ID theft.

But that was a corporate decision; it certainly wasn't required. It may surprise you to learn that before the implementation of the red flags rule, a company didn't have to inform you if someone might have stolen your personal information from them. Many did, but they didn't have to.

And What's This "Some" Businesses?

From the beginning, the new red flags rule applied only to businesses or organizations that handled accounts of one kind or another. So JC Penney would have to let you know if someone had tapped into their credit system and stolen your name and SSN, but your local bookstore or food market wouldn't.

Life became a bit easier for the identity thieves on December 31, 2010, when the FTC modified the red flags rule. Now only business and organizations that use consumer reports together with credit transactions, or who loan money, or provide information to credit reporting agencies, are required to comply.

Doctors, lawyers, and accountants are specifically exempt from compliance.

The Procedure

Here's how the FTC-mandated red flags program works:

First, the business must "Identify relevant patterns, practices, and specific forms of activity that are 'red flags' signaling possible identity theft." Second, they have to be able to detect those red flags when they occur.

The next step is to respond immediately, notify the affected customers, and help those customers mitigate the effects of the identity theft. Finally, the business is required to update their program regularly in order to detect new ID theft methods and trends.

It remains to be seen how well the new program will work, and whether further challenges will whittle down its utility. That said, half a loaf really is better than none when it comes to this kind of crime, so the identity theft red flags rule is a welcome breath of fresh air.


If you don't protect your Identity, someone will take it from you. -Birdy

No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)