Businesses now required to monitor warning signs for identity theft

Business owners take heed. A November 1 update to FACTA (the Fair and Accurate Credit Transactions Act of 2003) requires businesses to implement a written policy that monitors the business for "Red Flag" warning signs for identity theft. The policy must also specify how the business will respond to the crime if discovered.

The Red Flag rules have been on the books for years, and lawyers, health care practices, and small business owners have been fighting the changes to the law. In fact, the new deadline is only the latest deadline for the rule that was first introduced in April 2008. The initial deadline was set for November 1st, 2008 and subsequently moved to April 1st, 2009 and then finally November 1st, 2009.
 
The Red Flag Rule covers "financial institutions" and "creditors." It is this second group that almost every business falls into. Any business that doesn't collect payment in full at time of service is considered a "creditor." This includes doctors, lawyers, accountants, designers, phone companies, or anyone else who offers payment terms.
 
"Most businesses understand that they need to protect information through security and paper shredding programs," says Steven Hastert, president of Shred Nations, an expert in identity protection issues. "But even though this new law has been posted for more than a year, few businesses are aware of the scope of these changes."
 
The American Bar Association (ABA) and American Medical Association (AMA) have been vocal critics about being covered by the rule. They have a last ditch effort with H.R 3763 to prevent being covered. The bill has passed the House on October 26th and is headed for the Senate. This proposed legislation exempts businesses under 20 employees from the changes.
 
The Red Flag Rule requires businesses to install four components:
 
1)   Reasonable policies and procedures must be in place to identify suspicious patterns or practices in day-to-day operations. This activity indicates possible identity theft.
 
2)   The program should also detect identified red flags for the business. For example, obvious fake identification.
 
3)   The program should have procedures to take when a red flag is identified.
 
4)   There must also be having a system in place to re-evaluate the program as threats change.
 
These new requirements are just part of a good information security program. Hastert reminds businesses to remember the basic steps they need to take. These include locking file cabinets, not giving information over the phone and shredding everything with personal information on it.
 

You may like these other stories...

AgFeed agrees to pay $18 million to settle SEC accounting fraud caseMichael Rapoport of the Wall Street Journal reported on Monday that AgFeed Industries Inc. has agreed to pay $18 million to settle US Securities and...
Hertz and Icahn make peaceThere won’t be any nasty, protracted proxy battle between Hertz Global Holdings and activist investor Carl Icahn. The rental car chain agreed last Thursday to give Icahn – who has...
Following other recent high-profile hacking events, investigators discovered yesterday that hackers broke into the draft work paper files of several famous CPA firms. Revealing images of the scantily clad documents have been...

Already a member? log in here.

Upcoming CPE Webinars

Sep 18
In this course, Amber Setter will shine the light on different types of leadership behavior- an integral part of everyone's career.
Sep 24
In this jam-packed presentation Excel expert David Ringstrom, CPA will give you a crash-course in creating spreadsheet-based dashboards. A dashboard condenses large amounts of data into a compact space, yet enables the end user to easily drill down into details when warranted.
Sep 30
This webcast will include discussions of important issues in SSARS No. 19 and the current status of proposed changes by the Accounting and Review Services Committee in these statements.
Oct 23
Amber Setter will show the value of leadership assessments as tools for individual and organizational leadership development initiatives.