0
Welcome!


Platform Overview
   May 6, 2009
Our goals today
Our goals today
 ‣ To give you the WHAT…
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
   ‣ demo the idBUSINESS Red ...
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
   ‣ demo the idBUSINESS Red ...
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
   ‣ demo the idBUSINESS Red ...
Frame of reference


   Fewer than 30% of covered entities were
    compliant with the law on May 1, 2009



  An estimate...
What this means
What this means
‣ Lack of awareness and understanding
  ‣ Does not mean that FTC won’t be enforcing
What this means
‣ Lack of awareness and understanding
  ‣ Does not mean that FTC won’t be enforcing
‣ Early birds will get...
The facts

                                                30%
     40%

                     60%
                        ...
The facts
The average breach and its impact on customer confidence is growing.

             58% of customers said they lo...
The Red Flag Rules
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:
  ‣ you ho...
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:
  ‣ you ho...
Red Flag Compliance
Red Flag Compliance
1. A Written Information Security Program
Red Flag Compliance
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated wit...
Red Flag Compliance
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated wit...
Red Flag Compliance
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated wit...
Red Flag Compliance
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated wit...
Red Flag Compliance
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated wit...
Red Flag Compliance
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated wit...
“What happens
if I don’t comply?”
• Noncompliance carries several penalties
  – Civil Liability
  – Class-Action Lawsuits
...
The solution
‣ The idBUSINESS Red Flag Compliance Module
  ‣ Built on real-world forensic fieldwork
  ‣ Includes tools & b...
The Red Flag
Compliance Module




‣ Secure online interface
The Red Flag
Compliance Module




‣ Learning tools available as text or video webinar
The Red Flag
Compliance Module




‣ Risk Assessment tool provides ranking of your
   company in 12 key focus areas
The Red Flag
Compliance Module




‣ Customizable checklist of 26 Red Flags to meet
   requirements of FACT Act
The Red Flag
Compliance Module




‣ Employee training automated & easy, integrates
   automatically with your compliance ...
The Red Flag
Compliance Module




‣ Ability to evaluate supplier compliance practices using
The Red Flag
Compliance Module



‣ Access individual identity recovery protection using
   FraudStop and Restore from ID ...
So I’m compliant...
  ‣ NOW WHAT?
    ‣ Don’t let it sit on a shelf
    ‣ Talk to your employees
    ‣ Talk to your custom...
Thank you!
 ‣ Any questions?
Upcoming SlideShare
Loading in...5
×

idBUSINESS Red Flag Rules Overview

511

Published on

In this presentation, we walk through the WHAT - what are the FTC's Red Flag Rules; the HOW - how to become compliant using the idBUSINESS Red Flag Compliance Module; and most importantly, the WHY - why is this a good idea for my business?

Published in: Business, Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
511
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
10
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Transcript of "idBUSINESS Red Flag Rules Overview"

  1. 1. Welcome! Platform Overview May 6, 2009
  2. 2. Our goals today
  3. 3. Our goals today ‣ To give you the WHAT…
  4. 4. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules
  5. 5. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW…
  6. 6. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… ‣ demo the idBUSINESS Red Flag Compliance Module
  7. 7. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… ‣ demo the idBUSINESS Red Flag Compliance Module ‣ but also give you the WHY
  8. 8. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… ‣ demo the idBUSINESS Red Flag Compliance Module ‣ but also give you the WHY ‣ Why information security should be a part of your business
  9. 9. Frame of reference Fewer than 30% of covered entities were compliant with the law on May 1, 2009 An estimated 11 million US businesses are covered entities
  10. 10. What this means
  11. 11. What this means ‣ Lack of awareness and understanding ‣ Does not mean that FTC won’t be enforcing
  12. 12. What this means ‣ Lack of awareness and understanding ‣ Does not mean that FTC won’t be enforcing ‣ Early birds will get the worm ‣ Opportunity for competitive advantage
  13. 13. The facts 30% 40% 60% 70% Business has suffered breach Thief is employee or knows employee Business has yet to incur a breach Thief is unknown • Since 2/15/05, over 251,000,000 Americans have had identities or other personal information compromised
  14. 14. The facts The average breach and its impact on customer confidence is growing. 58% of customers said they lost confidence in a business following that business’ breach. 31% immediately severed their relationship with the business upon notification of the breach. Source: Ponemon Institute, 2008.
  15. 15. The Red Flag Rules
  16. 16. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act
  17. 17. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if:
  18. 18. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: ‣ you hold “covered accounts”
  19. 19. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: ‣ you hold “covered accounts” ‣ your customer records present a “reasonably foreseeable risk of identity theft”
  20. 20. Red Flag Compliance
  21. 21. Red Flag Compliance 1. A Written Information Security Program
  22. 22. Red Flag Compliance 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft
  23. 23. Red Flag Compliance 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management
  24. 24. Red Flag Compliance 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis
  25. 25. Red Flag Compliance 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees
  26. 26. Red Flag Compliance 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 6. Must contain an incident response capability
  27. 27. Red Flag Compliance 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 6. Must contain an incident response capability 7. Must ensure that vendors and suppliers are also compliant
  28. 28. “What happens if I don’t comply?” • Noncompliance carries several penalties – Civil Liability – Class-Action Lawsuits – Federal Fines – State Fines
  29. 29. The solution ‣ The idBUSINESS Red Flag Compliance Module ‣ Built on real-world forensic fieldwork ‣ Includes tools & benefits that actively involve employees in your compliance efforts ‣ Transitions information security from a compliance issue into a competitive advantage
  30. 30. The Red Flag Compliance Module ‣ Secure online interface
  31. 31. The Red Flag Compliance Module ‣ Learning tools available as text or video webinar
  32. 32. The Red Flag Compliance Module ‣ Risk Assessment tool provides ranking of your company in 12 key focus areas
  33. 33. The Red Flag Compliance Module ‣ Customizable checklist of 26 Red Flags to meet requirements of FACT Act
  34. 34. The Red Flag Compliance Module ‣ Employee training automated & easy, integrates automatically with your compliance report
  35. 35. The Red Flag Compliance Module ‣ Ability to evaluate supplier compliance practices using
  36. 36. The Red Flag Compliance Module ‣ Access individual identity recovery protection using FraudStop and Restore from ID Experts ‣ Available as employee benefit, cafeteria-style add-on, customer blanket, or new revenue stream ‣ In the event of a breach, one-click access to best-in- breed data breach services and forensic services
  37. 37. So I’m compliant... ‣ NOW WHAT? ‣ Don’t let it sit on a shelf ‣ Talk to your employees ‣ Talk to your customers ‣ Use your policy as a business-building tool
  38. 38. Thank you! ‣ Any questions?
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×