Red flag risk assement

Velvis

Well-Known Member
Reaction score
51
Location
Medfield, MA
Does anyone here know what's involved in a "red flag risk assessment"?
I have a nursing home that needs to have their IT infrastructure to be deemed secure because of new regulations going into effect Jan 1.

Anyone been involved in something like this before?
 
I'm not familiar with that specific term, but is it HIPAA related? I suspect it is, if that's the case, then I'd contact your states health department and ask for a HIPAA compliance specialist. Explain the situation and go from there.
 
The "Red Flag Risk Accessment" I've seen is from the FTC and is required for all banks.

Essentially it's an identify theft prevention plan. Identify ways identities can be stolen and implement ways to protect against them.
 
My under standing of RED FLAG, is to basically Figure out what data can be used in ID theft in your company & be able to track who has access to what data & monitor the places you determing it can be stolen.

From Wikipedia http://en.wikipedia.org/wiki/Red_Flags_Rule

The Red Flags Rule sets out how certain businesses and organizations must develop, implement, and administer their Identity Theft Prevention Programs. Your Program must include four basic elements, which together create a framework to address the threat of identity theft[7][8].

The four basic elements to the program are:

1) Identify Relevant Red Flags

Identify the red flags of identity theft you’re likely to come across in your business
2) Detect Red Flags

Set up procedures to detect those red flags in your day-to-day operations
3) Prevent and Mitigate Identity Theft

If you spot the red flags you’ve identified, respond appropriately to prevent and mitigate the harm done
4) Update your Program

The risks of identity theft can change rapidly, so it’s important to keep your Program current and educate your staff
The Red Flags Rules provide all financial institutions and creditors the opportunity to design and implement a program that is appropriate to their size and complexity, as well as the nature of their operations [5].

The red flags fall into five categories:

alerts, notifications, or warnings from a consumer reporting agency[5]
suspicious documents[5]
suspicious personally identifying information, such as a suspicious address[5]
unusual use of – or suspicious activity relating to – a covered account[5]
notices from customers, victims of identity theft, law enforcement authorities, or other businesses about possible identity theft in connection with covered accounts[5]
 
There are two separate, but related rules being mentioned here.

The "Information Safeguards" rules require affected entities to take specific steps to protect their customer's "Non-Public Information" from theft or loss.

The "Red Flags" rules require affected entities to take measures to prevent someone from using a false identity to obtain services or products.

So in an overly simplified nutshell, Information Safeguards is how you protect your customer's identities. Red Flags is how you keep a potential customer from using an identity that is not their own.

For the OP - Here's a guide direct from the FTC about their Red Flags requirements:
http://www.ftc.gov/bcp/edu/microsites/redflagsrule/index.shtml
 
Back
Top