COVID-19 (Coronavirus) fraud has been a growing concern to both government and business. New fraud tactics have targeted unemployment and COVID-19 economic relief funds. Find out the challenges of the U.S. War on COVID-19 fraud and how organizations can protect themselves.
COVID-19 (Coronavirus) fraud has been a growing concern to both government and business. New fraud tactics have targeted unemployment and COVID-19 economic relief funds. Find out the challenges of the U.S. War on COVID-19 fraud and how organizations can protect themselves.> Continue Reading
In early 2021, NACHA will be changing compliance standards for routing number and account verification used for internet payments (WEB debits). The current iteration of the WEB Debit Account Validation Rule (Article Two, Subsection 188.8.131.52) states that originators of WEB debit entries must use a “commercially reasonable fraudulent transaction detection system” to screen for fraud. Beginning March 19, 2021, the wording of the rule will update to require “account validation” to be part of fraud screening systems.> Continue Reading
In an earlier blog post, we covered the basics of the FTC’s Red Flags Rule – which requires certain types of businesses and financial organizations create an Identity Theft Prevention Program designed to detect the “red flags” (i.e. signs indicative of potential identity theft activity) unique to their day-to-day operations.
Since every business deals with different types of red flags and levels of risk, the FTC does not endorse or enforce any kind of one-size-fits-all compliance program. They have, however, provided guidelines describing the 4 core elements of ID theft prevention programs – which we’ll walk through in this blog post. (more…)> Continue Reading
The “Red Flags Rule” is a set of regulatory requirements outlined in the Fair and Accurate Credit Transactions Act (FACTA) and enforced by the Federal Trade Commission. Essentially, the rule requires businesses to protect themselves and their customers against identity theft by defining “red flags” (i.e. any suspicious account activity, informational inconsistencies, or other signals that may be indicative of identity theft), putting systems in place to detect and act on those red flags, and formally documenting that system. (more…)> Continue Reading