In early 2021, NACHA will be changing compliance standards for routing number and account verification used for internet payments (WEB debits). The current iteration of the WEB Debit Account Validation Rule (Article Two, Subsection 2.5.17.4) states that originators of WEB debit entries must use a “commercially reasonable fraudulent transaction detection system” to screen for fraud. Beginning March 19, 2021, the wording of the rule will update to require “account validation” to be part of fraud screening systems.
(more…)
-
-
Mar 2020
30
Coronavirus OR covid-19 has impacted people and businesses all over the world. The rapid spread of COVID-19 has caused a shortage of protective masks for communities and healthcare workers. Thanks to innovative employees at the parent company of Lyons Commercial Data, Autoscribe is making protective masks using a 3D printer. (more…)
> Continue Reading -
In an earlier blog post, we covered the basics of the FTC’s Red Flags Rule – which requires certain types of businesses and financial organizations create an Identity Theft Prevention Program designed to detect the “red flags” (i.e. signs indicative of potential identity theft activity) unique to their day-to-day operations.
Since every business deals with different types of red flags and levels of risk, the FTC does not endorse or enforce any kind of one-size-fits-all compliance program. They have, however, provided guidelines describing the 4 core elements of ID theft prevention programs – which we’ll walk through in this blog post. (more…)
> Continue Reading -
> Continue ReadingThe “Red Flags Rule” is a set of regulatory requirements outlined in the Fair and Accurate Credit Transactions Act (FACTA) and enforced by the Federal Trade Commission. Essentially, the rule requires businesses to protect themselves and their customers against identity theft by defining “red flags” (i.e. any suspicious account activity, informational inconsistencies, or other signals that may be indicative of identity theft), putting systems in place to detect and act on those red flags, and formally documenting that system. (more…)