Red Flag Rule - Identity Theft Prevention

Federal Trade Commission (FTC) Red Flags Rule (RFR) at UNH

What Is RFR?  From the FTC website:

The Red Flags Rule requires many businesses and organizations to implement a written Identity Theft Prevention Program designed to detect the warning signs — or "red flags" — of identity theft in their day-to-day operations. By identifying red flags in advance, businesses will be better equipped to spot suspicious patterns that may arise -- and take steps to prevent a red flag from escalating into a costly episode of identity theft.

Does RFR Apply To Your Department At UNH?

To determine if your department must apply the Red Flags program, complete the  Identity Theft Prevention Program Self-Assessment Form   If your department falls within the scope of the program's requirements, you must be compliant.

Compliance Assistance:

ISS offers detailed program information in 'Red Flags Minimum Standards' as well as  awareness level training or custom workshops.  UNH departments can request the standards and/or training by  contacting ISS .

For More Information:

Custom Fields
  • Author: Rori Boyce
  • Department: Information Security Services
Attached Files (2)
Related Articles RSS Feed
Network Registration & Vulnerability Scans
Viewed 1461 times since Wed, Apr 29, 2015
Should you send or receive UNH personally identifiable information by email?
Viewed 1431 times since Thu, Jun 9, 2016
COPPA: Children’s Online Privacy Protection
Viewed 1699 times since Wed, Apr 29, 2015
How to Determine if Your Windows Device is Automatically Updating
Viewed 718 times since Thu, Nov 2, 2017
Storing Restricted and Sensitive Data in Box @ UNH
Viewed 1664 times since Thu, May 28, 2015
File-Sharing Policy
Viewed 973 times since Tue, Jun 2, 2015
Good Security Practices to Adopt at Work/School, and at Home
Viewed 864 times since Fri, Jul 14, 2017
Microsoft Security Essentials and Windows Defender Installation
Viewed 44233 times since Wed, Aug 12, 2015
Password Managers 101
Viewed 920 times since Mon, Oct 16, 2017
Encryption & Virus Protection
Viewed 3584 times since Wed, Apr 29, 2015
MENU