Courses
Safety Training
HR Compliance
Training
Soft Skills
Training
OSHA Requirements
Training
Search By Industry
Training Shorts
Course Packages
About Us
Resources
Contact Us

Watch Course Preview

Red Flags Rule: Identity Theft Prevention for Employees Training Course

Watch Course Preview

Training teaches frontline employees to recognize identity theft red flags and take legally required actions to protect customer accounts.

12 minutes   |   SKU: AT236    |    Language(s): EN / ES / FR    |    Produced 2026

SKU:

AT236

Language(s):

EN / ES / FR

Updated:

2026

Length

12 minutes

Training Objectives

Understand Red Flags Rule and covered account risks
Identify five Red Flag warning categories
Detect, respond, and mitigate identity theft risks
Manage suspicious activity during account opening, maintenance
Identify account takeover and deceased SSN schemes
Protect PII and prevent workspace data leaks

Course Overview

Identity theft is a costly crime, and as a frontline employee, you are the first line of defense. Whether setting up a patient file, checking in a customer, or processing payments, you protect customers’ financial lives.

The FTC’s Red Flags Rule requires businesses, especially creditors and financial institutions, to have a program to detect warning signs of fraud. Your company has the policy; your role is to execute it. The goal is prevention: stop fraud before it happens.

This training teaches you to recognize the five categories of Red Flags:

Alerts: Never override credit alerts like Active Duty Alerts or Credit Freezes.

Suspicious Documents: Spot tampered IDs or generic application forms by checking holograms and handwriting.

Suspicious PII: Watch for mail-drop addresses, reused phone numbers, or SSNs of deceased individuals.

Suspicious Activity: Dormant accounts suddenly making large transactions may indicate account takeover.

When you spot a Red Flag, follow the Detect, Respond, Mitigate process: verify the issue, stop the transaction if unresolved, and notify your manager or compliance officer. Vigilance protects customers, your company, and yourself.

This program is available with Spanish and French closed captions.

Super Flexible Formatting

You’ll never find yourself scratching your head, trying to figure out why
you can’t get our videos to play or courses loaded into any platform.

Access courses
in our EHS Software.

View this course in a classroom
environment, or assign it to your
team individually with testing
and recordkeeping capabilities.

Load courses
into your platform.

Each title includes an embed
feature that allows users to add
videos to their existing training
platform or LMS.

Access courses
in our LMS.

View this course in a classroom
environment, or assign it to your
team individually with testing
and recordkeeping capabilities.

Not Ready to Sign Up?
No Worries. Here’s Some Helpful Info.

What are the two most dangerous times for identity theft in an account life cycle?


The two most dangerous times are when an account is being opened (when you don't know the customer) and during maintenance (when account takeovers can happen on existing accounts).


What is the required process when an employee spots a Red Flag?


The required process is Detect, Respond, Mitigate. This means verifying the suspicious item, stopping the transaction, immediately notifying a manager, and then taking steps to mitigate (stop) the damage.


If a customer refuses to show a second form of ID, am I required to accuse them of fraud?


No. You should politely stop the transaction by telling the customer, "I’m sorry, but because of federal security regulations, I need some more information before we can proceed".


What is one critical thing to look for when verifying a Social Security Number (SSN)?


You must check if the SSN is associated with a deceased individual. If it is, you must not open the account, regardless of how alive the person in front of you looks.


What is one of the biggest risks of data leakage in an employee's daily routine?


One major risk is poor workspace security, such as leaving sensitive PII on a desk when stepping away, failing to lock your computer screen, or failing to shred paper documents when finished.


Disclaimer: The information provided on this page is subject to change and is for promotional and informational purposes only. Prior to acting on the information contained on this page, verify all information against the latest OSHA and applicable standards, regulations, and guidelines. Please also contact us with any questions you have related to this information. Under no circumstances will Atlantic Training, LLC be held responsible for direct, indirect, consequential, or incidental injuries or damages, or any damages or injuries whatsoever, whether resulting from contract, negligence, or other torts, related to the utilization of this information or the contents of this page. Atlantic Training retains the right to incorporate, remove, or adjust the contents on this page without prior notice.