Understand Red Flags Rule and covered account risks
Identify five Red Flag warning categories
Detect, respond, and mitigate identity theft risks
Manage suspicious activity during account opening, maintenance
Identify account takeover and deceased SSN schemes
Protect PII and prevent workspace data leaks
Identity theft is a costly crime, and as a frontline employee, you are the first line of defense. Whether setting up a patient file, checking in a customer, or processing payments, you protect customers’ financial lives.
The FTC’s Red Flags Rule requires businesses, especially creditors and financial institutions, to have a program to detect warning signs of fraud. Your company has the policy; your role is to execute it. The goal is prevention: stop fraud before it happens.
This training teaches you to recognize the five categories of Red Flags:
Alerts: Never override credit alerts like Active Duty Alerts or Credit Freezes.
Suspicious Documents: Spot tampered IDs or generic application forms by checking holograms and handwriting.
Suspicious PII: Watch for mail-drop addresses, reused phone numbers, or SSNs of deceased individuals.
Suspicious Activity: Dormant accounts suddenly making large transactions may indicate account takeover.
When you spot a Red Flag, follow the Detect, Respond, Mitigate process: verify the issue, stop the transaction if unresolved, and notify your manager or compliance officer. Vigilance protects customers, your company, and yourself.
This program is available with Spanish and French closed captions.
View this course in a classroom
environment, or assign it to your
team individually with testing
and recordkeeping capabilities.
Each title includes an embed
feature that allows users to add
videos to their existing training
platform or LMS.
View this course in a classroom
environment, or assign it to your
team individually with testing
and recordkeeping capabilities.
The two most dangerous times are when an account is being opened (when you don't know the customer) and during maintenance (when account takeovers can happen on existing accounts).
The required process is Detect, Respond, Mitigate. This means verifying the suspicious item, stopping the transaction, immediately notifying a manager, and then taking steps to mitigate (stop) the damage.
No. You should politely stop the transaction by telling the customer, "I’m sorry, but because of federal security regulations, I need some more information before we can proceed".
You must check if the SSN is associated with a deceased individual. If it is, you must not open the account, regardless of how alive the person in front of you looks.
One major risk is poor workspace security, such as leaving sensitive PII on a desk when stepping away, failing to lock your computer screen, or failing to shred paper documents when finished.
Disclaimer: The information provided on this page is subject to change and is for promotional and informational purposes only. Prior to acting on the information contained on this page, verify all information against the latest OSHA and applicable standards, regulations, and guidelines. Please also contact us with any questions you have related to this information. Under no circumstances will Atlantic Training, LLC be held responsible for direct, indirect, consequential, or incidental injuries or damages, or any damages or injuries whatsoever, whether resulting from contract, negligence, or other torts, related to the utilization of this information or the contents of this page. Atlantic Training retains the right to incorporate, remove, or adjust the contents on this page without prior notice.