Certified Red Flag Specialist (CRFS) Program Overview & Curriculum
|
|
|
- Barrie Brooks
- 10 years ago
- Views:
Transcription
1 CRFS Overview The Certified Red Flag Specialist (CRFS) program is designed and administered by Identity Management Institute (IMI) to train employees, consultants and auditors of companies affected by rising identity theft risks and validate their identity theft prevention skills through an independent examination. Lost or shared information and personal data breach incidents present increasing identity theft risks to any company where the opportunity for fraud exists. More specifically, with rising personal data breach incidents, companies must have plans and knowledgeable staff to prevent identity theft regardless of how or where the personal information of potential victims was obtained. CRFS is the leading registered workplace identity theft prevention certification program which was developed by a global independent organization recognized for leadership in identity risk management education, training and certification. CRFS was developed based on the comprehensive identity theft prevention standards and guidelines proposed by the Red Flags Rule regulation of the United States. Why Become a CRFS CRFS professionals pick up where data security practices fail. There are many regulations, standards and guidelines for protecting consumers private information. However, when such efforts fail and millions of consumer information fall into the wrong hands because some records were retained or shared unnecessarily and remained unsecured, businesses must be on the lookout for warning signs which might indicate the fraudulent use of the stolen personal information. Page 1 of 7
2 A Certified Red Flag Specialist (CRFS) designation demonstrates that an individual is familiar with the latest workplace identity theft threats and solutions and knows how to develop, maintain and support a program to effectively prevent, detect and mitigate identity theft within an organization. Any company concerned with the consequences of identity theft must train key staff to help develop, implement and maintain an effective Identity Theft Prevention Program to prevent, detect and mitigate identity theft. Such professionals must obtain continuing education and renew their certification to ensure they stay current with the latest identity theft threats and solutions. IMI believes that if professionals follow the best industry practices for identity theft risk management, they will also comply with all local and international laws. Who should become a CRFS Many individuals contribute to a company s identity theft prevention efforts who must consider becoming a Certified Red Flag Specialist (CRFS). Such professionals include risk oversight members, managers, employees, consultants, examiners and auditors of organizations facing identity theft risks including but not limited to: Banks, Mortgage brokers, Finance companies, Investment firms, Insurance companies, Healthcare providers, Automobile dealers, Utility companies, and Telecommunications companies. Employees who are involved in the establishment of new accounts and management of existing accounts may become face to face with identity thieves and their crimes as part of their job duties. These professionals can help identify, detect and respond to identity theft red flags. Such employees may be the weakest link in the battle against identity theft Page 2 of 7
3 if they lack proper education and skills, therefore, they must be given special attention with proper training in order to ensure they follow the established policies and procedures to prevent identity theft. Page 3 of 7
4 Identity Theft Management Framework CRFS professionals are the extension of identity protection professionals and are trained to identify and detect identity theft red flags. Below is an identity theft management framework developed by Identity Management Institute to demonstrate how identity data protection and fraud management tasks are interrelated: Page 4 of 7
5 Critical Risk Domains Certified Red Flag Specialist (CRFS) The Certified Red Flag Specialist (CRFS) Critical Risk Domains (CRD) are areas defined by IMI to a) identify the knowledge areas that a CRFS must possess in order to effectively develop, implement and maintain an Identity Theft Prevention Program, and b) test the candidate s understanding of the risks and knowledge of preventive, detective and corrective controls necessary for effectively managing identity theft risks. The CRFS CRDs described below are used for training and certifying candidates: 1. Identity Theft Overview 2. Risk Assessments 3. Identity Theft Red Flags 4. Identity Theft Prevention Program 5. Layered Security Controls Identity Theft Overview: In order to be successful in preventing identity theft, certified professionals must understand the identity theft crime including threats to their organizations and customers, various types of identity theft, criminal motivations, consequences and impact of identity theft, latest industry trends, and available solutions. Risk Assessments: An initial risk assessment must be completed by CRFS professionals to identify the scope of the identity theft prevention program and identify how identity theft might occur within the organization. Each company must identify the specific red flags within its own operations based on a comprehensive risk assessment. Subsequent and periodic risk assessments are also necessary to ensure that the identity theft prevention program is updated and reflects changes in identity theft risks facing their companies and customers. Identity Theft Red Flags: Upon discovery of all identity theft red flags in the risk assessment process, CRFS professionals must develop the necessary policies and procedures to help the organization prevent, detect and respond to identity theft. Identity Theft Prevention Program: An identity theft prevention program must be properly designed and implemented to ensure that policies and procedures are documented and communicated to all appropriate employees. The Program must also be properly administered to ensure it addresses approval and oversight, scope, objectives, responsibilities, status reporting, and timing of various important tasks. The Program Page 5 of 7
6 must also specify plans for periodic updates and employee training as well as service provider oversight. Note: lessons learned from company operations and industry incidents are part of a comprehensive Program risk management process which must be analyzed, reflected in the Program updates, and communicated to all appropriate staff. Layered Security Controls: Layered security is characterized by the use of different controls at different points in a transaction process so that a weakness in one control is generally compensated for by the strength of a different control. Layered security can substantially strengthen the overall security of transactions and be effective in protecting sensitive customer information, preventing identity theft, and reducing account takeovers and the resulting financial losses and impact to consumer reports. Certification Requirements The CRFS designation can be obtained through a formal training and examination. Exam training may be completed individually with a self study course or group training administered by IMI. The basic requirements for becoming a CRFS include 1) be a member of the Identity Management Institute, and 2) successfully pass the exam. Note: The IMI membership application may be submitted simultaneously with the exam application if an applicant is not currently a member. Exam Format The exam is offered and taken by candidates online. The exam can also be administered onsite following group training. The exam includes 100 multiple choice questions and results are communicated to candidates as pass or fail within 2 weeks following the completion and successful submission of the examination. 70 questions or more must be answered correctly within the allocated timeframe in order to pass the exam and there is no penalty for guessing. Page 6 of 7
7 Application Process Certified Red Flag Specialist (CRFS) CRFS application can be downloaded from and submitted to IMI via fax, or regular mail. Application fees may be paid by check along with the application or by credit and debit cards. Candidates will receive a credit/debit card payment request after applications are received and accepted by IMI. Once payment is received, the CRFS study guide will be ed to exam candidates who will have up to one year to study and prepare for the exam. When a candidate is ready to take the exam, an request to take the exam must be sent to Upon receipt of the exam request, the link to the online exam along with the access pass code is sent to the candidate for taking the exam. Exam Cost Please refer to the IMI website at for information regarding most current membership and examination fees. CRFS Certification Maintenance To maintain certification, Certified Red Flag Specialist (CRFS) professionals must maintain active membership status each year, maintain required training, and abide by the IMI s code of ethics. Please visit the CRFS page at for more details. Page 7 of 7
Certified Identity Protection Advisor (CIPA) Overview & Curriculum
Overview The Certified Identity Protection Advisor (CIPA) program is an international registered certification which is designed to educate and certify professionals interested in identity theft risk management.
RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009
RANDOLPH COUNTY PUBLIC WORKS Identity Theft Prevention Program Adopted September 1, 2009 Effective beginning September 1, 2009 I. PROGRAM ADOPTION The Randolph County Public Works Department ( the Department
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Emergency Services
Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
Facts About FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
Certified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
City of Wyoming, Michigan Administrative Policy
City of Wyoming, Michigan Administrative Policy Department: Administrative Services-Treasurer Department Head Approval: /s/ Andrea Boot City Manager Approval: /s/ Curtis L. Holt Subject: Identity Theft
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate
FACTA Identity Theft Red Flags Program. www.chs.acfei.com
1 FACTA Identity Theft Red Flags Program Module 1 Fair and Accurate Credit Transactions Act Overview Identity thieves use individual s personal identifiable information to open new accounts and misuse
IDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)
IDENTITY THEFT PROCEDURES
IDENTITY THEFT PROCEDURES FREQUENTLY ASKED QUESTIONS ABOUT IDENTITY THEFT INCIDENTS AND RED FLAGS Q1: How is a Red Flags incident different from a data security breach? A1: A data security breach is the
Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009
Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )
Questions and Answers About the Identity Theft Red Flag Requirements
Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,
IDENTITY THEFT AND MUNICIPAL UTILITIES
Minnesota Municipal Utilities Association IDENTITY THEFT AND MUNICIPAL UTILITIES Identity Theft and Red Flags Rule requirements The Red Flags Rule implements portions of the Fair and Accurate Credit Transactions
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008
Travis County Water Control & Improvement District No. 17 Identity Theft Prevention Program Effective beginning November 20, 2008 I. PROGRAM ADOPTION The Travis County Water Control and Improvement District
Designing an Identity Theft Prevention Program
The Federal Trade Commission has indicated that mortgage brokers are covered by the Red Flags Rule and must design identity theft prevention programs to comply with the law. The FTC has published a How-To
Identity Theft Security and Compliance: Issues for Business
Identity Theft Security and Compliance: Issues for Business The Facts Six Common Uses for Stolen Information Financial Criminal Medical DMV Social Security Terrorist The Facts A Chronology of Data Breaches
Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009
Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention
21.01.04.Z1.01 Guideline: Identity Theft Prevention Program
Texas A&M Health Science Center Guidelines 21.01.04.Z1.01 Guideline: Identity Theft Prevention Program Approved October 7, 2009 Reviewed February 26, 2015 Supplements System Regulation 21.01.04 Reason
Identity Theft Prevention Program
Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.
ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...
Lincoln Financial Group. FTC/SEC Red Flags Identity Theft Prevention Program
Lincoln Financial Group FTC/SEC Red Flags Identity Theft Prevention Program Program Summary For Internal Use Only Table of Contents Page The Red Flags Rule 3 Key Points of the Program 4 Covered Accounts
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM SUMMARY OF OUR PROGRAM AND PROCESSES This dealership is committed to protecting its customers and itself from identity
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
Identity theft. A fraud committed or attempted using the identifying information of another person without authority.
SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE
Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010
Crime Location Crime Type Month Year Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop Theft April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop
Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
Ouachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
Identity Theft Protection as an Employee Benefit
Identity Theft Protection as an Employee Benefit ID Watchdog is a leading provider of comprehensive identity monitoring as a deterrent against identity theft. Our patentpending identity monitoring solutions
Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business
Federal Trade Commission BCP Business Center business.ftc.gov Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business An estimated nine million Americans have their identities stolen
Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM
Doc. T08-109 Passed by the BoT 12/11/08 UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM The Board recognizes that some activities of the University are subject to the provisions of the Fair
A Proposal of Employee Benefits. Innovations in IDENTITY THEFT
A of Employee Benefits Innovations in IDENTITY THEFT Innovations in IDENTITY THEFT Name or Logo 2 Innovations in IDENTITY THEFT A Complete Identity Theft Solution Prevention to Prosecution Solution
Red Flag Rules and Aging Services: What You Need to Know
Red Flag Rules and Aging Services: What You Need to Know Late in 2007, six federal agencies, including the Federal Trade Commission ( FTC ), jointly issued final rules and accompanying guidelines to implement
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
FFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
Identity Theft Prevention Program (FACTA Identity Theft Red Flags Rule)
Identity Theft Prevention Program (FACTA Identity Theft Red Flags Rule) Overview The Fair and Accurate Credit Transactions Act of 2003 ("FACTA") requirement, known as the Identity Theft Red Flags Rule,
IRS & Partners Combat Tax-Related Identity Theft What s New for 2016
IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 General Scope of Identity Theft Identity theft costs U.S. victims more than all property crimes combined Identity theft remains number
Identity Protection Guide. The more you know, the better you can protect yourself.
Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious
Red Flag Rules Information and Training
Red Flag Rules Information and Training What are Red Flag Rules? The Red Flag Rules: - Are enforced by the Federal Trade Commission (FTC), the federal bank regulatory agencies, and the National Credit
Identity Theft Protection Plans
Identity Theft Protection Plans Legal Resources has partnered with IdentityForce to offer two plan options for identity theft protection for employees at the City of Virginia Beach and Virginia Beach City
II. F. Identity Theft Prevention
II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal
University of Alaska. Identity Theft Prevention Program
University of Alaska Identity Theft Prevention Program Effective beginning October 31, 2009 I. PROGRAM ADOPTION The University of Alaska ( University ) developed this Identity Theft Prevention Program
