<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>KC Credit Services &#187; red flags</title>
	<atom:link href="http://creditrepairkansascity.com/tag/red-flags/feed/" rel="self" type="application/rss+xml" />
	<link>http://creditrepairkansascity.com</link>
	<description></description>
	<lastBuildDate>Fri, 21 Feb 2014 18:01:17 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.8.41</generator>
	<item>
		<title>Red Flag Rules of Identity Theft, Part One</title>
		<link>http://creditrepairkansascity.com/credit-education/red-flag-rules-of-identity-theft-part-one/</link>
		<comments>http://creditrepairkansascity.com/credit-education/red-flag-rules-of-identity-theft-part-one/#comments</comments>
		<pubDate>Wed, 03 Jul 2013 12:35:52 +0000</pubDate>
		<dc:creator><![CDATA[donnaperkins]]></dc:creator>
				<category><![CDATA[Credit Education]]></category>
		<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[credit]]></category>
		<category><![CDATA[credit repair]]></category>
		<category><![CDATA[credit restoration]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[red flag rules]]></category>
		<category><![CDATA[red flags]]></category>

		<guid isPermaLink="false">http://creditrepairkansascity.com/?p=4008</guid>
		<description><![CDATA[What are Red Flag Rules?&#160; This concept is not to be confused with &#34;Red Lining&#34;.&#160; Red Flag Rules tell you how to develop and implement an identity theft prevention program in your life or business.&#160; Any program must have four basic elements to create a framework within which to deal with the threat of identity [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>
	<a href="http://creditrepairkansascity.com/wp-content/uploads/2012/10/Identity-Theft-On-The-Web.jpg" rel="" style="" target="" title=""><img alt="" class="alignleft size-thumbnail wp-image-3462" height="150" src="http://creditrepairkansascity.com/wp-content/uploads/2012/10/Identity-Theft-On-The-Web-150x150.jpg" style="margin: 10px;" title="Identity-Theft-On-The-Web" width="150" /></a>What are Red Flag Rules?&nbsp; This concept is not to be confused with &quot;Red Lining&quot;.&nbsp; Red Flag Rules tell you how to develop and implement an identity theft prevention program in your life or business.&nbsp; Any program must have four basic elements to create a framework within which to deal with the threat of identity theft.
</p>
<p>
	1.&nbsp; Policies and procedures must be put in place to RECOGNIZE the red flags of identity theft that may occur in a company&#39;s day-to-day operations.&nbsp; Red Flags, in this instance, may be described as suspicious patterns or practices, or specific activites that indicate the possibility of identity theft.&nbsp; If a customer must provide proof of his/her identity to you, and the method they use looks suspicious, that is considered a Red Flag.
</p>
<p>
	2.&nbsp; Coming up with a list of Red Flag issues for your business is imperative.&nbsp; It you do not put procedures in place to recognize a red flag, as in fake, forged or altered identification sources, then you have not fully fulfilled the requirements of a good program.
</p>
<p>
	3.&nbsp; Describe the specific actions you will take to detect and act when given a fake ID.
</p>
<p>
	4.&nbsp; Put into place a timetable to review the Red Flag list you have implemented in order to keep up with the changing financial landscape within which you operate.
</p>
<p>
	Just because you have written things like this down, it doesn&#39;t constitute having taken care of the problem.&nbsp; You must have procedures in place to implement, review, act and/or change the identified threats in the daily round of your business.&nbsp; Determining the risks to your business and how to act when they do pop up is of paramount importance to having a successful program im place.
</p>
<p>
	<a href="http://creditrepairkansascity.com/wp-content/uploads/2012/10/0512e0f.jpg">
<div id="attachment_3505" style="width: 160px" class="wp-caption alignright"><img src="http://creditrepairkansascity.com/wp-content/uploads/2012/10/0512e0f-150x150.jpg" alt="Donna Perkins" title="Donna Perkins" class="size-thumbnail wp-image-3505 wp-caption alignright" height="150" width="150" />
<p class="wp-caption-text">Donna Perkins</p>
</div>
<p></a>Security of any data you collect is crucial.&nbsp; We&#39;ve all heard the stories on the news of corporation&#39;s having their computer&#39;s hacked, and losing large amounts of consumer data.&nbsp; What will you put in place to keep this from happening?
</p>
<p>
	In our next article, we will continue this subject and discuss who must comply with Red Flag Rules.&nbsp; Stay Tuned.</p>
]]></content:encoded>
			<wfw:commentRss>http://creditrepairkansascity.com/credit-education/red-flag-rules-of-identity-theft-part-one/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
