uding employees, contractors, consultants, etc.; Section four includes the general policy; Section five includes detailed definitions of covered accounts and red flags; Section six includes response to red flags; Section seven includes updates to program; and Section eight includes program administration (FTC, 2009; Jones, 2008).
Procedures have been laid out to back up the policies with methods for implementing each policy. Methods would clearly indicate the steps to be followed and tools to be used. This includes tools such as forms or documents that should be used while executing a specific policy. Roles and responsibilities have been assigned for various activities within the policies. Employee training is important in the execution of the program. Competencies that need to be developed for policies have been identified, and areas where employees need training have been identified. Methods for review and auditing the program have been included, and mechanism for correcting any gaps has been included.
FTC. (2009, November 1). A How to Guide for Business. Fighting Frauds with the Red Flags Rule. Federal Trade Commission, Retrieved from .
Jones, Josh. (2008, Setember 17). Model identity theft policy. Retrieved from http://www.mtas.tennessee.edu/KnowledgeBase.nsf/0dc5bcf28eace789852574590055ba0a/2ebf57dd17941195852574c700473c4a?OpenDocument
Tellabs is a telecom company with a wide range of products and services in a range of markets. The investor relations web page provides a variety of investor related information. A comparison of peer group websites has been illustrated in table 1. Peers include 3com Corporation; Arris Group; Polycom; and Mastec Incorporated.
A variety of information has been presented on the page. This includes events and presentations; news releases; stock quotes and links for annual reports; contact; email alerts; SEC filings; corporate governance; financial