Specifically, the business should:Identify relevant patterns, practices and specific forms of activity that are red flags signaling possible identity theft and incorporate those red flags into the program,Detect red flags that have been incorporated into the program,Respond appropriately to any red flags that are detected to prevent and mitigate identity theft, andEnsure the program is updated per