URU on-line identity verification

Size: px
Start display at page:

Download "URU on-line identity verification"

Transcription

1 on-line J Gahan stablishing and protecting is an issue that affects us all. In many everyday transactions, you have to prove that you are you. This paper describes, an automated on-line service based on a s architecture and delivery model. It discusses how will move from today s model based on documentation, to a much more convenient, faster and lower cost s model. pplications such as are evidence of the transition of s from a set of much talked about standards into real-world deployment. 1. Introduction up front and personal In many everyday transactions, the first thing you have to do is to prove that you are you. This is not as simple as it first appears. 1.1 Identity theft the crime of the century? Successful crime is copied. Identity fraud is very successful. In 2002, the Home Office estimated fraud cost the UK 1.3 billion and it is predicted to get much worse. Trials of chip and pin credit cards are under way in Northampton in an attempt to reduce credit card fraud. Perversely, chip and pin will give a big boost to fraud. hip and pin will make the skimming of cards very difficult, hence fraudsters will apply for cards in other people s names, rather than stealing or copying them. 1.2 ut who am I? There are three categories of : attributed includes your parents names and your place of birth, biographical includes your interactions with society as recorded in public and private, biometric includes your unique physical characteristics such as fingerprint, print, iris pattern and facial geometry. Identity is built on documentation. The problem is that these documents are relatively easy to obtain or forge. Recently, the journalist Paul Kenyon obtained a provisional driving licence in the name and details of Home Secretary lunkett. Kenyon also applied for and received credit cards in the name of author Frederick Forsyth, whose book, ay of the Jackal, exposed the major weakness in the issuing of UK documents thirty years ago. Kenyon demonstrated that the system was still vulnerable. No one company has the resources to stop fraud. The credit agencies hold gigabytes of data on our financial transactions, but in cases of fraud, credit checks verify the of the victim, not the real applicant. This paper suggests an inclusive approach, to mobilise businesses, government and citizens, into tackling fraud. On the Internet no-one knows you re a dog a wellknown 1993 Internet cartoon highlighted the problem with (see Fig 1). Identity is a prerequisite to other checks (see Fig 2). efore checking the background of a teacher or care worker, or a financial institution doing a credit check on a new customer, it is essential to establish with a high degree of confidence that the person is who they claim to be. The finance and gaming industries are subject to anti-money-laundering regulations. Their customers must provide two proofs of and two of domicile when opening an account. Typically, the customer has to post or take in documents such as a passport, a driving licence and two utility bills. The problem is that fraudsters are using fake documents. The current T Technology Journal Vol 22 No 1 January

2 on-line s data from the Web site or customer relationship management (RM) system and performs a series of checks against national. confirms back to the Web site or RM system that, for each piece of information checked, the item did match, partially matched, or did not match the corresponding database record. 2.1 ross-checking data gives a higher confidence in onfidence in increases with the number of checked and the consistency of the cross-matching of each data item (see Fig 4). On the Internet, nobody knows you re a dog. Fig 1 The problem. process of checking documents is expensive and is vulnerable to fraud. 2. a new, innovative, on-line service is a new, automated, on-line - service for organisations that need to check that their customers are who they say they are and live where they claim to live (see Fig 3). With, the enters information into a business/government Web site or provides it over the telephone to a call centre. Importantly, the gives their consent for their information to be checked to establish their. receives the The more checks used, the harder it is for a fraudster to succeed they either have to steal more data or to be more consistent in the data they fabricate. Of course, every large-scale database will have some data inaccuracies. will help to identify those inaccuracies, enabling the database owners to clean the data. 2.2 asier implementation using s The service required a low-cost and simple way to connect the many Web sites, RM systems and frontoffice systems to and to enable end-user credentials to be verified against disparate (see Fig 5). s were chosen as the underlying technology for for a number of reasons. Web Services offer a widely supported and simple mechanism making easier to integrate with new and existing applications. This reduces the complexity and costs of connecting to the service and ensures that it not access to data privacy digital certificate issue proofs of passport driving licence teacher checks care workers protect children Web sales telesales reduce fraud bank accounts betting reduce money laundering entitlement card benefits Fig 2 stablishing is problematic. 44 T Technology Journal Vol 22 No 1 January 2004

3 on-line call centre RM identifying data - name - postcode - utility information - driving licence data - passport details - telephone consent or Website Fig 3 The. name and address name address meter number telephone number driving licence number passport number date of birth electoral register deaths telephone (OSIS) MPN VL UKPS IFS shareholders Fig 4 ross-matching of data. only is technically available to a large number of potential customers, but also has a reduced initial setup cost compared to many other approaches. Since data will be interrogated and provided by a wide range of organisations that internally use a diverse range of platforms and systems, it is sensible to make use of the open-standards-based distribution model that s provide. esides the external benefits that s deliver, internal functional modules, such as registration and billing, can be designed and implemented quickly and flexibly. 2.3 has significant benefits For banks and other organisations, offers major benefits: significantly reduces the cost per transaction by removing the need to check paper documents in the majority of cases, reduces fraud and consequential bad debt by catching more fraud up front at the customer engagement stage, provides better compliance and easier auditing of compliance to meet the guidelines laid down by the Financial Services uthority and ritish anking ssociation For the, the benefits are: convenience no need to take in or post valuable documents, less delay can be verified within two seconds, T Technology Journal Vol 22 No 1 January

4 on-line G group VL customers example of potential data suppliers revenue retail banks government retailers interface - customer number - transaction type - to be checked - customer agent - provided data output - match results - audit number UKPS council tax / citizen gambling credit rating Fig 5 The s interface. no personal data held in the is disclosed simply confirms that the data the provides either matches, partially matches or does not match the information in the, s will be alerted to the fact when the information they give does not match with the s can then contact the owners of the in cases of error, s have more protection against fraud if they register with, they will be told every time their is checked by. 2.4 Proactive anti--fraud measure eing told every time your is checked is a significant benefit for s. If it was not you applying to open an account, you can inform the bank or other organisation straight away, stopping the fraud there and then. Traditionally, by the time the becomes aware of fraud, it is already a big problem. Victims often take two years to get their financial history back to where it was before their was stolen. 2.5 Making even better So s have a real reason to want to register with. When they register, they can provide additional identify information, including a biometric. If banks and other organisations are to rely on and value checks against this additional, volunteered information, the process of registration has to be rigorous. Registration must ensure that the person really is who they claim to be. High cost and inconvenience rules out a face-to-face registration, leaving remote registration as the only practical option. The remaining part of this paper looks at how this might be done. 3. Voice has chosen as the preferred biometric for two compelling reasons: 46 T Technology Journal Vol 22 No 1 January 2004

5 on-line can be registered remotely, can be checked remotely ll biometrics have their strengths and weaknesses [1], but none is foolproof. They all depend on optimising the false accept and false reject parameters. With, the biometric is just part of the overall checking undertaken to verify it is not the sole check. 3.1 Rigorous, remote registration Two levels of registration have been defined for. Self-registration is where s are given a full cross-check of all biographical data held about themselves in. ndorsed registration is where s ask someone who knows them to confirm that they are who they claim to be. 3.2 Self-registration The first step starts with the accessing the secure Prove- Web site and selecting the selfregistration option (see Fig 6). The secure socket layer (SSL) protocol encrypts the dialogue preventing eavesdropping. Web page describes the process, making clear the purposes for which the data will be held and warns that it is an offence to assume a fictitious or the of another person for the purposes of fraud or deception. On acceptance of the conditions, the is then sent and completes the Web form. verifies the data and if it matches the data, the is provided with a one-time number to be used in step 2 (see Fig 7). self-registration 1 goes to Web site and enters: - preferred language - name - postcode - date of birth - utility information - driving licence data - passport details - telephone number -... gives consent verifies provides one time number Web site Fig 6 Self-registration step 1. self-registration 2 calls self-registration line from home enters one time number checks LI enters date of birth checks o says words repeats words stores sends id number Fig 7 Self-registration step 2. T Technology Journal Vol 22 No 1 January

6 on-line The second step starts with the calling the registration line from their home phone with calling line (LI) enabled (Fig 7). The interactive response () system answers the call and asks the to enter via the telephone keypad the onetime number. The system checks the LI corresponds to the user for this one-time number and as an additional check asks the user to enter their date of birth. If this is correct, the system then asks the to repeat a number of words. The are taken and stored. The system thanks them for registering and tells them that their unique number will be sent to them. The fixed cost of registration is collected from the call to the premium rate registration number. 3.3 ndorsed registration When you apply for a passport, you are required to have your application form and photograph endorsed by someone who has known you for some time. The person making the endorsement is rarely contacted by the UK Passport Service to confirm that they made the endorsement. The endorsed confirmation level of assurance is the electronic equivalent of the passport endorsement. However, with, every endorsement is checked directly with the person endorsing a s. The has to self-register successfully before applying for endorsed registration. Step 1 of endorsed registration starts with the accessing the secure Prove- Web site and selecting the endorsed registration option (see Fig 8). The user is asked to enter their number. Web page describes the process, making clear the purposes for which the data is being held and warns that it is an offence to assume a fictitious or the of another person for the purposes of fraud or deception. On acceptance of the conditions, the is provided with a search facility where they can find someone who knows them who has already achieved endorsement registration status. The creation of a critical mass of endorsed registrations is discussed later. Having found someone who knows them, they select the endorser s name. The Web site generates a onetime number for use in step 2 (Fig 9). The calls the registration line from their home telephone with LI enabled. The system answers the call, checks the LI and asks the to enter via the telephone keypad the one-time number. The system asks the to repeat three words chosen at random from those recorded at selfregistration. If the match, the is provided with a new one-time number for use in step 3. links the one-time number to the and the selected endorser. s the endorser with the s contact details and tells them to expect a visit or telephone call from the. The endorser is advised to ask questions of the, especially if they are contacted over the telephone. In step 3 (Fig 10), the either visits or telephones the endorser and provides the endorser with the latest one-time number. Step 4 (Fig 11) follows the visit or telephone call. The endorser calls a freephone number from their home telephone with LI enabled. The system answers endorsed registration 1 enters their number provides a find an endorser function selects an endorser provides one time number Web site Fig 8 ndorsed registration step T Technology Journal Vol 22 No 1 January 2004

7 on-line endorsed registration 2 calls endorsed registration line from home enters one time number checks LI enters date of birth chooses at random and says three registration words repeats words checks tells new one time number s s details to endorser Fig 9 ndorsed registration step 2. endorsed registration 3 calls or visits endorser endorser ensures it is the person they know tells the endorser one time number Fig 10 ndorsed registration step 3. the call and asks the endorser to enter via the telephone keypad the one-time number. The system checks the LI and asks the endorser to repeat three words chosen at random from those recorded at self-registration. If the match, the system confirms the name of the person requesting endorsed registration and asks the endorser to key in how many years they have known the and, on a scale of 1 to 5, how well they know the. The thanks the endorser and updates the status of the to endorsed registration. It is envisaged that endorsers will not charge their friends for endorsing their registrations. maintains the chain of who has endorsed whom. If any registration is subsequently found to be false, will know all related endorsements that are suspect. 4. reating the first endorsers In order for endorsed registrations to be practical, there has to be a large number of endorsers from the outset. Two approaches are being considered, the known employee process and the known customer process. oth processes are based on additional information being available to increase the confidence endorsed registration 4 calls free endorsed registration line from home enters one time number checks LI chooses at random and says three registration words endorser repeats words checks tells endorser the requester s name and address endorser confirms endorser keys in how long and how well they know thanks endorser endorser Fig 11 ndorsed registration step 4. T Technology Journal Vol 22 No 1 January

8 on-line level about the first endorsers. In addition, the length of time the employee has been employed or the has been a customer is also a factor. 4.1 reating initial endorsers from known employees The Times 100 companies and selected government departments would be provided with a print-based password reset service. Password reset requests represent more than 50% of IT helpdesk calls. Helpdesk costs could be significantly reduced if all password resets were automated, using as the authentication method. This is a more secure way than asking for personal data over the telephone or using e- mail. mployees would self-register with. dditional checks are made against their firm s pay-roll and personnel. Self-registered employees that have worked for the company for more than 5 years are automatically upgraded to endorser status. Other selfregistration employees are encouraged to go through the normal endorsed registration process. When an employee wants to reset their password, they telephone a password reset line. answers the call and asks the employee to key in their number and repeat three words chosen at random from those recorded at self-registration. If the match, the system resets their forgotten password and tells them the new password. 4.2 reating initial endorsers from known customers In this start-up model, works with a company that has a reliable customer database of stable customers about which they hold accurate detailed personal data. The company encourages their customer base to register with. ustomers self-register with as described earlier; however, additional checks are made against the company s database. Self-registered customers that have been a customer for more than 5 years are automatically upgraded to endorser status. Other self-registration customers are encouraged to go through the normal endorsed registration process. 5. Using to check remotely Organisations who use the service will be able to specify print checks as well as biographical data checks. The following two scenarios illustrate how remote print works a calling into a call centre and a accessing a Web site. 5.1 all-centre print scenario systems are commonly used to pre-categorise s before they are put through to a call-centre agent. One of the menu options could be key 1 if you are registered with. On pressing 1, the is switched into the print checking system (see Fig 12). asks the to enter via the telephone keypad their number. The system asks the to repeat three words chosen at random from those recorded at self-registration. If the print matches, provides the next available call agent with the s name and address details together with confirmation that they have passed the print. stores the company name and details in the audit trail. remote telephones call centre keys 1 for keys number chooses at random and says three registration words repeats words checks passes call to agent, confirms I and name and address of logs customer call centre Fig 12 call-centre remote. 50 T Technology Journal Vol 22 No 1 January 2004

9 on-line remote goes to Web site enters I data and telephone number customer wants check calls keys number chooses at random and says three registration words repeats words checks sends the results of all checks to customer Web site logs customer Web site Fig 13 Web site remote. 5.2 Web site print scenario In this scenario the is trying to open an account and has accessed a financial institution s Web site (Fig 13). The is asked if they are registered with. If they are, they are asked to enter their number and a telephone number on which they can be immediately contacted. The financial institution s Web site makes a Web Services call to. dials the and asks the to enter via the telephone keypad their number. The system then asks the to repeat three words chosen at random from those recorded at self-registration. If the print matches, sends back confirmation to the financial institution s Web site via the, that the has passed the print. 6. onclusions stablishing and protecting is an issue that affects us all. In many everyday transactions, you have to prove that you are you. Proving you are you is moving into the electronic age, driven by a cheaper, faster, more reliable and auditable service called. Web Services have provided an effective and extensible architecture and delivery model for this highly sensitive and commercially important new service. Voice is set to become the pervasive, low-cost way of adding a biometric check to complement existing checks based on biographical and attributed. T plans to conduct a mass trial of as part of the uropean Union Government User Id for urope (GUI) project. Reference 1 Rejman-Greene M: iometrics real identities for a virtual world, T Technol J, 19, No 3, pp (July 2001). hris Gahan holds an honours degree in Mathematics and omputer Science. He has worked extensively in IT becoming T s uropean IT Manager for Northern Telecom. He has product and business development expertise within the telecommunications and networking industries, specialising in high-speed secure networks and network-based Web Services applications. He holds a US patent for secure networking, and would welcome feedback, at chris.gahan@bt.com, on the project described in this paper. T Technology Journal Vol 22 No 1 January

Driving License. National Insurance Number

Driving License. National Insurance Number STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries

More information

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming

More information

ID3 Applications. 800 million people One solution. Forward thinking solutions for a global industry. because identity matters

ID3 Applications. 800 million people One solution. Forward thinking solutions for a global industry. because identity matters ID3 Applications Forward thinking solutions for a global industry because identity matters 800 million people One solution ID3 Applications Forward thinking solutions for a global industry Background As

More information

Personal Information. About you. Personal information and your identity.

Personal Information. About you. Personal information and your identity. Personal Information About you. Personal information and your identity. 213301 Keeping you safe and stopping fraud. More and more people are worried about identity theft and fraud. We re working 24/7 to

More information

About you. Personal Information and your identity. a little extra help

About you. Personal Information and your identity. a little extra help About you Personal Information and your identity a little extra help Keeping you safe and stopping fraud More and more people are worried about identity theft and fraud. We re working 24/7 to keep your

More information

How To Create Trust Online

How To Create Trust Online Authors: Niall Burns (Symphonic), Professor Bill Buchanan (Edinburgh Napier University), Cassie Anderson (miicard) Overview There is a growing demand within governments, health sectors, social care, police,

More information

Two Factor Authentication. Software Version (SV) 1.0

Two Factor Authentication. Software Version (SV) 1.0 Two Factor Authentication Software Version (SV) 1.0 Property of: Worldwide Interactive Services, Inc. 5025 South Orange Avenue Orlando, FL 32809 The data contained in this documentation is PROPRIETARY

More information

De-duplication The Complexity in the Unique ID context

De-duplication The Complexity in the Unique ID context De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance

More information

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

Welcome to the Protecting Your Identity. Training Module

Welcome to the Protecting Your Identity. Training Module Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting

More information

Strategy for Mobile ID

Strategy for Mobile ID Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2

More information

How to protect your identity. Identity fraud explained

How to protect your identity. Identity fraud explained How to protect your identity Identity fraud explained What is identity fraud? Identity theft is when someone gets hold of your personal information without your permission. This can include your name,

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015 OVERVIEW TEACHER NOTES TEACHER NOTES

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015 OVERVIEW TEACHER NOTES TEACHER NOTES FLIP (Financial Literacy in Practice) February 2015 IDENTITY THEFT OVERVIEW This resource complements the material in Operation Financial Literacy. It has been written to address current issues which specifically

More information

Application of Biometric Technology Solutions to Enhance Security

Application of Biometric Technology Solutions to Enhance Security Application of Biometric Technology Solutions to Enhance Security Purpose: The purpose of this white paper is to summarize the various applications of fingerprint biometric technology to provide a higher

More information

ACCOUNT APPLICATION FORM & IDENTIFICATION FORM

ACCOUNT APPLICATION FORM & IDENTIFICATION FORM ACCOUNT APPLICATION FORM & IDENTIFICATION FORM This form may be used to apply for a new Account or to verify the identity of an existing Provisional account holder. INSTRUCTIONS Please complete Section

More information

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the

More information

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used? esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Net-ID 2006 Berlin PROTECTING IDENTITY IN THE DIGITAL ERA. Robin Wilton

Net-ID 2006 Berlin PROTECTING IDENTITY IN THE DIGITAL ERA. Robin Wilton Net-ID 2006 Berlin PROTECTING IDENTITY IN THE DIGITAL ERA Robin Wilton Corporate Architect (Federated Identity) Sun Microsystems robin.wilton@sun.com +44 705 005 2931 http://blogs.sun.com/racingsnake Aim

More information

When Fraud Comes Knocking

When Fraud Comes Knocking When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.

More information

Transforming the Customer Experience When Fraud Attacks

Transforming the Customer Experience When Fraud Attacks Transforming the Customer Experience When Fraud Attacks About the Presenters Mike Young, VP, Product Team, Everbank Manages consumers and business banking products, as well as online and mobile banking

More information

Brussels, 22 October 2007

Brussels, 22 October 2007 Brussels, 22 October 2007 REPORT ON IDENTITY THEFT/FRAUD FRAUD PREVENTION EXPERT GROUP 1 EXECUTIVE SUMMARY...2 1. INTRODUCTION:...5 2. SCOPE OF THE PROBLEM...7 2.1. WHAT IS IDENTITY THEFT? WHAT IS IDENTITY

More information

A Proper Foundation: Extended Validation SSL

A Proper Foundation: Extended Validation SSL A Proper Foundation: Extended Validation SSL A critical model for SSL digital certificates and browser trust Get this White Paper Entrust, Inc. All Rights Reserved. 1 1 Contents Context of Internet Security...

More information

The Case for a Processor Serial Number Control Unit

The Case for a Processor Serial Number Control Unit Introduction Cyber-Rights & Cyber-Liberties (UK) Report on the Intel 1 Pentium 1 III Processor Serial Number Feature Recently Intel have announced that the new Pentium III processor, due for release in

More information

Keeping your identity safe. Keeping you safe. Your home, shed and outbuildings. Bogus callers. Keeping your things safe. Internet safety.

Keeping your identity safe. Keeping you safe. Your home, shed and outbuildings. Bogus callers. Keeping your things safe. Internet safety. // CRIME IS LOW IN LANCASHIRE We want to work with you to keep it that way. This section contains tips on how you can help to prevent crime and avoid becoming a victim of crime. Click on the contents below

More information

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers Frequently Asked Questions and Answers 2011 CardLogix Corporation. All rights reserved. This document contains information

More information

Online Banking Terms and Conditions and Privacy Policy

Online Banking Terms and Conditions and Privacy Policy Online Banking Terms and Conditions and Privacy Policy These terms and conditions are our agreement with you for Online Banking and our Mobile Banking App they tell you how our Online Banking and our Mobile

More information

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect

More information

[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009

[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009 [FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM Effective May 1, 2009 Because [FACILITY NAME] offers and maintains covered accounts, as defined by 16 C.F.R. Part 681 (the Regulations ), [FACILITY NAME]

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

Reducing Fraud whilst Keeping Transactions in Motion

Reducing Fraud whilst Keeping Transactions in Motion Reducing Fraud whilst Keeping Transactions in Motion Fraud Today Following a decrease in 2012, fraud is on the rise again, and so are the costs involved in managing it. These factors are in turn driving

More information

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office:

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office: 2009 1 City of Geneva Policy Number: Effective Date: Last Revised Date: Responsible Office: 1.0 April 28, 2009 April 27, 2009 Tammy Shuttleworth Status: Draft Under Review Approved Obsolete IDENTITY THEFT

More information

Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach

Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Ruchir Choudhry ruchirchoudhry@cint.co.in; Abstract. J2EE based Web applications have largely spread over our multiple

More information

Two-Factor Authentication and Swivel

Two-Factor Authentication and Swivel Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide

More information

Using Strong Authentication for Preventing Identity Theft

Using Strong Authentication for Preventing Identity Theft Position Paper Using Strong Authentication for Preventing Identity Theft Robert Pinheiro Consulting LLC Better identity authentication has been proposed as a potential solution not only to identity theft,

More information

Questions. about your Simple Payment card

Questions. about your Simple Payment card Questions about your Simple Payment card 1. What is Simple Payment? Simple Payment is a service delivered jointly by the government, Citibank and PayPoint. 2. What is a Simple Payment card? Normally the

More information

The 4 forces that generate authentication revenue for the channel

The 4 forces that generate authentication revenue for the channel The 4 forces that generate authentication revenue for the channel Web access and the increasing availability of high speed broadband has expanded the potential market and reach for many organisations and

More information

Policies and Procedures: IDENTITY THEFT PREVENTION

Policies and Procedures: IDENTITY THEFT PREVENTION Policies and Procedures: IDENTITY THEFT PREVENTION Section: Chapter: Policy: Compliance Administration Identity Theft Prevention I. PURPOSE The purpose of this policy is to protect patients and West Virginia

More information

White paper. Biometrics and the mitigation of card-related fraud

White paper. Biometrics and the mitigation of card-related fraud White paper Biometrics and the mitigation of card-related fraud The Aadhaar scheme, primarily envisaged to provide every resident proof of identity, holds a great deal of promise for other applications

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy RESPONSIBLE OFFICIAL : Executive Vice Chancellor/Provost RESPONSIBLE OFFICIAL : Business & Financial Services EFFECTIVE

More information

Credit Card Agreement for GM Card in Capital One, N.A.

Credit Card Agreement for GM Card in Capital One, N.A. Credit Card Agreement for GM Card in Capital One, N.A. There are two parts to this Credit Card Agreement: Capital One Pricing Information and the Capital One Customer Agreement. The Pricing Information

More information

No selling. No jargon. Just the facts about proving your identity. Our guides here to help you. No selling. No jargon. Just the facts.

No selling. No jargon. Just the facts about proving your identity. Our guides here to help you. No selling. No jargon. Just the facts. November 2009 Our guides here to help you This guide is part of our Everyday money series. About the Financial Services Authority. Buying a home. Saving and investing. Pensions and retirement. If things

More information

Identity Cards. The Next Steps

Identity Cards. The Next Steps Identity Cards The Next Steps Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty November 2003 Cm 6020 4.75 Crown Copyright 2003 The text in this document

More information

FAQs - New German ID Card. General

FAQs - New German ID Card. General FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new

More information

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Audio: This overview module contains an introduction, five lessons, and a conclusion. Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules

More information

A guide to. basic bank and credit union accounts

A guide to. basic bank and credit union accounts A guide to basic bank and credit union accounts Information about basic bank and credit union accounts It is our policy to pay Housing Benefit directly into a bank or credit union account. This type of

More information

Alternative authentication what does it really provide?

Alternative authentication what does it really provide? Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK steve.pannifer@chyp.com Abstract In recent years many new technologies

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

M&S CURRENT ACCOUNT AND M&S MONTHLY SAVER. Terms and conditions EFFECTIVE FROM 8 JANUARY 2015 NEW FASHIONED BANKING

M&S CURRENT ACCOUNT AND M&S MONTHLY SAVER. Terms and conditions EFFECTIVE FROM 8 JANUARY 2015 NEW FASHIONED BANKING M&S CURRENT ACCOUNT AND M&S MONTHLY SAVER Terms and conditions EFFECTIVE FROM 8 JANUARY 2015 1 NEW FASHIONED BANKING Contents Page Page Summary of our M&S Current Account Terms and Conditions 3 Contact

More information

Token Security or Just Token Security? A Vanson Bourne report for Entrust

Token Security or Just Token Security? A Vanson Bourne report for Entrust Token Security or Just Token Security? A Vanson Bourne report for Entrust Foreword In 2011, Entrust Inc., an identity-based security company, partnered with respected technology research firm Vanson Bourne

More information

Helping you to protect yourself against fraud and financial crime

Helping you to protect yourself against fraud and financial crime Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you

More information

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication

More information

Child. Application for an Australian Passport. Your checklist

Child. Application for an Australian Passport. Your checklist Application for an Australian Passport Child Appointments Only certain applicants should lodge their forms at a passport office in Australia. Appointments are essential. See notes for details. Protect

More information

Evidence of Identity: Breeder Documents and Beyond Barry J. Kefauver International national Standards ds Organization ation Why Care? A false passport in the hands of a terrorist is as dangerous as a bomb

More information

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology 20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business

More information

The Leading Provider of Identity Solutions and Services in the U.S.

The Leading Provider of Identity Solutions and Services in the U.S. THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

A California Business Privacy Handbook

A California Business Privacy Handbook A California Business Privacy Handbook April 2008 This brochure is for informational purposes and should not be construed as legal advice or as policy of the State of California. If you want advice in

More information

ELECTRONIC SIGNATURES FACTSHEET

ELECTRONIC SIGNATURES FACTSHEET ELECTRONIC SIGNATURES FACTSHEET Electronic signatures mean that you can exchange information with others electronically and securely safe in the knowledge that everyone is who they claim to be and that

More information

How to use your new card. Tomorrow s Queensland: strong, green, smart, healthy and fair

How to use your new card. Tomorrow s Queensland: strong, green, smart, healthy and fair How to use your new card Tomorrow s Queensland: strong, green, smart, healthy and fair Safer, stronger cards for Queenslanders The Queensland Government has used the latest technology to make new Queensland

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM In compliance with Part 681 of Title 16 of the Code of Federal Regulations implementing Sections 114 of the Fair and Accurate Credit Transactions Act of 2003 ("FACTA"),

More information

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not

More information

Encryption and Digital Signatures

Encryption and Digital Signatures GreenNet CSIR Toolkit Briefing no.3 How to protect privacy, and your identity, online Written by Paul Mobbs for the GreenNet Civil Society Internet Rights Project, 2002. http://www.internetrights.org.uk/

More information

White Paper. The risks of authenticating with digital certificates exposed

White Paper. The risks of authenticating with digital certificates exposed White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric

More information

USB Secure Management for ProCurve Switches

USB Secure Management for ProCurve Switches ProCurve Networking USB Secure Management for ProCurve Switches Introduction... 2 A simple solution with multiple uses... 2 Staged deployment... 2 Remote deployment or upgrade... 3 Troubleshooting... 3

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY

More information

Enhanced Security for Online Banking

Enhanced Security for Online Banking Enhanced Security for Online Banking MidSouth Bank is focused on protecting your personal and account information at all times. As instances of internet fraud increase, it is no longer sufficient to use

More information

Bo Holland is the Founder & CEO of AllClear ID with deep expertise in Identity theft prevention, security, and technology

Bo Holland is the Founder & CEO of AllClear ID with deep expertise in Identity theft prevention, security, and technology AllClear ID (www.allclearid.com) is an identity protection company based in Austin, Texas, and is powered by Debix, a leader in identity protection technology. Our leading technology and customer service

More information

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft RED FLAGS RULE Identifying, Detecting, & Mitigating Possible Identity Theft What is the Red Flag Rule? The Federal Trade Commission (FTC), along with federal bank regulators and the National Credit Union

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers

Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers Sponsored by Nok Nok Labs, Inc. Independently conducted by Ponemon Institute LLC Publication

More information

1 Billion Individual records that were hacked in 2014 3.

1 Billion Individual records that were hacked in 2014 3. 783 Major data breaches in 204 up 27% from 203 2. Billion Individual records that were hacked in 204 3. 3 Fraud has changed The way we live and manage our finances today has changed radically from just

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program

Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program for the Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program DHS/ICE/PIA-015(h) January 15, 2016 Contact Point Peter Edge Executive Associate Director, Homeland Security

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

Additional contribution application form

Additional contribution application form 14P44 GROUP STAKEHOLDER PENSION PLAN Additional contribution application form You ll need to complete this application form to apply an additional regular contribution and/or single contribution to your

More information

Banking at the speed of your life. Online. Mobile. Superior. Safe.

Banking at the speed of your life. Online. Mobile. Superior. Safe. Banking at the speed of your life. Online. Mobile. Superior. Safe. PARKSTERLING Answers You Can Bank On. At Park Sterling Bank, we know that there are times when our answer can help expand a child s future,

More information

Our IVR Payment systems can be used for various business sectors and services.

Our IVR Payment systems can be used for various business sectors and services. IVR Payments Systems Cyprium provide a wide range of phone payment solutions satisfying the needs of customers who prefer to pay by phone while reducing customer support expenses. We specialise in this

More information

Business Online Banking & Bill Pay Guide to Getting Started

Business Online Banking & Bill Pay Guide to Getting Started Business Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Business Online Banking. Whether you re

More information

You can contact 0845 6014523 (local rate) where our Customer Services staff will help you resolve the problem. For help:

You can contact 0845 6014523 (local rate) where our Customer Services staff will help you resolve the problem. For help: Case Work Management (CWM) System for Protected Species Licensing Customer Registration Guidance 1. Scope This document covers the registration part of the Case Work Management (CWM) system through the

More information

Privacy and Information Protection Bulletin

Privacy and Information Protection Bulletin Privacy and Information Protection Bulletin March 2005 Fasken Martineau DuMoulin LLP Identity Theft Sara Levine and Joanna Erdman (student-at-law), Toronto Vancouver Calgary Toronto Montréal Québec City

More information

Identity Theft Prevention Program

Identity Theft Prevention Program The University of North Carolina at Chapel Hill Identity Theft Prevention Program The Board of Trustees of The University of North Carolina at Chapel Hill (the University ) adopts this Identity Theft Prevention

More information

Invoice finance made simple

Invoice finance made simple Invoice finance made simple All you need to keep the cash flowing Your Invoice Finance Experts Your Invoice Finance Experts Contents This informative, easy-to-use guide has been put together to explain

More information

Credit Card Agreement for Teamsters Cards in Capital One, N.A.

Credit Card Agreement for Teamsters Cards in Capital One, N.A. Credit Card Agreement for Teamsters Cards in Capital One, N.A. There are two parts to this Credit Card Agreement: Capital One Pricing Information and the Capital One Customer Agreement. The Pricing Information

More information

FREE YOUR MIND http://freeyourmindonline.net. Can You stop Identity Theft?

FREE YOUR MIND http://freeyourmindonline.net. Can You stop Identity Theft? FREE YOUR MIND http://freeyourmindonline.net Can You stop Identity Theft? Today I would like to explore the subject of identity theft. It is the fastest growing crime in America. Identity theft can be

More information

which you did not make,

which you did not make, What should you do if you think you ve been a victim of ID fraud? Put a fraud alert on your credit report. A fraud alert puts a red flag on your credit report and notifies lenders and creditors that they

More information

first direct credit card terms

first direct credit card terms first direct credit card terms 1 Definitions These are the definitions used in this Agreement: : a transfer to the Account of an amount you owe to another lender (who is not a member of the HSBC Group)

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft About Medical Identity Theft and Health Information Breaches... 1 What is medical identity theft?... 1 What are the dangers of medical identity theft?... 1 How do

More information

Mobile Wallet Platform. Next generation mobile wallet solution

Mobile Wallet Platform. Next generation mobile wallet solution Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator

More information

Identity Theft. Providing Your Student with a Safety Net By Sun Ow

Identity Theft. Providing Your Student with a Safety Net By Sun Ow Identity Theft Providing Your Student with a Safety Net By Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial

More information

A brief on Two-Factor Authentication

A brief on Two-Factor Authentication Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.

More information

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015. ACTIVITY 1 What do thieves want? STUDENT WORKSHEET

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015. ACTIVITY 1 What do thieves want? STUDENT WORKSHEET FLIP (Financial Literacy in Practice) IDENTITY THEFT February 2015 ACTIVITY 1 What do thieves want? There are many documents that thieves could use to steal your identity. Government departments, financial

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information