SOLVE THE PROBLEM OF IDENTITY THEFT. An online, real-time solution for KYC, POPI, RICA and FICA compliance. May

Size: px
Start display at page:

Download "SOLVE THE PROBLEM OF IDENTITY THEFT. An online, real-time solution for KYC, POPI, RICA and FICA compliance. May 2015. www.fidescloud.co."

Transcription

1 SOLVE THE PROBLEM OF IDENTITY THEFT An online, real-time solution for KYC, POPI, RICA and FICA compliance May 2015

2 What is the Fides Trusted Vault? The Fides Trusted Vault solution verifies individuals by providing access to a number of identity verification checks which, in combination, provide reliable authentication. Through authentication and the ability to upload compliance documentation your organization can rest assured that it complies with all relevant legislation The Trusted Vault is POPI compliant and is a cloud solution for KYC, FICA and RICA The Trusted Vault is accessible by the individual and anyone to whom the individual has granted permission to access his vault, e.g. a bank or service provider The Services allow for the capture, storage and retrieval of: Fingerprints - enrolment and verification Photographs Document Storage of Digitally-signed documents Digital Signatures Home Affairs Checks Real-time online identity verification Credit Bureau Checks Real-time online CPA & Non-CPA Reports Qualification Checks Matric & Tertiary Online SAPS Criminal Checks Drivers License Checks

3 What are the POPI Compliance Requirements? POPI Requirement Only collect information that you need for a specific purpose Apply reasonable security measures to protect it Ensure it is relevant and up to date Only hold as much as you need, and only for as long as you need it Allow the subject of the information to see it upon request Fides Compliance Fides gathers information for the client based on the individual s consent. This consent is an electronic consent that is recorded through an audit trail. The information captured is used for compliance purposes only and is not made available to third parties. The Fides Trusted Vault is subject to best practice security standards and undergoes routine testing such as Web Application Vulnerability Assessments. A full audit trail of all activity is recorded for each individual s Trusted Vault. Fides gathers all historical information related to an individual from authorized sources and has the ability to update the details upon request by the corporate and individual Fides gathers information based only on the client s needs, the information that is gathered is only stored based on individual s consent. Fides Trusted Vaults can be viewed through an internet connection by the client or the individual at any place and at anytime via their web browser and security credentials.

4 What are the FICA KYC Compliance Requirements? For individual customers who are South African Citizens and / or who are South African Residents Fides Compliance Identification Full Names Date of Birth Nationality Identifying Number Residential Address Income Tax Ref Number Contact Details Verification South African issued green bar-coded identity document An approved document to verify residential address, reflecting at least your initial(s) and surname and (physical) residential address Income tax reference number (if issued) A document issued by the South African Revenue Service to verify your income tax reference number Contact details (i.e. name, telephone number(s), address, etc.) Does not need to be verified Perform an RSA Identity Verification Check which retrieves all these fields in real-time from credit bureaus. The vault also has the ability to update the individual s latest address and upload their latest Proof of Residence into the vault. A copy of the individual s SARS issued Income Tax document will be uploaded into the vault Contact Details An entire list of all registered contact details as well as previous employment details can be retrieved through credit bureaus in real time and stored in the vault.

5 What are the RICA KYC Compliance Requirements? For individual customers who are South African Citizens and / or who are South African Residents Fides Compliance Identification Full Names Cellphone Number Nationality Identifying Number Residential Address The SIM Card to be registered Verification South African issued green bar-coded identity document An approved document to verify residential address, reflecting at least your initial(s) and surname and (physical) residential address The Verification Agent at any walk-in customer care centre can register the SIM Perform an Identity Verification Check which retrieves all fields in real-time from credit bureaus. The Vault has the ability to update the Cellphone Number related to the RICA registration. The vault also has the ability to update the individual s latest address and upload their latest Proof of Residence into the vault. The SIM Card details can be linked to the individual in their vault and be viewed by the service provider and individual at any time.

6 Why use the Fides Trusted Vault? A cloud-based offering simplifies adoption and eliminates expensive start-up costs by providing: A 24x7 online service enabling enrolment and verification from any location with internet access Hardware agnostic solution that supports all major vendors Annual subscription or Per-Transaction cost for the service Tracks all system activity for compliance reporting purposes Secure and compliant storage of all information

7 SOLVE THE PROBLEM OF IDENTITY THEFT Contact Fides Cloud 26 Saddle Drive Woodmead Office Park Van Reenen Ave, Woodmead Johannesburg, South Africa Phone Fax Web.

BURSARY APPLICATION 2. APPLICATIONS TO TERTIARY INSTITUTES ARE YOUR OWN RESPONSIBILITY AND WILL NOT BE DONE BY ANGLOGOLD ASHANTI.

BURSARY APPLICATION 2. APPLICATIONS TO TERTIARY INSTITUTES ARE YOUR OWN RESPONSIBILITY AND WILL NOT BE DONE BY ANGLOGOLD ASHANTI. SOUTH AFRICA REGION HUMAN RESOURCES DEPARTMENT AngloGold Ashanti Limited \ Reg. No.1944/017354/06 76 Jeppe Street \ Johannesburg \ 2001 \ PO Box 62117 \ Marshalltown \ 2107 \ South Africa Tel +27 (0)11

More information

PITTSBURGH CARE PARTNERSHIP, INC. COMMUNITY LIFE PROGRAM POLICIES AND PROCEDURES. Identity Theft Prevention Program Policy for Health Care Providers

PITTSBURGH CARE PARTNERSHIP, INC. COMMUNITY LIFE PROGRAM POLICIES AND PROCEDURES. Identity Theft Prevention Program Policy for Health Care Providers SUBJECT: Identity Theft Prevention Program Policy for Health Care Providers NUMBER: 1022 REG. REF.: Identity Theft Red Flags Rule (the Rule ), 16 C.F.R. 681, adopted by the Federal Trade Commission Adoption

More information

THE INSIDE VIEW TAX FREE SAVINGS ACCOUNT APPLICATION FORM NATURAL PERSONS DOCUMENT CHECKLIST INVESTOR DETAILS

THE INSIDE VIEW TAX FREE SAVINGS ACCOUNT APPLICATION FORM NATURAL PERSONS DOCUMENT CHECKLIST INVESTOR DETAILS TAX FREE SAVINGS ACCOUNT APPLICATION FORM THE INSIDE VIEW NATURAL PERSONS No instruction will be processed unless all requirements have been met, all relevant documentation received and the money is reflected

More information

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used? esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents

More information

APPLICATION FOR COMPENSATION Section 137 of the Firearms Control Act, 2000 (Act No 60 of 2000)

APPLICATION FOR COMPENSATION Section 137 of the Firearms Control Act, 2000 (Act No 60 of 2000) SAPS 0(d) SOUTH AFRICAN POLICE SERVICE APPLICATION FOR COMPENSATION Section of the Firearms Control Act, 000 (Act No 0 of 000) OFFICIAL DATE STAMP A. FOR OFFICIAL USE BY THE POLICE STATION WHERE THE APPLICATION

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

1.Requirements to apply for a new Smart ID Card?

1.Requirements to apply for a new Smart ID Card? 1.Requirements to apply for a new Smart ID Card? SA Citizen: Green bar-coded ID. First time applicant: Birth Certificate, proof of address and in case of minors, must be accompanied by the parent/s. Permanent

More information

ESTABLISHING AND MANAGING BUSINESS RELATIONSHIPS CUSTOMER IDENTIFICATION AND VERIFICATION

ESTABLISHING AND MANAGING BUSINESS RELATIONSHIPS CUSTOMER IDENTIFICATION AND VERIFICATION ESTABLISHING AND MANAGING BUSINESS RELATIONSHIPS CUSTOMER IDENTIFICATION AND VERIFICATION Legal background As part of the South African government's fight against money laundering, the Financial Intelligence

More information

Microenterprise Access to Banking Services Program General Security and Internal Control

Microenterprise Access to Banking Services Program General Security and Internal Control Microenterprise Access to Banking Services Program General Security and Internal Control Accreditation and Implementation Training On Mobile Phone Banking Services 1 Objectives Provide security features

More information

Key Considerations for Documentation Management Technology. Learning from Local Experience

Key Considerations for Documentation Management Technology. Learning from Local Experience Key Considerations for Documentation Management Technology Learning from Local Experience Agenda Document Management Systems Key Considerations Types of Document Management Systems Hardware/Software Requirements

More information

SOUTH AFRICAN POLICE SERVICE

SOUTH AFRICAN POLICE SERVICE SAPS 0 SOUTH AFRICAN POLICE SERVICE APPLICATION FOR MULTIPLE IMPORT OR EXPORT PERMIT/ PERMANENT IMPORT OR EXPORT PERMIT/TEMPORARY IMPORT OR EXPORT PERMIT/IN-TRANSIT PERMIT FOR PERSONAL USE (Individuals

More information

APPLICATION FOR ACCREDITATION FOR BUSINESS PURPOSES Section 8 of the Firearms Control Act, 2000 (Act No 60 of 2000)

APPLICATION FOR ACCREDITATION FOR BUSINESS PURPOSES Section 8 of the Firearms Control Act, 2000 (Act No 60 of 2000) SAPS 9(a) SOUTH AFRICAN POLICE SERVICE APPLICATION FOR ACCREDITATION FOR BUSINESS PURPOSES Section 8 of the Firearms Control Act, 000 (Act No 0 of 000) OFFICIAL DATE STAMP A. FOR OFFICIAL USE BY THE POLICE

More information

The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies

The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies By Rob Sims, Director, Life Science, UL EduNeering When a Life Science

More information

Identity Verification Program Guide

Identity Verification Program Guide Identity Verification Program Guide The National Crime Prevention and Privacy Compact Council (Compact Council) is a15-member body of local, state, and federal governmental officials which prescribes system

More information

Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments

Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments Executive Summary Modern Banks increasingly find the need to enable customers to sign up for Banking products without having

More information

Ch. 435a KEY, GAMING & NONGAMING EMPLOYEES 58 435a.1. CHAPTER 435a. KEY, GAMING AND NONGAMING EMPLOYEES; BOARD-ISSUED CREDENTIALS

Ch. 435a KEY, GAMING & NONGAMING EMPLOYEES 58 435a.1. CHAPTER 435a. KEY, GAMING AND NONGAMING EMPLOYEES; BOARD-ISSUED CREDENTIALS Ch. 435a KEY, GAMING & NONGAMING EMPLOYEES 58 435a.1 CHAPTER 435a. KEY, GAMING AND NONGAMING EMPLOYEES; BOARD-ISSUED CREDENTIALS Sec. 435a.1. 435a.2. 435a.3. 435a.4. 435a.5. 435a.6. 435a.7. 435a.8. 435a.9.

More information

AADHAAR E-KYC SERVICE

AADHAAR E-KYC SERVICE UIDAI Unique Identification Authority of India Planning Commission, Govt. of India, 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR E-KYC SERVICE NOVEMBER 2012

More information

College of Education Computer Network Security Policy

College of Education Computer Network Security Policy Introduction The College of Education Network Security Policy provides the operational detail required for the successful implementation of a safe and efficient computer network environment for the College

More information

FundsAtWork Umbrella Funds Retirement form

FundsAtWork Umbrella Funds Retirement form FundsAtWork Umbrella Funds etirement form Member number Please attach the following documents: A certified copy of the member s ID/Passport. If applicable, the proposal/s or annuity application form/s.

More information

financial intelligence centre REPUBLIC OF SOUTH AFRICA

financial intelligence centre REPUBLIC OF SOUTH AFRICA financial intelligence centre REPUBLIC OF SOUTH AFRICA PUBLIC COMPLIANCE COMMUNICATION No. 15 (PCC15) THE ACCEPTANCE OF A SMART CARD IDENTIFICATION DOCUMENT ISSUED BY THE DEPARTMENT OF HOME AFFAIRS FOR

More information

Reload Mobile Money FAQs 1. Buying a Reload card. Activation of a Reload account

Reload Mobile Money FAQs 1. Buying a Reload card. Activation of a Reload account Reload Mobile Money FAQs 1. What is Reload Mobile Money and Visa Card? Reload is a prepaid Mobile Money account that is activated using your cellular phone number and giving you access to your funds via

More information

INVESTOR PRESENTATION NYSE:IDN. October 28, 2015

INVESTOR PRESENTATION NYSE:IDN. October 28, 2015 INVESTOR PRESENTATION NYSE:IDN October 28, 2015 Safe Harbor Statement Certain statements in this presentation constitute forward-looking statements within the meaning of the Private Securities Litigation

More information

11:00 a.m. The closing time will be as per the clock at the RAF reception

11:00 a.m. The closing time will be as per the clock at the RAF reception RFB NUMBER: RAF/2015/00019 DESCRIPTION: Request for Information: ICT Security Solutions PUBLISH DATE: 18 September 2015 VALIDIY PERIOD: 120 days from the closing date CLOSING DATE: 20 October 2015 CLOSING

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

Project Management Programme (NQF 5)

Project Management Programme (NQF 5) Getting down to business with our Project Management Programme (NQF 5) POTCHEFSTROOM BESIGHEIDSKOOL BUSINESS SCHOOL NORTH-WEST UNIVERSITY YUNIBESITI YA BOKONE-BOPHIRIMA NOORDWES-UNIVERSITEIT POTCHEFSTROOM

More information

Secured Signing for Documents

Secured Signing for Documents Signing Documents in the Cloud Moving Local Government Forward ALGIM 2011 Annual Conference Mike Eyal TME Consulting Ltd, MD Current Signing Process Agenda Why Sign Documents Online? DS Solutions for Local

More information

Security and Security Certificates for OpenADR systems. Background. Content:

Security and Security Certificates for OpenADR systems. Background. Content: Security and Security Certificates for OpenADR systems Content: Background... 1 Setup for OpenADR... 2 Test-, Evaluation-, and Production Certificates... 3 Responsibilities... 3 Certificate Requesting

More information

National Association of Pharmacy Regulatory Authority s Privacy Policy for Pharmacists' Gateway Canada

National Association of Pharmacy Regulatory Authority s Privacy Policy for Pharmacists' Gateway Canada Introduction National Association of Pharmacy Regulatory Authority s Privacy Policy for Pharmacists' Gateway Canada This Privacy Policy describes the manner in which the National Association of Pharmacy

More information

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009 Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )

More information

DHS / UKvisas Project

DHS / UKvisas Project for the DHS / UKvisas Project November 14, 2007 Contact Point Elizabeth Gaffin Associate Counsel United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief

More information

Directorate of Financial Aid. National Student Financial Aid Scheme (NSFAS)

Directorate of Financial Aid. National Student Financial Aid Scheme (NSFAS) Directorate of Financial Aid National Student Financial Aid Scheme (NSFAS) Online Applications Manual for 2016 IMPORTANT INFORMATION!! 1. 2016 NSFAS Applications will be open from 1 July 2015. Closing

More information

ST. CLOUD STATE UNIVERSITY BACKGROUND CHECKS - VERIFICATION OF QUALIFICATIONS PROCEDURE

ST. CLOUD STATE UNIVERSITY BACKGROUND CHECKS - VERIFICATION OF QUALIFICATIONS PROCEDURE TYPE OF PROCEDURE: All University TITLE: Background Checks - Verification of Qualifications Procedure RELATED POLICY: Verification of Qualifications and Background Checks Policy Required Verification of

More information

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

Arkansas Department of Information Systems Arkansas Department of Finance and Administration Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state

More information

Learning Management System Evaluation Guide

Learning Management System Evaluation Guide Learning Management System Evaluation Guide With more than 400 companies with sites in 30 countries, and over 35 million training assignments completed, UL EduNeering is in a unique position to share best

More information

Guidelines for Completion of Taxicab or Public Transit Driver License Compliance with Chapter 114 of the Bowling Green Codified Ordinances

Guidelines for Completion of Taxicab or Public Transit Driver License Compliance with Chapter 114 of the Bowling Green Codified Ordinances Guidelines for Completion of Taxicab or Public Transit Driver License Compliance with Chapter 114 of the Bowling Green Codified Ordinances Obtain the Application from the City of Bowling Green Office of

More information

Nearly all countries award

Nearly all countries award #1. Reverse Tax Burden-of-Proof E-Signatures Guaranteed certainty through legally recognized security technology Nearly all countries award exceptional evidence status to high-quality electronic signatures.

More information

debt collection software PRIVACY POLICY

debt collection software PRIVACY POLICY debt collection software PRIVACY POLICY debt collection software Our Commitment to Your Privacy Swordfish Software CC ( Swordfish, we or us) is committed to protecting your privacy. We value the trust

More information

CSR Breach Reporting Service Frequently Asked Questions

CSR Breach Reporting Service Frequently Asked Questions CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could

More information

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008 Green University Identity Theft Prevention Program Effective beginning October 31, 2008 1 I. PROGRAM ADOPTION Green University ( University ) developed this Identity Theft Prevention Program ("Program")

More information

Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009

Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009 Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention

More information

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA

More information

Texas A&M International University Identity Theft Prevention Program

Texas A&M International University Identity Theft Prevention Program Texas A&M International University Identity Theft Prevention Program 1 I. PROGRAM ADOPTION Texas A&M International University ( University ) developed this Identity Theft Prevention Program ( Program )

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

Student Application Form

Student Application Form 2017 LI MPOP OOFF LI MPOPOO Y UUN NI IVVEERRSSITITY Student Application Form Under - Graduate Post - Graduate Central Enrolment Contacts: University Registrar University of Limpopo Private Bag X1106 Sovenga,

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Eastern Kentucky University Policy and Regulation Library 6.#.#P Volume 6, Volume Title: Financial Affairs Chapter #, Chapter Title Section #, Name: Identity Theft Prevention Policy Approval Authority:

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Server Security Checklist (2009 Standard)

Server Security Checklist (2009 Standard) Server Security Checklist (2009 Standard) Server identification and location: Completed by (please print): Date: Signature: Manager s signature: Next scheduled review date: Date: Secure Network and Physical

More information

Protecting Your Business Since 2006. Protecting Your Business Since 2006

Protecting Your Business Since 2006. Protecting Your Business Since 2006 Protecting Your Business Since 2006 Protecting Your Business Since 2006 About Us Our company s character is defined through the essential and enduring tenets and principles that guide our work and relationships

More information

EMPLOYMENT APPLICATION We are an Equal Opportunity Employer

EMPLOYMENT APPLICATION We are an Equal Opportunity Employer EMPLOYMENT APPLICATION We are an Equal Opportunity Employer Please print in ink. You must complete entire application. Date: Applicant Information Name (first, middle, last) (street, city, state, zip code)

More information

Instructions: 1) Fill in and complete this Change of Details Form (Black People) (this 'Form') in CAPITAL LETTERS and black ink.

Instructions: 1) Fill in and complete this Change of Details Form (Black People) (this 'Form') in CAPITAL LETTERS and black ink. (Incorporated in the Republic of South Africa) (Registration number 2010/004693/06) [This is the form to be completed by Black People that are already MTN Zakhele Shareholders if they want to change, update,

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Implemented October 2009 Page 1 Table of Contents Background... 3 Purpose... 3 Definitions... 3 Pretext Calling... 4 Receiving Telephone Calls... 5 Change of Address...

More information

Why You Should Consider Cloud- Based Email Archiving. A whitepaper by The Radicati Group, Inc.

Why You Should Consider Cloud- Based Email Archiving. A whitepaper by The Radicati Group, Inc. . The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Why You Should Consider Cloud- Based

More information

Minnesota State University, Mankato

Minnesota State University, Mankato Minnesota State University, Mankato Identity Theft Prevention Program (Updated July 2009) BACKGROUND Red Flag Overview, Summary of Law and Regulation: The Federal Trade Commission (FTC), the federal bank

More information

BACKGROUND CHECK POLICY

BACKGROUND CHECK POLICY BACKGROUND CHECK POLICY Introduction: How to Use This Template Background checks are an invaluable element of a robust selection process. A well-developed background check process helps in validating employee

More information

How to use your new card. Tomorrow s Queensland: strong, green, smart, healthy and fair

How to use your new card. Tomorrow s Queensland: strong, green, smart, healthy and fair How to use your new card Tomorrow s Queensland: strong, green, smart, healthy and fair Safer, stronger cards for Queenslanders The Queensland Government has used the latest technology to make new Queensland

More information

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,

More information

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013 MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Identity and Access Management Authoritive Identity Source User Identity Feed and Role Management

More information

09-3145313-4 09-2345325 website: www.cenbank.org. August 11, 2003. Ref: BSD/12/2003 CIRCULAR TO ALL BANKS

09-3145313-4 09-2345325 website: www.cenbank.org. August 11, 2003. Ref: BSD/12/2003 CIRCULAR TO ALL BANKS 09-3145313-4 09-2345325 website: www.cenbank.org August 11, 2003 Ref: BSD/12/2003 CIRCULAR TO ALL BANKS MINIMUM ACCOUNT OPENING REQUIREMENTS BY BANKS Further to our circulars Ref: BSD/DO/CIR/V.1/01/24

More information

Welcome to the ODE Secure Web Portal User Guide

Welcome to the ODE Secure Web Portal User Guide Welcome to the ODE Secure Web Portal User Guide If you followed the directions below and cannot complete the sign-up process for some reason, please contact the Security Administrator by clicking this

More information

K-Series Guide: Guide to digitising your document and business processing. February 2014 LATEST EDITION

K-Series Guide: Guide to digitising your document and business processing. February 2014 LATEST EDITION K-Series Guide: Guide to digitising your document and business processing February 2014 LATEST EDITION Kefron are the Document Kefron & simplifies the document and Information information management world

More information

Department of the Interior Privacy Impact Assessment

Department of the Interior Privacy Impact Assessment Department of the Interior Privacy Impact Assessment March 25, 2013 Name of Project: Laserfiche Document Management System (LDMS) Major Application (MA) Bureau: Office of the Secretary (OS) Project s Unique

More information

Introduction to The Privacy Act

Introduction to The Privacy Act Introduction to The Privacy Act Defense Privacy and Civil Liberties Office dpclo.defense.gov 1 Introduction The Privacy Act (5 U.S.C. 552a, as amended) can generally be characterized as an omnibus Code

More information

Enhancing IT Systems with Cloud Mobility. Service Management Expo 2014

Enhancing IT Systems with Cloud Mobility. Service Management Expo 2014 Enhancing IT Systems with Cloud Mobility Service Management Expo 2014 Is Mobility Important to Business Executives? Accenture s 2014 mobility study explores how companies are applying digital technologies

More information

6Towns Credit Union. 6Towns Account Membership

6Towns Credit Union. 6Towns Account Membership 6Towns Credit Union. 6Towns Account Membership Identification and address verification March 2015 Page 1 of 5 6Towns Account identification and address verification requirements. Why do we need documentary

More information

Type of Certificate: Secure Email Certificate

Type of Certificate: Secure Email Certificate Validity of Certificate (tick one): 1 year 2 years Class of Certificate (tick one): Class 2 Class 3 RA Name: Request No: 1) Please read the Instructions Box to fill this form. 2) Please fill the Application

More information

Pharmaceutical, Biotech and Medical Device Manufacturers. Be Compliant and Audit Ready - Implement an LMS!

Pharmaceutical, Biotech and Medical Device Manufacturers. Be Compliant and Audit Ready - Implement an LMS! Pharmaceutical, Biotech and Medical Device Manufacturers Be Compliant and Audit Ready - Implement an LMS! Organizations in the life sciences industry such as pharmaceuticals, medical devices and biotech

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

Massachusetts Executive Office of Public Safety and Security Statewide Applicant Fingerprint Identification Services (SAFIS) Program

Massachusetts Executive Office of Public Safety and Security Statewide Applicant Fingerprint Identification Services (SAFIS) Program Massachusetts Executi ive Office of Public Safety and Security Statewidee Applicant Fingerprint Identification Services (SAFIS) Program Reg gistration Guide Pre-K-12 th Grade Education (ESE) Contents About

More information

2015 Annual Screening Report

2015 Annual Screening Report 2015 Annual Screening Report Insights & Advice Employee Background Screening in South Africa 2015. Table of Contents Report Introduction 3 Criminal Record Checks (AFIS) 4 Fraud Checks (SAFPS) 6 Credit

More information

Application for Retirement Income Plan Guaranteed Escalator Annuity

Application for Retirement Income Plan Guaranteed Escalator Annuity Application for Retirement Income Plan Guaranteed Escalator Annuity Contact us Tel: 0860 67 5777, PO Box 653574, Benmore, 2010, www.discovery.co.za Content of this form Page 1. About the investor 1 2.

More information

SME Business Lending. Application Form. www.aib.ie/business

SME Business Lending. Application Form. www.aib.ie/business SME Business Lending Application Form www.aib.ie/business Contents Part 1 Part 2 Part 3 Part 4 (i) Business Details Personal Details Application Details Data Protection Notice Part 4 (ii) Declaration Three

More information

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming

More information

APPLICATION FORM (Please complete in BLOCK CAPITALS)

APPLICATION FORM (Please complete in BLOCK CAPITALS) SHORTWOOD TEACHERS' COLLEGE 77 Shortwood Road, Kingston 8 Telephone 924-1095-7 APPLICATION FORM (Please complete in BLOCK CAPITALS) OFFICE USE ONLY Receipt No. ( ) Pictures ( ) Recommendations ( ) Academic

More information

SECURE DIGITAL SIGNATURES FOR APPRAISERS

SECURE DIGITAL SIGNATURES FOR APPRAISERS ABSTRACT An appraiser s credibility is represented by a valid license and the signature affixed to a report. Providing a common requirement for the creation of digital signatures for licensed or certified

More information

The Leading Provider of Identity Solutions and Services in the U.S.

The Leading Provider of Identity Solutions and Services in the U.S. THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that

More information

Knowledge-Based Authentication Challenge Response System

Knowledge-Based Authentication Challenge Response System Knowledge-Based Authentication Challenge Response System Kevin Trilli Director, Product Management VeriSign, Inc. Bill Andrews Sr. Manager, Product Management Lightbridge, Inc. Purpose and Agenda Purpose

More information

PPS TAX FREE INVESTMENT ACCOUNT APPLICATION FORM

PPS TAX FREE INVESTMENT ACCOUNT APPLICATION FORM APPLICATION FORM PROFESSIONAL PROVIDENT SOCIETY INVESTMENTS PROPRIETARY LIMITED ( PPS INVESTMENTS ) CLIENT SERVICE CENTRE CONTACT DETAILS TEL: 0860 468 777 (0860 INV PPS) FAX: 021 680 3680 EMAIL: admin@ppsinvestments.co.za

More information

Securing Your Software for the Mobile Application Market

Securing Your Software for the Mobile Application Market WHITE PAPER: SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET White Paper Securing Your Software for the Mobile Application Market The Latest Code Signing Technology Securing Your Software for

More information

FINANCIAL ADVISOR REGISTRATION FORM

FINANCIAL ADVISOR REGISTRATION FORM FINANCIAL ADVISOR REGISTRATION FORM COMPLETION OF THIS FORM IS REQUIRED FOR REGISTRATION IN THE UNIVERSITY OF ALABAMA PLAYER-FINANCIAL ADVISOR PROGRAM. NOTE: This form must be completed in its entirety.

More information

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of

More information

NEC Application Form

NEC Application Form Section 1: Study Program I am interested in applying for: I prefer to start in: Foundations of Business Program B.A. - International Management M.A. - International Management October February June M.B.A.

More information

Dr R L Straszacker SCHOLARSHIP FOR CHILDREN OF ESKOM EMPLOYEES TECHNIKON STUDIES

Dr R L Straszacker SCHOLARSHIP FOR CHILDREN OF ESKOM EMPLOYEES TECHNIKON STUDIES Dr R L Straszacker SCHOLARSHIP FOR CHILDREN OF ESKOM EMPLOYEES TECHNIKON STUDIES APPLICATION FORM To: The Student Development Manager Dr R L Straszacker Scholarship Scheme Eskom P O Box 1091, Johannesburg

More information

Signicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08

Signicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Signicat white paper Signicat Solutions This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Version 1.1 2015-08-20 Disclaimer Please note that this

More information

01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) 01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) Authority: Board of Trustees History: Effective May 1, 2009 (approved initially April 24, 2009) Source of Authority: Related Links: Responsible Office:

More information

Kroger Supplier Information Management System (SIM) Training Documentation

Kroger Supplier Information Management System (SIM) Training Documentation Kroger Supplier Information Management System (SIM) Training Documentation Introduction All Kroger suppliers are required to register in Kroger s new Supplier Information Management (SIM) system. The SIM

More information

www.gdeadmissions.gov.za

www.gdeadmissions.gov.za FACT PAGE FOR THE ON-LINE APPLICATION FOR NEW APPLICANTS FOR THE 2017 LEARNER INTAKE www.gdeadmissions.gov.za First time applicants for Grade 1 and 8 2017 learner intake must apply on-line. No transfers

More information

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009 Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program

More information

BUSINESS GUIDE SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY

BUSINESS GUIDE SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET THE LATEST CODE SIGNING TECHNOLOGY Now from CONTENTS 1 THE CHALLENGE 1 A BRIEF REVIEW OF CODE SIGNING 2 THE SOLUTION 2 HOW THE CODE SIGNING PORTAL

More information

Introduction. Editions

Introduction. Editions Introduction TRAIN TRACK Employee Training Management Software gives you the tools you need to make sure employee training requirements are met. Assign required training for groups or individuals. Easily

More information

A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or

A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or SBA Procedural Notice TO: All SBA Employees CONTROL NO.: 5000-1323 SUBJECT: Acceptance of Electronic Signatures in the 7(a) and 504 Loan Program EFFECTIVE: 10/21/14 The purpose of this Notice is to inform

More information

WHY YOU SHOULD CONSIDER CLOUD BASED EMAIL ARCHIVING.

WHY YOU SHOULD CONSIDER CLOUD BASED EMAIL ARCHIVING. WHY YOU SHOULD CONSIDER CLOUD BASED EMAIL ARCHIVING. INTRODUCTION A vast majority of information today is being exchanged via email. In 2011, the average corporate user will send and receive about 112

More information

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Post-Graduate Diploma in Business Administration. be worth more

Post-Graduate Diploma in Business Administration. be worth more be worth more be worth more Message from the Director The Postgraduate Diploma in Business Administration introduces a new phase to the academic offering of the UFS Business School. The PGDip is a natural

More information

Employment Application

Employment Application Employment Application Please complete this application as completely and accurately as possible PERSONAL INFORMATION Today s Date Name: Last First Middle Social Security Number Address Home Telephone

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

Biometrics in Identity as a Service

Biometrics in Identity as a Service Daon - your trusted Identity Partner Biometrics in Identity as a Service What is BaaS and who is doing it? Catherine Tilton 28 September 2011 The Need As the world becomes more interdependent, as transactions

More information

Tasmanian Government Identity and Access Management Toolkit

Tasmanian Government Identity and Access Management Toolkit Tasmanian Government Identity and Access Management Toolkit Summary January 2010 Department of Premier and Cabinet For further information on the Toolkit, contact the Office of egovernment: egovernment@dpac.tas.gov.au

More information

General Support System

General Support System PRIVACY IMPACT ASSESSMENT JUNE 30, 2015 General Support System Does the CFPB use the information to benefit or make a determination about an individual? No. What is the purpose? Store and Transmit all

More information

Information Governance Toolkit Policy

Information Governance Toolkit Policy Information Governance Toolkit Policy UNIQUE REF NUMBER: AC/IG/014/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT

More information

DEPARTMENT OF STATE PRIVACY IMPACT ASSESSMENT

DEPARTMENT OF STATE PRIVACY IMPACT ASSESSMENT DEPARTMENT OF STATE PRIVACY IMPACT ASSESSMENT Integrated Document Management and Analysis System (IDMAS) (Updated April 2008) Conducted by: Bureau of Administration Information Sharing Services Office

More information