Dealing Effectively with Address Changes A Best Practices Approach. April Dealing Effectively with Address Changes A Best Practices Approach

Size: px
Start display at page:

Download "Dealing Effectively with Address Changes A Best Practices Approach. April Dealing Effectively with Address Changes A Best Practices Approach"

Transcription

1 April 2013

2 THE IMPACT OF ADDRESS CHANGES Most people don t sit around all day thinking about address changes, but at ID Insight Inc. we do. OK, maybe we aren t sitting around all day, but we definitely think about address changes a lot. It is the very reason why ID Insight was founded. Back in 2003 identity theft was increasing at double-digit rates, and the leading indicator was you guessed it a change of address. Since that time, however, we have realized that the address change event is not only an indicator of possible identity theft, but so much more. Why focus on address changes? Address changes are a major life-stage event with many inherent risks and rewards that amount to billions of dollars in impact to financial services companies. While an address change is simple in nature, it impacts financial services companies in many ways. Think about your own address change experiences. Maybe you just got married and moved into that new home or - you may have taken a new job across the country or - the kids have moved off into the world and you are now down-sizing. From a financial services perspective, you can quickly see that how someone moves can have a significant bearing on their financial needs. And it is not just related to addressing a customer s financial needs. Address changes create many operational impacts as well. If you are a financial services company and you begin to take a deep-dive look at address changes, you quickly realize that there are both good and bad outcomes that can happen when your customers change their address, including: Fraud Losses Compliance Requirements Operational Impacts Retention Issues Cross-Selling When we focus on the operational cost of an address change alone, we estimate the average cost to be in excess of $6.00 per change. When we look at retention and cross-selling, we observe that there are hundreds, if not thousands of dollars at stake. This White Paper outlines the various impacts of an address change and a best practices approach to minimize the risk and operational costs while optimizing the opportunity.

3 FRAUD AND COMPLIANCE The Problem The major fraud type associated with address changes is account takeover. In fact, the main focus of the Fair and Accurate Transaction Act (FACT Act) was address changes. The reason for regulation around address changes was due to this being the control point that is most commonly and easily compromised in a true identity theft situation. When you look at identity theft cases, a typical victim story you will hear is: Someone changed my address and then had a replacement card sent to them. They emptied my account in a couple of days. Since late 2008, financial services companies have been required to take action and screen address changes for the likelihood of account takeover. Since this requirement has been in place, we have observed that, overall, the initial strategies have done little to deter account takeover. According to the Javelin 2013 Identity Theft Report, account takeover fraud is up by 69% when compared to While fraud types can ebb and flow, it is becoming quite apparent that account takeover continues to become a larger problem whether you consider consumers or corporate accounts. Any way you cut it, account takeover remains a significant problem for the financial services industry. Through our work with banks of all sizes, we have observed that the average fraud loss associated with a single address change is over $4.00 on consumer accounts. FS-ISAC recently reported the average fraud loss per commercial account was over $26. Approaches When FACT Act Section 114(B) went into effect in November of 2008, this required financial institutions to screen address changes for the likelihood of account takeover identity fraud. Most institutions took the path of least resistance of mailing letters, implemented their plan, and have not significantly altered their procedures since. This is now beginning to change, especially as we understand that the initial procedures have done little to deter account takeover. If we look back in the rear-view mirror for a minute, here is a review of what was required for the FACT Act address change requirements:

4 FACT Act Section 114B: If the address associated with an account is changed, and within at least 30 days there is a request for a card on that same account, the card issuer must take one of the following actions before issuing the card: 1) Notify the cardholder of the request at the former address and provide a means of promptly reporting an incorrect address change, or; 2) Notify the cardholder of the request through other means of communication previously agreed to by the card issuer and cardholder, or; 3) Use some other means of assessing the validity of that address change, in accordance with responsible policies and procedures. The vast majority of financial services opted for Option #1 above. In speaking with hundreds of institutions, the most widely adopted approach to screening address changes for fraud is to send a first class piece of postal mail to either the former address, or both the former and new address. This security letter indicates that an address change was requested, giving the receiver of that mailing an opportunity to stop the fraud in process by notifying the institution. It is understandable why banks and credit unions would choose Option #1. It is both simple and easy. Banks and credit unions send letters every day, so sending a security letter is a fairly simple procedure to deploy on customers requesting an address change. However, as we saw earlier, it has had very little impact on reducing account takeover losses. There are many reasons why this approach is marginal in stopping account takeover: The account is wiped clean before the security letter ever arrives. The letter ends up in the junk mail pile, and never opened. The fraudsters will actually pick up the mail from the victim s box or select consumers who they know are not periodically monitoring their mail. The majority of financial institutions adopted this approach to meet the FACTA compliance requirements and most continue to do so today. While financial institutions are compliant, they have done so at a large cost adding to their expense line while not producing the intended results.

5 Best Practices Approach Increasingly, financial services companies are abandoning their initial Mail Strategy approach and adopting a reasonable / risk-based approach or option #3 under the FACT Act. This is resulting in detecting more fraud, faster, at a fraction of the cost. ID Insight was founded in 2003 with the idea that by looking at the data and information related to the address change itself, you could identify account takeover fraud. After nearly 10 years of developing our address change technology we know this to be true. And it makes sense. After researching thousands of true account takeover situations, there is one commonality: fraudsters don t typically perform their fraud at addresses similar to their victims. They tend to frequent very nomadic, anonymous address points to facilitate their crime. When we look at it from a data and analytics perspective, we will see things like: Why is John Smith moving from a 3,500 square foot, half-a-million-dollar owned home in suburban Milwaukee to a vacant industrial park address in the highest white-collar crime part of New York City, 1,000 miles away? The fundamental question becomes: Would you rather send John the snail mail asking him to call you or would you rather obtain this information the moment that the crook tried to fraudulently change the address? Thus far, over 700 banks and credit unions have adopted a risk-based approach to screening address changes. In short, using data and analytics to screen address changes. These institutions are able to immediately pass low risk address changes and review high risk address changes. In doing so, they are realizing the following benefits: They are significantly reducing fraud due to account takeover. We have observed the average savings to exceed $2.00 per address change. They are catching the fraud much faster. The address change is many times one clue amongst many that an account takeover is in process. By understanding the dynamics of the address change as it is happening, institutions are taking action much earlier and reducing their exposure. Because it is automated, institutions are able to have a clear and conspicuous audit trail to demonstrate that they screened every address change.

6 OPERATIONAL IMPACTS The Problem On the surface, address changes are relatively straightforward. However, when you get into the back office, you realize that one simple address change has many touch-points across the enterprise. The address change can come in through any number of channels such as phone centers, online or mail. Some of these channels are authenticated, while some are not. If a consumer has multiple accounts within an institution, this can result in many duplicate address changes. In addition to address changes coming from multiple systems and touch-points, address data tends to be ugly, with invalid addresses, addresses entered incorrectly, etc. This in turn leads to many operational problems such as returned mail, increased postage, destruction of cards and checks and other outcomes. Approaches As described above, the primary approach to deal with address changes is by mailing letters to the old and/or new address. While it is simple and allows an institution to comply with the FACT Act, it is most problematic from an operational perspective. Postage In addition to the low deterrence effect, sending mail is expensive and difficult to track effectively from an audit/compliance perspective. Financial services companies are the single largest mailer of statements and notices in the nation mailing over half of all mailed statements and notices. Overall, they spend over $7 billion per year to send these notices. When we look at an address change, we observe the average postage and fulfillment cost of an address change to be $2.00. Return Mail Address changes are also the major contributor to return mail. According to the United States Postal Service, approximately 75% of all returned mail is caused by a change of address. This is due to a variety of reasons including address information being entered incorrectly or the consumer never notifying the institution of their new address.

7 When you consider what a consumer does when they change their address with their financial institution, they do one of three things: 1) They notify their institution of the address change. 2) They do not notify their institution, but instead fill out the National Change of Address (NCOA) card at their local post-office. 3) They do not notify their institution nor fill out the NCOA card. We observe that approximately 67% of consumers will notify their financial institution of a change of address. We see that another 20% only fill out the NCOA card and the remaining 13% do not notify the institution or the Post Office. Notifies Institution Does not notify / Fills Out NCOA with the USPS Does not notify institution or USPS 20% 13% 67% How the consumer changed their address can have different consequences for the institution. If the consumer notifies the institution and the new address information is entered incorrectly, this will result in return mail. If they only notify the Post Office, the institution will receive a postcard indicating a change of address with the yellow sticker showing the new address. The institution then needs to resolve. The consumer notifies no one and the mail is sent back RETURN TO SENDER. These costs begin to add up fast. When we consider the overall return mail cost, we observe the average cost to be $1.90 per address change.

8 Interchange Impacts For those institutions mailing out letters, the FACT Act requires institutions to allow a reasonable period of time (typically days) to elapse after the mailing before they can send replacement or emergency cards to the customer. We have observed that approximately 7-10% of customers changing their address will order a replacement card in the first 60 days post-move. This is very disruptive as it comes at a time when the consumer is spending a lot of money. According to the latest survey results, the average new mover spends between $7,000 and $10,000 in the first 120 days post move. When institutions put a hold on card replacement it leads immediately to a loss in interchange revenue. Because the spend factor is so high, the average loss in interchange per address change can be nearly $4.00. Best Practices Approach Increasingly, financial institutions understand the very tangible costs of taking a manual approach towards address changes. Everyone is looking for cost takeout and address change processing is a good place to start. As we saw with fraud and compliance, institutions are moving away from manual methods toward an automated risk-based approach. Not only does this provide significant fraud savings, but also results in significant operational savings. Many of our clients that have moved to automated risk-based solutions have abandoned sending letters all together. This is now becoming the norm as institutions realize that maintaining the mailing of letters becomes unnecessary expense with little or no additional benefit. Others continue to mail letters as more of a belt and suspenders strategy. When it comes to return mail, there are additional savings that can be realized. Because every address change transaction is processed and run through address standardization routines, they are able to identify undeliverable mail before it goes out the door. According to Pitney Bowes, high-rise addresses with the apartment number missing results in a 31% return mail rate. Similarly, vacant lots have a 99% return mail rate. By screening these new addresses through various databases, clients are able to reduce the cost of return mail due to erroneous entry.

9 When consumers only fill out the NCOA card and the bank is notified of the address change by postcard, banks are able to instantly screen the address change and allow them to update or populate the new address into their Customer Information File. For the consumers that do not notify the institution or the post office, these customers end up in the lost category. In these cases, institutions can automate their return mail processing systems to send customer information to third party providers to find the customer at the new address. Moving from a mail-strategy to an automated risk-based system When it comes to loss of interchange revenue and decreased customer satisfaction due to placing a hold on replacement or emergency cards, we again see the ability to significantly and positively impact the customer experience and the bottom line. By moving to a risk-based real-time solution, resolution is immediate. As such, cards no longer need to be placed on hold as is required if you are sending letters. The institution is able to take action immediately on high risk cases and allow normal account maintenance activities to be performed. The result is no loss in interchange revenue as well as increased customer satisfaction. Impacts Mail Strategy Risk-Based Approach Fraud Losses $ 4.30 $ 2.15 Postage Costs $ 2.00 $ - Return Mail Costs $ 1.90 $ 0.63 Interchange $ 3.80 $ - TOTAL $ $ 2.78 When you add it all up, the impacts of moving to a risk-based approach are substantial. From above, we see the opportunity to reduce the average cost of an address change from $12.00 to less than $3.00. For a bank with 100,000 customers and a 10% annual address change rate, this can result in an annual savings of over $90,000.

10 CONCLUSIONS When you look under the hood at the anatomy of a typical address change, there are many touch-points within the institution producing many outcomes some good and some bad. Many times these impacts are not fully realized. For those institutions maintaining a manual process to screen address changes, they continue to spend more than they should, see more fraud than they should and lose more customers than they should. For those that are now moving to an automated risk-based approach, they are able to significantly reduce the costs, catch more fraud and realize more opportunity. For more information, please visit us at or give us a call at

How To Print Mail From The Post Office

How To Print Mail From The Post Office PRINTING AND MAILING, INC. Understanding Mailing UPDATED January 23, 2014 www.successprint.com www.successprint.com Let s Be Friends! 10 Pearl Street Norwalk, CT 06850 tel 203-847-1112 fax 203-846-2770

More information

5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper

5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper 5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business An IDology, Inc. Whitepaper No matter how big your company is or what industry you are in, every business typically

More information

Card Not Present Fraud Webinar Transcript

Card Not Present Fraud Webinar Transcript Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share

More information

Trends in Address Management

Trends in Address Management Trends in Address Management Index What is Address Management?... 3 Cleansing Dirty Data... 4 Rapid Addressing: The Better Solution... 4 Ease of Use... 5 Practical Deployment of Rapid Addressing... 5 360

More information

Trade Secrets to Connecting Your Mail to Better Business Outcomes

Trade Secrets to Connecting Your Mail to Better Business Outcomes Intelligent Mail can show the way to significant cost savings and business benefits for your customers 1 Abstract If mail is a major marketing and communications channel for your clients, then Intelligent

More information

How To Reduce The Cost Of Return Mail

How To Reduce The Cost Of Return Mail Identifying causes and identifying solutions 1 Abstract Return mail is often seen by many large volume mailers as a relatively minor problem that rarely warrants a focused effort to reduce costs or streamline

More information

Could a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year?

Could a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year? MANAGED IT SERVICES Could a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year? A lot of business owners, executives, and managers have a love-hate relationship with managed

More information

Arresting Fraud with Automated Notifications

Arresting Fraud with Automated Notifications Using automated Fraud Alert Notifications to reduce exposure and increase customer satisfaction. A Premiere Global Services Whitepaper Introduction Identity theft and fraud cost consumers and financial

More information

Fraud detection in newly opened accounts. Connecting data helps predict identity theft

Fraud detection in newly opened accounts. Connecting data helps predict identity theft Fraud detection in newly opened accounts Connecting data helps predict identity theft Executive summary Fraud continues to be a genuine threat and challenge. After a sharp and unexplained drop in identity

More information

Five Steps Towards Effective Fraud Management

Five Steps Towards Effective Fraud Management Five Steps Towards Effective Fraud Management Merchants doing business in a card-not-present environment are exposed to significantly higher fraud risk, costly chargebacks and the challenge of securing

More information

Clear and Present Payments Danger: Fraud Shifting To U.S., Getting More Complex

Clear and Present Payments Danger: Fraud Shifting To U.S., Getting More Complex Clear and Present Payments Danger: Fraud Shifting To U.S., Getting More Complex Q: Good morning, this is Alex Walsh at PYMNTS.com. I m joined by David Mattei, the vice president and product manager for

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

When to Leverage Video as a Platform A Guide to Optimizing the Retail Environment

When to Leverage Video as a Platform A Guide to Optimizing the Retail Environment When to Leverage Video as a Platform A Guide to Optimizing the Retail Environment Contents S1 An Industry in Transition Over the past few years, retail has seen seismic changes in how the customer shops.

More information

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the

More information

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority MEMBER IDENTITY PROTECTION Protect Your Identity Security of Personal Information is Our Top Priority Imagine this Unexpectedly, you get turned down for a loan, you get a call from a collection agency

More information

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively

More information

Internet PIN Debit: Aligning the Needs of Merchants, FIs and Consumers for Online Payments

Internet PIN Debit: Aligning the Needs of Merchants, FIs and Consumers for Online Payments Internet PIN Debit: Aligning the Needs of Merchants, FIs and Consumers for Online Payments By Javelin Strategy & Research June 2009 2009 Javelin Strategy & Research All Rights Reserved Executive Summary

More information

Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud

Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud Securing Internet Payments across Europe Guidelines for Detecting and Preventing Fraud Table of Contents Executive Summary Protecting Internet Payments: A Top Priority for All Stakeholders European Central

More information

5B OTTOM LINE F INDING THE I MPACTING GEMS HIDING IN YOUR DATA. Maximize the ROI of your next campaign with the data you already have.

5B OTTOM LINE F INDING THE I MPACTING GEMS HIDING IN YOUR DATA. Maximize the ROI of your next campaign with the data you already have. F INDING THE 5B OTTOM LINE I MPACTING GEMS HIDING IN YOUR DATA BROUGHT TO YOU BY Maximize the ROI of your next campaign with the data you already have. 38 % O F MARKETERS RAN CAMPAIGNS WITH THREE CHANNELS

More information

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative

More information

WHITEPAPER: GETTING SERIOUS ABOUT STOCK Take control of stock with an integrated ERP system

WHITEPAPER: GETTING SERIOUS ABOUT STOCK Take control of stock with an integrated ERP system GETTING SERIOUS ABOUT STOCK Take control of stock with an integrated ERP system Taking charge of stock control can be the difference between running a profitable business and a floundering one. We look

More information

Fraud Prevention and Detection for Credit and Debit Card Transactions

Fraud Prevention and Detection for Credit and Debit Card Transactions August 2009 Fraud Prevention and Detection for Credit and Debit Card Transactions Richard Collard Senior Business Lead and SME - Market Development ILOG, Software Sales, IBM Sales and Distribution Page

More information

Protect your credit. Guard your identity. BENEFITS GUIDE

Protect your credit. Guard your identity. BENEFITS GUIDE Protect your credit. Guard your identity. BENEFITS GUIDE Welcome to the Identity Watch Program Congratulations! You have taken an important step in safeguarding your identity from the impact of theft.

More information

Remote Deposit Capture: The Future of Check Processing BB&T Webinar March 28, 2007 Q&A Session

Remote Deposit Capture: The Future of Check Processing BB&T Webinar March 28, 2007 Q&A Session Remote Deposit Capture: The Future of Check Processing BB&T Webinar March 28, 2007 Q&A Session Q. What types of checks are eligible for remote deposit capture? A. All checks drawn on US banks are eligible

More information

Frequently Asked Questions Wellmark s Identity Protection Services Offering Member Q&A

Frequently Asked Questions Wellmark s Identity Protection Services Offering Member Q&A Learn More Frequently Asked Questions Wellmark s Identity Protection Services Offering Member Q&A Enrolling in identity protection services Q1. How can I enroll in identity protection services? A1. Enrollment

More information

Where Did My Customers Go? The Problem of Undeliverable-As-Addressed Mail

Where Did My Customers Go? The Problem of Undeliverable-As-Addressed Mail Where Did My Customers Go? 2 Where Did My Customers Go? The Problem of Undeliverable-As-Addressed Mail INTRODUCTION The U.S. Postal Service said it best when it noted in its recent annual report that Nothing

More information

Weeding Out For Results

Weeding Out For Results Weeding Out For Results Little known ways to cultivate direct mail results with minimal investment Plus: Three ways to deepen customer relationships without selling Picking the right dance partners for

More information

The Actionable Barcode

The Actionable Barcode Solutions for Enabling Lifetime Customer Relationships The Actionable Barcode How organizations have turned a new postal mandate into much-needed customer insight WHITE PAPER: CUSTOMER EXPERIENCE MANAGEMENT

More information

BUYER S GUIDE. The Unified Communications Buyer s Guide to Picking the Right Cloud Telephony Solution

BUYER S GUIDE. The Unified Communications Buyer s Guide to Picking the Right Cloud Telephony Solution BUYER S GUIDE The Unified Communications Buyer s Guide to Picking the Right Cloud Telephony Solution There s no better time for a business to embrace unified communications solutions. Actually, that s

More information

Identity Theft and Strategies for Crime Prevention

Identity Theft and Strategies for Crime Prevention Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What

More information

Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015

Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015 Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015 This document has several purposes: To explain what website maintenance is and why it's critical

More information

Are you listening to your customers?

Are you listening to your customers? Are you listening to your customers? It s more than just call recording BY NIGEL OLDING, PRODUCT DIRECTOR, ENGHOUSE INTERACTIVE White Paper - Are you listening to your customers? Traditionally, most service-based

More information

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM Program Adoption THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule, implementing

More information

RSA Adaptive Authentication For ecommerce

RSA Adaptive Authentication For ecommerce RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers

More information

Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty

Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty Conducted by Javelin Strategy & Research June 2010 All Rights Reserved Rising Fraud

More information

Using Proprietary Change of Address (PCOA) Processing to Enhance Mail Deliverability

Using Proprietary Change of Address (PCOA) Processing to Enhance Mail Deliverability Using Proprietary Change of Address (PCOA) Processing to Enhance Mail Deliverability Data is the least expensive component of a marketing campaign, but it is the deliverable that determines if all of the

More information

CREDIT PROCESSING. First Data takes you beyond with Credit solutions designed to meet the ever-evolving needs of your customers.

CREDIT PROCESSING. First Data takes you beyond with Credit solutions designed to meet the ever-evolving needs of your customers. CREDIT PROCESSING First Data takes you beyond with Credit solutions designed to meet the ever-evolving needs of your customers. Enabling innovative solutions through strategic alliances HOW WILL YOU GO

More information

Five Predictive Imperatives for Maximizing Customer Value

Five Predictive Imperatives for Maximizing Customer Value Five Predictive Imperatives for Maximizing Customer Value Applying predictive analytics to enhance customer relationship management Contents: 1 Customers rule the economy 1 Many CRM initiatives are failing

More information

Next Generation Tech-Talk. Cloud Based Business Collaboration with Cisco Spark

Next Generation Tech-Talk. Cloud Based Business Collaboration with Cisco Spark Next Generation Tech-Talk Cloud Based Business Collaboration with Cisco Spark 2 [music] 00:06 Phil Calzadilla: Hello, hello! Welcome. This is Phil Calzadilla founder and CEO of NextNet Partners, and I'd

More information

Now is the time for a fresh approach to detecting fraud

Now is the time for a fresh approach to detecting fraud Now is the time for a fresh approach to detecting fraud Learn where today s fraud detection falls short and what you can do about it. Read on. Table of Contents Now is the time for a fresh approach to

More information

California Treasures High-Frequency Words Scope and Sequence K-3

California Treasures High-Frequency Words Scope and Sequence K-3 California Treasures High-Frequency Words Scope and Sequence K-3 Words were selected using the following established frequency lists: (1) Dolch 220 (2) Fry 100 (3) American Heritage Top 150 Words in English

More information

Privacy, Identity, And Security: A Spotlight On Why Insurance Companies Should Offer Identity Theft Solutions

Privacy, Identity, And Security: A Spotlight On Why Insurance Companies Should Offer Identity Theft Solutions A Thought Leadership Spotlight September 2014 Commissioned By LifeLock Privacy, Identity, And Security: A Spotlight On Why Insurance Companies Should Offer Identity Theft Solutions Results Focusing on

More information

Published by www.practicebuildingcenter.com. - December 2004 -

Published by www.practicebuildingcenter.com. - December 2004 - - December 2004 - Greetings, Welcome to our end of the year special issue. This month I want to discuss the most important marketing and practice building issue that is most frequently overlooked by doctors.

More information

Phonics. High Frequency Words P.008. Objective The student will read high frequency words.

Phonics. High Frequency Words P.008. Objective The student will read high frequency words. P.008 Jumping Words Objective The student will read high frequency words. Materials High frequency words (P.HFW.005 - P.HFW.064) Choose target words. Checkerboard and checkers (Activity Master P.008.AM1a

More information

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service WHITE PAPER Managed Security Five Reasons to Adopt a Managed Security Service Introduction Cyber security presents many organizations with a painful dilemma. On the one hand, they re increasingly vulnerable

More information

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005

More information

THE INTELLIGENT APPROACH TO PRINT AND MAIL PRODUCTION

THE INTELLIGENT APPROACH TO PRINT AND MAIL PRODUCTION THE INTELLIGENT APPROACH TO PRINT AND MAIL PRODUCTION The Intelligent Approach to an Efficient Mailstream The mailstream is immense, diverse, rapidly changing and essential to world-class customer communication

More information

Financial Services Industry Solutions. Winning in the financial services marketplace for banks and credit unions

Financial Services Industry Solutions. Winning in the financial services marketplace for banks and credit unions Financial Services Industry Solutions Winning in the financial services marketplace for banks and credit unions Financial services industry is now at a major changing point Banks and credit unions are

More information

PayPoint.net Gateway Guide to Identifying Fraud Risks

PayPoint.net Gateway Guide to Identifying Fraud Risks PayPoint.net Gateway Guide to Identifying Fraud Risks Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced in any form or disclosed to

More information

What is Organizational Communication?

What is Organizational Communication? What is Organizational Communication? By Matt Koschmann Department of Communication University of Colorado Boulder 2012 So what is organizational communication? And what are we doing when we study organizational

More information

Hotel Operations Partner

Hotel Operations Partner Hotel Operations Partner Good evening everyone. Thanks so much for taking time out of your busy lives to celebrate with us. Because after all the time and experiences we ve had getting our beautiful Inn

More information

Good Call. A Guide to Driving Calls with AdWords

Good Call. A Guide to Driving Calls with AdWords Good Call A Guide to Driving Calls with AdWords Introduction Some people want to talk to a real person when they re looking for information. In fact, 70% of mobile searchers have called a business directly

More information

COMMON DISASTER RECOVERY PLAN MISCONCEPTIONS

COMMON DISASTER RECOVERY PLAN MISCONCEPTIONS TRUSTED TECHNOLOGY FOR BUSINESS COMMON DISASTER RECOVERY PLAN MISCONCEPTIONS ENSURING YOUR DR PLAN DOES NOT LEAD TO DISASTER Neverfail IT Continuity Engine Whitepaper Charles Street Solutions 28 Throgmorton

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

Introduction. We hope you find this series helpful and look forward to learning from each other. Let's get data inspired!

Introduction. We hope you find this series helpful and look forward to learning from each other. Let's get data inspired! Introduction Our customers often ask us to share our thoughts on marketing best practices. We may be a little biased, but we believe great marketing starts with great data, which is why we created the

More information

Cutting Paper: The SME FD's Guide to Document Management. A White Paper by Pegasus Software

Cutting Paper: The SME FD's Guide to Document Management. A White Paper by Pegasus Software Cutting Paper: The SME FD's Guide to Document Management Understanding the challenge Research 1 commissioned by Pegasus Software highlights that slow economic recovery combined with a steep increase in

More information

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login

More information

Introduction. ¹The rise of the digital bank, McKinsey & Company, (July 2014)

Introduction. ¹The rise of the digital bank, McKinsey & Company, (July 2014) Content Introduction 4 Delivering Data-Driven Unique Experiences 6 Peer Validation and Reassurance 8 Localized Targeting 10 Form Optimization 12 Identification of Visitors with High Lifetime Value 14 Omnichannel

More information

PERSPECTIVE. Will Gamification be the Game Changer in Insurance Distribution?

PERSPECTIVE. Will Gamification be the Game Changer in Insurance Distribution? PERSPECTIVE Will Gamification be the Game Changer in Insurance Distribution? Brenda is a new home owner in California. She researches online on the types of insurance covers available in the market and

More information

WhatWorks in Log Management EventTracker at San Bernardino County Superior Court

WhatWorks in Log Management EventTracker at San Bernardino County Superior Court WhatWorks in Log Management EventTracker at San Bernardino County Superior Court WhatWorks is a user-to-user program in which security managers who have implemented effective internet security technologies

More information

How child identity theft happens.

How child identity theft happens. How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver

More information

Regulation Costs in More Ways than One:

Regulation Costs in More Ways than One: View Point Regulation Costs in More Ways than One: Examining the implications relative to CSAT Sykes Enterprises, Incorporated l www.sykes.com l Tel. 1.813.274.1000 Introduction Everyone knows that regulation

More information

SIP BASED CONFERENCING MEET-ME CONFERENCING. Conferencing Defined:

SIP BASED CONFERENCING MEET-ME CONFERENCING. Conferencing Defined: SIP BASED CONFERENCING Conferencing Defined: Programs and meetings which may be for the purpose of presenting and exchanging information, comparing views, learning, planning and decision-making. www.dtic.mil/ieb_cctwg/contrib-docs/vtc001/sect3.htm

More information

Mobile Banking Adoption: Where Is the Revenue for Financial Institutions? Understanding the Value of Engaging Consumers in the Mobile Channel

Mobile Banking Adoption: Where Is the Revenue for Financial Institutions? Understanding the Value of Engaging Consumers in the Mobile Channel Mobile Banking Adoption: Where Is the Revenue for Financial Institutions? Understanding the Value of Engaging Consumers in the Mobile Channel It goes without saying that mobile is an important channel

More information

Converting Leads into Profitable Sales 5 Reasons Why Lead Verification Works. An IDology, Inc. Whitepaper

Converting Leads into Profitable Sales 5 Reasons Why Lead Verification Works. An IDology, Inc. Whitepaper Converting Leads into Profitable Sales 5 Reasons Why Lead Verification Works An IDology, Inc. Whitepaper While most marketers take long strides to measure the effectiveness of their campaigns, three little

More information

CDW Video Conferencing Straw Poll Report

CDW Video Conferencing Straw Poll Report CDW Video Conferencing Straw Poll Report Summary Consider this scenario: Your company is working with a key customer on a major project that involves several partners and colleagues in multiple locations.

More information

B2B Customer Satisfaction Research

B2B Customer Satisfaction Research Circle Research White Paper B2B Customer Satisfaction B2B Customer Satisfaction Research IN SUMMARY This paper on B2B customer satisfaction research: Identifies why customer satisfaction matters Provides

More information

Profit from Fee-Based Services By Jim Cuprisin, CIC, CRM, ARP

Profit from Fee-Based Services By Jim Cuprisin, CIC, CRM, ARP Profit from Fee-Based Services By Jim Cuprisin, CIC, CRM, ARP A new study from The National Alliance Research Academy answers many questions that insurance agents have about providing fee-based services

More information

15 Most Typically Used Interview Questions and Answers

15 Most Typically Used Interview Questions and Answers 15 Most Typically Used Interview Questions and Answers According to the reports made in thousands of job interviews, done at ninety seven big companies in the United States, we selected the 15 most commonly

More information

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity

More information

Ouachita Baptist University. Identity Theft Policy and Program

Ouachita Baptist University. Identity Theft Policy and Program Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program

More information

The Marketer s Guide To Building Multi-Channel Campaigns

The Marketer s Guide To Building Multi-Channel Campaigns The Marketer s Guide To Building Multi-Channel Campaigns Introduction Marketing is always changing. Currently there s a shift in the way we talk to customers and potential customers. Specifically, where

More information

Do You Know. Your Credit Rights? Federal Reserve Bank of Philadelphia

Do You Know. Your Credit Rights? Federal Reserve Bank of Philadelphia Do You Know Your Credit Rights? Federal Reserve Bank of Philadelphia 1 C redit can play an important role in your daily life. For example, you may use a credit card to make purchases, or you may obtain

More information

The Future of Address Validation

The Future of Address Validation Solutions for Customer Intelligence, Communications and Care. The Future of Address Validation Going Beyond Move Update to Cut Costs and Connect with Customers W H I T E PA P E R : MAILING EFFICIENCY AND

More information

Making Your Direct Mail Matter

Making Your Direct Mail Matter Making Your Direct Mail Matter Strategies To Cut Costs And Maximize Your ROI 2 Creating a marketing budget usually requires compromises on which areas to focus. No company can afford unlimited marketing

More information

Save money and stay in. compliance. Know. what you have, keep. what you must, eliminate. what you should.

Save money and stay in. compliance. Know. what you have, keep. what you must, eliminate. what you should. The solution Save money and stay in Know what you have, eliminate what you should. compliance. keep what you must, Manage and reduce paper as you bridge to digital. FileBRIDGE Paper actively manages your

More information

EMDEON REVENUE OPTIMIZATION SERVICES

EMDEON REVENUE OPTIMIZATION SERVICES EMDEON REVENUE OPTIMIZATION SERVICES TRANSFORM PREVIOUSLY WRITTEN-OFF PAYER UNDERPAYMENTS INTO REALIZED REVENUE Simplifying the Business of Healthcare Simplifying the Business of Healthcare Helping increase

More information

BOOST SALES & INCREASE CUSTOMER LOYALTY WITH A REFERRAL PROGRAM A WHITE PAPER

BOOST SALES & INCREASE CUSTOMER LOYALTY WITH A REFERRAL PROGRAM A WHITE PAPER BOOST SALES & INCREASE CUSTOMER LOYALTY WITH A REFERRAL PROGRAM $ A WHITE PAPER Contents 1 Boost Sales and Increase Customer Loyalty with a Referral Program 2 Executive Summary 3 The Speed of Business

More information

CONTEXT AWARE CONTENT MARKETING

CONTEXT AWARE CONTENT MARKETING CONTEXT AWARE CONTENT MARKETING FOUR STEPS TO THE FUTURE OF CONTENT, CONTEXT AND MARKETING SUCCESS Introduction Managing, delivering and consuming web content has changed. Yes, again. The universe of options

More information

secure Agent Secure Enterprise Solutions Remote Recovery from a Data Center Outage SecureAgent Software www.secureagent.com

secure Agent Secure Enterprise Solutions Remote Recovery from a Data Center Outage SecureAgent Software www.secureagent.com secure Agent Secure Enterprise Solutions SecureAgent Software Disaster Recovery Remote Recovery from a Data Center Outage SecureAgent Software 2448 E. 81 st St., Ste. 2000 Tulsa OK 74137-4271 USA Tel:

More information

Contents WHITE PAPER. Introduction

Contents WHITE PAPER. Introduction Contents Introduction... 2 Focus Areas for Digital Transformation of Your Business Systems... 3 User Experience Transformation - Re-Design for modern user experience... 4 Cloud enablement Augment Digital

More information

Who s Winning? How knowing the score can keep your team moving in the right direction. Who s Winning?

Who s Winning? How knowing the score can keep your team moving in the right direction. Who s Winning? Who s Winning? How knowing the score can keep your team moving in the right direction. Imagine sitting through an entire football game without knowing the score. The big day has arrived. It s Michigan

More information

CREATING A CONNECTED BRAND EXPERIENCE WITH VERIFONE.

CREATING A CONNECTED BRAND EXPERIENCE WITH VERIFONE. VALUE ADDS. CREATING A CONNECTED BRAND EXPERIENCE WITH VERIFONE. Retailers are continuously required to keep up with new innovations in order to retain customers and create an advantage over their competitors.

More information

DRIVING BUSINESS PERFORMANCE WITH BUSINESS INTELLIGENCE

DRIVING BUSINESS PERFORMANCE WITH BUSINESS INTELLIGENCE GERSTEIN LEGALTEC DRIVING BUSINESS PERFORMANCE WITH BUSINESS INTELLIGENCE A Finance Guide for Law Firms A White Paper by Todd Gerstein BI software allows you to easily aggregate, manipulate, and display

More information

Mistake #1: Assuming that lowest rate means lowest overall cost.

Mistake #1: Assuming that lowest rate means lowest overall cost. Introduction Congratulations you ve selected a top-notch e-commerce website solution. But you re not done yet. In fact, the next choice you make will be one of the most important in the process of setting

More information

Best Practices in Account Takeover

Best Practices in Account Takeover WHITEPAPER Best Practices in Account Takeover July 2013 2 Table of Contents Introduction 3 Account Takeover is Painful 4 Differences between Account Takeover and Account Compromise 4 Why Account Compromise

More information

Another Legal Guide from Bonallack & Bishop Solicitors

Another Legal Guide from Bonallack & Bishop Solicitors Another Legal Guide from Bonallack & Bishop Solicitors 80 PRACTICAL TIPS TO HELP COMBAT ALL YOU NEED TO KNOW INTRODUCTION... Over the last few years, identity theft has become one of the fastest growing

More information

Build customer relationships. through document creation, presentment and archiving. Ease regulatory compliance. Enhance marketing efforts

Build customer relationships. through document creation, presentment and archiving. Ease regulatory compliance. Enhance marketing efforts Solutions Overview Managing the Transactional Document Life Cycle Increase callcenter efficiency Enhance marketing efforts Ease regulatory compliance Manage complexity Build customer relationships through

More information

ROI. Build a Better ROI for Your Marketing. Print Email PURLs Mobile. HEIDI TOLLIVER-WALKER www.digitalprintingreports.com

ROI. Build a Better ROI for Your Marketing. Print Email PURLs Mobile. HEIDI TOLLIVER-WALKER www.digitalprintingreports.com Build a Better ROI for Your Marketing Print Email PURLs Mobile ROI HEIDI TOLLIVER-WALKER www.digitalprintingreports.com 11900 West Roosevelt Road Hillside, Illinois 60162 Ph. 708.236.4900 Fx. 708.236.5820

More information

State Mail Services: An Introduction. 1910 Darbytown Road Richmond VA 23231 Mail Stop Code: 194-16

State Mail Services: An Introduction. 1910 Darbytown Road Richmond VA 23231 Mail Stop Code: 194-16 State Mail Services: An Introduction 1910 Darbytown Road Richmond VA 23231 Mail Stop Code: 194-16 16 What is SMS State Mail Services (SMS) is a unit of the Department of General Services that provides

More information

A Glider guide to. Sales CONTract management. www.glider.com 1231 NW Hoyt St., Portland, OR 97209 info@glider.com 1 of 7

A Glider guide to. Sales CONTract management. www.glider.com 1231 NW Hoyt St., Portland, OR 97209 info@glider.com 1 of 7 A Glider guide to Sales CONTract management www.glider.com 1231 NW Hoyt St., Portland, OR 97209 info@glider.com 1 of 7 The Evolution. From paper to the web. From the biggest companies down to small, growing

More information

IBM Counter Fraud Signature Solutions

IBM Counter Fraud Signature Solutions IBM Counter Fraud Signature Solutions November 5th, 2013 Athens Carmen Ene, VP IBM Global Business Services, Europe Leader Counter Fraud & Financial Crimes Provider ID Theft o Claim for routine services

More information

MasterCard SecureCode Building Consumer Confidence, Extending Your Market Reach

MasterCard SecureCode Building Consumer Confidence, Extending Your Market Reach An Introduction for Issuers MasterCard SecureCode Building Consumer Confidence, Extending Your Market Reach The time is now for gaining greater control over nonface-to-face transactions, reassuring consumers

More information

The Value of Knowing More About Your Customers

The Value of Knowing More About Your Customers The Value of Knowing More About Your Customers How Customer Intelligence can Increase Contact Center Efficiency While Improving the Customer Experience Today s consumers are more demanding than ever. The

More information

calibrate confidence with Risk Management: The Critical Role of Measurement and Calibration WHITE PAPER SERVICES

calibrate confidence with Risk Management: The Critical Role of Measurement and Calibration WHITE PAPER SERVICES calibrate with confidence The Critical Role of Measurement and Calibration The ultimate goal of your company is to be profitable in providing a superior, effective, and safe product or service. Your use

More information

STEP 5: Giving Feedback

STEP 5: Giving Feedback STEP 5: Giving Feedback Introduction You are now aware of the responsibilities of workplace mentoring, the six step approach to teaching skills, the importance of identifying the point of the lesson, and

More information

5 Costly Inventory Mistakes (and how you can avoid them)

5 Costly Inventory Mistakes (and how you can avoid them) 5 Costly Inventory Mistakes (and how you can avoid them) grow Discover the Inventory Secrets of Successful Retailers When you set out on your dream voyage to own your own retail store your dream may have

More information

Enhanced Operations Management

Enhanced Operations Management Using Video Surveillance for Enhanced Operations Management 2015 VideoSurveillance.com LLC Using Video Surveillance for Enhanced Operations Management In the business world there is always a need to improve.

More information

Identity Theft Information

Identity Theft Information Identity Theft Information Houston Police Department Criminal Investigations Command Financial Crimes Unit 713-308-2500 The information contained on this page is intended to assist the citizens of Houston

More information

A California Business Privacy Handbook

A California Business Privacy Handbook A California Business Privacy Handbook April 2008 This brochure is for informational purposes and should not be construed as legal advice or as policy of the State of California. If you want advice in

More information