one admin. one tool. Providing instant access to hundreds of industry leading verification tools.
|
|
- Alban James
- 8 years ago
- Views:
Transcription
1
2 one admin. one tool. Providing instant access to hundreds of industry leading verification tools. With online transactions, risk management needs to be more than just a process. Businesses need a solution with advanced capabilities that provide optimal defense against fraud. Vogogo provides just that. Risk Management Introduction... Know Your Customers Compliance... Payment Risk Management & Processing Fraud Mitigation Merchant Underwriting Pricing & Contact
3 SECTION: RISK Management Advanced. Intelligent. Intuitive. Risk management solutions designed and customized to meet your business needs. Layered with advanced KYC software and AML/CTF monitoring processes, you can confidently validate your customers upon account creation and every transaction going forward. Vogogo s machine learning capability keeps your business protected with premium risk management coverage. The system learns fraud patterns and then seamlessly adjusts user interaction and transaction metrics based on desired risk thresholds. 5
4 Advanced multi-level KYC technology confidently identifies and analyzes customers. Globally $16 billion was stolen from 12.7 million identity fraud victims in The anonymous nature of online transactions exposes your business to illegal transactions and illicit activity. Verifying your customers is paramount to maintain the integrity and success of your business. Implementing industry leading KYC processes into your platform is easy with Vogogo. With numerous KYC checkpoints automated in near real-time, Vogogo will reduce your risk and optimize successful, verified users and their transactions. NAME TO ADDRESS Verifying your customers registered first and/or last name to address information, address type and length of residency. VERIFICATION Review accounts in-depth, from type of , age of account, customer details to account profile demographics. PHONE VERIFICATION Geo level information with detailed phone characteristics scanned down to phone owner name and billing address. PHONE BLOCKING Set parameters with immediate action to block specific phone types and high-risk phone characteristics of customers. ADVANCED IDV Includes Global ID match, from CPF to SSN ID, driver s license and passport checks, name, address, phone and DOB output. DATE OF BIRTH (DOB) Verification on date of birth down to month / day / year level; which in addition, validates country s legal age. SOCIAL VERIFICATION Confirm customers through their social media networking intel against their address and registrant information. IP RESOLUTION SCREENING Real-time geo location IP resolution monitoring and alerts. Scanning from country level down to city level. DEVICE FINGERPRINT Hardware device tracking and device ID verification provides further awareness of your customers intel to mitigate fraud. 7
5 SECTION: COMPLIANCE Management Comply with world regulations. Providing exceptional compliance for unmatched defense. Vogogo s powerful transaction and customer screening solutions offers unparalleled protection against money laundering and terrorist financing activities. Global sanction screening, AML / CTF reporting and suspicious activity alerts, in conjunction with Vogogo s advanced decision analytics fast-tracks the client assessment and on-boarding process. Integrating with Vogogo, you can effectively lower the cost of compliance, reduce exposure, increase operational efficiency and keep your business compliant. SANCTION SCREENING Customers are automatically validated against; OFAC, OSFL, UN, HM Treasury and PEP s watchlists with the ability to customize your compliance screening based on your business needs. SOURCE OF FUNDS With advanced bank verification easily confirm customers payment details down to bank location, name, account details, cross-referenced with registrant intel such as name, address, and phone. PAYMENT MONITORING Real-time transactional monitoring and reporting for suspicious or illicit activity. Sending alerts automatically to allow for quicker response times to minimize effects of fraudulent transactions. ADVANCED DUE DILIGENCE Comprehensive screening performed on all high-risk customers through technology and data collected from numerous global 3rd party providers. SUSPICIOUS ACTIVITY Vogogo s monitoring team will export data from the system to complete suspicious activity reports and file them to the appropriate regulatory bodies. AML / CTF REPORTING Vogogo monitors, reports and submits on all your transactions that are required to be filed to their appropriate regulatory bodies, keeping you properly compliant. 9
6 SECTION: PAYMENT Management Intelligently route transactions. Set parameters with system actions that are instantly applied, giving you full control over your payments. Understanding the risk model for online transactions allows businesses to increase profitability by customer, which inherently increases their life-time value. Vogogo helps reduce hard costs. Vogogo s transaction machine is integrated with premium data verification services that collects and validates users in near real-time based on their personal data, KYC and compliance checkpoints, transactional behaviors, payment verifications, and more. Vogogo then analyzes this data and authenticity of the user and transaction before it s submitted for processing and re-routes the transaction if needed. Minimizing your exposure and increasing your successful transactional rates. Customer routing works in tandem with multiple features of the Vogogo offering and requires a merchant to offer multiple payment options and/or processing channels to be viable. Essentially customers are directed to payment options based on the risk posed by their interaction with your system. A new customer frequently poses a greater risk to your business than an individual that has been regularly purchasing for weeks/months/years. Routing customers based on risk level is not a new idea, making it simple is! Vogogo can assist you in routing higher risk customers to payment options that pose a lower risk to your business. In a time where customer experience is paramount, declining as few transactions as possible, while preserving healthy relationships with payment processors is critical for any merchant doing business online. 11
7 Feature-rich payment processing. Risk management in front of each and every transaction. ADVANCED BANK VERIFY Available to less then 5% of the globes institutions. Vogogo is one. Confirm customers registrant intel crossed with detailed bank account intel and history. ACTIVITY INTELLIGENCE Vogogo s machine learning capability learns fraud patterns and then seamlessly adjusts user interaction and transaction metrics based on desired risk thresholds. SECURE TRANSACTIONS Layer your customers transaction process with additional verification features such as knowledge-based questions, or phone PIN verification. PAYMENT MONITORING In addition to a real-time configurable KPI dashboard reporting and payment alerts, Vogogo s team is dedicated to monitoring and reporting on any suspicious activity, associated accounts or illicit transactions. ROUTE PAYMENT METHODS Based on customers risk scores, you can route them to preferred payment methods. Minimizing your exposure to high risk transactions by routing high risk customers to low risk payment methods. ROUTE DECLINES Set parameters to automatically route declined transactions to other payment methods and/or other acquirers to process the payment; resulting in an increase in volumes, customer retention and revenue. Need Payment Processing? Add it with simple integrations. Localize your payment services to provide native payment and currency options. Allowing your customers to transact with familiarity and confidence. Learn more at Vogogo.com CREDIT CARDS DEBIT CARDS BANK TRANSFERS 13
8 SECTION: FRAUD Mitigation The right tools to get in front of fraud. Monitor. Evaluate. Respond. Adjust. Vogogo provides access to multiple leading-edge fraud prevention tools and strategies. Making your business efforts on investigating and managing fraud efficient, allowing for quicker response times to minimize fraudulent effects. Vogogo s leadership team has over 50 years of combined experience working in fraud/money laundering prevention and payment risk. In addition to our technology, Vogogo regularly integrate with multiple tools and features to assist in investigating fraud, identifying trends and common identifiers, and immediately targeting fraudsters removing their ability to transact and interact with merchant systems. We understand that risk professionals have responsibilities beyond managing fraud risk thus our solution is more than a simple rules engine. Merchants can access global and local negative databases, test rules with real data prior to deploying in production environments, track performance in real time, work money laundering investigations and submit reports to regulators quickly and more. RULE MANAGEMENT Set countless parameters to alert system action based on risk thresholds. Rules can be set based on customers scores, transaction location, device ID, etc. LIVE KPI DASHBOARD Set configurable monitoring on patterns, behaviors, and transactions with real-time alerts at all levels from global traffic down to specific processing channel results. MONITOR CONVERSIONS Effortlessly review customer conversion, approval and acceptance rates to know if a processing issue has occurred. Providing the ability to take required action quicker. ACCOUNT ASSOCIATIONS Identify shared accounts instantly across unique and global networks through the use of numerous attributes in full, in fragments and with time frame intelligence. COMPLIANCE ALERTS Vogogo provides alerts on all core AML / CTF regulatory requirements. In addition, set specific compliance checkpoints to be alerted on for a prompt response. RESOLUTION CENTER Front-end ID resolution center for your document management and real-time Know Your Customer (KYC) verification processes and history reports. 15
9 SECTION: MERCHANT Underwriting Evaluate and on-board businesses. An advanced risk management solution designed specifically for B2B relationships. Merchant and business underwriting/intake is the first line of defense for any business or enterprise that services other businesses. Service providers know that business level account holders pose greater risks because they can access more features and higher limits than any individual consumer. A fraudulent merchant account can damage your relationship with your processing banks and result in high fines, involvement in money laundering or criminal investigations, diminished operational resources due to increased workload and lost funds. The merchant underwriting space is under serviced in the payments world multiple providers have their own in-house processes that cobble multiple service providers into a single difficult to use and primarily manual process. Others take advantage of single-use solutions that underwrite a merchant but provide no transaction monitoring, provide transaction monitoring but no underwriting or run a credit check only prior to boarding a new business client. Vogogo uses a proprietary merchant on-boarding model that assesses fraud risk, regulatory risk and business viability prior to communicating a decision to accept or decline the merchant. Paired with real-time transaction monitoring that is tied to the merchant risk level, specific processes, checks, and system risk rules management to target industry and merchant risks. Bring your business confidence that risk is managed and exposure to illicit activities is minimized, allowing you to grow your B2B ventures. 17
10 Integrate to Vogogo. FEATURE #1-70 USER VALIDATION Name to address, address type and length of users residency FEATURE # ACCOUNT ASSOCIATIONS Identify shared accounts immediately across unique and global networks through the use of numerous attributes in full, in fragments and with time frame intelligence. PRICING DETAILS Contact us to receive pricing information based on your business location, multiple integrations, or high volume discounts. Existence and ID verify with advanced data Premium watch list screening and reporting capabilities CONTACT US Visit vogogo.com or our on-boarding team directly at Phone number verification with ability to manage and block unwanted phone types FEATURE # LIVE PERFORMANCE ROUTING INTELLIGENCE Payment Allowance Automatically adjust payment velocity amounts in real-time. Route Declined Transactions Instantly send to alternative payment methods for processing or acquirers. Change Payment Route higher risk users to lower risk payment methods. 19
Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution
Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively
More informationProduct. AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance
Product AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance A Comprehensive Solution for AML Detection, Investigation, Case Management and Reporting Illegal money laundering
More informationAn Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions
An Oracle White Paper October 2009 An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions Executive Overview Today s complex financial crime schemes pose
More informationAn Oracle White Paper November 2011. Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime
An Oracle White Paper November 2011 Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime Disclaimer The following is intended to outline our general product direction.
More informationManaging TPPPs and TPSs in the Current Regulatory Environment
November 2015 Managing TPPPs and TPSs in the Current Regulatory Environment Prepared by: Jodie Ruby, Director Audience: This document is intended for managers, directors and executives who deal with business
More informationComplete Financial Crime and Compliance Management
Complete Financial Crime and Management With Oracle Financial Services Financial Crime and Management applications, financial institutions can manage compliance risk and investigate appropriate information
More informationAdmiral Markets. ID Verification solution: Overview. Case Study
ID Verification solution: Admiral Markets Overview Company Admiral Markets is a leading forex trading provider. Challenge To protect itself from fraud and comply with regulations, Admiral Markets must
More informationTHOMSON REUTERS ACCELUS
THOMSON REUTERS ACCELUS ACCELUS Screening Resolution Service Executive Summary Thomson Reuters Accelus offers Screening Resolution Service (SRS): an outsourced screening service for Corporates and Financial
More informationHIGH-RISK COUNTRIES IN AML MONITORING
HIGH-RISK COUNTRIES IN AML MONITORING ALICIA CORTEZ TABLE OF CONTENTS I. Introduction 3 II. High-Risk Countries 3 Customers 4 Products 7 Monitoring 8 Audit Considerations 8 III. Conclusion 10 IV. References
More informationDecide with Confidence
Identity Verification Business Verification AML Compliance Fraud Detection Dun and Bradstreet (D&B) have been operating in Australia since 1887 and in New Zealand since 1903 as a correspondent country.
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
1 Copyright 2011, Oracle and/or its affiliates. All rights Challenges in Implementing the Financial Action Task Force (FATF) recommendations on Risk Based Approach by R. Suresha CAMS 2 Copyright 2011,
More informationImprove Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps. An IDology, Inc. Whitepaper
Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps An IDology, Inc. Whitepaper Delivering a pleasant consumer experience on the phone is a make or break opportunity for creating positive
More informationWHITE PAPER. Credit Issuers. Stop Application Fraud at the Source With Device Reputation
WHITE PAPER Credit Issuers Stop Application Fraud at the Source With Device Reputation Table of Contents Overview 1 Why you need more than conventional methods of fraud detection 2 It is not just credit
More informationSmarter Analytics Leadership Summit Content Review
Smarter Analytics Leadership Summit Content Review Agenda Fraud Point of View IBM Claims Fraud Solution Overview Infinity Insurance: Combating Fraud with IBM Claims Fraud Solution Building the Business
More informationOnline Payment Fraud. IP Intelligence is one of the top five techniques used to detect and prevent online fraud
Online Payment Fraud IP Intelligence is one of the top five techniques used to detect and prevent online fraud Online Payment Fraud 2 Contents IP Intelligence is one of the top five fraud tools 3 Not all
More informationPlease make extra copies of the blank Independent Review Form and do not use your last blank one.
Section 4 : Independent Review INDEPENDENT REVIEW When you established your Compliance Program and with MoneyGram's approval, you indicated how often you would have an Independent Review of your AML Compliance
More informationWHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules
WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative
More informationMeeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions
Leveraging Risk & Compliance for Strategic Advantage IBM Information Management software Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions XXX Astute financial services
More informationModule. Aperio TM Branch Platform For Signature A Component of Aperio Operational CRM Platform
Module Aperio TM Branch Platform For Signature A Component of Aperio Operational CRM Platform Now you can exceed customer expectation and remove process roadblocks to focus on profit, while accelerating
More informationKNOW YOUR THIRD PARTY
Thomson Reuters KNOW YOUR THIRD PARTY EXECUTIVE SUMMARY The drive to improve profitability and streamline operations motivates many organizations to collaborate with other businesses, increase outsourcing
More informationIdentifying Key Risk Indicator
PUERTO RICO PAYMENTS SYMPOSIUM Identifying Key Risk Indicator EPOCPR Services Agenda for Today Background History Regulators & Risk Management Let s have fun Regulators & Risk Assessment ACH Risks Categories
More informationMobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments
Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments Executive Summary Modern Banks increasingly find the need to enable customers to sign up for Banking products without having
More informationProviding the right combination of managed services for data validation, monitoring, and customer interaction.
A comprehensive approach to customer identity,analytics,and market intelligence. Providing the right combination of managed services for data validation, monitoring, and customer interaction. The Customer
More informationWHITE PAPER Moving Beyond the FFIEC Guidelines
WHITE PAPER Moving Beyond the FFIEC Guidelines How Device Reputation Offers Protection Against Future Security Threats Table of Contents Introduction 1 The FFIEC Guidelines 2 Why Move Beyond Complex Device
More informationGUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014)
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Financial Institution Letter FIL-127-2008 November 7, 2008 GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July
More informationPeter Hill, Oracle Reveleus & Mantas
Using Risk and Compliance as a Strategic Tool for Growth - Looking for Opportunities in turbulent times to Optimize and Grow your Business Peter Hill, Oracle Reveleus & Mantas Safe
More informationModule. Aperio TM Call Center For Signature A Component of Aperio Operational CRM Platform
Module Aperio TM Call Center For Signature A Component of Aperio Operational CRM Platform Delight your customers by providing them with highly effective and consistent call center experiences. Your customers
More informationKnowledge-Based Authentication Challenge Response System
Knowledge-Based Authentication Challenge Response System Kevin Trilli Director, Product Management VeriSign, Inc. Bill Andrews Sr. Manager, Product Management Lightbridge, Inc. Purpose and Agenda Purpose
More informationOuachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
More informationThe University of North Carolina at Charlotte Identity Theft Prevention Program
The University of North Carolina at Charlotte Identity Theft Prevention Program Program Adoption As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule ( Rule ),
More informationBeyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
More informationSFC AML/CFT Seminar Governance, PEPs & Transaction Monitoring. Philip Rodd
SFC AML/CFT Seminar Governance, PEPs & Transaction Monitoring Philip Rodd Agenda Page ML/TF Vulnerabilities for the Securities Industry 3 Governance and Culture 5 PEP Identification 7 Case Study Structuring
More informationREGULATORY COMPLIANCE SOFTWARE SOLUTIONS. Dynamic Solutions. Superior Results.
REGULATORY COMPLIANCE SOFTWARE SOLUTIONS Dynamic Solutions. Superior Results. TOOLS THAT REDUCE THE BURDEN OF MANAGING COMPLIANCE AND THE RISK OF NON-COMPLIANCE WATCHDOG ELITE PLATFORM, a holistic platform
More informationFFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
More informationPrepaid Fraud Mitigation: Leveraging the Processing Relationship to Prevent Fraud Throughout the Prepaid Lifecycle
Prepaid Fraud Mitigation: Leveraging the Processing Relationship to Prevent Fraud Throughout the Prepaid Lifecycle Conducted by Javelin Strategy & Research October 2009 2008 Javelin Strategy & Research
More informationTHE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM
Program Adoption THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule, implementing
More informationPROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT
Office of Employee Benefits Administrative Manual PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT 150 EFFECTIVE DATE: AUGUST 1, 2009 REVISION DATE: PURPOSE: Ensure that the Office of Employee Benefits
More informationACCEPT MORE ORDERS, FROM MORE PEOPLE, IN MORE PLACES.
ACCEPT MORE ORDERS, FROM MORE PEOPLE, IN MORE PLACES. Kount s fraud prevention platform helps you maximize sales. Now you can sell more, to more people, and in more markets than ever before. SELL MORE
More informationIT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies
IT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies Added Value through a Holistic GRC Approach Frank Holzenthal, computer scientist* 1 Today, a holistic Governance, Risk & Compliance
More informationKnowing your customers and their customers and their customers and so on and so on
Knowing your customers and their customers and their customers and so on and so on Identifying your Third-Party s and their Nested s This ACH risk management white paper provides an overview of ACH relationships
More informationFFIEC BUSINESS ACCOUNT GUIDANCE
FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit unions and business account holders to make online banking safer and more secure from account hijacking and unauthorized funds
More informationManaged Solutions for Customer Data Verification, Analytics, and Monitoring.
A comprehensive approach to customer identity,analytics,and market intelligence. Managed Solutions for Customer Data Verification, Analytics, and Monitoring. We deliver products and solutions designed
More informationMTN Mobile Money 2012
MTN Mobile Money 2012 Anti-Money Laundering It is the policy of MTN to prohibit and actively prevent the use of its money transfer services to facilitate money laundering, the funding of terrorists or
More informationINTERNATIONAL CORRESPONDENT BANKS. Knowing Your Customer (KYC) Anti-Money Laundering Prevention of Terrorist Financing
INTERNATIONAL CORRESPONDENT BANKS Registered Name Commercial name (if applicable) Full address of the registered office of the financial institution (Street, town and country) VAT number BIC code Website:
More informationEnabling Delivery of Enterprise Applications for Financial Services Companies
Enabling Delivery of Enterprise Applications for Financial Services Companies Executive Summary Computing platforms revolutionize the way we work. Mainframes The First Platform - 1955 to 1980 Personal
More informationFinancial Crime Management EIFR workshop 19th November 2015
Financial Crime Management EIFR workshop 19th November 2015 dd-mm-yyyy Photo by Deutsche Bank AG Agenda Introduction Atos FCCM SaaS Offering Introductions Atos and Oracle Cloud based service Deskription
More informationID3 Applications. 800 million people One solution. Forward thinking solutions for a global industry. because identity matters
ID3 Applications Forward thinking solutions for a global industry because identity matters 800 million people One solution ID3 Applications Forward thinking solutions for a global industry Background As
More informationFinancial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for
Division of Gaming Customer Due Diligence Guidelines for Interactive Gaming & Interactive Wagering Companies November 2005 Customer Due Diligence for Interactive Gaming & Interactive Wagering Companies
More information2: Credit cards, etc. Overview of the sector
19 2: Credit cards, etc Overview of the sector Note: This sectoral guidance is incomplete on its own. It must be read in conjunction with the main guidance set out in Part I of the Guidance. 2.1 A credit
More informationWHITE PAPER. Internet Gambling Sites. Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
WHITE PAPER Internet Gambling Sites Expose Fraud Rings and Stop Repeat Offenders with Device Reputation Table of Contents Confident Casinos: How to stop fraud before it starts 1 Organized Fraud: A Growing
More informationANTI-MONEY LANDERING & COUNTER TERRORISM FINANCING POLICY
ANTI-MONEY LANDERING & COUNTER TERRORISM FINANCING POLICY Company: Union Standard International Group Pty Ltd Company trading as: USGFX ACN: 117 658 349 AFSL: 302792 Date Updated: 11 th November 2014 1
More informationHere are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online.
Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit
More informationPayment Processor Relationships Revised Guidance
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Payment Processor Relationships Revised Guidance Financial Institution Letter FIL-3-2012 January 31, 2012 Summary:
More informationWolfsberg Guidance on Mobile and Internet Payment Services (MIPS) 1
Wolfsberg Guidance on Mobile and Internet Payment Services (MIPS) 1 1. Preamble The Wolfsberg Group of International Financial Institutions (the Wolfsberg Group ) has published global anti-money laundering
More informationWhite Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
More informationUNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy
UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy RESPONSIBLE OFFICIAL : Executive Vice Chancellor/Provost RESPONSIBLE OFFICIAL : Business & Financial Services EFFECTIVE
More informationThe In-Depth Guide to Fraud Prevention in International E-commerce
The In-Depth Guide to Fraud Prevention in International E-commerce The Evolution of Fraud Cyberattacks are not a new threat, yet the rise in high-profile hacking cases has merchants rightfully concerned
More informationEFFECTIVE MONITORING: MANAGING INQUIRIES, INVESTIGATIONS
EFFECTIVE MONITORING: MANAGING INQUIRIES, INVESTIGATIONS AND THE REPORTING OF SUSPICIOUS ACTIVITY Managing the Inventory External Inquiries 1 314 (a) 2 314 (b) 3 Law Enforcement Inquiries Grand Jury Subpoenas
More information01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)
01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) Authority: Board of Trustees History: Effective May 1, 2009 (approved initially April 24, 2009) Source of Authority: Related Links: Responsible Office:
More informationBank Secrecy Act, Anti-Money Laundering, and Office of Foreign Assets Control
Bank Secrecy Act, Anti-Money Laundering, and Office of Foreign Assets Control Overview The Bank Secrecy Act (BSA) was created in 1970 to assist in criminal, tax, and regulatory investigations. The Financial
More informationSolution Brief Efficient ecommerce Fraud Management for Acquirers
Solution Brief Efficient ecommerce Fraud Management for Acquirers Table of Contents Introduction Sophisticated Fraud Detection and Chargeback Reduction Improved Compliance Posture Transparent User Experience
More informationANTI-MONEY LAUNDERING/ COUNTER TERRORISM FINANCING POLICY
ANTI-MONEY LAUNDERING/ COUNTER TERRORISM FINANCING POLICY TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 Preamble... 3 Policy Parameters... 4 KEY TERMS... 4 POLICY OBJECTIVE, RATIONALE AND DELIVERABLES... 6
More informationDEVELOPING AN AML (ANTI-MONEY LAUNDERING) PROGRAM:
DEVELOPING AN AML (ANTI-MONEY LAUNDERING) PROGRAM: Although the Department of the Treasury has not issued specific rules for hedge funds and hedge fund managers, hedge fund managers should adopt and implement
More informationPolicy on Prevention of Money Laundering and Terrorist Financing ABH Holding S.A.
Policy on Prevention of Money Laundering and Terrorist Financing ABH Holding S.A. 2013 CONTENT 1. GENERAL PROVISIONS... 3 2. THE SCOPE AND APPLICABILITY... 3 3. THE PURPOSE OF THE POLICY... 3 4. OBJECTIVES...
More informationVeriphy TM business intelligence. people and company information. service range. version 2.19 29/11/2013
Veriphy TM business intelligence people and company information service range Service Summary 2 Online checks on people what do put in? 3 Online checks on people what do I get back? 4 Company information
More informationADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE
ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE Purpose This document explains the benefits of using Risk Based Authentication (RBA) a dynamic method of cardholder authentication
More informationIneffective fraud prevention destroys profit margins. The right analytics keeps your business on target.
White Paper Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target. Research provided by Javelin Strategy & Research February 2010 Risk Solutions Financial
More informationProtecting Online Gaming and e-commerce Companies from Fraud
Protecting Online Gaming and e-commerce Companies from Fraud White Paper July 2007 Protecting Online Gaming and e-commerce Companies from Fraud Overview In theory, conducting business online can be efficient
More informationon behalf of the National Retail Federation before the
Testimony of Amy Hanson President FACS Group, Inc. Financial, Administrative Credit Services (A Subsidiary of Federated Department Stores, Inc.) Mason, Ohio on behalf of the National Retail Federation
More informationlow levels of compliance with the regulations and POCA by negligent HVD operators are enabling criminals to launder the proceeds of crime
6.185 Under the regulations HMRC must maintain a registry of HVDs. However the regulations do not enable HMRC to conduct a fit and proper person test on those who seek to register as an HVD. From 2004
More informationIBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking
IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking IBM and ACI offer unparalleled expertise in designing and optimizing payment systems As leading
More informationContract and Procurement Fraud. Vendor Management
Contract and Procurement Fraud Vendor Management Introduction Organizations must take steps to reduce vendor fraud, including: Conducting vendor due diligence Managing vendor risks via contracts Ensuring
More informationThird Party Payment Processors Job Aid
Third Party Payment Processors Job Aid This job aid is to be used by state institution examiners as a means to understand, identify, and assess the risks associated with institutions relationships with
More informationThe 2006 FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual:
The 2006 FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual: Knowing the Risks Is It Possible to Keep Pace and Manage Them All? By: Carmina Hughes, Executive Director and Patricia McKeown,
More informationThe Facets of Fraud. A layered approach to fraud prevention
The Facets of Fraud A layered approach to fraud prevention Recognizing Fraud The various guises of fraud lead many organizations to believe they are not victims of deception or to vastly underestimate
More informationMobile Deposit Policy
Mobile Deposit Policy Mobile Deposit, a deposit transaction delivery system, allows the Credit Union to receive digital information from deposit documents captured at remote locations (i.e., the Credit
More informationFRAUD TECHNIQUE: IDENTITY DOCUMENT VERIFICATION
FRAUD TECHNIQUE: IDENTITY DOCUMENT VERIFICATION A technique data sheet presented by The Fraud Practice LLC. Fraud Technique: Identity Document Verification Author: David Montague Identity Document Verification
More informationCard Acceptance Best Practices Playing it Safe at the Point of Sale
White Paper Card Acceptance Best Practices Playing it Safe at the Point of Sale Fraudulent activity costs U.S. businesses billions. And that is just lost revenue. When you consider the associated damage
More informationIdentity Theft Prevention Policy
Eastern Kentucky University Policy and Regulation Library 6.#.#P Volume 6, Volume Title: Financial Affairs Chapter #, Chapter Title Section #, Name: Identity Theft Prevention Policy Approval Authority:
More informationExecutive summary. Incorporate more information into the decisioning process, especially for high-dollar unsecured transactions.
Executive summary The biggest risk to an institution is not the consumer whose identity has been verified; it is the individual whose true identity is unknown. Meridian Research, Inc. 1 Know your customers
More informationThe State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology
The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies
More informationUnderstanding and Combating Online Fraud in 2014
Understanding and Combating Online Fraud in 2014 Fraud is pervasive online and high-risk merchants must be vigilant in employing a multi-layered, comprehensive approach to security and risk management.
More informationData sharing for Fraud Prevention in Medical Insurance
Data sharing for Fraud Prevention in Medical Insurance Nick Mothershaw, Director Identity and Fraud Experian Limited 2008. All rights reserved. Experian and the marks used herein are service marks or registered
More informationRisk Based Approach putting it into practice
Risk Based Approach putting it into practice Collin Lobo Regional Head of Financial Crime Risk Middle East, Pakistan and Africa Disclaimer This presentation / document has been prepared to assist improve
More informationAutomotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy
CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions
More informationHeadache vs. Hassle-Free: How Technology Can Ease the Burden of Regulatory Compliance An Equifax White Paper
Headache vs. Hassle-Free: How Technology Can Ease the Burden of Regulatory Compliance An Equifax White Paper Andrew Skillen February 2008 IMPORTANT NOTE: This summary is intended to provide general basic
More informationII. F. Identity Theft Prevention
II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal
More informationRisk & Fraud Management Solutions
Risk & Fraud Management Solutions Protect Your Business and Reduce Fraud Transaction Type Summary Last 14 days 150k 100k 50k 0k 26.11. 27.11. 28.11. 29.11. 30.11. 1.12. 2.12. 3.12. 4.12. 5.12. 6.12. 7.12.
More informationKnowledge Based Authentication [KBA] is not just for onboarding new customers
White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA] is not just for onboarding new customers December 2013 Risk Solutions Best Practices
More informationTHE USE OF BANK DATA FOR IDENTITY VERIFICATION. White Paper
THE USE OF BANK DATA FOR IDENTITY VERIFICATION White Paper August 2015 Contributors OIX UK is the UK arm of a global organisation and works closely with the Cabinet Office on the Identity Assurance Programme.
More informationJordans Group. Anti-money laundering checks: Overview. Case Study
Anti-money laundering checks: Jordans Group Overview Company Jordans Group Challenge Jordans is a firm of corporate consultants with offices worldwide. They wanted to offer their customers an extended
More informationPerspectives on retail payments fraud
Perspectives on retail payments fraud Steve Malphrus Let me begin by saying that I am not here to lecture, but rather to learn. Today, I would like to talk about a couple of things. First, I would like
More informationANTI-MONEY LAUNDERING COMPLIANCE GUIDE
LATIN AMERICA AND THE CARIBBEAN ANTI-MONEY LAUNDERING COMPLIANCE GUIDE REPORTING REQUIREMENTS RECORDKEEPING EMPLOYEE TRAINING PREVENTION OF TERRORISM FINANCING COMPLIANCE WITH LOCAL REGULATIONS COMPLIANCE
More informationBT Managed Fraud Reduction. Confidence in online business from stronger identity assurance
BT Managed Fraud Reduction Confidence in online business from stronger identity assurance The BT Managed Fraud Reduction service cost-effective solution to the problem of online fraud. disclosure of how
More informationAnti-Money Laundering and Counter- Terrorism Financial Policy
Anti-Money Laundering and Counter- Terrorism Financial Policy Version: March 2014 1. INTRODUCTION...3 2. DEFINITIONS...3 3. RISK-BASED APPROACH...3 4. AML COMPLIANCE OFFICER...4 5. SUSPICIOUS TRANSACTION
More informationLincoln Financial Group. FTC/SEC Red Flags Identity Theft Prevention Program
Lincoln Financial Group FTC/SEC Red Flags Identity Theft Prevention Program Program Summary For Internal Use Only Table of Contents Page The Red Flags Rule 3 Key Points of the Program 4 Covered Accounts
More informationIdentity Theft Prevention Program
Smyth County Policy Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in
More informationCard Not Present Fraud Webinar Transcript
Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share
More information