one admin. one tool. Providing instant access to hundreds of industry leading verification tools.

Size: px
Start display at page:

Download "one admin. one tool. Providing instant access to hundreds of industry leading verification tools."

Transcription

1

2 one admin. one tool. Providing instant access to hundreds of industry leading verification tools. With online transactions, risk management needs to be more than just a process. Businesses need a solution with advanced capabilities that provide optimal defense against fraud. Vogogo provides just that. Risk Management Introduction... Know Your Customers Compliance... Payment Risk Management & Processing Fraud Mitigation Merchant Underwriting Pricing & Contact

3 SECTION: RISK Management Advanced. Intelligent. Intuitive. Risk management solutions designed and customized to meet your business needs. Layered with advanced KYC software and AML/CTF monitoring processes, you can confidently validate your customers upon account creation and every transaction going forward. Vogogo s machine learning capability keeps your business protected with premium risk management coverage. The system learns fraud patterns and then seamlessly adjusts user interaction and transaction metrics based on desired risk thresholds. 5

4 Advanced multi-level KYC technology confidently identifies and analyzes customers. Globally $16 billion was stolen from 12.7 million identity fraud victims in The anonymous nature of online transactions exposes your business to illegal transactions and illicit activity. Verifying your customers is paramount to maintain the integrity and success of your business. Implementing industry leading KYC processes into your platform is easy with Vogogo. With numerous KYC checkpoints automated in near real-time, Vogogo will reduce your risk and optimize successful, verified users and their transactions. NAME TO ADDRESS Verifying your customers registered first and/or last name to address information, address type and length of residency. VERIFICATION Review accounts in-depth, from type of , age of account, customer details to account profile demographics. PHONE VERIFICATION Geo level information with detailed phone characteristics scanned down to phone owner name and billing address. PHONE BLOCKING Set parameters with immediate action to block specific phone types and high-risk phone characteristics of customers. ADVANCED IDV Includes Global ID match, from CPF to SSN ID, driver s license and passport checks, name, address, phone and DOB output. DATE OF BIRTH (DOB) Verification on date of birth down to month / day / year level; which in addition, validates country s legal age. SOCIAL VERIFICATION Confirm customers through their social media networking intel against their address and registrant information. IP RESOLUTION SCREENING Real-time geo location IP resolution monitoring and alerts. Scanning from country level down to city level. DEVICE FINGERPRINT Hardware device tracking and device ID verification provides further awareness of your customers intel to mitigate fraud. 7

5 SECTION: COMPLIANCE Management Comply with world regulations. Providing exceptional compliance for unmatched defense. Vogogo s powerful transaction and customer screening solutions offers unparalleled protection against money laundering and terrorist financing activities. Global sanction screening, AML / CTF reporting and suspicious activity alerts, in conjunction with Vogogo s advanced decision analytics fast-tracks the client assessment and on-boarding process. Integrating with Vogogo, you can effectively lower the cost of compliance, reduce exposure, increase operational efficiency and keep your business compliant. SANCTION SCREENING Customers are automatically validated against; OFAC, OSFL, UN, HM Treasury and PEP s watchlists with the ability to customize your compliance screening based on your business needs. SOURCE OF FUNDS With advanced bank verification easily confirm customers payment details down to bank location, name, account details, cross-referenced with registrant intel such as name, address, and phone. PAYMENT MONITORING Real-time transactional monitoring and reporting for suspicious or illicit activity. Sending alerts automatically to allow for quicker response times to minimize effects of fraudulent transactions. ADVANCED DUE DILIGENCE Comprehensive screening performed on all high-risk customers through technology and data collected from numerous global 3rd party providers. SUSPICIOUS ACTIVITY Vogogo s monitoring team will export data from the system to complete suspicious activity reports and file them to the appropriate regulatory bodies. AML / CTF REPORTING Vogogo monitors, reports and submits on all your transactions that are required to be filed to their appropriate regulatory bodies, keeping you properly compliant. 9

6 SECTION: PAYMENT Management Intelligently route transactions. Set parameters with system actions that are instantly applied, giving you full control over your payments. Understanding the risk model for online transactions allows businesses to increase profitability by customer, which inherently increases their life-time value. Vogogo helps reduce hard costs. Vogogo s transaction machine is integrated with premium data verification services that collects and validates users in near real-time based on their personal data, KYC and compliance checkpoints, transactional behaviors, payment verifications, and more. Vogogo then analyzes this data and authenticity of the user and transaction before it s submitted for processing and re-routes the transaction if needed. Minimizing your exposure and increasing your successful transactional rates. Customer routing works in tandem with multiple features of the Vogogo offering and requires a merchant to offer multiple payment options and/or processing channels to be viable. Essentially customers are directed to payment options based on the risk posed by their interaction with your system. A new customer frequently poses a greater risk to your business than an individual that has been regularly purchasing for weeks/months/years. Routing customers based on risk level is not a new idea, making it simple is! Vogogo can assist you in routing higher risk customers to payment options that pose a lower risk to your business. In a time where customer experience is paramount, declining as few transactions as possible, while preserving healthy relationships with payment processors is critical for any merchant doing business online. 11

7 Feature-rich payment processing. Risk management in front of each and every transaction. ADVANCED BANK VERIFY Available to less then 5% of the globes institutions. Vogogo is one. Confirm customers registrant intel crossed with detailed bank account intel and history. ACTIVITY INTELLIGENCE Vogogo s machine learning capability learns fraud patterns and then seamlessly adjusts user interaction and transaction metrics based on desired risk thresholds. SECURE TRANSACTIONS Layer your customers transaction process with additional verification features such as knowledge-based questions, or phone PIN verification. PAYMENT MONITORING In addition to a real-time configurable KPI dashboard reporting and payment alerts, Vogogo s team is dedicated to monitoring and reporting on any suspicious activity, associated accounts or illicit transactions. ROUTE PAYMENT METHODS Based on customers risk scores, you can route them to preferred payment methods. Minimizing your exposure to high risk transactions by routing high risk customers to low risk payment methods. ROUTE DECLINES Set parameters to automatically route declined transactions to other payment methods and/or other acquirers to process the payment; resulting in an increase in volumes, customer retention and revenue. Need Payment Processing? Add it with simple integrations. Localize your payment services to provide native payment and currency options. Allowing your customers to transact with familiarity and confidence. Learn more at Vogogo.com CREDIT CARDS DEBIT CARDS BANK TRANSFERS 13

8 SECTION: FRAUD Mitigation The right tools to get in front of fraud. Monitor. Evaluate. Respond. Adjust. Vogogo provides access to multiple leading-edge fraud prevention tools and strategies. Making your business efforts on investigating and managing fraud efficient, allowing for quicker response times to minimize fraudulent effects. Vogogo s leadership team has over 50 years of combined experience working in fraud/money laundering prevention and payment risk. In addition to our technology, Vogogo regularly integrate with multiple tools and features to assist in investigating fraud, identifying trends and common identifiers, and immediately targeting fraudsters removing their ability to transact and interact with merchant systems. We understand that risk professionals have responsibilities beyond managing fraud risk thus our solution is more than a simple rules engine. Merchants can access global and local negative databases, test rules with real data prior to deploying in production environments, track performance in real time, work money laundering investigations and submit reports to regulators quickly and more. RULE MANAGEMENT Set countless parameters to alert system action based on risk thresholds. Rules can be set based on customers scores, transaction location, device ID, etc. LIVE KPI DASHBOARD Set configurable monitoring on patterns, behaviors, and transactions with real-time alerts at all levels from global traffic down to specific processing channel results. MONITOR CONVERSIONS Effortlessly review customer conversion, approval and acceptance rates to know if a processing issue has occurred. Providing the ability to take required action quicker. ACCOUNT ASSOCIATIONS Identify shared accounts instantly across unique and global networks through the use of numerous attributes in full, in fragments and with time frame intelligence. COMPLIANCE ALERTS Vogogo provides alerts on all core AML / CTF regulatory requirements. In addition, set specific compliance checkpoints to be alerted on for a prompt response. RESOLUTION CENTER Front-end ID resolution center for your document management and real-time Know Your Customer (KYC) verification processes and history reports. 15

9 SECTION: MERCHANT Underwriting Evaluate and on-board businesses. An advanced risk management solution designed specifically for B2B relationships. Merchant and business underwriting/intake is the first line of defense for any business or enterprise that services other businesses. Service providers know that business level account holders pose greater risks because they can access more features and higher limits than any individual consumer. A fraudulent merchant account can damage your relationship with your processing banks and result in high fines, involvement in money laundering or criminal investigations, diminished operational resources due to increased workload and lost funds. The merchant underwriting space is under serviced in the payments world multiple providers have their own in-house processes that cobble multiple service providers into a single difficult to use and primarily manual process. Others take advantage of single-use solutions that underwrite a merchant but provide no transaction monitoring, provide transaction monitoring but no underwriting or run a credit check only prior to boarding a new business client. Vogogo uses a proprietary merchant on-boarding model that assesses fraud risk, regulatory risk and business viability prior to communicating a decision to accept or decline the merchant. Paired with real-time transaction monitoring that is tied to the merchant risk level, specific processes, checks, and system risk rules management to target industry and merchant risks. Bring your business confidence that risk is managed and exposure to illicit activities is minimized, allowing you to grow your B2B ventures. 17

10 Integrate to Vogogo. FEATURE #1-70 USER VALIDATION Name to address, address type and length of users residency FEATURE # ACCOUNT ASSOCIATIONS Identify shared accounts immediately across unique and global networks through the use of numerous attributes in full, in fragments and with time frame intelligence. PRICING DETAILS Contact us to receive pricing information based on your business location, multiple integrations, or high volume discounts. Existence and ID verify with advanced data Premium watch list screening and reporting capabilities CONTACT US Visit vogogo.com or our on-boarding team directly at Phone number verification with ability to manage and block unwanted phone types FEATURE # LIVE PERFORMANCE ROUTING INTELLIGENCE Payment Allowance Automatically adjust payment velocity amounts in real-time. Route Declined Transactions Instantly send to alternative payment methods for processing or acquirers. Change Payment Route higher risk users to lower risk payment methods. 19

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively

More information

Product. AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance

Product. AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance Product AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance A Comprehensive Solution for AML Detection, Investigation, Case Management and Reporting Illegal money laundering

More information

An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions

An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions An Oracle White Paper October 2009 An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions Executive Overview Today s complex financial crime schemes pose

More information

An Oracle White Paper November 2011. Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime

An Oracle White Paper November 2011. Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime An Oracle White Paper November 2011 Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime Disclaimer The following is intended to outline our general product direction.

More information

Managing TPPPs and TPSs in the Current Regulatory Environment

Managing TPPPs and TPSs in the Current Regulatory Environment November 2015 Managing TPPPs and TPSs in the Current Regulatory Environment Prepared by: Jodie Ruby, Director Audience: This document is intended for managers, directors and executives who deal with business

More information

Complete Financial Crime and Compliance Management

Complete Financial Crime and Compliance Management Complete Financial Crime and Management With Oracle Financial Services Financial Crime and Management applications, financial institutions can manage compliance risk and investigate appropriate information

More information

Admiral Markets. ID Verification solution: Overview. Case Study

Admiral Markets. ID Verification solution: Overview. Case Study ID Verification solution: Admiral Markets Overview Company Admiral Markets is a leading forex trading provider. Challenge To protect itself from fraud and comply with regulations, Admiral Markets must

More information

THOMSON REUTERS ACCELUS

THOMSON REUTERS ACCELUS THOMSON REUTERS ACCELUS ACCELUS Screening Resolution Service Executive Summary Thomson Reuters Accelus offers Screening Resolution Service (SRS): an outsourced screening service for Corporates and Financial

More information

HIGH-RISK COUNTRIES IN AML MONITORING

HIGH-RISK COUNTRIES IN AML MONITORING HIGH-RISK COUNTRIES IN AML MONITORING ALICIA CORTEZ TABLE OF CONTENTS I. Introduction 3 II. High-Risk Countries 3 Customers 4 Products 7 Monitoring 8 Audit Considerations 8 III. Conclusion 10 IV. References

More information

Decide with Confidence

Decide with Confidence Identity Verification Business Verification AML Compliance Fraud Detection Dun and Bradstreet (D&B) have been operating in Australia since 1887 and in New Zealand since 1903 as a correspondent country.

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. 1 Copyright 2011, Oracle and/or its affiliates. All rights Challenges in Implementing the Financial Action Task Force (FATF) recommendations on Risk Based Approach by R. Suresha CAMS 2 Copyright 2011,

More information

Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps. An IDology, Inc. Whitepaper

Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps. An IDology, Inc. Whitepaper Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps An IDology, Inc. Whitepaper Delivering a pleasant consumer experience on the phone is a make or break opportunity for creating positive

More information

WHITE PAPER. Credit Issuers. Stop Application Fraud at the Source With Device Reputation

WHITE PAPER. Credit Issuers. Stop Application Fraud at the Source With Device Reputation WHITE PAPER Credit Issuers Stop Application Fraud at the Source With Device Reputation Table of Contents Overview 1 Why you need more than conventional methods of fraud detection 2 It is not just credit

More information

Smarter Analytics Leadership Summit Content Review

Smarter Analytics Leadership Summit Content Review Smarter Analytics Leadership Summit Content Review Agenda Fraud Point of View IBM Claims Fraud Solution Overview Infinity Insurance: Combating Fraud with IBM Claims Fraud Solution Building the Business

More information

Online Payment Fraud. IP Intelligence is one of the top five techniques used to detect and prevent online fraud

Online Payment Fraud. IP Intelligence is one of the top five techniques used to detect and prevent online fraud Online Payment Fraud IP Intelligence is one of the top five techniques used to detect and prevent online fraud Online Payment Fraud 2 Contents IP Intelligence is one of the top five fraud tools 3 Not all

More information

Please make extra copies of the blank Independent Review Form and do not use your last blank one.

Please make extra copies of the blank Independent Review Form and do not use your last blank one. Section 4 : Independent Review INDEPENDENT REVIEW When you established your Compliance Program and with MoneyGram's approval, you indicated how often you would have an Independent Review of your AML Compliance

More information

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative

More information

Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions

Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions Leveraging Risk & Compliance for Strategic Advantage IBM Information Management software Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions XXX Astute financial services

More information

Module. Aperio TM Branch Platform For Signature A Component of Aperio Operational CRM Platform

Module. Aperio TM Branch Platform For Signature A Component of Aperio Operational CRM Platform Module Aperio TM Branch Platform For Signature A Component of Aperio Operational CRM Platform Now you can exceed customer expectation and remove process roadblocks to focus on profit, while accelerating

More information

KNOW YOUR THIRD PARTY

KNOW YOUR THIRD PARTY Thomson Reuters KNOW YOUR THIRD PARTY EXECUTIVE SUMMARY The drive to improve profitability and streamline operations motivates many organizations to collaborate with other businesses, increase outsourcing

More information

Identifying Key Risk Indicator

Identifying Key Risk Indicator PUERTO RICO PAYMENTS SYMPOSIUM Identifying Key Risk Indicator EPOCPR Services Agenda for Today Background History Regulators & Risk Management Let s have fun Regulators & Risk Assessment ACH Risks Categories

More information

Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments

Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments Executive Summary Modern Banks increasingly find the need to enable customers to sign up for Banking products without having

More information

Providing the right combination of managed services for data validation, monitoring, and customer interaction.

Providing the right combination of managed services for data validation, monitoring, and customer interaction. A comprehensive approach to customer identity,analytics,and market intelligence. Providing the right combination of managed services for data validation, monitoring, and customer interaction. The Customer

More information

WHITE PAPER Moving Beyond the FFIEC Guidelines

WHITE PAPER Moving Beyond the FFIEC Guidelines WHITE PAPER Moving Beyond the FFIEC Guidelines How Device Reputation Offers Protection Against Future Security Threats Table of Contents Introduction 1 The FFIEC Guidelines 2 Why Move Beyond Complex Device

More information

GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014)

GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014) Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Financial Institution Letter FIL-127-2008 November 7, 2008 GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July

More information

Peter Hill, Oracle Reveleus & Mantas

Peter Hill, Oracle Reveleus & Mantas Using Risk and Compliance as a Strategic Tool for Growth - Looking for Opportunities in turbulent times to Optimize and Grow your Business Peter Hill, Oracle Reveleus & Mantas Safe

More information

Module. Aperio TM Call Center For Signature A Component of Aperio Operational CRM Platform

Module. Aperio TM Call Center For Signature A Component of Aperio Operational CRM Platform Module Aperio TM Call Center For Signature A Component of Aperio Operational CRM Platform Delight your customers by providing them with highly effective and consistent call center experiences. Your customers

More information

Knowledge-Based Authentication Challenge Response System

Knowledge-Based Authentication Challenge Response System Knowledge-Based Authentication Challenge Response System Kevin Trilli Director, Product Management VeriSign, Inc. Bill Andrews Sr. Manager, Product Management Lightbridge, Inc. Purpose and Agenda Purpose

More information

Ouachita Baptist University. Identity Theft Policy and Program

Ouachita Baptist University. Identity Theft Policy and Program Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program

More information

The University of North Carolina at Charlotte Identity Theft Prevention Program

The University of North Carolina at Charlotte Identity Theft Prevention Program The University of North Carolina at Charlotte Identity Theft Prevention Program Program Adoption As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule ( Rule ),

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

SFC AML/CFT Seminar Governance, PEPs & Transaction Monitoring. Philip Rodd

SFC AML/CFT Seminar Governance, PEPs & Transaction Monitoring. Philip Rodd SFC AML/CFT Seminar Governance, PEPs & Transaction Monitoring Philip Rodd Agenda Page ML/TF Vulnerabilities for the Securities Industry 3 Governance and Culture 5 PEP Identification 7 Case Study Structuring

More information

REGULATORY COMPLIANCE SOFTWARE SOLUTIONS. Dynamic Solutions. Superior Results.

REGULATORY COMPLIANCE SOFTWARE SOLUTIONS. Dynamic Solutions. Superior Results. REGULATORY COMPLIANCE SOFTWARE SOLUTIONS Dynamic Solutions. Superior Results. TOOLS THAT REDUCE THE BURDEN OF MANAGING COMPLIANCE AND THE RISK OF NON-COMPLIANCE WATCHDOG ELITE PLATFORM, a holistic platform

More information

FFIEC CONSUMER GUIDANCE

FFIEC CONSUMER GUIDANCE FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their

More information

Prepaid Fraud Mitigation: Leveraging the Processing Relationship to Prevent Fraud Throughout the Prepaid Lifecycle

Prepaid Fraud Mitigation: Leveraging the Processing Relationship to Prevent Fraud Throughout the Prepaid Lifecycle Prepaid Fraud Mitigation: Leveraging the Processing Relationship to Prevent Fraud Throughout the Prepaid Lifecycle Conducted by Javelin Strategy & Research October 2009 2008 Javelin Strategy & Research

More information

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM Program Adoption THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule, implementing

More information

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT Office of Employee Benefits Administrative Manual PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT 150 EFFECTIVE DATE: AUGUST 1, 2009 REVISION DATE: PURPOSE: Ensure that the Office of Employee Benefits

More information

ACCEPT MORE ORDERS, FROM MORE PEOPLE, IN MORE PLACES.

ACCEPT MORE ORDERS, FROM MORE PEOPLE, IN MORE PLACES. ACCEPT MORE ORDERS, FROM MORE PEOPLE, IN MORE PLACES. Kount s fraud prevention platform helps you maximize sales. Now you can sell more, to more people, and in more markets than ever before. SELL MORE

More information

IT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies

IT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies IT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies Added Value through a Holistic GRC Approach Frank Holzenthal, computer scientist* 1 Today, a holistic Governance, Risk & Compliance

More information

Knowing your customers and their customers and their customers and so on and so on

Knowing your customers and their customers and their customers and so on and so on Knowing your customers and their customers and their customers and so on and so on Identifying your Third-Party s and their Nested s This ACH risk management white paper provides an overview of ACH relationships

More information

FFIEC BUSINESS ACCOUNT GUIDANCE

FFIEC BUSINESS ACCOUNT GUIDANCE FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit unions and business account holders to make online banking safer and more secure from account hijacking and unauthorized funds

More information

Managed Solutions for Customer Data Verification, Analytics, and Monitoring.

Managed Solutions for Customer Data Verification, Analytics, and Monitoring. A comprehensive approach to customer identity,analytics,and market intelligence. Managed Solutions for Customer Data Verification, Analytics, and Monitoring. We deliver products and solutions designed

More information

MTN Mobile Money 2012

MTN Mobile Money 2012 MTN Mobile Money 2012 Anti-Money Laundering It is the policy of MTN to prohibit and actively prevent the use of its money transfer services to facilitate money laundering, the funding of terrorists or

More information

INTERNATIONAL CORRESPONDENT BANKS. Knowing Your Customer (KYC) Anti-Money Laundering Prevention of Terrorist Financing

INTERNATIONAL CORRESPONDENT BANKS. Knowing Your Customer (KYC) Anti-Money Laundering Prevention of Terrorist Financing INTERNATIONAL CORRESPONDENT BANKS Registered Name Commercial name (if applicable) Full address of the registered office of the financial institution (Street, town and country) VAT number BIC code Website:

More information

Enabling Delivery of Enterprise Applications for Financial Services Companies

Enabling Delivery of Enterprise Applications for Financial Services Companies Enabling Delivery of Enterprise Applications for Financial Services Companies Executive Summary Computing platforms revolutionize the way we work. Mainframes The First Platform - 1955 to 1980 Personal

More information

Financial Crime Management EIFR workshop 19th November 2015

Financial Crime Management EIFR workshop 19th November 2015 Financial Crime Management EIFR workshop 19th November 2015 dd-mm-yyyy Photo by Deutsche Bank AG Agenda Introduction Atos FCCM SaaS Offering Introductions Atos and Oracle Cloud based service Deskription

More information

ID3 Applications. 800 million people One solution. Forward thinking solutions for a global industry. because identity matters

ID3 Applications. 800 million people One solution. Forward thinking solutions for a global industry. because identity matters ID3 Applications Forward thinking solutions for a global industry because identity matters 800 million people One solution ID3 Applications Forward thinking solutions for a global industry Background As

More information

Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for

Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for Division of Gaming Customer Due Diligence Guidelines for Interactive Gaming & Interactive Wagering Companies November 2005 Customer Due Diligence for Interactive Gaming & Interactive Wagering Companies

More information

2: Credit cards, etc. Overview of the sector

2: Credit cards, etc. Overview of the sector 19 2: Credit cards, etc Overview of the sector Note: This sectoral guidance is incomplete on its own. It must be read in conjunction with the main guidance set out in Part I of the Guidance. 2.1 A credit

More information

WHITE PAPER. Internet Gambling Sites. Expose Fraud Rings and Stop Repeat Offenders with Device Reputation

WHITE PAPER. Internet Gambling Sites. Expose Fraud Rings and Stop Repeat Offenders with Device Reputation WHITE PAPER Internet Gambling Sites Expose Fraud Rings and Stop Repeat Offenders with Device Reputation Table of Contents Confident Casinos: How to stop fraud before it starts 1 Organized Fraud: A Growing

More information

ANTI-MONEY LANDERING & COUNTER TERRORISM FINANCING POLICY

ANTI-MONEY LANDERING & COUNTER TERRORISM FINANCING POLICY ANTI-MONEY LANDERING & COUNTER TERRORISM FINANCING POLICY Company: Union Standard International Group Pty Ltd Company trading as: USGFX ACN: 117 658 349 AFSL: 302792 Date Updated: 11 th November 2014 1

More information

Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online.

Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit

More information

Payment Processor Relationships Revised Guidance

Payment Processor Relationships Revised Guidance Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Payment Processor Relationships Revised Guidance Financial Institution Letter FIL-3-2012 January 31, 2012 Summary:

More information

Wolfsberg Guidance on Mobile and Internet Payment Services (MIPS) 1

Wolfsberg Guidance on Mobile and Internet Payment Services (MIPS) 1 Wolfsberg Guidance on Mobile and Internet Payment Services (MIPS) 1 1. Preamble The Wolfsberg Group of International Financial Institutions (the Wolfsberg Group ) has published global anti-money laundering

More information

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by

More information

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy RESPONSIBLE OFFICIAL : Executive Vice Chancellor/Provost RESPONSIBLE OFFICIAL : Business & Financial Services EFFECTIVE

More information

The In-Depth Guide to Fraud Prevention in International E-commerce

The In-Depth Guide to Fraud Prevention in International E-commerce The In-Depth Guide to Fraud Prevention in International E-commerce The Evolution of Fraud Cyberattacks are not a new threat, yet the rise in high-profile hacking cases has merchants rightfully concerned

More information

EFFECTIVE MONITORING: MANAGING INQUIRIES, INVESTIGATIONS

EFFECTIVE MONITORING: MANAGING INQUIRIES, INVESTIGATIONS EFFECTIVE MONITORING: MANAGING INQUIRIES, INVESTIGATIONS AND THE REPORTING OF SUSPICIOUS ACTIVITY Managing the Inventory External Inquiries 1 314 (a) 2 314 (b) 3 Law Enforcement Inquiries Grand Jury Subpoenas

More information

01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) 01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) Authority: Board of Trustees History: Effective May 1, 2009 (approved initially April 24, 2009) Source of Authority: Related Links: Responsible Office:

More information

Bank Secrecy Act, Anti-Money Laundering, and Office of Foreign Assets Control

Bank Secrecy Act, Anti-Money Laundering, and Office of Foreign Assets Control Bank Secrecy Act, Anti-Money Laundering, and Office of Foreign Assets Control Overview The Bank Secrecy Act (BSA) was created in 1970 to assist in criminal, tax, and regulatory investigations. The Financial

More information

Solution Brief Efficient ecommerce Fraud Management for Acquirers

Solution Brief Efficient ecommerce Fraud Management for Acquirers Solution Brief Efficient ecommerce Fraud Management for Acquirers Table of Contents Introduction Sophisticated Fraud Detection and Chargeback Reduction Improved Compliance Posture Transparent User Experience

More information

ANTI-MONEY LAUNDERING/ COUNTER TERRORISM FINANCING POLICY

ANTI-MONEY LAUNDERING/ COUNTER TERRORISM FINANCING POLICY ANTI-MONEY LAUNDERING/ COUNTER TERRORISM FINANCING POLICY TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 Preamble... 3 Policy Parameters... 4 KEY TERMS... 4 POLICY OBJECTIVE, RATIONALE AND DELIVERABLES... 6

More information

DEVELOPING AN AML (ANTI-MONEY LAUNDERING) PROGRAM:

DEVELOPING AN AML (ANTI-MONEY LAUNDERING) PROGRAM: DEVELOPING AN AML (ANTI-MONEY LAUNDERING) PROGRAM: Although the Department of the Treasury has not issued specific rules for hedge funds and hedge fund managers, hedge fund managers should adopt and implement

More information

Policy on Prevention of Money Laundering and Terrorist Financing ABH Holding S.A.

Policy on Prevention of Money Laundering and Terrorist Financing ABH Holding S.A. Policy on Prevention of Money Laundering and Terrorist Financing ABH Holding S.A. 2013 CONTENT 1. GENERAL PROVISIONS... 3 2. THE SCOPE AND APPLICABILITY... 3 3. THE PURPOSE OF THE POLICY... 3 4. OBJECTIVES...

More information

Veriphy TM business intelligence. people and company information. service range. version 2.19 29/11/2013

Veriphy TM business intelligence. people and company information. service range. version 2.19 29/11/2013 Veriphy TM business intelligence people and company information service range Service Summary 2 Online checks on people what do put in? 3 Online checks on people what do I get back? 4 Company information

More information

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE Purpose This document explains the benefits of using Risk Based Authentication (RBA) a dynamic method of cardholder authentication

More information

Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target.

Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target. White Paper Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target. Research provided by Javelin Strategy & Research February 2010 Risk Solutions Financial

More information

Protecting Online Gaming and e-commerce Companies from Fraud

Protecting Online Gaming and e-commerce Companies from Fraud Protecting Online Gaming and e-commerce Companies from Fraud White Paper July 2007 Protecting Online Gaming and e-commerce Companies from Fraud Overview In theory, conducting business online can be efficient

More information

on behalf of the National Retail Federation before the

on behalf of the National Retail Federation before the Testimony of Amy Hanson President FACS Group, Inc. Financial, Administrative Credit Services (A Subsidiary of Federated Department Stores, Inc.) Mason, Ohio on behalf of the National Retail Federation

More information

low levels of compliance with the regulations and POCA by negligent HVD operators are enabling criminals to launder the proceeds of crime

low levels of compliance with the regulations and POCA by negligent HVD operators are enabling criminals to launder the proceeds of crime 6.185 Under the regulations HMRC must maintain a registry of HVDs. However the regulations do not enable HMRC to conduct a fit and proper person test on those who seek to register as an HVD. From 2004

More information

IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking

IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking IBM and ACI offer unparalleled expertise in designing and optimizing payment systems As leading

More information

Contract and Procurement Fraud. Vendor Management

Contract and Procurement Fraud. Vendor Management Contract and Procurement Fraud Vendor Management Introduction Organizations must take steps to reduce vendor fraud, including: Conducting vendor due diligence Managing vendor risks via contracts Ensuring

More information

Third Party Payment Processors Job Aid

Third Party Payment Processors Job Aid Third Party Payment Processors Job Aid This job aid is to be used by state institution examiners as a means to understand, identify, and assess the risks associated with institutions relationships with

More information

The 2006 FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual:

The 2006 FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual: The 2006 FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual: Knowing the Risks Is It Possible to Keep Pace and Manage Them All? By: Carmina Hughes, Executive Director and Patricia McKeown,

More information

The Facets of Fraud. A layered approach to fraud prevention

The Facets of Fraud. A layered approach to fraud prevention The Facets of Fraud A layered approach to fraud prevention Recognizing Fraud The various guises of fraud lead many organizations to believe they are not victims of deception or to vastly underestimate

More information

Mobile Deposit Policy

Mobile Deposit Policy Mobile Deposit Policy Mobile Deposit, a deposit transaction delivery system, allows the Credit Union to receive digital information from deposit documents captured at remote locations (i.e., the Credit

More information

FRAUD TECHNIQUE: IDENTITY DOCUMENT VERIFICATION

FRAUD TECHNIQUE: IDENTITY DOCUMENT VERIFICATION FRAUD TECHNIQUE: IDENTITY DOCUMENT VERIFICATION A technique data sheet presented by The Fraud Practice LLC. Fraud Technique: Identity Document Verification Author: David Montague Identity Document Verification

More information

Card Acceptance Best Practices Playing it Safe at the Point of Sale

Card Acceptance Best Practices Playing it Safe at the Point of Sale White Paper Card Acceptance Best Practices Playing it Safe at the Point of Sale Fraudulent activity costs U.S. businesses billions. And that is just lost revenue. When you consider the associated damage

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Eastern Kentucky University Policy and Regulation Library 6.#.#P Volume 6, Volume Title: Financial Affairs Chapter #, Chapter Title Section #, Name: Identity Theft Prevention Policy Approval Authority:

More information

Executive summary. Incorporate more information into the decisioning process, especially for high-dollar unsecured transactions.

Executive summary. Incorporate more information into the decisioning process, especially for high-dollar unsecured transactions. Executive summary The biggest risk to an institution is not the consumer whose identity has been verified; it is the individual whose true identity is unknown. Meridian Research, Inc. 1 Know your customers

More information

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies

More information

Understanding and Combating Online Fraud in 2014

Understanding and Combating Online Fraud in 2014 Understanding and Combating Online Fraud in 2014 Fraud is pervasive online and high-risk merchants must be vigilant in employing a multi-layered, comprehensive approach to security and risk management.

More information

Data sharing for Fraud Prevention in Medical Insurance

Data sharing for Fraud Prevention in Medical Insurance Data sharing for Fraud Prevention in Medical Insurance Nick Mothershaw, Director Identity and Fraud Experian Limited 2008. All rights reserved. Experian and the marks used herein are service marks or registered

More information

Risk Based Approach putting it into practice

Risk Based Approach putting it into practice Risk Based Approach putting it into practice Collin Lobo Regional Head of Financial Crime Risk Middle East, Pakistan and Africa Disclaimer This presentation / document has been prepared to assist improve

More information

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions

More information

Headache vs. Hassle-Free: How Technology Can Ease the Burden of Regulatory Compliance An Equifax White Paper

Headache vs. Hassle-Free: How Technology Can Ease the Burden of Regulatory Compliance An Equifax White Paper Headache vs. Hassle-Free: How Technology Can Ease the Burden of Regulatory Compliance An Equifax White Paper Andrew Skillen February 2008 IMPORTANT NOTE: This summary is intended to provide general basic

More information

II. F. Identity Theft Prevention

II. F. Identity Theft Prevention II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal

More information

Risk & Fraud Management Solutions

Risk & Fraud Management Solutions Risk & Fraud Management Solutions Protect Your Business and Reduce Fraud Transaction Type Summary Last 14 days 150k 100k 50k 0k 26.11. 27.11. 28.11. 29.11. 30.11. 1.12. 2.12. 3.12. 4.12. 5.12. 6.12. 7.12.

More information

Knowledge Based Authentication [KBA] is not just for onboarding new customers

Knowledge Based Authentication [KBA] is not just for onboarding new customers White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA] is not just for onboarding new customers December 2013 Risk Solutions Best Practices

More information

THE USE OF BANK DATA FOR IDENTITY VERIFICATION. White Paper

THE USE OF BANK DATA FOR IDENTITY VERIFICATION. White Paper THE USE OF BANK DATA FOR IDENTITY VERIFICATION White Paper August 2015 Contributors OIX UK is the UK arm of a global organisation and works closely with the Cabinet Office on the Identity Assurance Programme.

More information

Jordans Group. Anti-money laundering checks: Overview. Case Study

Jordans Group. Anti-money laundering checks: Overview. Case Study Anti-money laundering checks: Jordans Group Overview Company Jordans Group Challenge Jordans is a firm of corporate consultants with offices worldwide. They wanted to offer their customers an extended

More information

Perspectives on retail payments fraud

Perspectives on retail payments fraud Perspectives on retail payments fraud Steve Malphrus Let me begin by saying that I am not here to lecture, but rather to learn. Today, I would like to talk about a couple of things. First, I would like

More information

ANTI-MONEY LAUNDERING COMPLIANCE GUIDE

ANTI-MONEY LAUNDERING COMPLIANCE GUIDE LATIN AMERICA AND THE CARIBBEAN ANTI-MONEY LAUNDERING COMPLIANCE GUIDE REPORTING REQUIREMENTS RECORDKEEPING EMPLOYEE TRAINING PREVENTION OF TERRORISM FINANCING COMPLIANCE WITH LOCAL REGULATIONS COMPLIANCE

More information

BT Managed Fraud Reduction. Confidence in online business from stronger identity assurance

BT Managed Fraud Reduction. Confidence in online business from stronger identity assurance BT Managed Fraud Reduction Confidence in online business from stronger identity assurance The BT Managed Fraud Reduction service cost-effective solution to the problem of online fraud. disclosure of how

More information

Anti-Money Laundering and Counter- Terrorism Financial Policy

Anti-Money Laundering and Counter- Terrorism Financial Policy Anti-Money Laundering and Counter- Terrorism Financial Policy Version: March 2014 1. INTRODUCTION...3 2. DEFINITIONS...3 3. RISK-BASED APPROACH...3 4. AML COMPLIANCE OFFICER...4 5. SUSPICIOUS TRANSACTION

More information

Lincoln Financial Group. FTC/SEC Red Flags Identity Theft Prevention Program

Lincoln Financial Group. FTC/SEC Red Flags Identity Theft Prevention Program Lincoln Financial Group FTC/SEC Red Flags Identity Theft Prevention Program Program Summary For Internal Use Only Table of Contents Page The Red Flags Rule 3 Key Points of the Program 4 Covered Accounts

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Smyth County Policy Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in

More information

Card Not Present Fraud Webinar Transcript

Card Not Present Fraud Webinar Transcript Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share

More information