CORPORATION for AMERICAN BANKING
|
|
- Leon Wilkinson
- 8 years ago
- Views:
Transcription
1 CORPORATION for AMERICAN BANKING Due Diligence Report New Account Opening Procedures Introduction The Corporation for American Banking (CAB), a subsidiary of the American Bankers Association (ABA), targets programs for endorsement that help banks diversify their income stream, reduce expenses, operate more efficiently, and compete more effectively. In response to the know your customer requirements imposed by Section 326 of the U.S.A. PATRIOT Act of 2001 (Patriot Act) enacted by Congress in 2001, the ABA s Government Relations and Compliance Departments deployed CAB to evaluate solutions that assist with Section 326 compliance. CAB conducted research in the marketplace to identify potential companies that were best positioned to help banks comply with the new Patriot Act requirements. CAB considered many factors during its due diligence process including product effectiveness, customer service standards, financial soundness, and marketing capabilities. In addition, CAB employed Alex Sheshunoff Management Services (ASM) to provide an independent review and analysis of such companies and service offerings.
2 At the conclusion of its due diligence, CAB recommended that the ABA further evaluate a LexisNexis product called InstantID. After the CAB analysis and the independent analysis by ASM, the American Bankers Association worked with LexisNexis to ensure that InstantID directly responded to the member banks request for assistance in fulfilling their obligations under Section 326 of the Patriot Act. ABA member banks also tested the InstantID product, provided feedback to the development committee and assisted in the overall product development and rollout. The following information represents the due diligence design and evaluation criteria along with key findings about the product ultimately endorsed by the ABA, InstantID from LexisNexis. Due Diligence Evaluation Criteria Some of the critical criteria used in evaluating potential companies and their services included: How well does the product offering meet the requirements of Section 326? Does the product offering have value added components-functionality? What types of data, quantity of data, and quality of data is used in the verification process? How will the product assist banks with their Customer Information Program (CIP)? Is the product price competitive and value competitive with other marketplace tools? What background does the providing company have that suggests strength, stability, and expertise? I. How well does the product offering meet the requirements of Section 326? The primary requirements under Section 326 of the Patriot Act are to know your customer by verifying the identity of your customer and to check the applicant information against government supplied lists of known terrorists and individuals involved in money laundering activities. InstantID uses a sophisticated and comprehensive search process developed by LexisNexis to verify customer identity information, check against government lists of known or suspected terrorists and identify circumstances often associated with higher risk. InstantID is designed to work with a variety of account opening processes and is available via on-line, Web-based searches, batch processing, or through systems integration in existing processing platforms. Applicant information such as name, address, telephone number, social security number and date of birth is provided via search forms available through a secure web link or as part of a list of applicants submitted for a batch process. 2
3 3
4 The sophisticated LexisNexis search process takes each piece of input information and performs simultaneous searches against multiple-independent data sources. Extensive searches using Name-Address-SSN information and Name-Address-Phone information are used to validate and verify the account information. The verification process utilizes proprietary search and string comparison technology to quickly and efficiently sort through billions of records looking for confirmation of identity while checking for suspicious patterns of verification failure that may indicate fraud or data integrity problems. This search process incorporates built-in processing logic and sophisticated matching techniques to compensate for potential data input errors, changes of address, and name changes. Effective matching techniques ensure that data is accurately retrieved and compared to form an accurate conclusion of whether or not the data is verified. The InstantID process utilizes some of the most sophisticated matching and linking technology available today. The thoroughness of the InstantID verification and validation process produces very high verification rates. As a result, banks will have fewer exception accounts to process and customer acquisition interruptions will be minimized. InstantID Online Web Based Searches This feature allows banks to access data forms via a secure website and receive instantaneous feedback. Account openers access and complete the required customer information for a consumer or business verification which includes name, address, telephone number, social security number and date of birth. InstantID processes the information and immediately returns search results with a 4
5 verification index. This option gives bankers the ability to enter customer information during the account opening process in order to receive immediate results. InstantID Batch Processing Options When institutions choose to utilize the batch processing capability of InstantID there are two options available. The versions of InstantID through batch processing include: I. Compliance Version (InstantID) OFAC Check The CVI (Comprehensive Verification Index) Name - Address - SSN Results Name - Address - Telephone Results II. Compliance Version with Due Diligence Data (InstantID Premium) InstantID Premium includes all the InstantID content and; Corrected data for miskeyed information Telephone summary results Name & address summary results SSN - name - address summary results OFAC hit information InstantID Business Processes InstantID is also available to assess new accounts opened on behalf of a business entity. The business processes can assess data for the business entity alone, or can simultaneously assess both the business information and the business authorized agent information. The later solution is particularly effective when opening a small business account which often includes both business and consumer information. The fundamental search processes within the InstantID business products are the same as the InstantID consumer processes. However, in addition to searching billions of consumer records, extensive searching also takes place across multiple-independent business data files consisting of over 75 million records. The InstantID business process includes verification results for the business entity and for the business authorized agent information if it has been provided. Potential risk indicators are provided for both the business data and the agent data. Corrected information is provided if the InstantID process determines that some of the input data may have been miskeyed. Supplemental information about the business such as years in business, number of employees, principal officers, and other public record information can also be provided as part of the business InstantID process. 5
6 II. Does the product offering have value added components-functionality? InstantID not only helps banks meet the compliance requirements under Section 326, it also provides several value added components. InstantID is also a valuable fraud prevention tool. The Comprehensive Verification Index (CVI) and Business Verification Index (BVI) within InstantID is valuable for assessing the level of identity verification achieved, and it s also indicative of potential fraud risk and identity theft. A potential risk indicator such as deceased SSN, invalid SSN, and others are also frequently correlative to fraud and identity theft and are useful tools for subsequent actions taken by the bank. Lastly, the data located in the search processes, is also useful for follow-up, due diligence, and fraud prevention efforts taken by the bank. III. What types of data, quantity of data and quality of data is used in the verification process? Bankers rate quantity and quality of verification rates produced by the product as extremely important factors in rating the functionality of a verification product. Compliance officers know that they will need to demonstrate that they have deployed an effective process within their organization. Research indicates that bankers value a process that meets Section 326 guidelines and minimizes false alarms that can create additional work in the bank s operations organization. Banks are looking for product offerings that can achieve high levels of verification yet can demonstrate sound principles that produce quality verifications. The verification rates with InstantID are extremely high. One reason is because InstantID accesses multiple-independent data sources in its verification routines. Nearly four billion consumer records are accessed for consumer verifications and an additional 75 million records are accessed for business account verification. The accumulative size of databases utilized by InstantID provides banks with one of the largest search engines available to any verification product. The data update frequency within InstantID makes the InstantID data some of the most current information available in any industry product. Current data is important for producing quality answers, especially in situations where a customer has recently moved. In addition to adding built-in intelligence for new mover situations, the InstantID product also takes into consideration potential data input errors when it s formulating its verification results. This data correction capability is important for minimizing false alarms, and it is also a valuable tool to ensure that subsequent customer contact can be made via telephone and mail. Category by category, InstantID compares favorably with other product solutions for quantity and quality, current data, data matching and linking technology, processing intelligence, and minimizing false alarms (false positives). 6
7 IV. How will the product assist banks with their Customer Information Program (CIP)? Financial institutions will be required to maintain a customer information policy for new account opening procedures. InstantID provides the tools necessary for banks to develop a customer information policy. InstantID is extremely comprehensive and enables financial institutions to build policy and take appropriate follow-up steps where necessary. Generally, the Comprehensive Verification Index (CVI) and Business Verification Index (BVI) within InstantID is used to determine which accounts may warrant further follow-up action. The potential risk indicators, potential follow-up actions, and the due diligence data provided within InstantID make it easy for banks to deploy appropriate follow-up actions on accounts which have poor verification or indications of potential risk. Many banks use the summarized search results in the easy-to-use CVI and BVI as the foundation of their Customer Identification Program (CIP). The CVI and BVI are categorized as a value of 00, 10, 20, 30, 40, or 50. A CVI or BVI score of 00 indicates that none of the data was verified; a score of 50 means that complete verification of the applicant information has been achieved. When an account has a low CVI or BVI value, it is suggested that the bank follow its internal policy regarding account opening procedures. In addition to OFAC screening and the CVI or BVI, InstantID also includes potential risk indicator flags (i.e. SSN belongs to a deceased individual) and data located from the search processes which makes subsequent due diligence efforts easy to deploy within the financial institution. V. Is the product price competitive and value competitive with other marketplace tools? The price range for Section 326 compliance products ranges significantly and is influenced by several factors. Prices include various combinations of transaction fees, fixed fees, licensing fees, start-up fees, integration fees, and consulting fees. InstantID s price range varies depending on which version, html or batch, the bank implements, as well as other ancillary products purchased. LexisNexis conducted market research, including feedback from community bankers, regarding pricing, product offerings and scope of services offered to determine pricing appropriate for the marketplace. VI. What background does the providing company have that suggests strength, stability and expertise? InstantID is a product produced by LexisNexis. This group has the ability to access one of the largest collections of public records available anywhere and has 30 years of data 7
8 management expertise. Unlike several other companies who have recently emerged with verification products, LexisNexis has been focused on identity verification processes since 1994 and has a well established market reputation as a leading authority on identity verification and authentication. In 1993, Elsevier NV and Reed International P.L.C. merged to form Reed Elsevier plc. Its first major acquisition was LEXIS-NEXIS in In 2002, Reed Elsevier plc was renamed Reed Elsevier Group plc. The LexisNexis Group unites strong brands, pioneering technologies and premium information for customers in the legal, corporate, government and academic markets. More than two-thirds of its revenue is generated in the North American marketplace. The Group is also the market leader in the United Kingdom and the British Commonwealth and major publisher in the legal, tax and regulatory markets in Continental Europe and Latin America. The Group is divided into four main operating units: North American Legal markets, U.S. Corporate and Federal markets, Martindale-Hubbell and the International Division. The division, which comprises the Group s publishing assets, is regionally organized, in Europe, Asia-pacific and Latin America. The Group's products are available via the World Wide Web, dial-up online, CD-ROM and hardcopy print. The thousands of titles available via LexisNexis Group products offer access to some of the most recognized and authoritative sources in the world today. LexisNexis Web and dial-up online solutions combine searchable access to billions of documents from thousands of sources with leading edge systems and tools for managing this content. LexisNexis delivers a high quality resource with which to build research and knowledge-management solutions for the entire enterprise. Providing access to thousands of worldwide newspapers, magazines, trade journals, industry newsletters, tax and accounting information, financial data, public records, legislative records, data on companies and their executives makes the LexisNexis service an indispensable tool for gathering information and providing accurate answers. As an aggregator of public records databases, LexisNexis was recently named one of KM World magazine's "Top 100 Companies in Knowledge Management." LexisNexis* at lexis.com and lexisonesm are winners of the 2002 Codie Awards sponsored by the Software and Information Industry Association (SIIA), which also awarded LexisNexis its prestigious Corporate Achievement Award. The Codie s recognize the software and information industry's finest products and services and honor excellence for corporate achievement and philanthropic efforts. LexisNexis LexisNexis combines one of the largest collections of public records available anywhere with innovative search processes and statistical modeling to provide industry leading identity authentication products. Formed after the acquisition of International, L.L.C. in 2000, this unit builds products and services for fraud detection, risk scoring, identity verification and fraud consulting and management services. The LexisNexis family of 8
9 solutions provides innovative and intelligent tools for financial institutions to acquire good customers, manage risk and locate and recover assets. Customer Service/Support LexisNexis has a highly trained customer support organization. Customers within the United States can simply call , 24 hours a day, 7 days a week with questions. Customer Support Representatives address questions related to InstantID as well as the news, finance, public records, and business materials. Training LexisNexis offers a wide array of training options to assist customers in learning about products as well as how to use them in order to maximize their effectiveness. As part of the implementation process, the LexisNexis Project Manager works with each customer to determine the exact type of training the customer will need to effectively use InstantID. The training options naturally vary for each institution but can include training classes that train the trainer, individual training or training groups either in person or telephonically. The customer will work with both the Account Manager and a Project Manager to come up with a training course and schedule that best meets the institution s needs. The Account Manager and Project Manager will continuously stay in contact with the customer on an ongoing basis to ensure any training issues are appropriately addressed. Technology LexisNexis data management and technology leadership has spanned more than 30 years. The LexisNexis Data Center is one of the largest of its kind in the United States. The complex operates 365 days a year, 24 hours a day. It consists of networked servers, software and telecommunications equipment that are the backbone for a wide range of LexisNexis products and services, as well as the host to customer data and other Reed Elsevier services, such as Elsevier Science Direct. Allan McLaughlin, senior vice president and CTO of LexisNexis, was named among the Top 25 Most Influential CTOs of 2002 by InfoWorld, a highly regarded resource for indepth technical analysis on key products, solutions, and technologies for sound buying decisions and business gain. The magazine chose McLaughlin for his innovative efforts and continued success in a challenging economic landscape. McLaughlin is an acknowledged technology leader and maintains responsibility for all the information systems and information technology operational functions of LexisNexis. It is his team that enables the company to deliver its top-quality, high availability online services of integrated legal, news and business information to customers worldwide. McLaughlin s team uses a mixture of homegrown and state of the art technology and processes to ensure a proactive, customer focused business service for the business. LexisNexis has also achieved TruSecure Corporation s Perimeter Security Certification by successfully completing extensive information security assurance compliance 9
10 validation for the LexisNexis Data Center, housing more than four billion documents comprising the LexisNexis information services aspTruSecure certification, a gold standard for essential best practices in network and information security, confirms that LexisNexis is effectively managing information security risk, ensuring that LexisNexis information services continue to provide high levels of integrity, confidentiality and availability to customers throughout the world. The TruSecure Perimeter service is an integrated security program addressing the most significant sources of external risk. It provides security assurance in six major areas: electronic threats and vulnerabilities; malicious code; privacy; physical security; system availability; and human factors. Implementation The LexisNexis family of products provides online, batch processing and machine-tomachine customer solutions. To ensure implementation goes smoothly and produces quality results after a contract is signed, project managers assist with initial process setup. In addition, the batch process has been designed to accommodate the many different types of internal systems used by financial institutions. LexisNexis can accept virtually any type of file format and return results in virtually any type of file format. Implementation of the online version of InstantID is also straightforward. Access to the online version is available at and requires a user identification number and password, which is assigned by LexisNexis. Whether you need access for one person or for an entire team, simply log on to the website. As outlined above, multiple methods of training are available to ensure the InstantID solution is well implemented. Conclusion InstantID is a unique product offering that helps financial institutions meet the requirements set forth in Section 326 of the Patriot Act. Additionally, InstantID provides several valuable components that can be used by financial institutions in their fraud-loss mitigation efforts and within their follow-up due diligence on new accounts. Regulatory compliance is often perceived as additional operational burden and cost. However, unique features of InstantID can convert what may have been perceived as an incremental cost into bottom line improvement for the financial institution. With InstantID, banks get several unique features including: Tools for 326 compliance in a single product. Assistance in meeting compliance requirements for both consumer and business entities. A unique 0-50 Comprehensive Verification Index (CVI) that makes Section 326 policy deployment easy and understandable. 10
11 Built-in logic that considers changes of address, data input errors, and name changes to reduce false alarms and improve verification accuracy. Information which can streamline operational procedures and follow-up due diligence. Information which can help prevent financial fraud and identity theft and produce bottom line results. More information about InstantID, the ABA-sponsored Account Verification and Validation solution is available by visting or by contacting: American Bankers Association LexisNexis Lisa Gold Schier Scott Kolar Director, Strategic Alliances Senior Director of Marketing Corporation for American Banking LexisNexis 1120 Connecticut Avenue, NW PH: (630) Washington, DC PH: (202) Website: The information gained from InstantID is not to be considered a consumer report (as that term is defined in the Fair Credit Reporting Act 15 U.S.C. Sec 1681, et seq.) and may not be used to determine a consumer s eligibility for credit or insurance for personal, family, or household purposes; employment; a government license, or benefit, or other transaction initiated by a consumer. LexisNexis and the Knowledge Burst logo are trademarks of Reed Elsevier Properties Inc., used under license. It s How You Know is a trademark of Reed Elsevier Inc. RiskWise and InstantID are registered trademarks of RiskWise, L.L.C. Other products or services may be trademarks or registered trademarks of their respective companies. 11
LexisNexis InstantID. Technical White Paper. Analyzing Results. For the following: LexisNexis Bridger Insight XG. Contact LexisNexis Sales:
Technical White Paper LexisNexis InstantID Analyzing Results For the following: LexisNexis Bridger Insight XG Contact LexisNexis Sales: 877-922-5757 C ONTENTS Executive Summary..................................................
More informationIdentity fraud demands constantly evolving prevention strategies to thwart ever-shifting criminals.
White Paper An Overview of Complementary Approaches Identity fraud demands constantly evolving prevention strategies to thwart ever-shifting criminals. February 2010 Risk Solutions Financial Services Introduction
More informationProduct. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution
Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively
More informationSpotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
More informationAutomotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy
CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions
More informationKnowledge Based Authentication [KBA] is not just for onboarding new customers
White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA] is not just for onboarding new customers December 2013 Risk Solutions Best Practices
More informationLeveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
More informationAward-Winning Reed Elsevier. Team Relies on LexisNexis
Case Study LexisNexis Business Insight Solutions Global Procurement Award-Winning Reed Elsevier Global Procurement Team Relies on LexisNexis Publisher to Track News Reports about Suppliers. LexisNexis
More informationInteragency Guidelines on Identity Theft Detection, Prevention, and Mitigation
Guidelines to FTC Red Flag Rule(reformatted) Appendix A to Part 681 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 681.2 of this part requires each financial institution
More informationBe the carrier of choice.
White Paper a Comprehensive, Automated Loss History Database Be the carrier of choice. Industry leaders are simplifying their quoting process by automating loss runs. September 2012 Risk Solutions Insurance
More informationWhite Paper. The Data Matching Game: Enabling Customer Data Integration and Protecting Consumer Privacy. October 2008
> White Paper The Data Matching Game: Enabling Customer Data Integration and Protecting Consumer Privacy October 2008 Table of Contents Introduction..............................................1 What
More informationQuestions and Answers About the Identity Theft Red Flag Requirements
Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,
More informationBusiness Information Services. Product overview
Business Information Services Product overview Capabilities Quality data with an approach you can count on every step of the way Gain the distinctive edge you need to make better decisions throughout the
More informationInvestigative and Security Consulting Services for Hedge Funds, Venture Capital Funds, Private Equity Firms and other Financial Institutions
Investigative and Security Consulting Services for Hedge Funds, Venture Capital Funds, Private Equity Firms and other Financial Institutions 575 MADISON AVENUE, SUITE 1006, NEW YORK, NY 10022 T. 212 605
More informationA Unique Perspective into the World of Identity Fraud
White Paper A Unique Perspective into the World of Identity Fraud Explore the value of LexisNexis FraudPoint solutions in fraud detection. Risk Solutions Identity Management Executive Summary There are
More informationPutting Reliable Health Care Performance Measurement Systems into Practice
An NCQA Issue Brief 2000 L Street, NW Washington, DC 20036 888-275-7585 www.ncqa.org Putting Reliable Health Care Performance Measurement Systems into Practice By Joachim Roski, PhD MPH; Vice President,
More informationLake Havasu City. Identity Theft Prevention Program
Lake Havasu City Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION Lake Havasu City (City) developed this Identity Theft Prevention Program (Program) pursuant to the
More informationProspect Portfolio User Guide
Prospect Portfolio User Guide Table of Contents LexisNexis Prospect Portfolio Overview... 3 Accessing Prospect Portfolio... 3 Prospect Portfolio as a stand-alone application... 3 Integrate Prospect Portfolio
More informationNorth American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
More informationNavigating OFAC demands a map. Access valuable information and key details to stay informed.
White Paper Navigating OFAC demands a map. Access valuable information and key details to stay informed. February 2010 Risk Solutions Financial Services Introduction This white paper introduces the Office
More informationDecide with Confidence
Identity Verification Business Verification AML Compliance Fraud Detection Dun and Bradstreet (D&B) have been operating in Australia since 1887 and in New Zealand since 1903 as a correspondent country.
More informationWhite Paper. Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper
White Paper Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper Dave Whitin, Consultant Michiko Wolcott, Statistician September 2006 Table of contents Executive summary...................................
More informationWHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules
WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative
More informationAIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
More informationSecurity management solutions White paper. Extend business reach with a robust security infrastructure.
Security management solutions White paper Extend business reach with a robust security infrastructure. July 2007 2 Contents 2 Overview 3 Adapt to today s security landscape 4 Drive value from end-to-end
More informationXavier University. Fair & Accurate Credit Transactions Act (Red Flags Rule) Policy and Procedures
Xavier University Fair & Accurate Credit Transactions Act (Red Flags Rule) Policy and Procedures Revised April 7, 2009 1 Identity Theft Policy IdentityTheft An identity can be stolen with nothing more
More informationSecuring Critical Information Assets: A Business Case for Managed Security Services
White Paper Securing Critical Information Assets: A Business Case for Managed Security Services Business solutions through information technology Entire contents 2004 by CGI Group Inc. All rights reserved.
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More informationNORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES
NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES 1. PROCEDURE SUMMARY STATMENT The purpose of this procedure
More informationFINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
More informationAn Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions
An Oracle White Paper October 2009 An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions Executive Overview Today s complex financial crime schemes pose
More informationPreemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
More informationSimply Sophisticated. Information Security and Compliance
Simply Sophisticated Information Security and Compliance Simple Sophistication Welcome to Your New Strategic Advantage As technology evolves at an accelerating rate, risk-based information security concerns
More informationThe State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology
The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies
More informationDocument process management solutions for MiFID compliance
Adobe Technical White Paper produced in conjunction with Equiduct Document process management solutions for MiFID compliance Adobe technology provides document process management solutions, enabling investment
More informationCOUNCIL POLICY STATEMENT
COUNCIL POLICY STATEMENT Policy No. 44 General Subject: Finance Specific Subject: Identity Theft Policy and Prevention Program Date Approved: October 20, 2008 The following policy is to implement the requirements
More informationProvide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
More informationSYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
More informationKey Factors for Payers in Fraud and Abuse Prevention. Protect against fraud and abuse with a multi-layered approach to claims management.
White Paper Protect against fraud and abuse with a multi-layered approach to claims management. October 2012 Whether an act is technically labeled health insurance fraud or health insurance abuse, the
More informationRSA Adaptive Authentication For ecommerce
RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers
More informationSymantec Protection Center Enterprise 3.0. Release Notes
Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used
More informationStopping the Flow of Health Care Fraud with Technology, Data and Analytics
White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,
More informationFerris State University
Ferris State University BUSINESS POLICY TO: All Members of the University Community 2009:08 DATE: May 2009 I. BACKGROUND IDENTITY THEFT PREVENTION PROGRAM The risk to the University, and its students,
More informationIBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule
IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule I. Firm Policy Our firm s policy is to protect our customers and their accounts from identity theft
More informationB. Credit - Deferral of payment of a debt incurred for the purchase of goods services, including educational services.
Date Revised: Page 1 of 16 5-21 Identity Theft Prevention Program I. BACKGROUND As a result of the increasing instances of identity theft, the United States Congress passed the Fair and Accurate Credit
More informationStrengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
More informationIdentity Theft Prevention Program
Identity Theft Prevention Program Illinois College of Optometry Illinois Eye Institute Effective Date: May 2009 Revised: Review Dates: IDENTITY THEFT PREVENTION POLICY STATEMENT The Illinois College of
More informationExecutive summary. Incorporate more information into the decisioning process, especially for high-dollar unsecured transactions.
Executive summary The biggest risk to an institution is not the consumer whose identity has been verified; it is the individual whose true identity is unknown. Meridian Research, Inc. 1 Know your customers
More informationThomson Reuters CLEAR THE SMARTER WAY TO GET YOUR INVESTIGATIVE FACTS STRAIGHT.
Thomson Reuters CLEAR THE SMARTER WAY TO GET YOUR INVESTIGATIVE FACTS STRAIGHT. CLEAR. EASIER SEARCH. BETTER RESULTS. SMARTER PREFERENCES. Bring the facts into focus. CLEAR features a simple, intuitive
More informationAccount Opening/Client Identification Program and Monitoring Client Activity
Account Opening/Client Identification Program and Monitoring Client Activity To help the government fight the funding of terrorism and money laundering activities, federal law requires all financial institutions
More informationUNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy
UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy RESPONSIBLE OFFICIAL : Executive Vice Chancellor/Provost RESPONSIBLE OFFICIAL : Business & Financial Services EFFECTIVE
More informationThomas College Private College Enhances Security, Performance, and Reporting Capability
Microsoft.com Home Site Map Search Microsoft.com for: Go ISA Server Home Site Map Worldwide Free Newsletters Product Information How to Buy Technical Resources Downloads Support Community Partners Windows
More informationREGULATORY COMPLIANCE. Dynamic Solutions. Superior Results.
REGULATORY COMPLIANCE Dynamic Solutions. Superior Results. STREAMLINE, STRENGTHEN AND SIMPLIFY YOUR COMPLIANCE EFFORTS CSI S AUTOMATED, DYNAMIC SOLUTIONS MITIGATE RISK, DECREASE COSTS AND IMPROVE COMPLIANCE
More informationUltimate Beneficial Ownership The Implications of Not Knowing
White Paper Ultimate Beneficial Ownership The Implications of Not Knowing September 2014 Ultimate Beneficial Ownership The Implications of Not Knowing Author: Ana Maria H. de Alba Beneficial ownership
More informationTHE LUTHERAN UNIVERSITY ASSOCIATION, INC. d/b/a Valparaiso University IDENTITY THEFT PREVENTION PROGRAM
THE LUTHERAN UNIVERSITY ASSOCIATION, INC. d/b/a Valparaiso University IDENTITY THEFT PREVENTION PROGRAM SECTION 1: BACKGROUND The risk to Valparaiso University ("University"), its employees, students (in
More informationLexisNexis Screening Solutions. Fast. Accurate. Secure.
LexisNexis Screening Solutions Fast. Accurate. Secure. Employment Screening Resident Screening Volunteer Screening Experience Matters Gain confidence in your hiring decisions with LexisNexis who knows
More informationPRIVACY AND SECURITY POLICY
assess, align, achieve PRIVACY AND SECURITY POLICY ath Power Consulting is a professional market research and consulting firm. We are committed to maintaining the privacy of our website users, clients,
More informationA Critical Need: The Importance of AML Compliance for Broker-Dealers
A Critical Need: The Importance of AML Compliance for Broker-Dealers AML is a FINRA Priority For broker-dealer or other financial services firms, it can sometimes appear that in order to reinforce the
More informationTake value-add on a test drive. Explore smarter ways to evaluate phone data providers.
White Paper Take value-add on a test drive. Explore smarter ways to evaluate phone data providers. Employing an effective debt-collection strategy with the right information solutions provider helps increase
More informationManaging data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
More informationAskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
More informationWhite Paper. Imperva Data Security and Compliance Lifecycle
White Paper Today s highly regulated business environment is forcing corporations to comply with a multitude of different regulatory mandates, including data governance, data protection and industry regulations.
More informationMcAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
More informationWhite Paper. High Value Data and Analytics: Building a Platform for Growth
White Paper High Value Data and Analytics: Building a Platform for Growth What s hidden in your data? Analyze, realize and optimize the possibilities. Created by industry experts, this publication is the
More information31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003,
5/23/2011 31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, Public Law 108-159, requires municipalities to promulgate
More informationApplication Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
More informationDetect, Prevent, and Deter Fraud in Big Data Environments
SAP Brief SAP s for Governance, Risk, and Compliance SAP Fraud Management Objectives Detect, Prevent, and Deter Fraud in Big Data Environments Detect and prevent fraud to reduce financial loss Detect and
More informationMARKETING FINANCIAL SERVICES
MARKETING FINANCIAL SERVICES Building a Better Bank: Strategies for Implementing a Marketing Process Bruce A. Clapp 1120 Connecticut Avenue, N.W. Washington, D.C. 20036 This publication is designed to
More informationUniversity of Tennessee's Identity Theft Prevention Program
IDENTITY THEFT PREVENTION PROGRAM 1. BACKGROUND The University of Tennessee (UT) developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission s Red Flags Rule, Section 114
More informationRe: Fraud adjustment and fraud prevention standard provisions of Section 1075 of the Dodd Frank Act related to debit card interchange fees.
American Bankers Association Building Success Together. Nessa Feddis Vice President and Senior Counsel Center for Regulatory Compliance Phone: 202-663-5433 nfeddis@aba.com Ms. Louise Roseman. Director
More informationAdvent Software. Advent Software. Innovative Solutions for Investment Management
Advent Software Advent Software Innovative Solutions for Investment Management Innovation & Proven Reliability Since 1983 Setting the Standard for Investment Technology 25 Years of Innovation Advent pioneered
More informationPursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES
Pursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES Contents PART I An Increasing Threat: Identity Theft The FFIEC Response Risk Assessment Fundamentals The FFIEC
More informationFAQs: Final CIP Rule
FAQs: Final CIP Rule The staff of the Board of Governors of the Federal Reserve System, Federal Deposit Insurance Corporation, Financial Crimes Enforcement Network, National Credit Union Administration,
More informationIdentity Theft Prevention Policy
Eastern Kentucky University Policy and Regulation Library 6.#.#P Volume 6, Volume Title: Financial Affairs Chapter #, Chapter Title Section #, Name: Identity Theft Prevention Policy Approval Authority:
More informationThe National Association of Community Health Centers, Inc. ISSUE BRIEF
The National Association of Community Health Centers, Inc. ISSUE BRIEF FTC Red Flag Rule Considerations in Developing an Identity Theft Prevention Program April 2009 Prepared for NACHC by: Carrie Bill
More informationUsing Data Mining to Detect Insurance Fraud
IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts
More informationA Best Practices Point of View from. Data Backup and Disaster Recovery Planning
A Best Practices Point of View from Data Backup and Disaster Recovery Planning Security Protect Your Data Expertise Support Patient Privacy Business Continuity Plan and Restore Peace of Mind Backup and
More informationF5 and Microsoft Exchange Security Solutions
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
More informationManaged Security Monitoring Quick Guide 5/26/15. 2014 EarthLink. Trademarks are property of their respective owners. All rights reserved.
Managed Security Monitoring Quick Guide 5/26/15 2014 EarthLink. Trademarks are property of their respective owners. All rights reserved. 2 Managed Security Monitoring - Overview Service Positioning EarthLink
More informationAML & Mortgage Fraud Compliance Program v. 08.2013 ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM
ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM Version: 2.0 dated 08.2013 TABLE OF CONTENTS AML & Mortgage Fraud Compliance Program 1.0 PURPOSE AND SCOPE... 3 2.0 APPLICABLE REGULATIONS AND
More informationUsing Data Mining to Detect Insurance Fraud
IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: Combine powerful analytical techniques with existing fraud detection and prevention efforts Build
More informationUniversity Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule
NUMBER: BUSF 4.12 SECTION: SUBJECT: Finance and Planning University Identity Theft and Detection Program (NEW) DATE: March 3, 2011 Policy for: Procedure for: Authorized by: Issued by: All Campuses and
More informationLexisNexis Provider FAQs
LexisNexis Provider FAQs Get straight answers to your questions about the provider verification request faxes or phone calls. More than 25 percent of health care provider contact information changes each
More informationOuachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
More informationValidating Third Party Software Erica M. Torres, CRCM
Validating Third Party Software Erica M. Torres, CRCM Michigan Bankers Association Risk Management & Compliance Institute September 29, 2014 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT
More informationRe: Big Data Request for Information
March 31, 2014 Attn: Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue NW Washington, D.C. 20502 Ladies and Gentlemen: Re: Big Data Request
More informationDeer Park Independent School District. Identity Theft Policy and Board of Trustees Resolution
Deer Park Independent School District Identity Theft Policy and Board of Trustees Resolution Deer Park, Texas ORDINANCE AND RESOLUTION A RESOLUTION ADOPTING AN IDENTITY THEFT POLICY WHEREAS, The Fair and
More informationInterAction combines an organization s relationship data and industry knowledge and transforms it into actionable relationship. intelligence.
North Carolina Biotechnology Center (NC Biotech) Overview Location: Research Triangle Park, NC Industry: Economic development/ biotechnology Customer Profile: NC Biotech is a state-funded nonprofit corporation
More informationwith Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
More informationDomain Name Cyberscape Report
White Paper Domain Name Cyberscape Report Uncovering infringement trends in the domain name marketplace Version 1.0 Executive Summary... 1 Analysis... 4 Data Quality... 4 Registrant Analysis... 5 Dispute
More informationRed Flags Identity Theft Training Program. Fall 2015
Red Flags Identity Theft Training Program Fall 2015 Background In 2003, U.S. Congress enacted the Fair and Accurate Credit Transactions Act of 2003 (FACTA). FACTA requires creditors to adopt policies and
More informationThese rules became effective August 1, 2009, and require certain agencies to implement an identity theft program and policy.
Red Flag Policy Protecting your privacy is of paramount importance at Missouri Southern State University, and we are dedicated to the responsible handling of your personal information. We are very committed
More informationORACLE UTILITIES ANALYTICS
ORACLE UTILITIES ANALYTICS TRANSFORMING COMPLEX DATA INTO BUSINESS VALUE UTILITIES FOCUS ON ANALYTICS Aging infrastructure. Escalating customer expectations. Demand growth. The challenges are many. And
More informationCorporate Incident Response. Why You Can t Afford to Ignore It
Corporate Incident Response Why You Can t Afford to Ignore It Whether your company needs to comply with new legislation, defend against financial loss, protect its corporate reputation or a combination
More informationNow is the time for a fresh approach to detecting fraud
Now is the time for a fresh approach to detecting fraud Learn where today s fraud detection falls short and what you can do about it. Read on. Table of Contents Now is the time for a fresh approach to
More informationFive Star Wealth Manager Award
Five Star Wealth Manager Award Program Summary and Research Methodology (Effective starting with 2012 Awards) Revised March 19, 2013 Five Star Professional 2117 Cliff Drive Eagan, MN 55122 1-888-438-5782
More informationRemote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
More informationRSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS
RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS Security solutions for patient and provider access AT A GLANCE Healthcare organizations of all sizes are responding to the demands of patients, physicians,
More information