White Paper. The Data Matching Game: Enabling Customer Data Integration and Protecting Consumer Privacy. October 2008

Size: px
Start display at page:

Download "White Paper. The Data Matching Game: Enabling Customer Data Integration and Protecting Consumer Privacy. October 2008"

Transcription

1 > White Paper The Data Matching Game: Enabling Customer Data Integration and Protecting Consumer Privacy October 2008

2 Table of Contents Introduction What s Your Phone Number? Mary Johnson and the Privacy vs. Accuracy Challenge How to Win the Data Matching Game Consumer Credit Data and the GLB Act Summary

3 Introduction To comply with privacy rules that seek to protect consumer interests, businesses must consistently and accurately recognize records associated with the consumer. That task is fraught with complexities, especially for businesses that manage consumer information across multiple databases and products. Organizational and technological silos create barriers to matching information in disparate places. A few examples of questions a business may need to resolve: Is J. Patterson the same person as John Patterson? Are records for Julie Banks (maiden name) and Julie Watson (married name) accurately linked? Are records for Mark Adams at his old address and new address accurately matched? To accurately identify consumers, businesses are increasingly relying on reference-based matching systems that use unique identifiers to recognize and integrate dissimilar records. The challenge for providers of reference-based matching systems is to comply with privacy legislation while supplying businesses with the most accurate and reliable information afforded by law. The foundation of most reference-based matching systems is credit header data that links information in a credit report to a particular individual. Credit headers enable Customer Data Integration (CDI), ensuring both the privacy and security of consumers. This paper explores two requirements that sometimes are in conflict: the business s need for accurate identity information and the privacy rights of consumers. The paper explains how businesses can use reference-based matching systems to favorably resolve the privacy-versus-accuracy challenge. What s Your Phone Number? Consumers are routinely asked to provide data about themselves to conduct business transactions. Consider your own daily experiences. The department store clerk wants to know your phone number. The cashier at a toy store asks for your zip code. When you call your bank, the customer service representative wants you to verify your address and the last four digits of your Social Security number. Businesses invest heavily on systems that capture, store, and 1

4 analyze the data they collect about their customers and prospects. Uses of the data are broad: Loyalty programs track purchases and encourage future transactions. Surveys gather demographic information and insight into shopping trends. Return activity is monitored to prevent losses and control abuses. Analysis of what is being purchased regionally helps businesses to manage inventory and improve logistics. Telephone numbers, addresses and Social Security numbers are used to recognize customers and provide customer service support. Analysis of consumers in-store behavior helps store managers to improve sales through better placement of complimentary merchandise. How can a business use consumer data to improve profitability and customer satisfaction, while at the same time protecting consumer privacy? Many consumers fear that simply accepting a preapproved credit offer or requesting a catalog will result in waves of unwanted offers and solicitations. And with increasing concerns over identity theft, consumers worry about proliferating access to their personal information. Mary Johnson and the Privacy vs. Accuracy Challenge Concern for the protection of consumer privacy sparked moves to regulate how companies can share data and contact consumers. Enacted in 1999, the Gramm-Leach-Bliley Act ( GLB Act ) provides privacy protections for consumers by regulating how financial institutions can share nonpublic personal information, such as name, Social Security number and address information. The GLB Act requires issuance of privacy notices, which, with some exceptions, give consumers the right to opt-out and disallow the sharing of their nonpublic personal information with nonaffiliated third parties. To comply with privacy regulation, companies face the substantial challenge of accurately identifying consumers. Many businesses manage their customer information across multiple databases, product lines and portfolios. Consequently, personal information resides in various data silos that can t communicate with each other, vastly complicating the task of identifying consumers accurately and consistently. 2

5 The unstable nature of data compounds the problem. Data entry is an error-prone process; names and addresses change frequently due to marriage, divorce and relocations. Is Mary V. Johnson in Dallas the same Mary V. Johnson as the one in Irving, a Dallas suburb? Can Mary Johnson s bank recognize that she has two credit cards it issued, one to M. V. Johnson and one to Mary V. Johnson, each at different addresses? If she opts-out of further solicitations and the sharing of her nonpublic personal information with nonaffiliated third parties, will the bank implement her choices and protect her privacy? Names and addresses frequently change due to marriage, divorce and relocations. Is M. Johnson the same individual as Mary Johnson? How to Win the Data Matching Game Businesses now have access to Customer Data Integration (CDI) tools specifically designed to help them deal with how consumer records are recognized and integrated. CDI is at the heart of efforts to consolidate and integrate customer information into a single, holistic view of the customer. With CDI tools, businesses gain the ability to accurately match records in disparate data. Algorithms and one-to-one or string matching, the traditional methods for data matching, often fail to link together dissimilar records. Reference-based technology provides a more advanced form of data matching used to identify consumers. Reference-based matching systems employ large databases housing the name and address information of millions of consumers. Users of this technology provide names and addresses for matching with the names and addresses in the reference database. When a user-submitted name and address produces a match, the service provider returns to the user a unique identifier or key that identifies this consumer within the reference database. With these keys, users can identify individuals across business products, channels and databases, regardless of name or address change. The bank mentioned earlier would therefore recognize that Mary V. Johnson and M. V. Johnson are the same individual because both have the same key. The bank benefits by gaining a single view of its customer, and Ms. Johnson is spared from unwanted solicitations and phone calls. Several reference-based matching systems and services are available in the marketplace. A major differentiator is the robustness and accuracy of the data that resides in the reference database. The credibility and depth of the data is essential to providing an accurate match. A larger database with more history can be expected to have greater accuracy, resulting in fewer unwanted mailings and solicitations, unwanted information sharing, and 3

6 consumer recognition errors. For example, reference databases with several years of address history enable users to identify consumers who have multiple addresses or who have moved frequently. Often these reference databases include data from surveys, marketing lists and other public data sources. Since these sources can often contain inaccuracies, providers of CDI services seek to augment the database with more reliable data sources. One such source is credit header data the consumer identification information located within the header portion of the consumer credit file. In addition, credit header data includes actual account information provided to consumer credit reporting companies for various purposes. Credit headers provide an excellent, reliable source of name and address information. By incorporating historical credit header data, the identification information of individuals can be linked even though their names and addresses have changed over the years. Consumer Credit Data and the GLB Act Credit header data is a coveted, yet highly regulated, source of information. Any company that uses credit header data as part of its reference-based matching product must comply with laws regarding how the data can be used. The GLB Act specifies how the data can be used by financial institutions and third parties receiving the data for various purposes. Regardless of the type of data found within the reference database, any financial institution that transmits nonpublic personal information to a company for assigning a unique key or identifier must comply with the GLB Act. The Act s definition of nonpublic personal information includes basic identifying information about individuals, such as name, Social Security number, address, telephone number, mother s maiden name, and prior addresses. The GLB Act limits financial institutions from sharing consumer information with a third party. Financial institutions are broadly defined to include banks, lenders, insurers, loan brokers, and credit reporting agencies. Before a financial institution can share protected information, it must provide a notice that gives the consumer an opportunity to opt out. The Act has various exceptions that allow nonpublic personal information to be provided to, and used by, third parties without having to provide a notice and an opt-out. In general, the exceptions allow the use of nonpublic personal information for consumer reporting (pursuant to the Fair Credit Reporting Act), fraud protection, law enforcement and regulatory or self-regulatory purposes. 4

7 The GLB Act also requires financial institutions to implement appropriate physical, technical and procedural safeguards to protect the security and integrity of information they receive from customers, directly or indirectly. The Federal Trade Commission has broad discretion to interpret the GLB Act s statutory definitions. As FTC Commisioner Jon Leibowitz noted in his May 11, 2006 statement before the House Subcommittee on Commerce, Trade and Consumer Protection, the FTC has a Safeguards Rule requiring financial institutions to have a written information security plan that describes their procedures to protect customer information. Equifax believes that the use, consistent with contractual requirements, of keys derived from a reference database incorporating credit header information is within GLB requirements. Other than the key itself, no other information within the reference database is disclosed or distributed to users. The use of keys can impact a variety of activities that enable the business to communicate, manage and process customer transactions such as when a consumer applies for credit, authorizes a purchase, or requests a credit increase. By using the key in its front and back office operations, a company can streamline its operations and facilitate consumer transactions. When the business markets its own products and services to current customers or prospects, the keys protect the integrity of the institution and help prevent actual or potential fraud. Businesses are finding many fine advantages to using these keys. Applications and benefits include: Compliance with the consumer s opt-out requests, as required by various federal and state laws, such as the GLB Act. These requests can involve solicitations, do-not-call lists, and invitations to apply for a product or service. To comply with such opt-out instructions of the consumer, a company must have effective ways to fully identify a consumer across all marketing channels, products and operations. Fraud protection. Better identification measures will help prevent actual or potential fraud and prevent unauthorized transactions. By having a unique identifier for each customer or prospect, a business can greatly increase its ability to identify the misuse of personal information, such as having a single Social Security number associated with multiple names. Responsiveness to requests from law enforcement or regulatory authorities. Accurate information about a consumer s financial relationships with an organization is essential to help law enforcement respond to suspicious and illegal activity. 5

8 Meeting legal responsibilities. Data-matching processes are essential in fulfilling know your customer obligations, including identity verification and anti-money laundering requirements of the USA PATRIOT Act. In the subprime lending environment, lenders may be required to exercise additional diligence in understanding the consumer s relationships with the organization. Only by recognizing their customers can businesses provide highly valued customer service and protect against losses. Such losses are not necessarily related to fraud. With a reliable source of data covering several years of name-andaddress history, a business gains the means to protect its own interests while preserving the privacy and security of consumers. Reference-based data matching provides the ability to accurately recognize a consumer by using a unique identifier at the point of sale or service. The business or lender can thereby validate a consumer s identity claims and discover what other relationships the consumer has with the organization. Using credit header data in a private and confidential manner allows for added security by providing the ability to identify the potential misuse of Social Security numbers. In a case of fraud, criminals will appropriate Social Security numbers to establish new lines of credit. With Social Security numbers residing in a historical reference database, businesses can identify and track all names and/or addresses associated with a single Social Security number. Only by recognizing their customers can businesses provide highly valued customer service and protect against losses. Such losses are not necessarily related to fraud. For example, companies in the telecommunications industry often have difficulty recognizing former customers among new applicants. Using a unique key from a reference-based technology, the telecommunications company can match the new applicant information to internal customer records. The company can then determine if it should establish service with the new applicant immediately or collect a previous debt first. Summary Complying with privacy rules that seek to protect consumer interests requires businesses to consistently and accurately recognize the consumer. To do so, businesses are increasingly relying on reference-based matching systems that utilize the most accurate and reliable information afforded by law. Credit header data is a significant part of a foundation that enables Customer Data Integration, which ensures the privacy and security of consumers. 6

9 Contact Information Equifax Inc. is a global leader in information technology that enables and secures global commerce with consumers and businesses. We are one of the largest sources of consumer and commercial data. Utilizing our databases, advanced analytics and proprietary enabling technology, we provide real-time answers for our customers. This innovative ability to transform information into intelligence is valued by customers across a wide range of industries and markets. Headquartered in Atlanta, Georgia, Equifax employs approximately 4,700 people in 13 countries throughout North America, Latin America and Europe. Equifax was founded 109 years ago, and today is a member of Standard & Poor's (S&P) 500 Index. Our common stock is traded on the New York Stock Exchange under the symbol EFX. Equifax offers a wide array of risk, collections, and marketing tools for managing portfolios of all sizes and types. Visit for additional details. Equifax Inc Peachtree Street, NW Atlanta, Georgia This publication contains many of the valuable trademarks, service marks, names, titles, logos, images, designs, copyrights and other proprietary materials owned, registered and used by Equifax Inc. and its affiliated companies, including but not limited to the registered mark Equifax ; any unauthorized use of same is strictly prohibited and all rights are reserved by Equifax Inc. and its affiliated companies. All other trademarks and service marks not owned by Equifax Inc. or its affiliated companies that appear in this publication are the property of their respective owners. Copyright 2008, Equifax Inc., Atlanta, Georgia. All rights reserved. 7

10 Equifax is a registered trademark of Equifax Inc. Inform, Enrich, Empower is a trademark of Equifax Inc. Copyright 2008, Equifax Inc., Atlanta, Georgia. All rights reserved. Printed in the U.S.A. EFS-838-ADV 10/08

Profitably Managing Risk in Your Credit Portfolio

Profitably Managing Risk in Your Credit Portfolio Profitably Managing Risk in Your Credit Portfolio An Equifax White Paper February 2007 Author: Richard Becker Assistant Vice President, Product Development Equifax Inc. As Acquisition Marketing Cools Off,

More information

Empowering Brokers to Identify and Combat Mortgage Fraud

Empowering Brokers to Identify and Combat Mortgage Fraud Empowering Brokers to Identify and Combat Mortgage Fraud An Equifax White Paper October 2007 Author: Paul Wills Equifax Global Product Management Introduction In today s lending environment, mortgage fraud

More information

White Paper. Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper

White Paper. Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper White Paper Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper Dave Whitin, Consultant Michiko Wolcott, Statistician September 2006 Table of contents Executive summary...................................

More information

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions

More information

Utilizing Credit Scoring to Predict Patient Outcomes. An Equifax Predictive Sciences Research Paper September 2005

Utilizing Credit Scoring to Predict Patient Outcomes. An Equifax Predictive Sciences Research Paper September 2005 Utilizing Credit Scoring to Predict Patient Outcomes An Equifax Predictive Sciences Research Paper September 2005 Introduction Improving Your Revenue Cycle Performance Through Financial Management Solutions

More information

CREDIT SCORE USER GUIDE

CREDIT SCORE USER GUIDE Page 1 of 11 ABOUT EQUIFAX Equifax empowers businesses and consumers with information they can trust. A global leader in information solutions, we leverage one of the largest sources of consumer and commercial

More information

ALERTS NOTIFICATION USER GUIDE

ALERTS NOTIFICATION USER GUIDE Page 1 of 10 ABOUT EQUIFAX ALERTS NOTIFICATION USER GUIDE Equifax Canada Inc. Box 190 Jean Talon Station Montreal, Quebec H1S 2Z2 Equifax empowers businesses and consumers with information they can trust.

More information

HOW TO COMPLY WITH THE GRAMM-LEACH-BLILEY ACT

HOW TO COMPLY WITH THE GRAMM-LEACH-BLILEY ACT HOW TO COMPLY WITH THE GRAMM-LEACH-BLILEY ACT The information contained herein has been provided by Keith E. Whann and Deanna L. Stockamp of the law firm Whann & Associates and is for general information

More information

Equifax Reports Fourth Quarter and Full Year 2008 Results; Provides First Quarter 2009 Guidance

Equifax Reports Fourth Quarter and Full Year 2008 Results; Provides First Quarter 2009 Guidance 1550 Peachtree Street, N.W. Atlanta, Georgia 30309 NEWS RELEASE Contact: Jeff Dodge Tim Klein Investor Relations Media Relations (404) 885-8804 (404) 885-8555 jeff.dodge@equifax.com tim.klein@equifax.com

More information

Mortgage Services > Today s mortgage lenders are faced with. constant challenges Equifax can help. CONSUMER INFORMATION SOLUTIONS

Mortgage Services > Today s mortgage lenders are faced with. constant challenges Equifax can help. CONSUMER INFORMATION SOLUTIONS CONSUMER INFORMATION SOLUTIONS Mortgage Services > Today s mortgage lenders are faced with constant challenges Equifax can help. From quick access to tri-merge reports to independent third-party appraisals,

More information

Please read this Policy carefully. Your continued use of our sites means that you understand and consent to the terms of this Policy.

Please read this Policy carefully. Your continued use of our sites means that you understand and consent to the terms of this Policy. EFFECTIVE: February 2016 Version 1.2 CHECK 'N GO PRIVACY POLICY This Privacy Policy ("Policy") applies to the use of Check 'n Go (the "Company") online sites and any Company affiliate or subsidiary sites.

More information

CREDIT REPORT USER GUIDE

CREDIT REPORT USER GUIDE Page 1 of 17 ABOUT EQUIFAX CREDIT REPORT USER GUIDE Equifax Canada Inc. Box 190 Jean Talon Station Montreal, Quebec H1S 2Z2 Equifax empowers businesses and consumers with information they can trust. A

More information

Regulation P: Privacy of Consumer Financial Information. Frequently Asked Questions

Regulation P: Privacy of Consumer Financial Information. Frequently Asked Questions Regulation P: Privacy of Consumer Financial Information Frequently Asked Questions December 2001 Contents A. Financial institutions, products, and services that are covered under the Privacy Rule (Q.

More information

CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES

CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES THE TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS REVISED MAY 2008 CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING

More information

All About Credit Reports from A to Z

All About Credit Reports from A to Z All About Credit Reports from A to Z Adverse Action Notice A notice that you have been denied credit, employment, insurance, or other benefits based on information in a credit report. The notice should

More information

Privacy at Staples and Coastwide Laboratories. Customer Personal Information Privacy Policy (Effective Date: October 20, 2009)

Privacy at Staples and Coastwide Laboratories. Customer Personal Information Privacy Policy (Effective Date: October 20, 2009) Privacy at Staples and Coastwide Laboratories Customer Personal Information Privacy Policy (Effective Date: October 20, 2009) At Staples your privacy is as important to us as it is to you. Our Customer

More information

Introduction PriorFX LTD Right to Privacy Information

Introduction PriorFX LTD Right to Privacy Information Privacy Policy 1.Introduction 1.1 PriorFX LTD ( PriorFx or we ) is a Cyprus Investment Firm regulated by the Cyprus Securities and Exchange Commission (License No. 221/13). 1.2 PriorFX is operating under

More information

Headache vs. Hassle-Free: How Technology Can Ease the Burden of Regulatory Compliance An Equifax White Paper

Headache vs. Hassle-Free: How Technology Can Ease the Burden of Regulatory Compliance An Equifax White Paper Headache vs. Hassle-Free: How Technology Can Ease the Burden of Regulatory Compliance An Equifax White Paper Andrew Skillen February 2008 IMPORTANT NOTE: This summary is intended to provide general basic

More information

NCUA LETTER TO CREDIT UNIONS

NCUA LETTER TO CREDIT UNIONS NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and

More information

Business Credit Consulting Agreement

Business Credit Consulting Agreement Business Credit Consulting Agreement THIS AGREEMENT is entered into by and between Business Credit Advisor or Business Credit Coach ( Advisor ) Business Credit Consulting Client ( Client ) and the Business

More information

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial

More information

Optimizing government and insurance claims management with IBM Case Manager

Optimizing government and insurance claims management with IBM Case Manager Enterprise Content Management Optimizing government and insurance claims management with IBM Case Manager Apply advanced case management capabilities from IBM to help ensure successful outcomes Highlights

More information

CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES

CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES A CONSULTATION REPORT OF THE CHAIRMEN S TASK FORCE OF THE TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS OCTOBER

More information

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Data Privacy and Gramm- Leach-Bliley Act Section 501(b) Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement

More information

Wealthfront Brokerage Corporation

Wealthfront Brokerage Corporation Wealthfront Brokerage Corporation Business Continuity Plan Disclosure Wealthfront Brokerage Corporation ( Wealthfront Brokerage ) has developed a Business Continuity Plan on how we will respond to events

More information

The Right Choice for Call Recording Call Recording and Regulatory Compliance

The Right Choice for Call Recording Call Recording and Regulatory Compliance Call Recording and Regulatory Compliance An OAISYS White Paper Table of Contents Increased Regulations in Response to Economic Crisis...1 The Sarbanes-Oxley Act...1 The Payment Card Industry Data Security

More information

CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES

CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES THE TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS DECEMBER 2004 CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING

More information

Consumer and Community Affairs. Consumer Protection

Consumer and Community Affairs. Consumer Protection Consumer and Community Affairs The number of federal laws intended to protect consumers in credit and other financial transactions has been growing since the late 1960s. Congress has assigned to the Federal

More information

A+ Financial Services, Inc., A+ Auto Insurance Agency, Inc., and A+ Loans, Inc. Privacy Policy (Last updated 03/05/2014)

A+ Financial Services, Inc., A+ Auto Insurance Agency, Inc., and A+ Loans, Inc. Privacy Policy (Last updated 03/05/2014) A+ Financial Services, Inc., A+ Auto Insurance Agency, Inc., and A+ Loans, Inc. Privacy Policy (Last updated 03/05/2014) This Privacy Policy explains the policy statement of A+ Financial Services, Inc.,

More information

OCC Staff Responses to Questions from February 13-14, 2001, Telephone Seminar on Privacy Regulation Compliance

OCC Staff Responses to Questions from February 13-14, 2001, Telephone Seminar on Privacy Regulation Compliance OCC Staff Responses to Questions from February 13-14, 2001, Telephone Seminar on Privacy Regulation Compliance [Most recent questions and answers appear in bold text] Scope of the rule -- Section 40.1

More information

Cross-Selling Check-Up: Are You Effectively Timing Consumer Interactions? An Equifax White Paper July 2007

Cross-Selling Check-Up: Are You Effectively Timing Consumer Interactions? An Equifax White Paper July 2007 Cross-Selling Check-Up: Are You Effectively Timing Consumer Interactions? An Equifax White Paper July 2007 Timing is Everything Especially When Cross-Selling Cross-selling is the strategy of selling additional

More information

PRIVACY POLICY. What Information Is Collected

PRIVACY POLICY. What Information Is Collected PRIVACY POLICY This Privacy Policy applies to Web.com Group, Inc. (along with all subsidiaries, affiliates, successors and assigns thereof, referred to hereinafter collectively as Web.com, "we", "our"

More information

Complete Financial Crime and Compliance Management

Complete Financial Crime and Compliance Management Complete Financial Crime and Management With Oracle Financial Services Financial Crime and Management applications, financial institutions can manage compliance risk and investigate appropriate information

More information

Taking care of what s important to you

Taking care of what s important to you A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten

More information

An Oracle White Paper October 2010. Siebel Financial Services Customer Relationship Management for Banking

An Oracle White Paper October 2010. Siebel Financial Services Customer Relationship Management for Banking An Oracle White Paper October 2010 Siebel Financial Services Customer Relationship Management for Banking Executive Overview Banks are in constant interaction with customers. A winning and proven strategy

More information

MBNA Privacy and Personal Information Protection Notice

MBNA Privacy and Personal Information Protection Notice MBNA Privacy and Personal Information Protection Notice This notice (the MBNA Privacy Notice ) explains the collection, protection, use, sharing, disclosure and retention practices of the Bank solely in

More information

ElegantJ BI. White Paper. The Competitive Advantage of Business Intelligence (BI) Forecasting and Predictive Analysis

ElegantJ BI. White Paper. The Competitive Advantage of Business Intelligence (BI) Forecasting and Predictive Analysis ElegantJ BI White Paper The Competitive Advantage of Business Intelligence (BI) Forecasting and Predictive Analysis Integrated Business Intelligence and Reporting for Performance Management, Operational

More information

COMPLIANCE BULLETIN 01-15 NEW PICTURE EFFECTS

COMPLIANCE BULLETIN 01-15 NEW PICTURE EFFECTS COMPLIANCE BULLETIN 01-15 NEW PICTURE EFFECTS A TALE OF TWO VERTICALS: The Differences Between Broker-Dealers and Investment Advisers I t was the best of times, it was the worst of times Well, that might

More information

Substantive Requirements for a Registered Investment Adviser under the U.S. Investment Advisers Act of 1940

Substantive Requirements for a Registered Investment Adviser under the U.S. Investment Advisers Act of 1940 Substantive Requirements for a Registered Investment Adviser under the U.S. Investment Advisers Act of 1940 Alternative investment fund managers and other investment advisory firms that are registered

More information

All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us.

All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us. LEO Pharma Terms of use We/ Us/ Our You/Your Website Content LEO Laboratories Limited a company registered in the United kingdom under number 662129) known as LEO Pharma (LEO Pharma) and companies affiliated

More information

BEFORE THE HEARING ON DECEMBER 18, 2013 TESTIMONY OF JERRY CERASALE

BEFORE THE HEARING ON DECEMBER 18, 2013 TESTIMONY OF JERRY CERASALE BEFORE THE SENATE COMMITTEEON COMMERCE, SCIENCE, & TRANSPORTATION HEARING ON WHATINFORMATION DO DATA BROKERS HAVE ON CONSUMERS, AND HOW DO THEY USE IT? DECEMBER 18, 2013 TESTIMONY OF JERRY CERASALE SENIOR

More information

Iowa Student Loan Online Privacy Statement

Iowa Student Loan Online Privacy Statement Iowa Student Loan Online Privacy Statement Revision date: Jan.6, 2014 Iowa Student Loan Liquidity Corporation ("Iowa Student Loan") understands that you are concerned about the privacy and security of

More information

Rethinking Risk. 5 Barriers To Effective B2B Credit Risk Management And How To Transcend Them

Rethinking Risk. 5 Barriers To Effective B2B Credit Risk Management And How To Transcend Them Commercial Information Solutions Rethinking Risk 5 Barriers To Effective B2B Credit Risk Management And How To Transcend Them A sale isn t complete when the customer says yes to an offer, but rather when

More information

SUBMITTED BY: INTERNATIONAL COUNCIL OF SHOPPING CENTERS 1033 N. FAIRFAX STREET, SUITE 404 ALEXANDRIA, VA 22314 (703) 549-7404

SUBMITTED BY: INTERNATIONAL COUNCIL OF SHOPPING CENTERS 1033 N. FAIRFAX STREET, SUITE 404 ALEXANDRIA, VA 22314 (703) 549-7404 STATEMENT OF ELIZABETH I. HOLLAND ON BEHALF OF THE INTERNATIONAL COUNCIL OF SHOPPING CENTERS ------------- ON THE COMMUNITY CHOICE IN REAL ESTATE ACT (H.R. 3424) ------------- TO THE FINANCIAL INSTITUTIONS

More information

US Solar Dept Privacy Policy

US Solar Dept Privacy Policy Last updated: September 24, 2014 US Solar Dept Privacy Policy US Solar Dept recognizes your expectations of privacy and security and we greatly respect your privacy concerns. This Privacy Policy describes

More information

FINRA E-Learning Courses

FINRA E-Learning Courses FINRA E-Learning Courses The Definitive Source for Firm Element Training FINRA develops a wide range of e-learning courses for registered representatives, supervisors, operations staff, compliance personnel

More information

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy

More information

A Strategic Approach to Customer Engagement Optimization. A Verint Systems White Paper

A Strategic Approach to Customer Engagement Optimization. A Verint Systems White Paper A Strategic Approach to Customer Engagement Optimization A Verint Systems White Paper Table of Contents Introduction... 1 What is customer engagement?... 2 Why is customer engagement critical for business

More information

[ know me ] A Strategic Approach to Customer Engagement Optimization

[ know me ] A Strategic Approach to Customer Engagement Optimization [ know me ] A Strategic Approach to Customer Engagement Optimization A Verint and KANA White Paper Table of contents Introduction... 1 What is customer engagement?... 2 Why is customer engagement critical

More information

CAN-SPAM Policy & Data Verification Guide

CAN-SPAM Policy & Data Verification Guide BIZ SERVICE PROVIDER CAN-SPAM Compliance & Data Verification Policy Document BSP CAN-SPAM Policy & Data Verification Guide BSP Page 1 of 5 Version 8.1 Effective Date; May 2015 BIZ SERVICE PROVIDER I. Summary

More information

EADS-NA Code of Ethics

EADS-NA Code of Ethics Page: 1 of 7 EADS-NA Code of Ethics Introduction The Company demands high ethical standards of conduct from its directors, employees, and agents and will conduct its business with honesty, integrity, and

More information

CRM On Demand now hosted locally in Europe. An Oracle White Paper 2011

CRM On Demand now hosted locally in Europe. An Oracle White Paper 2011 CRM On Demand now hosted locally in Europe An Oracle White Paper 2011 Innovation, fuelled by the rapid development of new technologies, continues to drive competitive advantage in the area of customer

More information

Re: Big Data Request for Information

Re: Big Data Request for Information March 31, 2014 Attn: Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue NW Washington, D.C. 20502 Ladies and Gentlemen: Re: Big Data Request

More information

Account Opening/Client Identification Program and Monitoring Client Activity

Account Opening/Client Identification Program and Monitoring Client Activity Account Opening/Client Identification Program and Monitoring Client Activity To help the government fight the funding of terrorism and money laundering activities, federal law requires all financial institutions

More information

Decision Solutions Consulting Group. Leading Solutions for Leading Enterprises

Decision Solutions Consulting Group. Leading Solutions for Leading Enterprises Decision Solutions Consulting Group Leading Solutions for Leading Enterprises The Big Picture Enterprises today face a number of challenges Issues Amid the growing complexity of consumer behaviour, economic

More information

INFORMATION FOR VICTIMS OF FRAUD CRIMES SCHERTZ POLICE DEPARTMENT

INFORMATION FOR VICTIMS OF FRAUD CRIMES SCHERTZ POLICE DEPARTMENT INFORMATION FOR VICTIMS OF FRAUD CRIMES SCHERTZ POLICE DEPARTMENT The following information is being provided to you as the result of you being the victim of a fraud crime. This information will provide

More information

Privacy Impact Assessment of Automated Loan Examination Review Tool

Privacy Impact Assessment of Automated Loan Examination Review Tool Privacy Impact Assessment of Automated Loan Examination Review Tool Program or application name: Automated Loan Examination Review Tool (ALERT) System Owner: Board of Governors of the Federal Reserve System

More information

NorthStar Alarm Services. Website Privacy Policy

NorthStar Alarm Services. Website Privacy Policy NorthStar Alarm Services Website Privacy Policy NorthStar Alarm Services ( NorthStar ) values your privacy. To that end, we strive to provide a safe, secure online user experience for you. In this Privacy

More information

Privacy of Consumer Financial Information

Privacy of Consumer Financial Information Background and Overview Introduction Title V, Subtitle A of the Gramm-Leach-Bliley Act ( GLBA ) 1 governs the treatment of nonpublic personal information about consumers by financial institutions. Section

More information

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule SOUTH TEXAS COLLEGE Identity Theft Prevention Program and Guidelines FTC Red Flags Rule Issued June 24, 2009 Table of Contents Section Section Description Page # 1 Section 1: Program Background and Purpose

More information

Solve Your Toughest Challenges with Data Mining

Solve Your Toughest Challenges with Data Mining IBM Software Business Analytics IBM SPSS Modeler Solve Your Toughest Challenges with Data Mining Use predictive intelligence to make good decisions faster Solve Your Toughest Challenges with Data Mining

More information

IBM Software A Journey to Adaptive MDM

IBM Software A Journey to Adaptive MDM IBM Software A Journey to Adaptive MDM What is Master Data? Why is it Important? A Journey to Adaptive MDM Contents 2 MDM Business Drivers and Business Value 4 MDM is a Journey 7 IBM MDM Portfolio An Adaptive

More information

Ford & Thomas Insurance Agency

Ford & Thomas Insurance Agency Ford & Thomas Insurance Agency PRIVACY POLICY NOTICE (As of February 14, 2012) PURPOSE OF THIS NOTICE As provided by law, we are generally prohibited from sharing nonpublic personal information about you

More information

TOOLBOX. ABA Financial Privacy

TOOLBOX. ABA Financial Privacy ABA Financial Privacy TOOLBOX This tool will help ensure that privacy remains a core value in all corners of your institution. The success of your privacy program depends upon your board s and your management

More information

An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions

An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions An Oracle White Paper October 2009 An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions Executive Overview Today s complex financial crime schemes pose

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2005 H 2 HOUSE BILL 629 Committee Substitute Favorable 5/18/05

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2005 H 2 HOUSE BILL 629 Committee Substitute Favorable 5/18/05 GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 0 H HOUSE BILL Committee Substitute Favorable //0 Short Title: Option to Freeze Credit Report. Sponsors: Referred to: March, 0 (Public) A BILL TO BE ENTITLED

More information

Personal Data Protection Policy and Practices ( the Policy )

Personal Data Protection Policy and Practices ( the Policy ) Personal Data Protection Policy and Practices ( the Policy ) FWD Life Insurance Company (Bermuda) Limited ("the Company") is committed to implementation and compliance with the provisions of the Personal

More information

Protecting your privacy

Protecting your privacy Protecting your privacy Protecting your privacy is important to us. Transamerica Life Canada and its affiliates: Canadian Premier Life Insurance Company, Legacy General Insurance Company, Aegon Fund Management

More information

Privacy Policy & Identity Theft Prevention Program

Privacy Policy & Identity Theft Prevention Program Privacy Policy & Identity Theft Prevention Program Orcam Financial Group LLC PO Box 91098 4640 Cass St San Diego, CA 92109 (858) 220-5383 Orcam Financial Group LLC Privacy Policy February, 2014 Page 1

More information

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively

More information

Responding to New Identity Theft Laws

Responding to New Identity Theft Laws Responding to New Identity Theft Laws March 2011 Privacy Expectations Today, there is increasing recognition that an individual has a legitimate interest in controlling the collection, use and disclosure/dissemination

More information

DARTFISH PRIVACY POLICY

DARTFISH PRIVACY POLICY OUR COMMITMENT TO PRIVACY DARTFISH PRIVACY POLICY Our Privacy Policy was developed as an extension of our commitment to combine the highestquality products and services with the highest level of integrity

More information

CFPB Consumer Laws and Regulations

CFPB Consumer Laws and Regulations Fair Credit Reporting Act Background and Summary The Fair Credit Reporting Act () 1 became effective on April 25, 1971. The is a part of a group of acts contained in the Federal Consumer Credit Protection

More information

Anti-Money Laundering Policy Manual Table of Contents [Sample Client] Table of Contents

Anti-Money Laundering Policy Manual Table of Contents [Sample Client] Table of Contents Table of Contents [ Client] Table of Contents TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 3 1.1 GOALS AND OBJECTIVES... 3 1.2 REQUIRED REVIEW... 3 1.3 APPLICABILITY... 3 1.4 MONEY LAUNDERING DEFINED...

More information

VIII 6.1. VIII. Privacy Fair Credit Reporting Act. Fair Credit Reporting Act. Structure and Overview of Examination Modules.

VIII 6.1. VIII. Privacy Fair Credit Reporting Act. Fair Credit Reporting Act. Structure and Overview of Examination Modules. Fair Credit Reporting Act Introduction The Fair Credit Reporting Act (FCRA) (15 USC 1681-1681u) became effective on April 25, 1971. The FCRA is a part of a group of acts contained in the Federal Consumer

More information

Regulation P Privacy of Consumer Financial Information

Regulation P Privacy of Consumer Financial Information Regulation P Privacy of Consumer Financial Information BACKGROUND AND OVERVIEW Title V, Subtitle A of the Gramm-Leach-Bliley Act ( GLBA ) governs the treatment of nonpublic personal information about consumers

More information

Fair Credit Reporting

Fair Credit Reporting Fair Credit Reporting Background The Fair Credit Reporting Act (FCRA) deals with the rights of consumers in relation to their credit reports and the obligations of credit reporting agencies and the businesses

More information

These rules became effective August 1, 2009, and require certain agencies to implement an identity theft program and policy.

These rules became effective August 1, 2009, and require certain agencies to implement an identity theft program and policy. Red Flag Policy Protecting your privacy is of paramount importance at Missouri Southern State University, and we are dedicated to the responsible handling of your personal information. We are very committed

More information

Code of Ethics. I. Definitions

Code of Ethics. I. Definitions Code of Ethics Old North State Trust, LLC (the Company ) has adopted this Code of Ethics in recognition of the principle that all Supervised Persons (as defined below) of the Company have a fiduciary duty

More information

MLS Data Use and License Policy Approved September 2010

MLS Data Use and License Policy Approved September 2010 MLS Data Use and License Policy Approved September 2010 Data access and licensing limited to uses permitted by MLS policy. The Multiple Listing Service of the Berkshire County Board of REALTORS complies

More information

WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION?

WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? M-112997 Rev 07/2015 FACTS Why? What? How? WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? Financial companies choose how they share your personal information. Federal law gives consumers

More information

The Gramm-Leach-Bliley Act Privacy of Consumer Financial Information

The Gramm-Leach-Bliley Act Privacy of Consumer Financial Information FEDERAL TRADE COMMISSION BUREAU OF CONSUMER PROTECTION DIVISION OF FINANCIAL PRACTICES The Gramm-Leach-Bliley Act Privacy of Consumer Financial Information Subtitle A of Title V of the Gramm-Leach-Bliley

More information

CEROS CUSTOMER AGREEMENT SUPPLEMENT Accounts Managed by Unaffiliated Investment Advisers

CEROS CUSTOMER AGREEMENT SUPPLEMENT Accounts Managed by Unaffiliated Investment Advisers CEROS CUSTOMER AGREEMENT SUPPLEMENT Accounts Managed by Unaffiliated Investment Advisers This Customer Agreement Supplement ( Agreement ) is for customer accounts of Ceros Financial Services, Inc. ( Ceros

More information

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How

More information

M&T BANK CANADIAN PRIVACY POLICY

M&T BANK CANADIAN PRIVACY POLICY M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (

More information

The Association of Registered Agents and the National Public Records Research Association

The Association of Registered Agents and the National Public Records Research Association The Association of Registered Agents and the National Public Records Research Association Best Practices Recommendations to Prevent the Exploitation of the Company Formation Agent Industry for Criminal

More information

Fair Credit Reporting

Fair Credit Reporting Fair Credit Reporting Background The Fair Credit Reporting Act (FCRA) deals with the rights of consumers in relation to their credit reports and the obligations of credit reporting agencies and the businesses

More information

Tapping the benefits of business analytics and optimization

Tapping the benefits of business analytics and optimization IBM Sales and Distribution Chemicals and Petroleum White Paper Tapping the benefits of business analytics and optimization A rich source of intelligence for the chemicals and petroleum industries 2 Tapping

More information

InnoCaption TM Service Terms of Use

InnoCaption TM Service Terms of Use PRIOR TO USING THE INNOCAPTION SERVICE YOU MUST REVIEW AND AGREE TO THE TERMS AND CONDITIONS OF THIS SERVICE AGREEMENT ( AGREEMENT ) BY COMPLETING YOUR REGISTRATION ( SIGN UP ) FOR INNOCAPTION SERVICE.

More information

We will not collect, use or disclose your personal information without your consent, except where required or permitted by law.

We will not collect, use or disclose your personal information without your consent, except where required or permitted by law. HSBC Privacy Notice HSBC's Privacy Principles HSBC Bank Canada is a subsidiary of HSBC Holdings plc which, together with its subsidiaries and affiliates, is one of the world s largest banking and financial

More information

PRIVACY POLICY. Mil y Un Consejos Network. Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of

PRIVACY POLICY. Mil y Un Consejos Network. Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of PRIVACY POLICY Mil y Un Consejos Network Version Date: April 15th 2010 GENERAL Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of its users ( user or you ) whether they use

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

Privacy Policy. Effective Date: November 20, 2014

Privacy Policy. Effective Date: November 20, 2014 Privacy Policy Effective Date: November 20, 2014 Welcome to the American Born Moonshine website (this Site ). This policy describes the Privacy Policy (this Policy ) for this Site and describes how Windy

More information

Section 10: Fair Credit Reporting Act (FCRA) Policy

Section 10: Fair Credit Reporting Act (FCRA) Policy Section 10: Fair Credit Reporting Act (FCRA) Policy Summary of Regulation The Fair Credit Reporting Act (FCRA) regulates Consumer Reporting Agencies (CRAs), users of consumer reports, and furnishers of

More information

The effect of dirty data on business

The effect of dirty data on business The effect of dirty data on business The biggest data quality challenges 2013 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered

More information

Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information

Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information INTRODUCTION Privacy legislation establishes legal privacy rights for individuals and sets enforceable

More information

How To Comply With The Federal Consumer Reporting Act

How To Comply With The Federal Consumer Reporting Act Fair Credit Reporting Act 1 The Fair Credit Reporting Act (FCRA) 2 became effective on April 25, 1971. The FCRA is a part of a group of acts contained in the Federal Consumer Credit Protection Act 3 such

More information

Questions and Answers About the Identity Theft Red Flag Requirements

Questions and Answers About the Identity Theft Red Flag Requirements Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,

More information

An Oracle White Paper November 2011. Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime

An Oracle White Paper November 2011. Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime An Oracle White Paper November 2011 Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime Disclaimer The following is intended to outline our general product direction.

More information

Copyright 2012, General Dynamics Information Technology. All Rights Reserved.

Copyright 2012, General Dynamics Information Technology. All Rights Reserved. Introduction Over the years, General Dynamics Information Technology has experienced significant growth in its IT services business serving government and commercial customers worldwide. As a valued supplier

More information