White Paper. The Data Matching Game: Enabling Customer Data Integration and Protecting Consumer Privacy. October 2008
|
|
- Christal Cooper
- 8 years ago
- Views:
Transcription
1 > White Paper The Data Matching Game: Enabling Customer Data Integration and Protecting Consumer Privacy October 2008
2 Table of Contents Introduction What s Your Phone Number? Mary Johnson and the Privacy vs. Accuracy Challenge How to Win the Data Matching Game Consumer Credit Data and the GLB Act Summary
3 Introduction To comply with privacy rules that seek to protect consumer interests, businesses must consistently and accurately recognize records associated with the consumer. That task is fraught with complexities, especially for businesses that manage consumer information across multiple databases and products. Organizational and technological silos create barriers to matching information in disparate places. A few examples of questions a business may need to resolve: Is J. Patterson the same person as John Patterson? Are records for Julie Banks (maiden name) and Julie Watson (married name) accurately linked? Are records for Mark Adams at his old address and new address accurately matched? To accurately identify consumers, businesses are increasingly relying on reference-based matching systems that use unique identifiers to recognize and integrate dissimilar records. The challenge for providers of reference-based matching systems is to comply with privacy legislation while supplying businesses with the most accurate and reliable information afforded by law. The foundation of most reference-based matching systems is credit header data that links information in a credit report to a particular individual. Credit headers enable Customer Data Integration (CDI), ensuring both the privacy and security of consumers. This paper explores two requirements that sometimes are in conflict: the business s need for accurate identity information and the privacy rights of consumers. The paper explains how businesses can use reference-based matching systems to favorably resolve the privacy-versus-accuracy challenge. What s Your Phone Number? Consumers are routinely asked to provide data about themselves to conduct business transactions. Consider your own daily experiences. The department store clerk wants to know your phone number. The cashier at a toy store asks for your zip code. When you call your bank, the customer service representative wants you to verify your address and the last four digits of your Social Security number. Businesses invest heavily on systems that capture, store, and 1
4 analyze the data they collect about their customers and prospects. Uses of the data are broad: Loyalty programs track purchases and encourage future transactions. Surveys gather demographic information and insight into shopping trends. Return activity is monitored to prevent losses and control abuses. Analysis of what is being purchased regionally helps businesses to manage inventory and improve logistics. Telephone numbers, addresses and Social Security numbers are used to recognize customers and provide customer service support. Analysis of consumers in-store behavior helps store managers to improve sales through better placement of complimentary merchandise. How can a business use consumer data to improve profitability and customer satisfaction, while at the same time protecting consumer privacy? Many consumers fear that simply accepting a preapproved credit offer or requesting a catalog will result in waves of unwanted offers and solicitations. And with increasing concerns over identity theft, consumers worry about proliferating access to their personal information. Mary Johnson and the Privacy vs. Accuracy Challenge Concern for the protection of consumer privacy sparked moves to regulate how companies can share data and contact consumers. Enacted in 1999, the Gramm-Leach-Bliley Act ( GLB Act ) provides privacy protections for consumers by regulating how financial institutions can share nonpublic personal information, such as name, Social Security number and address information. The GLB Act requires issuance of privacy notices, which, with some exceptions, give consumers the right to opt-out and disallow the sharing of their nonpublic personal information with nonaffiliated third parties. To comply with privacy regulation, companies face the substantial challenge of accurately identifying consumers. Many businesses manage their customer information across multiple databases, product lines and portfolios. Consequently, personal information resides in various data silos that can t communicate with each other, vastly complicating the task of identifying consumers accurately and consistently. 2
5 The unstable nature of data compounds the problem. Data entry is an error-prone process; names and addresses change frequently due to marriage, divorce and relocations. Is Mary V. Johnson in Dallas the same Mary V. Johnson as the one in Irving, a Dallas suburb? Can Mary Johnson s bank recognize that she has two credit cards it issued, one to M. V. Johnson and one to Mary V. Johnson, each at different addresses? If she opts-out of further solicitations and the sharing of her nonpublic personal information with nonaffiliated third parties, will the bank implement her choices and protect her privacy? Names and addresses frequently change due to marriage, divorce and relocations. Is M. Johnson the same individual as Mary Johnson? How to Win the Data Matching Game Businesses now have access to Customer Data Integration (CDI) tools specifically designed to help them deal with how consumer records are recognized and integrated. CDI is at the heart of efforts to consolidate and integrate customer information into a single, holistic view of the customer. With CDI tools, businesses gain the ability to accurately match records in disparate data. Algorithms and one-to-one or string matching, the traditional methods for data matching, often fail to link together dissimilar records. Reference-based technology provides a more advanced form of data matching used to identify consumers. Reference-based matching systems employ large databases housing the name and address information of millions of consumers. Users of this technology provide names and addresses for matching with the names and addresses in the reference database. When a user-submitted name and address produces a match, the service provider returns to the user a unique identifier or key that identifies this consumer within the reference database. With these keys, users can identify individuals across business products, channels and databases, regardless of name or address change. The bank mentioned earlier would therefore recognize that Mary V. Johnson and M. V. Johnson are the same individual because both have the same key. The bank benefits by gaining a single view of its customer, and Ms. Johnson is spared from unwanted solicitations and phone calls. Several reference-based matching systems and services are available in the marketplace. A major differentiator is the robustness and accuracy of the data that resides in the reference database. The credibility and depth of the data is essential to providing an accurate match. A larger database with more history can be expected to have greater accuracy, resulting in fewer unwanted mailings and solicitations, unwanted information sharing, and 3
6 consumer recognition errors. For example, reference databases with several years of address history enable users to identify consumers who have multiple addresses or who have moved frequently. Often these reference databases include data from surveys, marketing lists and other public data sources. Since these sources can often contain inaccuracies, providers of CDI services seek to augment the database with more reliable data sources. One such source is credit header data the consumer identification information located within the header portion of the consumer credit file. In addition, credit header data includes actual account information provided to consumer credit reporting companies for various purposes. Credit headers provide an excellent, reliable source of name and address information. By incorporating historical credit header data, the identification information of individuals can be linked even though their names and addresses have changed over the years. Consumer Credit Data and the GLB Act Credit header data is a coveted, yet highly regulated, source of information. Any company that uses credit header data as part of its reference-based matching product must comply with laws regarding how the data can be used. The GLB Act specifies how the data can be used by financial institutions and third parties receiving the data for various purposes. Regardless of the type of data found within the reference database, any financial institution that transmits nonpublic personal information to a company for assigning a unique key or identifier must comply with the GLB Act. The Act s definition of nonpublic personal information includes basic identifying information about individuals, such as name, Social Security number, address, telephone number, mother s maiden name, and prior addresses. The GLB Act limits financial institutions from sharing consumer information with a third party. Financial institutions are broadly defined to include banks, lenders, insurers, loan brokers, and credit reporting agencies. Before a financial institution can share protected information, it must provide a notice that gives the consumer an opportunity to opt out. The Act has various exceptions that allow nonpublic personal information to be provided to, and used by, third parties without having to provide a notice and an opt-out. In general, the exceptions allow the use of nonpublic personal information for consumer reporting (pursuant to the Fair Credit Reporting Act), fraud protection, law enforcement and regulatory or self-regulatory purposes. 4
7 The GLB Act also requires financial institutions to implement appropriate physical, technical and procedural safeguards to protect the security and integrity of information they receive from customers, directly or indirectly. The Federal Trade Commission has broad discretion to interpret the GLB Act s statutory definitions. As FTC Commisioner Jon Leibowitz noted in his May 11, 2006 statement before the House Subcommittee on Commerce, Trade and Consumer Protection, the FTC has a Safeguards Rule requiring financial institutions to have a written information security plan that describes their procedures to protect customer information. Equifax believes that the use, consistent with contractual requirements, of keys derived from a reference database incorporating credit header information is within GLB requirements. Other than the key itself, no other information within the reference database is disclosed or distributed to users. The use of keys can impact a variety of activities that enable the business to communicate, manage and process customer transactions such as when a consumer applies for credit, authorizes a purchase, or requests a credit increase. By using the key in its front and back office operations, a company can streamline its operations and facilitate consumer transactions. When the business markets its own products and services to current customers or prospects, the keys protect the integrity of the institution and help prevent actual or potential fraud. Businesses are finding many fine advantages to using these keys. Applications and benefits include: Compliance with the consumer s opt-out requests, as required by various federal and state laws, such as the GLB Act. These requests can involve solicitations, do-not-call lists, and invitations to apply for a product or service. To comply with such opt-out instructions of the consumer, a company must have effective ways to fully identify a consumer across all marketing channels, products and operations. Fraud protection. Better identification measures will help prevent actual or potential fraud and prevent unauthorized transactions. By having a unique identifier for each customer or prospect, a business can greatly increase its ability to identify the misuse of personal information, such as having a single Social Security number associated with multiple names. Responsiveness to requests from law enforcement or regulatory authorities. Accurate information about a consumer s financial relationships with an organization is essential to help law enforcement respond to suspicious and illegal activity. 5
8 Meeting legal responsibilities. Data-matching processes are essential in fulfilling know your customer obligations, including identity verification and anti-money laundering requirements of the USA PATRIOT Act. In the subprime lending environment, lenders may be required to exercise additional diligence in understanding the consumer s relationships with the organization. Only by recognizing their customers can businesses provide highly valued customer service and protect against losses. Such losses are not necessarily related to fraud. With a reliable source of data covering several years of name-andaddress history, a business gains the means to protect its own interests while preserving the privacy and security of consumers. Reference-based data matching provides the ability to accurately recognize a consumer by using a unique identifier at the point of sale or service. The business or lender can thereby validate a consumer s identity claims and discover what other relationships the consumer has with the organization. Using credit header data in a private and confidential manner allows for added security by providing the ability to identify the potential misuse of Social Security numbers. In a case of fraud, criminals will appropriate Social Security numbers to establish new lines of credit. With Social Security numbers residing in a historical reference database, businesses can identify and track all names and/or addresses associated with a single Social Security number. Only by recognizing their customers can businesses provide highly valued customer service and protect against losses. Such losses are not necessarily related to fraud. For example, companies in the telecommunications industry often have difficulty recognizing former customers among new applicants. Using a unique key from a reference-based technology, the telecommunications company can match the new applicant information to internal customer records. The company can then determine if it should establish service with the new applicant immediately or collect a previous debt first. Summary Complying with privacy rules that seek to protect consumer interests requires businesses to consistently and accurately recognize the consumer. To do so, businesses are increasingly relying on reference-based matching systems that utilize the most accurate and reliable information afforded by law. Credit header data is a significant part of a foundation that enables Customer Data Integration, which ensures the privacy and security of consumers. 6
9 Contact Information Equifax Inc. is a global leader in information technology that enables and secures global commerce with consumers and businesses. We are one of the largest sources of consumer and commercial data. Utilizing our databases, advanced analytics and proprietary enabling technology, we provide real-time answers for our customers. This innovative ability to transform information into intelligence is valued by customers across a wide range of industries and markets. Headquartered in Atlanta, Georgia, Equifax employs approximately 4,700 people in 13 countries throughout North America, Latin America and Europe. Equifax was founded 109 years ago, and today is a member of Standard & Poor's (S&P) 500 Index. Our common stock is traded on the New York Stock Exchange under the symbol EFX. Equifax offers a wide array of risk, collections, and marketing tools for managing portfolios of all sizes and types. Visit for additional details. Equifax Inc Peachtree Street, NW Atlanta, Georgia This publication contains many of the valuable trademarks, service marks, names, titles, logos, images, designs, copyrights and other proprietary materials owned, registered and used by Equifax Inc. and its affiliated companies, including but not limited to the registered mark Equifax ; any unauthorized use of same is strictly prohibited and all rights are reserved by Equifax Inc. and its affiliated companies. All other trademarks and service marks not owned by Equifax Inc. or its affiliated companies that appear in this publication are the property of their respective owners. Copyright 2008, Equifax Inc., Atlanta, Georgia. All rights reserved. 7
10 Equifax is a registered trademark of Equifax Inc. Inform, Enrich, Empower is a trademark of Equifax Inc. Copyright 2008, Equifax Inc., Atlanta, Georgia. All rights reserved. Printed in the U.S.A. EFS-838-ADV 10/08
Profitably Managing Risk in Your Credit Portfolio
Profitably Managing Risk in Your Credit Portfolio An Equifax White Paper February 2007 Author: Richard Becker Assistant Vice President, Product Development Equifax Inc. As Acquisition Marketing Cools Off,
More informationEmpowering Brokers to Identify and Combat Mortgage Fraud
Empowering Brokers to Identify and Combat Mortgage Fraud An Equifax White Paper October 2007 Author: Paul Wills Equifax Global Product Management Introduction In today s lending environment, mortgage fraud
More informationWhite Paper. Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper
White Paper Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper Dave Whitin, Consultant Michiko Wolcott, Statistician September 2006 Table of contents Executive summary...................................
More informationAutomotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy
CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions
More informationUtilizing Credit Scoring to Predict Patient Outcomes. An Equifax Predictive Sciences Research Paper September 2005
Utilizing Credit Scoring to Predict Patient Outcomes An Equifax Predictive Sciences Research Paper September 2005 Introduction Improving Your Revenue Cycle Performance Through Financial Management Solutions
More informationCREDIT SCORE USER GUIDE
Page 1 of 11 ABOUT EQUIFAX Equifax empowers businesses and consumers with information they can trust. A global leader in information solutions, we leverage one of the largest sources of consumer and commercial
More informationALERTS NOTIFICATION USER GUIDE
Page 1 of 10 ABOUT EQUIFAX ALERTS NOTIFICATION USER GUIDE Equifax Canada Inc. Box 190 Jean Talon Station Montreal, Quebec H1S 2Z2 Equifax empowers businesses and consumers with information they can trust.
More informationHOW TO COMPLY WITH THE GRAMM-LEACH-BLILEY ACT
HOW TO COMPLY WITH THE GRAMM-LEACH-BLILEY ACT The information contained herein has been provided by Keith E. Whann and Deanna L. Stockamp of the law firm Whann & Associates and is for general information
More informationEquifax Reports Fourth Quarter and Full Year 2008 Results; Provides First Quarter 2009 Guidance
1550 Peachtree Street, N.W. Atlanta, Georgia 30309 NEWS RELEASE Contact: Jeff Dodge Tim Klein Investor Relations Media Relations (404) 885-8804 (404) 885-8555 jeff.dodge@equifax.com tim.klein@equifax.com
More informationMortgage Services > Today s mortgage lenders are faced with. constant challenges Equifax can help. CONSUMER INFORMATION SOLUTIONS
CONSUMER INFORMATION SOLUTIONS Mortgage Services > Today s mortgage lenders are faced with constant challenges Equifax can help. From quick access to tri-merge reports to independent third-party appraisals,
More informationPlease read this Policy carefully. Your continued use of our sites means that you understand and consent to the terms of this Policy.
EFFECTIVE: February 2016 Version 1.2 CHECK 'N GO PRIVACY POLICY This Privacy Policy ("Policy") applies to the use of Check 'n Go (the "Company") online sites and any Company affiliate or subsidiary sites.
More informationCREDIT REPORT USER GUIDE
Page 1 of 17 ABOUT EQUIFAX CREDIT REPORT USER GUIDE Equifax Canada Inc. Box 190 Jean Talon Station Montreal, Quebec H1S 2Z2 Equifax empowers businesses and consumers with information they can trust. A
More informationRegulation P: Privacy of Consumer Financial Information. Frequently Asked Questions
Regulation P: Privacy of Consumer Financial Information Frequently Asked Questions December 2001 Contents A. Financial institutions, products, and services that are covered under the Privacy Rule (Q.
More informationCODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES
CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES THE TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS REVISED MAY 2008 CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING
More informationAll About Credit Reports from A to Z
All About Credit Reports from A to Z Adverse Action Notice A notice that you have been denied credit, employment, insurance, or other benefits based on information in a credit report. The notice should
More informationPrivacy at Staples and Coastwide Laboratories. Customer Personal Information Privacy Policy (Effective Date: October 20, 2009)
Privacy at Staples and Coastwide Laboratories Customer Personal Information Privacy Policy (Effective Date: October 20, 2009) At Staples your privacy is as important to us as it is to you. Our Customer
More informationIntroduction PriorFX LTD Right to Privacy Information
Privacy Policy 1.Introduction 1.1 PriorFX LTD ( PriorFx or we ) is a Cyprus Investment Firm regulated by the Cyprus Securities and Exchange Commission (License No. 221/13). 1.2 PriorFX is operating under
More informationHeadache vs. Hassle-Free: How Technology Can Ease the Burden of Regulatory Compliance An Equifax White Paper
Headache vs. Hassle-Free: How Technology Can Ease the Burden of Regulatory Compliance An Equifax White Paper Andrew Skillen February 2008 IMPORTANT NOTE: This summary is intended to provide general basic
More informationNCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and
More informationBusiness Credit Consulting Agreement
Business Credit Consulting Agreement THIS AGREEMENT is entered into by and between Business Credit Advisor or Business Credit Coach ( Advisor ) Business Credit Consulting Client ( Client ) and the Business
More informationWhite Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
More informationOptimizing government and insurance claims management with IBM Case Manager
Enterprise Content Management Optimizing government and insurance claims management with IBM Case Manager Apply advanced case management capabilities from IBM to help ensure successful outcomes Highlights
More informationCODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES
CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES A CONSULTATION REPORT OF THE CHAIRMEN S TASK FORCE OF THE TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS OCTOBER
More informationData Privacy and Gramm- Leach-Bliley Act Section 501(b)
Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement
More informationWealthfront Brokerage Corporation
Wealthfront Brokerage Corporation Business Continuity Plan Disclosure Wealthfront Brokerage Corporation ( Wealthfront Brokerage ) has developed a Business Continuity Plan on how we will respond to events
More informationThe Right Choice for Call Recording Call Recording and Regulatory Compliance
Call Recording and Regulatory Compliance An OAISYS White Paper Table of Contents Increased Regulations in Response to Economic Crisis...1 The Sarbanes-Oxley Act...1 The Payment Card Industry Data Security
More informationCODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES
CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING AGENCIES THE TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS DECEMBER 2004 CODE OF CONDUCT FUNDAMENTALS FOR CREDIT RATING
More informationConsumer and Community Affairs. Consumer Protection
Consumer and Community Affairs The number of federal laws intended to protect consumers in credit and other financial transactions has been growing since the late 1960s. Congress has assigned to the Federal
More informationA+ Financial Services, Inc., A+ Auto Insurance Agency, Inc., and A+ Loans, Inc. Privacy Policy (Last updated 03/05/2014)
A+ Financial Services, Inc., A+ Auto Insurance Agency, Inc., and A+ Loans, Inc. Privacy Policy (Last updated 03/05/2014) This Privacy Policy explains the policy statement of A+ Financial Services, Inc.,
More informationOCC Staff Responses to Questions from February 13-14, 2001, Telephone Seminar on Privacy Regulation Compliance
OCC Staff Responses to Questions from February 13-14, 2001, Telephone Seminar on Privacy Regulation Compliance [Most recent questions and answers appear in bold text] Scope of the rule -- Section 40.1
More informationCross-Selling Check-Up: Are You Effectively Timing Consumer Interactions? An Equifax White Paper July 2007
Cross-Selling Check-Up: Are You Effectively Timing Consumer Interactions? An Equifax White Paper July 2007 Timing is Everything Especially When Cross-Selling Cross-selling is the strategy of selling additional
More informationPRIVACY POLICY. What Information Is Collected
PRIVACY POLICY This Privacy Policy applies to Web.com Group, Inc. (along with all subsidiaries, affiliates, successors and assigns thereof, referred to hereinafter collectively as Web.com, "we", "our"
More informationComplete Financial Crime and Compliance Management
Complete Financial Crime and Management With Oracle Financial Services Financial Crime and Management applications, financial institutions can manage compliance risk and investigate appropriate information
More informationTaking care of what s important to you
A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten
More informationAn Oracle White Paper October 2010. Siebel Financial Services Customer Relationship Management for Banking
An Oracle White Paper October 2010 Siebel Financial Services Customer Relationship Management for Banking Executive Overview Banks are in constant interaction with customers. A winning and proven strategy
More informationMBNA Privacy and Personal Information Protection Notice
MBNA Privacy and Personal Information Protection Notice This notice (the MBNA Privacy Notice ) explains the collection, protection, use, sharing, disclosure and retention practices of the Bank solely in
More informationElegantJ BI. White Paper. The Competitive Advantage of Business Intelligence (BI) Forecasting and Predictive Analysis
ElegantJ BI White Paper The Competitive Advantage of Business Intelligence (BI) Forecasting and Predictive Analysis Integrated Business Intelligence and Reporting for Performance Management, Operational
More informationCOMPLIANCE BULLETIN 01-15 NEW PICTURE EFFECTS
COMPLIANCE BULLETIN 01-15 NEW PICTURE EFFECTS A TALE OF TWO VERTICALS: The Differences Between Broker-Dealers and Investment Advisers I t was the best of times, it was the worst of times Well, that might
More informationSubstantive Requirements for a Registered Investment Adviser under the U.S. Investment Advisers Act of 1940
Substantive Requirements for a Registered Investment Adviser under the U.S. Investment Advisers Act of 1940 Alternative investment fund managers and other investment advisory firms that are registered
More informationAll copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us.
LEO Pharma Terms of use We/ Us/ Our You/Your Website Content LEO Laboratories Limited a company registered in the United kingdom under number 662129) known as LEO Pharma (LEO Pharma) and companies affiliated
More informationBEFORE THE HEARING ON DECEMBER 18, 2013 TESTIMONY OF JERRY CERASALE
BEFORE THE SENATE COMMITTEEON COMMERCE, SCIENCE, & TRANSPORTATION HEARING ON WHATINFORMATION DO DATA BROKERS HAVE ON CONSUMERS, AND HOW DO THEY USE IT? DECEMBER 18, 2013 TESTIMONY OF JERRY CERASALE SENIOR
More informationIowa Student Loan Online Privacy Statement
Iowa Student Loan Online Privacy Statement Revision date: Jan.6, 2014 Iowa Student Loan Liquidity Corporation ("Iowa Student Loan") understands that you are concerned about the privacy and security of
More informationRethinking Risk. 5 Barriers To Effective B2B Credit Risk Management And How To Transcend Them
Commercial Information Solutions Rethinking Risk 5 Barriers To Effective B2B Credit Risk Management And How To Transcend Them A sale isn t complete when the customer says yes to an offer, but rather when
More informationSUBMITTED BY: INTERNATIONAL COUNCIL OF SHOPPING CENTERS 1033 N. FAIRFAX STREET, SUITE 404 ALEXANDRIA, VA 22314 (703) 549-7404
STATEMENT OF ELIZABETH I. HOLLAND ON BEHALF OF THE INTERNATIONAL COUNCIL OF SHOPPING CENTERS ------------- ON THE COMMUNITY CHOICE IN REAL ESTATE ACT (H.R. 3424) ------------- TO THE FINANCIAL INSTITUTIONS
More informationUS Solar Dept Privacy Policy
Last updated: September 24, 2014 US Solar Dept Privacy Policy US Solar Dept recognizes your expectations of privacy and security and we greatly respect your privacy concerns. This Privacy Policy describes
More informationFINRA E-Learning Courses
FINRA E-Learning Courses The Definitive Source for Firm Element Training FINRA develops a wide range of e-learning courses for registered representatives, supervisors, operations staff, compliance personnel
More informationPrivacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction
Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy
More informationA Strategic Approach to Customer Engagement Optimization. A Verint Systems White Paper
A Strategic Approach to Customer Engagement Optimization A Verint Systems White Paper Table of Contents Introduction... 1 What is customer engagement?... 2 Why is customer engagement critical for business
More information[ know me ] A Strategic Approach to Customer Engagement Optimization
[ know me ] A Strategic Approach to Customer Engagement Optimization A Verint and KANA White Paper Table of contents Introduction... 1 What is customer engagement?... 2 Why is customer engagement critical
More informationCAN-SPAM Policy & Data Verification Guide
BIZ SERVICE PROVIDER CAN-SPAM Compliance & Data Verification Policy Document BSP CAN-SPAM Policy & Data Verification Guide BSP Page 1 of 5 Version 8.1 Effective Date; May 2015 BIZ SERVICE PROVIDER I. Summary
More informationEADS-NA Code of Ethics
Page: 1 of 7 EADS-NA Code of Ethics Introduction The Company demands high ethical standards of conduct from its directors, employees, and agents and will conduct its business with honesty, integrity, and
More informationCRM On Demand now hosted locally in Europe. An Oracle White Paper 2011
CRM On Demand now hosted locally in Europe An Oracle White Paper 2011 Innovation, fuelled by the rapid development of new technologies, continues to drive competitive advantage in the area of customer
More informationRe: Big Data Request for Information
March 31, 2014 Attn: Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue NW Washington, D.C. 20502 Ladies and Gentlemen: Re: Big Data Request
More informationAccount Opening/Client Identification Program and Monitoring Client Activity
Account Opening/Client Identification Program and Monitoring Client Activity To help the government fight the funding of terrorism and money laundering activities, federal law requires all financial institutions
More informationDecision Solutions Consulting Group. Leading Solutions for Leading Enterprises
Decision Solutions Consulting Group Leading Solutions for Leading Enterprises The Big Picture Enterprises today face a number of challenges Issues Amid the growing complexity of consumer behaviour, economic
More informationINFORMATION FOR VICTIMS OF FRAUD CRIMES SCHERTZ POLICE DEPARTMENT
INFORMATION FOR VICTIMS OF FRAUD CRIMES SCHERTZ POLICE DEPARTMENT The following information is being provided to you as the result of you being the victim of a fraud crime. This information will provide
More informationPrivacy Impact Assessment of Automated Loan Examination Review Tool
Privacy Impact Assessment of Automated Loan Examination Review Tool Program or application name: Automated Loan Examination Review Tool (ALERT) System Owner: Board of Governors of the Federal Reserve System
More informationNorthStar Alarm Services. Website Privacy Policy
NorthStar Alarm Services Website Privacy Policy NorthStar Alarm Services ( NorthStar ) values your privacy. To that end, we strive to provide a safe, secure online user experience for you. In this Privacy
More informationPrivacy of Consumer Financial Information
Background and Overview Introduction Title V, Subtitle A of the Gramm-Leach-Bliley Act ( GLBA ) 1 governs the treatment of nonpublic personal information about consumers by financial institutions. Section
More informationSOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule
SOUTH TEXAS COLLEGE Identity Theft Prevention Program and Guidelines FTC Red Flags Rule Issued June 24, 2009 Table of Contents Section Section Description Page # 1 Section 1: Program Background and Purpose
More informationSolve Your Toughest Challenges with Data Mining
IBM Software Business Analytics IBM SPSS Modeler Solve Your Toughest Challenges with Data Mining Use predictive intelligence to make good decisions faster Solve Your Toughest Challenges with Data Mining
More informationIBM Software A Journey to Adaptive MDM
IBM Software A Journey to Adaptive MDM What is Master Data? Why is it Important? A Journey to Adaptive MDM Contents 2 MDM Business Drivers and Business Value 4 MDM is a Journey 7 IBM MDM Portfolio An Adaptive
More informationFord & Thomas Insurance Agency
Ford & Thomas Insurance Agency PRIVACY POLICY NOTICE (As of February 14, 2012) PURPOSE OF THIS NOTICE As provided by law, we are generally prohibited from sharing nonpublic personal information about you
More informationTOOLBOX. ABA Financial Privacy
ABA Financial Privacy TOOLBOX This tool will help ensure that privacy remains a core value in all corners of your institution. The success of your privacy program depends upon your board s and your management
More informationAn Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions
An Oracle White Paper October 2009 An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions Executive Overview Today s complex financial crime schemes pose
More informationGENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2005 H 2 HOUSE BILL 629 Committee Substitute Favorable 5/18/05
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 0 H HOUSE BILL Committee Substitute Favorable //0 Short Title: Option to Freeze Credit Report. Sponsors: Referred to: March, 0 (Public) A BILL TO BE ENTITLED
More informationPersonal Data Protection Policy and Practices ( the Policy )
Personal Data Protection Policy and Practices ( the Policy ) FWD Life Insurance Company (Bermuda) Limited ("the Company") is committed to implementation and compliance with the provisions of the Personal
More informationProtecting your privacy
Protecting your privacy Protecting your privacy is important to us. Transamerica Life Canada and its affiliates: Canadian Premier Life Insurance Company, Legacy General Insurance Company, Aegon Fund Management
More informationPrivacy Policy & Identity Theft Prevention Program
Privacy Policy & Identity Theft Prevention Program Orcam Financial Group LLC PO Box 91098 4640 Cass St San Diego, CA 92109 (858) 220-5383 Orcam Financial Group LLC Privacy Policy February, 2014 Page 1
More informationProduct. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution
Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively
More informationResponding to New Identity Theft Laws
Responding to New Identity Theft Laws March 2011 Privacy Expectations Today, there is increasing recognition that an individual has a legitimate interest in controlling the collection, use and disclosure/dissemination
More informationDARTFISH PRIVACY POLICY
OUR COMMITMENT TO PRIVACY DARTFISH PRIVACY POLICY Our Privacy Policy was developed as an extension of our commitment to combine the highestquality products and services with the highest level of integrity
More informationCFPB Consumer Laws and Regulations
Fair Credit Reporting Act Background and Summary The Fair Credit Reporting Act () 1 became effective on April 25, 1971. The is a part of a group of acts contained in the Federal Consumer Credit Protection
More informationAnti-Money Laundering Policy Manual Table of Contents [Sample Client] Table of Contents
Table of Contents [ Client] Table of Contents TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 3 1.1 GOALS AND OBJECTIVES... 3 1.2 REQUIRED REVIEW... 3 1.3 APPLICABILITY... 3 1.4 MONEY LAUNDERING DEFINED...
More informationVIII 6.1. VIII. Privacy Fair Credit Reporting Act. Fair Credit Reporting Act. Structure and Overview of Examination Modules.
Fair Credit Reporting Act Introduction The Fair Credit Reporting Act (FCRA) (15 USC 1681-1681u) became effective on April 25, 1971. The FCRA is a part of a group of acts contained in the Federal Consumer
More informationRegulation P Privacy of Consumer Financial Information
Regulation P Privacy of Consumer Financial Information BACKGROUND AND OVERVIEW Title V, Subtitle A of the Gramm-Leach-Bliley Act ( GLBA ) governs the treatment of nonpublic personal information about consumers
More informationFair Credit Reporting
Fair Credit Reporting Background The Fair Credit Reporting Act (FCRA) deals with the rights of consumers in relation to their credit reports and the obligations of credit reporting agencies and the businesses
More informationThese rules became effective August 1, 2009, and require certain agencies to implement an identity theft program and policy.
Red Flag Policy Protecting your privacy is of paramount importance at Missouri Southern State University, and we are dedicated to the responsible handling of your personal information. We are very committed
More informationCode of Ethics. I. Definitions
Code of Ethics Old North State Trust, LLC (the Company ) has adopted this Code of Ethics in recognition of the principle that all Supervised Persons (as defined below) of the Company have a fiduciary duty
More informationMLS Data Use and License Policy Approved September 2010
MLS Data Use and License Policy Approved September 2010 Data access and licensing limited to uses permitted by MLS policy. The Multiple Listing Service of the Berkshire County Board of REALTORS complies
More informationWHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION?
M-112997 Rev 07/2015 FACTS Why? What? How? WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? Financial companies choose how they share your personal information. Federal law gives consumers
More informationThe Gramm-Leach-Bliley Act Privacy of Consumer Financial Information
FEDERAL TRADE COMMISSION BUREAU OF CONSUMER PROTECTION DIVISION OF FINANCIAL PRACTICES The Gramm-Leach-Bliley Act Privacy of Consumer Financial Information Subtitle A of Title V of the Gramm-Leach-Bliley
More informationCEROS CUSTOMER AGREEMENT SUPPLEMENT Accounts Managed by Unaffiliated Investment Advisers
CEROS CUSTOMER AGREEMENT SUPPLEMENT Accounts Managed by Unaffiliated Investment Advisers This Customer Agreement Supplement ( Agreement ) is for customer accounts of Ceros Financial Services, Inc. ( Ceros
More informationSCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection
SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How
More informationM&T BANK CANADIAN PRIVACY POLICY
M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (
More informationThe Association of Registered Agents and the National Public Records Research Association
The Association of Registered Agents and the National Public Records Research Association Best Practices Recommendations to Prevent the Exploitation of the Company Formation Agent Industry for Criminal
More informationFair Credit Reporting
Fair Credit Reporting Background The Fair Credit Reporting Act (FCRA) deals with the rights of consumers in relation to their credit reports and the obligations of credit reporting agencies and the businesses
More informationTapping the benefits of business analytics and optimization
IBM Sales and Distribution Chemicals and Petroleum White Paper Tapping the benefits of business analytics and optimization A rich source of intelligence for the chemicals and petroleum industries 2 Tapping
More informationInnoCaption TM Service Terms of Use
PRIOR TO USING THE INNOCAPTION SERVICE YOU MUST REVIEW AND AGREE TO THE TERMS AND CONDITIONS OF THIS SERVICE AGREEMENT ( AGREEMENT ) BY COMPLETING YOUR REGISTRATION ( SIGN UP ) FOR INNOCAPTION SERVICE.
More informationWe will not collect, use or disclose your personal information without your consent, except where required or permitted by law.
HSBC Privacy Notice HSBC's Privacy Principles HSBC Bank Canada is a subsidiary of HSBC Holdings plc which, together with its subsidiaries and affiliates, is one of the world s largest banking and financial
More informationPRIVACY POLICY. Mil y Un Consejos Network. Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of
PRIVACY POLICY Mil y Un Consejos Network Version Date: April 15th 2010 GENERAL Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of its users ( user or you ) whether they use
More informationGUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
More informationPrivacy Policy. Effective Date: November 20, 2014
Privacy Policy Effective Date: November 20, 2014 Welcome to the American Born Moonshine website (this Site ). This policy describes the Privacy Policy (this Policy ) for this Site and describes how Windy
More informationSection 10: Fair Credit Reporting Act (FCRA) Policy
Section 10: Fair Credit Reporting Act (FCRA) Policy Summary of Regulation The Fair Credit Reporting Act (FCRA) regulates Consumer Reporting Agencies (CRAs), users of consumer reports, and furnishers of
More informationThe effect of dirty data on business
The effect of dirty data on business The biggest data quality challenges 2013 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered
More informationCredit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information INTRODUCTION Privacy legislation establishes legal privacy rights for individuals and sets enforceable
More informationHow To Comply With The Federal Consumer Reporting Act
Fair Credit Reporting Act 1 The Fair Credit Reporting Act (FCRA) 2 became effective on April 25, 1971. The FCRA is a part of a group of acts contained in the Federal Consumer Credit Protection Act 3 such
More informationQuestions and Answers About the Identity Theft Red Flag Requirements
Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,
More informationAn Oracle White Paper November 2011. Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime
An Oracle White Paper November 2011 Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime Disclaimer The following is intended to outline our general product direction.
More informationCopyright 2012, General Dynamics Information Technology. All Rights Reserved.
Introduction Over the years, General Dynamics Information Technology has experienced significant growth in its IT services business serving government and commercial customers worldwide. As a valued supplier
More information