Telephone Banking Authentication Practical Approaches to Securing a Popular yet Vulnerable Channel

Size: px
Start display at page:

Download "Telephone Banking Authentication Practical Approaches to Securing a Popular yet Vulnerable Channel"

Transcription

1 Telephone Banking Authentication yet Vulnerable Channel March 2007

2 Overview Financial institutions (FIs) must implement effective authentication solutions that address specific, often mutually exclusive threats from different channels, while remaining in compliance with FFIEC guidelines which pertain to both telephone and online channels. With phone usage increasing over historical levels, this report provides comprehensive coverage and analysis of consumer preferences toward telephone banking, and evaluates the authentication methods currently being used by FIs for the phone channel. Building upon robust consumer data generated from a survey of 3,215 respondents, Javelin also interviewed several top FIs and authentication solutions providers to obtain qualitative input on current phone security efforts and market trends. Finally, Javelin investigates several well-known phone authentication products. Primary Questions How can FIs secure the phone channel, while maximizing efficiency and reducing costs? Which phone authentication solutions provide the best security? What phone authentication solutions are FIs using? How many consumers conduct phone banking transactions (compared to other channels)? How secure do consumers feel using the phone channel? Audience: Author: Contributors: Editor: Financial institutions and authentication solutions providers Rachel Kim, Research Associate Bruce Cundiff, Senior Analyst Mary T. Monahan, Editor Publication date: March 2007 Length: 23 pages 11 charts/graphs Price: $950

3 Table of Contents Overview. 3 Primary Questions... 3 Findings and Analysis. 3 Over One-Third Of Consumers Bank By Phone: Channel Security Is Critical... 4 Confidence High In Telephone Banking Safety Despite Fraud Potential... 6 Expect Growth In Telephone Fraud With Advent Of VOIP 7 Weak, In-Wallet Authentication Prevails On The Phone Channel 9 Fortify Phone Authentication With Risk Scoring, Voice Biometrics And KBA Vendor Solutions By Need: Comprehensive Or Component. 14 What s The Bottom Line.. 16 Related Research Appendix A: 15% Of Fraud From In-Store, Mail Or Telephone Purchases. 18 Appendix B: Online Bill Payers Have Higher Rates Of Phone Contact Then Non-Bill Payers 19 Appendix C: Telephone Channel Usage Increasing Over Historical Levels Appendix D: Two-Thirds Of Consumers Use Telephone Channel Appendix E: Passwords And Voice Recognition Are The Top Phone-Based Solutions... 22

4 Table of Figures Figure 1: Used a Phone Operated System to Perform a Banking Function 4 Figure 2: Spoke By Phone with a Bank or Credit Union Representative. 5 Figure 3: How Consumers Rate the Safety of Using a Phone Automated System... 6 Figure 4: How Consumers Rate the Safety of Speaking with a CSR... 7 Figure 5: Telephone Authentication Factors Used By Top 23 US FIs. 9 Figure 6: Phone Authentication Model.. 12 Figure 7: Sources of Identity Fraud Figure 8: Financial Activities in Past 12 Months by Bill Payer at Bank Web Site Figure 9: Consumer Financial Activities by Type and Time Period.. 20 Figure 10: Percentages of Online Consumers Who Have Ever Used these Channels 21 Figure 11: Consumers Preferred Methods of Authentication for Online Accounts 22 Companies/Organizations Mentioned in Report Verid Experian Digital Resolve TradeHarbor RSA VoiceVerified Additional Report Topics Phone authentication Call center adoption Vishing Pretexting Voice Biometrics Biometric Authentication FFIEC Compliance CSR Security VOIP Security Knowledge Based Authentication (KBA) Interactive Voice Recognition (IVR) Risk Scoring Adaptive Authentication Voice Signature Service

5 Sample Pages

6 Health Savings Accounts: Focus on Transactions and Product Development Will Lead to Asset Growth Target Place Your Order as Follows: 1) Call us at , x26 2) us at 3) Fax or Mail using the form below: Please send me the following report(s): Report Title Publication Date Price Name Title Organization Division or group Phone Fax Address Signature to confirm your order: Payment Method: [ ] Payment card [ ] Check Enclosed [ ] Invoice me Visa, MC, AE or Disc. card #: Exp date: / Name on Card: Signature For invoicing, provide PO number: (Invoicing is available to financial institutions or publicly owned firms) Note: Reports are provided in electronic PDF form only. Javelin reports are subject to standard terms and conditions, as described on our web site. Javelin will contact you in the future to provide our free research newsletter or other mailings. If you do not wish to receive our newsletter or other mailings, you may advise us of this. Your contact information will not be sold to other organizations.

PCI Compliance: Finding Value beyond Fine Avoidance

PCI Compliance: Finding Value beyond Fine Avoidance November 2007 Overview Safeguarding customer data is a necessary component of good business practice, yet the numbers of data breached accounts are at an all time high. Data security has not been given

More information

Online Storage Vaults The Electronic Safe Deposit Box Brings Opportunities for Loyalty and Fees, but Can It Overcome Daunting Challenges?

Online Storage Vaults The Electronic Safe Deposit Box Brings Opportunities for Loyalty and Fees, but Can It Overcome Daunting Challenges? October 2008 Audience: Financial institutions: Online banking and e-commerce and billers such as utilities. Vendors of online storage vault vendors, online-banking platforms, bill-pay services and data-storage

More information

E Commerce Platform Review:

E Commerce Platform Review: November 2010 Audience: Treasury personnel and payment specialists for online retailers or multichannel retail organizations with an online presence; merchant acquirers, e commerce platform providers,

More information

2011 Online Account Opening:

2011 Online Account Opening: 2011 Online Account Opening: Faulty Process Hobbles FIs in the Battle for Customer Acquisition, Profitability and Retention October 2011 Audience: Financial institutions: E commerce, mobile banking, credit

More information

Multi-Factor Authentication of Online Transactions

Multi-Factor Authentication of Online Transactions Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best

More information

Voice biometrics. Advait Deshpande. 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1

Voice biometrics. Advait Deshpande. 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1 Voice biometrics Advait Deshpande 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1 Imagine a world without PINS/Passwords 2002-2013 Nuance Communications, Inc. All rights reserved. Page

More information

Voice Authentication On-Demand: Your Voice as Your Key

Voice Authentication On-Demand: Your Voice as Your Key Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009 Convergys Corporation A Global Leader in Relationship

More information

FFIEC CONSUMER GUIDANCE

FFIEC CONSUMER GUIDANCE FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their

More information

FFIEC CONSUMER GUIDANCE

FFIEC CONSUMER GUIDANCE FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment

Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment Using Voice Biometrics in the Call Center Best Practices for Authentication and Anti-Fraud Technology Deployment This whitepaper is designed for executives and managers considering voice biometrics to

More information

FIS Dispute Resolution Center Dispute/Fraud Cover Sheet. FRAUD INVESTIGATION FORM PO Box 30495 Tampa, FL 33630 3495 Or by fax to 1.800.253.

FIS Dispute Resolution Center Dispute/Fraud Cover Sheet. FRAUD INVESTIGATION FORM PO Box 30495 Tampa, FL 33630 3495 Or by fax to 1.800.253. FIS FRAUD INVESTIGATION FORM PO Box 30495 Tampa, FL 33630 3495 Or by fax to 1.800.253.1220 1. My mailing address is My telephone number at home is ( ) and at work is ( ) 2. My credit/debit card was issued

More information

Voiceprint. México. May 2014

Voiceprint. México. May 2014 Voiceprint México 1 May 2014 1 2 3 4 General information The road to Voiceprint Project execution Numbers & Conclusions 2 México q Est. 120 Million people q Median age 28 years old Some demographics q

More information

Online Banking Risks efraud: Hands off my Account!

Online Banking Risks efraud: Hands off my Account! Online Banking Risks efraud: Hands off my Account! 1 Assault on Authentication Online Banking Fraud Significant increase in account compromises via online banking systems Business accounts are primary

More information

Developing A True Multi-Channel Contact Center

Developing A True Multi-Channel Contact Center Developing A True Multi-Channel Contact Center Case Study Based Evidence Report Sponsored by: GoToAssist Report Prepared by: callcentres.net Pty Ltd (part of ACA Research Group) Published: November 2010

More information

Knowledge Based Authentication [KBA] is not just for onboarding new customers

Knowledge Based Authentication [KBA] is not just for onboarding new customers White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA] is not just for onboarding new customers December 2013 Risk Solutions Best Practices

More information

Shared VRU. A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy

Shared VRU. A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy Shared VRU A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy Agenda Voice response within FIS Telephone banking today FIS shared VRU roadmap Speech recognition Unleash

More information

CSR REPORT 2016 Corporate Social Responsibility Report

CSR REPORT 2016 Corporate Social Responsibility Report CSR REPORT 2016 Corporate Social Responsibility Report 01 02 03 07 13 14 15 17 Business 19 20 21 22 Support and Contribution 23 Management System 27 31 with Employee 02 Business 03 1 2 04 18 1 3 4 2 6

More information

2011 B2B Marketing BenchMark Report

2011 B2B Marketing BenchMark Report EXCERPT Special Rate Sponsor: 2011 B2B Marketing BenchMark Report Practical instructions to generate, Research and Insights on Elevating qualify and nurture new business Marketing Effectiveness from Lead

More information

ExtendTime Time & Labor Management

ExtendTime Time & Labor Management ExtendTime Time & Labor Management p r e s e n t e d b y: Trident Internet Systems, Inc. www.extendtime.com Corporate Overview ExtendTime TM is a Time and Attendance Solution offered in licensed and hosted

More information

State Network Consumer Assistance Small Group Consultation Call Center

State Network Consumer Assistance Small Group Consultation Call Center State Network Consumer Assistance Small Group Consultation Call Center Support for this presentation was provided through a grant from the Robert Wood Johnson Foundation s State Health Reform Assistance

More information

Guidelines for Accepting Credit Cards as a Form of Payment for Education, Registration and Other Fees

Guidelines for Accepting Credit Cards as a Form of Payment for Education, Registration and Other Fees Guidelines for Accepting Credit Cards as a Form of Payment for Education, Registration and Other Fees Background Over the past few years, the use of credit cards as a payment option for purchasing goods

More information

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication

More information

ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES

ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES The following procedures are needed to establish your account in order to download three bureau credit reports into your bankruptcy software.

More information

Dissecting Wire Fraud: How it Happens, and How to Prevent It WHITE PAPER

Dissecting Wire Fraud: How it Happens, and How to Prevent It WHITE PAPER Dissecting Wire Fraud: How it Happens, and How to Prevent It WHITE PAPER 2013 Guardian Analytics. Inc. All rights reserved. Introduction Preventing wire fraud starts with understanding how it is perpetrated

More information

SECURITY FREEZE INFORMATION

SECURITY FREEZE INFORMATION SECURITY FREEZE INFORMATION Any consumer in Texas may request a security freeze in writing by certified mail to the consumer reporting agencies. The consumer reporting agencies shall not charge a fee to

More information

Volume Challenges? Technology Can Help A look at the many ways in which technology is a resource for managing peaks and unpredictable volume.

Volume Challenges? Technology Can Help A look at the many ways in which technology is a resource for managing peaks and unpredictable volume. tech line / may 2013 Volume Challenges? Technology Can Help A look at the many ways in which technology is a resource for managing peaks and unpredictable volume. By Brian Hinton, Strategic Contact Pipeline

More information

PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY

PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY TABLE OF CONTENTS Executive Summary... 3 The Evolution of Bank Theft... Phone Channel Vulnerabilities

More information

Vendor Solutions Gateway

Vendor Solutions Gateway Vendor Solutions Gateway Vendor Registration User Guide Because of increasing regulatory requirements within the business environment, a new business requirement is being implemented for all supply partners

More information

Customer experience roulette: are banks making the right investments?

Customer experience roulette: are banks making the right investments? Customer experience roulette: are banks making the right investments? A survey of banking consumers and executives. 1 Executive summary Nuance commissioned a survey of 1,000 American consumers to learn

More information

Checking Switch Kit. 1. Get Organized. 2. Switching Your Direct Deposit. 3. Switching Your Automatic Payments. 4. Request to Close Account

Checking Switch Kit. 1. Get Organized. 2. Switching Your Direct Deposit. 3. Switching Your Automatic Payments. 4. Request to Close Account Checking Switch Kit Moving your checking account has never been easier! Thank you for choosing to bank with EvergreenDIRECT Credit Union. We are dedicated to ensuring your transition is a smooth one. The

More information

PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY

PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY TABLE OF CONTENTS Executive Summary... 3 The Evolution of Bank Theft... Phone Channel Vulnerabilities

More information

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,

More information

How To Control Credit Card And Debit Card Payments In Wisconsin

How To Control Credit Card And Debit Card Payments In Wisconsin BACKGROUND State of Wisconsin agencies accepted more than 6 million credit/debit card payments annually through the following payment channels: Point of Sale (State agency location) Point of Sale (Retail-agent

More information

FIS Dispute Resolution Center Dispute/Fraud Cover Sheet

FIS Dispute Resolution Center Dispute/Fraud Cover Sheet Attention: Chargeback Services (Chargeback Customer Service Inquiries) : 1.800.600.5249 Fax: 1.800.253.1220 Mail: PO BOX 30495 Tampa, FL 33630 3495 Revised: 10/18/2013 From: (Institution Name): Phone:

More information

REPORT. Next steps in cyber security

REPORT. Next steps in cyber security REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15

More information

Visa Debit processing. For ecommerce and telephone order merchants

Visa Debit processing. For ecommerce and telephone order merchants Visa Debit processing For ecommerce and telephone order merchants Table of contents About this guide 3 General procedures 3 Authorization best practices 3 Status check transactions 4 Authorization reversals

More information

Improving Small Business Payments Processing

Improving Small Business Payments Processing Improving Small Business Payments Processing ASBDC State Directors Conference March 19, 2012 Claudia Swendseid Senior Vice President Federal Reserve Bank of Minneapolis 2012 Federal Reserve Bank of Minneapolis.

More information

Welcome to Golden Belt Bank We Appreciate Your Business

Welcome to Golden Belt Bank We Appreciate Your Business Switch Your Checking Account to Golden Belt Bank the Easy Way Welcome to Golden Belt Bank We Appreciate Your Business It has never been easier to begin enjoying the exceptional personal service you can

More information

Hitachi ID Password Manager Telephony Integration

Hitachi ID Password Manager Telephony Integration Hitachi ID Password Manager Telephony Integration 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................

More information

SECURITY FREEZE INFORMATION Any consumer in Wisconsin may place a security freeze on his or her credit report by requesting it in writing.

SECURITY FREEZE INFORMATION Any consumer in Wisconsin may place a security freeze on his or her credit report by requesting it in writing. SECURITY FREEZE INFORMATION Any consumer in Wisconsin may place a security freeze on his or her credit report by requesting it in writing. The consumer reporting agency is not allowed to charge a fee to

More information

Account-to-Account Transfer Services Risk

Account-to-Account Transfer Services Risk Account-to-Account Transfer Services Risk This white paper is part of the Risk Management White Paper Series, which CUNA Mutual Group provides exclusively to its Bond policyholders. TABLE OF CONTENTS Table

More information

Enterprise Readiness Series: The Case for Passive, Voice-Based Authentication

Enterprise Readiness Series: The Case for Passive, Voice-Based Authentication Enterprise Readiness Series: The Case for Passive, Voice-Based Authentication Today s customer authentication methods are from another age. Opus Research interviewed security and customer care professionals

More information

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015 For the Financial Industry in Singapore 31 July 2015 TABLE OF CONTENT 1. EXECUTIVE SUMMARY 3 2. INTRODUCTION 4 2.1 Audience 4 2.2 Purpose and Scope 4 2.3 Definitions 4 3. REQUIREMENTS 6 3.1 Overview 6

More information

Inside Electronic Signature APIs

Inside Electronic Signature APIs Inside Electronic Signature APIs 7/20/2011 Adam DuVander Executive Editor Wendell Santos Web Services Analyst Sponsored by DocuSign Table of Contents Contents Executive Summary... 3 Methodology... 3 Provider

More information

Contact Centers: The Fraud Enablement Channel

Contact Centers: The Fraud Enablement Channel Contact Centers: The Fraud Enablement Channel APRIL 2016 Shirley Inscoe Photocopying or electronic distribution of this document or any of its contents without prior written consent of the publisher violates

More information

Understanding and Combating Online Fraud in 2014

Understanding and Combating Online Fraud in 2014 Understanding and Combating Online Fraud in 2014 Fraud is pervasive online and high-risk merchants must be vigilant in employing a multi-layered, comprehensive approach to security and risk management.

More information

Osterman Research Executive Summary

Osterman Research Executive Summary Osterman Research Executive Summary Report Focus This report focuses on demand for unified communications and related technologies in the North American market. The research conducted for this report,

More information

Vishing (and SMiShing ) Countermeasures

Vishing (and SMiShing ) Countermeasures Vishing (and SMiShing ) Countermeasures Fraud Investigation & Education FIS www.fisglobal.com Vishing What is it? Vishing also called (Voice Phishing) is the voice counterpart to the phishing scheme. Instead

More information

Solutions. Billing and Payment Solutions for Billers A Multi-Channel, Integrated Approach to Reduce Costs and Delight Customers

Solutions. Billing and Payment Solutions for Billers A Multi-Channel, Integrated Approach to Reduce Costs and Delight Customers Solutions Billing and Payment Solutions for Billers A Multi-Channel, Integrated Approach to Reduce Costs and Delight Customers Solutions Are you looking to reduce costs, collect payments faster and delight

More information

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

More information

Secure Data Exchange Solution

Secure Data Exchange Solution Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates

More information

2014 Media Kit & Editorial Calendar

2014 Media Kit & Editorial Calendar 2014 Media Kit & Editorial Calendar Magazine Advertising Email Marketing Newsletters White Papers Advertorials Sales Promotions Website Banners Direct Mail List Rental List Purchase Who We Are January/

More information

Accounts Payable and Payments Policy

Accounts Payable and Payments Policy REV. 07/07/15 Accounts Payable and Payments Policy Accounts Payable and Payments Policy Purpose 1. The purpose of this policy is to establish the responsibilities, controls, authorizations and procedures

More information

Defending the Internet of Things

Defending the Internet of Things Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity

More information

Completing an Accounts Payable Audit With ACL (Aired on Feb 15)

Completing an Accounts Payable Audit With ACL (Aired on Feb 15) AuditSoftwareVideos.com Video Training Titles (ACL Software Sessions Only) Contents Completing an Accounts Payable Audit With ACL (Aired on Feb 15)... 1 Statistical Analysis in ACL The Analyze Menu (Aired

More information

Protective Life Corporation (PL) - Financial and Strategic SWOT Analysis Review

Protective Life Corporation (PL) - Financial and Strategic SWOT Analysis Review Protective Life Corporation (PL) - Financial and Strategic SWOT Analysis Review Protective Life Corporation (PL) - Financial and Strategic SWOT Analysis Review Sector Publishing Intelligence Limited (SPi)

More information

BENCHMARK REPORT. 2011 Social Marketing. New research and insights on the monetization of social marketing for ROI. sponsored by EXCERPT

BENCHMARK REPORT. 2011 Social Marketing. New research and insights on the monetization of social marketing for ROI. sponsored by EXCERPT BENCHMARK REPORT 2011 Social Marketing New research and insights on the monetization of social marketing for ROI sponsored by EXCERPT 2011 Social Marketing Benchmark Report New research and insights on

More information

Frequently Asked Questions on FFIEC Guidance on Authentication in an Internet Banking Environment. August 15, 2006

Frequently Asked Questions on FFIEC Guidance on Authentication in an Internet Banking Environment. August 15, 2006 Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation National Credit Union Administration Office of the Comptroller of the Currency Office of Thrift Supervision Frequently

More information

Hospital Certified Electronic Health Record (EHR) Technology Questionnaire

Hospital Certified Electronic Health Record (EHR) Technology Questionnaire Page 1 of 10 Hospital Certified Electronic Health Record (EHR) Technology Questionnaire Thank you for taking time to complete this questionnaire. The Office of Inspector General (OIG) is conducting this

More information

2. Once the 5 day right to cancel period has passed, we will begin investigating and repairing your credit profile.

2. Once the 5 day right to cancel period has passed, we will begin investigating and repairing your credit profile. IMPORTANT: Please take a few minutes to review our process. Thank you for choosing Heartland Credit Restoration Services. Our goal is to help you build a positive credit profile. It is very important to

More information

Failure to follow the following procedures may subject the state to significant losses, including:

Failure to follow the following procedures may subject the state to significant losses, including: SUBJECT: Policy and Procedures PAGE: 1 of 5 INTRODUCTION During fiscal year 2014, State of Wisconsin agencies accepted approximately 6 million credit/debit card payments through the following payment channels:

More information

E Source Multichannel Metrics Survey 2012

E Source Multichannel Metrics Survey 2012 E Source Multichannel s Survey 2012 Instructions Fill in only the fields highlighted in blue; the yellow fields will automatically populate with the calculated s. In the "Number" column please use numerals;

More information