Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target.
|
|
|
- Matilda Davidson
- 10 years ago
- Views:
Transcription
1 White Paper Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target. Research provided by Javelin Strategy & Research February 2010 Risk Solutions Financial Services
2 Executive Summary Difficult economic conditions appear to have reversed the trend of decreasing fraud incidence. According to Javelin s 2009 Identity Fraud Survey Report, the rate of identity fraud rose nearly a full percentage point in Over the past 12 months, the number of identity fraud victims increased 22 percent to 9.9 million adults. Considering fraudulent new accounts, the data also shows that the gains of 2007 reversed course this past year as the total annual cost of new accounts fraud rose from $15 billion in 2007 to $18 billion in It is more crucial than ever to minimize the risk that faceless online applicants are fraudsters. Financial institutions are using a complex, two-phase process that begins by accessing and analyzing a wide range of databases to verify the applicant s identity, then assesses the likelihood that funding for the new account comes from a legitimate source. Financial institutions must arm themselves with the appropriate tools to combat new account fraud while remaining usable to the consumer. This toolkit ranges from internal initiatives to calling on external experts to review applicant data. It is designed to assist in defining the good applications from the bad and, where necessary, take further steps for those that fall into that gray area. Analytic solutions allow financial institutions to create more precise, efficient and automated processes for making smarter decisions. Financial institutions should employ fraud systems that can flag suspect transactions and applications, stop the fraudulent ones and allow the legitimate activity to proceed unhindered. The operational efficiencies gained in addition to the mitigation of risk provide significant benefits to deploy an analytics solution. Questions answered in this paper 1. What is the current state of fraud, particularly costs and incidence rates? 2. How have new account fraud rates been affected? 3. What is the process for new account onboarding through online channels? 4. Why are analytics so important in an onboarding process? 5. What security tools are currently available to financial institutions? 2
3 Current state of fraud Fraud cost and incidence rate According to Javelin s 2009 Identity Fraud Survey Report, the rate of identity fraud rose nearly a full percentage point in 2008 to 4.32 percent, reversing a four-year trend of decreasing incidence. Over the past 12 months, the number of identity fraud victims increased 22 percent to 9.9 million adults. There have been reports of an increase in crimes of opportunity, seemingly driven by economic misfortune and availability and the deliberate targeting of immediate gains. Simultaneously, fraud increases have been driven by the development of an increasingly global, hierarchal, specialized criminal enterprise and a growing secondary market for stolen financial credentials. Fraudsters appear to be moving more rapidly, with one notable trend showing a significant increase in data used immediately after the compromise, which jumped from 33 percent to 71 percent over the past three years. There was likewise a rise in data used after a long holding period (one or more years), which grew from 4 percent to 9 percent. This dichotomy speaks to an inclination in which crimes of opportunity are beginning to evolve within a global criminal enterprise that uses the secondary market for large dumps of card data, withholds the stolen information and delays its sale to avoid detection. Total Annual Cost of Fraud and Incidence Rates $70 10% 9% 8% 7% 6% 5% 4% 3% 2% 1% 0% In Billions $60 $50 $40 $30 $20 $10 $60 $57 $50 $48 $ % 4.32% 4.00% 3.74% 3.58% (Incidence Rate) $ Q32: What is the approximate dollar value of what the person obtained while misusing your information? 2008;2007;2006;2005;2004, n = 4474;5075;5008;5003;5004 Base: All respondents Javelin Strategy & Research New account fraud Difficult economic conditions appear to have caused a resurgence in the most frightful form of identity fraud: new accounts establishment. The data shows that the gains of 2007 reversed course this past year as the total annual cost of new accounts fraud, which had decreased from $19 billion to $15 billion in 2007, rose to $18 billion in The incidence rate of new accounts fraud increased 0.24 percentage points from 0.95 percent in 2007 to 1.19 percent in This is a complicated type of fraud to resolve, requiring more than 40 hours of the victim s time to resolve. New accounts fraud is also the most difficult type of identity fraud to detect at 155 days (of the three main categories). These victims are significantly more likely to find out about their frauds by being contacted by a debt collector or by law enforcement (more than three times as often as victims of existing card fraud). Thus, the average duration 3
4 of misuse of new accounts fraud is the highest compared to other fraud types at 155 days. New accounts fraud victims tend to have their information misused over a long period of time, i.e. more than one year (20 percent for new accounts versus 9 percent for all fraud victims). They are much less likely than average victims to discover the frauds within the first week and much more likely to discover the frauds after three months or even a year or more. The mean fraud amount for this type of fraud increased 5 percent from $8,386 in 2007 to $8,515 in 2008, while the median amount remained at $3,000. New Account Frauds Total Annual Cost and Incidence Rates % $ % $ % $19 $0 $5 $10 $15 $20 (In Billions) Q32: What is the approximate dollar value of what the person obtained while misusing your information? by Q11: Did the perpetrator use your personal information to obtain NEW credit or debit cards, new bank account or loans in your name, run up debts in your name, open other new accounts or otherwise commit theft, fraud or some other... October 2008, n = 490/4784,445/5000,458/5000 Base: Card fraud victims Javelin Strategy & Research New accounts victims are likely to be younger: 36 percent of victims ages 18 to 34 experienced new accounts fraud compared to only 19 percent for those 55 and older. Latino victims were also more likely to suffer new accounts frauds (47 percent Latinos versus 32 percent of all victims). New accounts fraud also poses great financial impact to the victim. Four out of every ten new account victims ranked themselves in the more or most severely impacted category (38 percent ranked severe impact versus 25 percent ranked average impact), demonstrating the profound impact of new accounts fraud. Therefore, these victims are the most likely to file a police report. 4
5 Types of Fraudulent New Accounts Opened 3 New credit card accounts New store-branded credit cards New loans New telephone accounts New checking or savings accounts New internet accounts New payments accounts Another type of new account, please specify NA 3% 3% 6% 11% 8% 10% 15% 15% 16% 21% 26% 26% 29% 32% 33% With identity fraud rates rising for the first time in five years, it is more crucial than ever to minimize the risk that faceless online applicants are fraudsters. 0% 10% 20% 30% 40% Q18: Did the person use your information to open any of the following new accounts? October 2008, n = 146, 137 Base: New account fraud victims Javelin Strategy & Research In 2008, a lower percentage of new account fraud victims reported being defrauded by new store-branded credit cards than did in the previous year (26 percent in 2008 vs. 29 percent in 2007). There were also decreases in the number of victims defrauded by new loans in 2008; 15 percent of new account fraud victims in 2008 as opposed to 21 percent in These decreases may be partly due to FIs and creditors implementing more sophisticated means of back-end fraud detection capabilities when one applies for a loan or credit card, in addition to being aware of the most recent defrauding schemes and techniques. Under federal law, banks must abide by the Know Your Customer (KYC) regulations of the USA PATRIOT Act and Bank Secrecy Act (BSA), and are therefore required to perform robust due diligence in customer identity verification. In 2008, there were a higher percentage of victims being defrauded by new network-branded credit cards (i.e., new cards usable anywhere) than in 2007 (33 percent in 2008 versus 26 percent in 2007). Moreover, an increasing number of victims were defrauded by new checking or savings accounts up three percentage points from 2007 to 11 percent in Victims defrauded by new Internet accounts saw an increase from 6 percent in 2007 to 10 percent in
6 This trend further highlights the need for consumers to take a proactive, rather than reactive, approach to the prevention and detection of identity fraud given the difficulty involved in detecting this type of fraud. The largest decrease was in new telephone accounts, where a 17 percentage-point decrease was observed between 2007 (32 percent) and 2008 (15 percent). The networks have made great strides in this area, especially reducing cloning of accounts. Current onboarding processes Account opening is a two-phase process To the consumer, the process of opening an account online is one that should be simple and proceed without requiring a phone call to the bank or a visit to a branch a fate suffered by 39 percent of consumers who attempted to open a checking account online in 2008, according to Javelin data. What the consumer doesn t see is a complex, two-phase process that begins by accessing and analyzing a wide range of databases to verify the applicant s identity, then assesses the likelihood that funding for the new account comes from a legitimate source. With identity fraud rates rising for the first time in five years 4, it is more crucial than ever to minimize the risk that faceless online applicants are fraudsters. This behind-the-scenes process is often triggered before the consumer completes the application. The first step is to develop a picture of the applicant so a financial institution can determine whether he or she is a customer it wants to do business with. This typically is done by reaching out to third-party data providers like LexisNexis that sift through mountains of public records, credit bureau files, government databases and other material. On a basic level, financial institutions will match information listed on the application against routine records to screen out riskier applicants or those identified on federal anti-terrorism lists. But some financial institutions will go deeper, either by consulting a broader number of data sources or by digging deeper into the applicant s history. The goal is to identify applicants who might have a history of fraudulent activity or have been forced to close accounts in the past. Some might run a soft credit check that won t show up on the applicant s credit record but will elicit information only a legitimate applicant is likely to know, such as the size of a mortgage payment. While these steps are mostly motivated by fear of fraud, they also can benefit applicants with thin credit files, such as recent college graduates or the underbanked. For example, financial institutions might evaluate cell phone bills or driver s license data to develop a better sense of whether the applicant is reliable enough to invite in as a customer. Ideally, data developed during this first phase is evaluated during the application process, resulting in either an approval or a rejection. But many applications will fall into a gray zone, requiring financial institutions to review them manually. Applicants who make it through this first screening process then face the second phase, when financial institutions must determine whether applicants are making authorized deposits to fund the new account. Many institutions will again rely on third-party data providers to assess the validity of the applicant s claim to the funding account or when booking future accounts. Some financial institutions are leery of relying solely on this data, in part because it is often weeks old. Instead, they will employ microdeposit authentication that involves making small deposits into the funding account and confirming the amounts with the applicant. Because that process often can take several days boosting the odds that the applicant will lose interest or forget to follow up some institutions instead employ account aggregation tools that elicit real-time or near real-time account data. Applicants provide their log-in information to the funding account, and the financial institution confirms information listed on the application. Ideally, the entire process is completed entirely online, in mere minutes. 6
7 What tools are available to financial institutions? The new account toolkit for financial institutions Rising fraud rates and the wide availability of personal information on the black market means every application comes with the risk of requiring a write-off. Financial institutions must arm themselves with the appropriate tools to combat new account fraud, while remaining usable to the consumer. This toolkit ranges from internal initiatives to calling on external experts to review applicant data. It is designed to assist in defining the good applications from the bad and where necessary, take further steps for those that fall into that gray area. Customer identification To comply with KYC (know-your-customer) regulations, applicants are required to provide identifying information that can be checked for validity. Information provided typically includes the applicant s SSN, driver s license or passport number, address and phone number. Institutions additionally run this information against outside data to confirm the information submitted is valid and the identity elements (SSN, physical address or phone number) can be verified. An image of the photo identification (faxed or photocopied in-branch) may be required prior to funding the account. Financial institutions must arm themselves with the appropriate tools to combat new account fraud while remaining usable to the consumer. Device fingerprinting Device fingerprinting reviews key variables in the device submitting an online application (and the software running on that device) to ensure that it reflects the information contained in the application. Comparing both software and hardware components can ensure, for example, the computer submitting an application claiming to be from Los Angeles, California, is set to Pacific Time or the browser is configured in English and not Russian. Hot lists A hot list compiles the relevant data of past frauds and suspicious or high-risk activity. By storing this information for future review and integrating it into monitoring activities, financial institutions can protect themselves from being fooled twice by the same method. For example, by storing the name or IP address used in an application that resulted in a costly fraud, an institution can immediately flag any additional applications with the same information for additional review before authorizing the account. Hot lists can additionally lead to many false positives, as bad IP addresses may become good IP addresses if a legitimate customer obtains it. Financial institutions must weigh the costs of manually reviewing applicants that hit a hot list due to these false positives. Outside data Reviewing outside data during an application is commonplace for identity verification, authentication or fraud scoring. Credit bureau or public record data can be used (beyond the traditional use of spotting for closed-down or delinquent accounts) to fuel KBA (knowledge-based authentication) out-of-wallet questions to the applicant. 7
8 For example, an applicant could be asked the size or institution that holds their car loan or mortgage. Additionally, outside agencies may be called upon to verify that the applicant s data is internally consistent without actually verifying the information. For example, checking whether the SSN on the application matches the year of birth stated by the applicant. Post-origination monitoring Monitoring accounts for high-risk transactions or session activity is essential to prevent costly fraud losses. While some institutions forego monitoring for applicants with a prior relationship with the institutions or for accounts older than a window period (be that 60 days, 6 months, 2 years or longer), fraudsters can begin to predict these window periods and create sleeper accounts to wait out any window periods before the misuse begins. These exclusion rules that determine what transactions or applications are excluded from monitoring must be under review and adapt for changing fraud patterns. If a fraudster gets stopped using a wire transfer at $10,000, they will lower their attempts to $2,000 to slip through monitoring systems. What makes analytics so important? Analytic solutions allow financial institutions to create more precise, efficient and automated processes for making smarter decisions. Financial institutions have the responsibility of handling millions of transactions and applications each day. The challenge lies in sifting through those millions of transactions and applications to identify the suspect activity and finally determine which suspect activity is fraudulent. Impact of incorporating analytics The key factors in incorporating analytics into your authentication and fraud detection process will be the impact on reducing write-offs due to fraud, reducing manual review while maintaining a smooth process for legitimate activity. For financial institutions, this has a direct impact on the bottom line by reducing costs and an indirect impact by preventing disgruntled customers from blaming the institution for the misuse conducted in the customers names and speeding up the process for suspect-but-legitimate activity. Reduce write-offs due to fraud Preventing write-offs due to fraud has the most direct ability to reduce overhead. Fraud is a constantly moving target and requires systems that continually adapt to new methods of misuse. Incorporating analytics allows institutions to remain one step ahead of the fraudsters. Reduce manual review Manual review of transactions and applicants poses a daunting task for institutions in both time and expense. An analytics solution that screens out obviously fraudulent activity allows analysts to more efficiently process the gray transactions that may be legitimate or may be fraudulent. This automation can reduce the average cost sunk into verifying a transaction and allow transactions and activity to be verified faster. Maintain a smooth process for legitimate transactions and applications While customers generally appreciate the diligence shown by institutions, a flagged transaction that turns out to be legitimate is inefficient. This draws away from the customer experience and causes undo strain in the banking relationship. Remote channel banking activities are under increasing customer pressure to occur in real time, to keep pace with customers who want their bank to move as fast as they do. Employing analytics can get new accounts started on the right foot for these customers. 8
9 Recommendation Financial institutions The data shows that the gains of 2007 reversed course this past year. The incidence of identity fraud increased by 22 percent in 2008, with fraud amounts increasing slightly from $3 billion over the previous year. Difficult economic conditions also appear to have caused a resurgence in the most feared form of identity fraud: new accounts establishment. It is more crucial than ever to minimize the risk that faceless online applicants are fraudsters. Financial institutions are tasked with sifting through millions of transactions and applications each day. Without the proper technology in place, that process is a daunting task that requires excessive work hours to manually review these transactions. Financial institutions should employ fraud systems that can flag suspect transactions and applications, stop the fraudulent ones and allow the legitimate activity to proceed unhindered. The operational efficiencies gained in addition to the mitigation of risk will reduce write-offs due to fraud, reduce manual review of suspect activity and maintain a smooth process for legitimate transactions and applications. Financial institutions will see this direct impact on the bottom line in reduced overhead, more productive analysts and fewer customer complaints. Sources Identity Fraud Survey Report: Identity Fraud on the Rise but Consumer Costs Plummet as Protections Increase. 2 Ibid 3 Ibid 4 Ibid 9
10 For more information: Call or visit lexisnexis.com/risk/financial-services About LexisNexis Risk Solutions LexisNexis Risk Solutions ( is a leader in providing essential information that helps customers across all industries and government predict, assess and manage risk. Combining cutting-edge technology, unique data and advanced scoring analytics, we provide products and services that address evolving client needs in the risk sector while upholding the highest standards of security and privacy. LexisNexis Risk Solutions is part of Reed Elsevier, a leading publisher and information provider that serves customers in more than 100 countries with more than 30,000 employees worldwide. Our financial services solutions assist organizations with preventing financial crime, achieving regulatory compliance, mitigating business risk, improving operational efficiencies and enhancing profitability. LexisNexis and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties Inc., used under license. Other products and services may be trademarks or registered trademarks of their respective companies. Copyright 2011 LexisNexis. All rights reserved. NXR
Stopping the Flow of Health Care Fraud with Technology, Data and Analytics
White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,
WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules
WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative
Now is the time for a fresh approach to detecting fraud
Now is the time for a fresh approach to detecting fraud Learn where today s fraud detection falls short and what you can do about it. Read on. Table of Contents Now is the time for a fresh approach to
A Unique Perspective into the World of Identity Fraud
White Paper A Unique Perspective into the World of Identity Fraud Explore the value of LexisNexis FraudPoint solutions in fraud detection. Risk Solutions Identity Management Executive Summary There are
Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
Knowledge Based Authentication [KBA] is not just for onboarding new customers
White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA] is not just for onboarding new customers December 2013 Risk Solutions Best Practices
Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution
Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively
Identity Theft and Tax Administration
PREPARED STATEMENT OF BETH TUCKER IRS DEPUTY COMMISSIONER FOR OPERATIONS SUPPORT BEFORE SUBCOMMITTEE ON FISCAL RESPONSIBILITY AND ECONOMIC GROWTH SENATE FINANCE COMMITTEE ON IDENTITY THEFT MAY 25, 2011
Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper
Fraudulent accounts in collections: improve detection and reduce collector workload An Experian briefing paper September 2010 1. The inter-relationship of fraud and collections The fraud and collections
White Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions
An Oracle White Paper October 2009 An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions Executive Overview Today s complex financial crime schemes pose
The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age
How to Battle the Leading Identity Fraud Tactic in The Digital Age In the 15 years since synthetic identity fraud emerged as a significant threat, it has become the predominant tactic for fraudsters. The
ACI Response to FFIEC Guidance
ACI Response to FFIEC Guidance Version 1 July 2011 Table of contents Introduction 3 FFIEC Supervisory Expectations 4 ACI Online Banking Fraud Management 8 Online Banking Fraud Detection and Prevention
Questions and Answers About the Identity Theft Red Flag Requirements
Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,
A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud
A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts
Data makes all the difference.
White Paper, Earlier: The Value of Incorporating and makes all the difference. LexisNexis research shows that carriers can reduce severity payments by up to 25 percent. June 2014 Risk Solutions Insurance
Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy
CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions
one admin. one tool. Providing instant access to hundreds of industry leading verification tools.
2 7 12 14 11 15 8 16 10 41 40 42 19 49 45 44 50 48 47 51 46 52 53 55 54 56 57 67 68 1 5 39 43 58 71 81 82 69 70 88 25 29 23 26 22 3 21 28 4 6 32 30 38 33 31 37 34 35 36 63 59 64 60 62 61 65 72 73 66 74
The Facets of Fraud. A layered approach to fraud prevention
The Facets of Fraud A layered approach to fraud prevention Recognizing Fraud The various guises of fraud lead many organizations to believe they are not victims of deception or to vastly underestimate
Best Practices in Account Takeover
WHITEPAPER Best Practices in Account Takeover July 2013 2 Table of Contents Introduction 3 Account Takeover is Painful 4 Differences between Account Takeover and Account Compromise 4 Why Account Compromise
Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions
Leveraging Risk & Compliance for Strategic Advantage IBM Information Management software Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions XXX Astute financial services
Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps. An IDology, Inc. Whitepaper
Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps An IDology, Inc. Whitepaper Delivering a pleasant consumer experience on the phone is a make or break opportunity for creating positive
White Paper. Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper
White Paper Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper Dave Whitin, Consultant Michiko Wolcott, Statistician September 2006 Table of contents Executive summary...................................
RSA Adaptive Authentication For ecommerce
RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers
The Rise in State Income Tax Refund Identity Fraud:
The Rise in State Income Tax Refund Identity Fraud: Overview It s fair to say that many people don t enjoy putting together the paperwork and filing their federal income taxes. The task is doubled for
Bust-out fraud. Knowing what to look for can safeguard the bottom line. An Experian white paper
Knowing what to look for can safeguard the bottom line An Experian white paper Executive summary Bust-out is a growing area of fraud for the financial services industry. For organizations across the globe,
White Paper. Account Opening: The Front Door of Fraud. Effective Enterprise-wide Fraud Mitigation Solutions to Combat New-Account Fraud
White Paper Account Opening: The Front Door of Fraud Effective Enterprise-wide Fraud Mitigation Solutions to Combat New-Account Fraud August 2010 Table of Contents Introduction..........................................1
FFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
CA Arcot RiskFort. Overview. Benefits
PRODUCT SHEET: CA Arcot RiskFort CA Arcot RiskFort CA Arcot RiskFort provides real-time protection against identity theft and online fraud via risk based, adaptive authentication. It evaluates the fraud
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
INTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
WHITE PAPER Fighting Banking Fraud Without Driving Away Customers
WHITE PAPER Fighting Banking Fraud Without Driving Away Customers Effective Methods for Targeting Cybercrime in Financial Services Table of Contents Introduction 1 Stopping Fraud: One Goal Among Many 2
Understanding and Combating Online Fraud in 2014
Understanding and Combating Online Fraud in 2014 Fraud is pervasive online and high-risk merchants must be vigilant in employing a multi-layered, comprehensive approach to security and risk management.
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
Ouachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
How to Prevent It What to Do If You Are a Victim
How to Prevent It What to Do If You Are a Victim www.tn.gov/consumer www.tn.gov/safety Tennessee Division of Consumer Affairs Identity theft happens when someone steals your personal information and uses
WHITE PAPER. Credit Issuers. Stop Application Fraud at the Source With Device Reputation
WHITE PAPER Credit Issuers Stop Application Fraud at the Source With Device Reputation Table of Contents Overview 1 Why you need more than conventional methods of fraud detection 2 It is not just credit
Identity Theft Trends
PERSONAL PRIVACY Identity Theft Trends Privacy TouchPoint Services GIS CONTEMPORARY IDENTITY THEFT TRENDS Powered by Victims of Identity Theft, 2012 Erika Harrell, Ph.D. and Lynn Langton, Ph.D., BJS Statisticians
Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the
Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005
Prepared by Sgt. Gibbs, Thomas B. 82-11
Prepared by Sgt. Gibbs, Thomas B. 82-11 Collaborative partnerships between the law enforcement agency and the individuals and organizations they serve to develop solutions to problems and increase trust
LexisNexis InstantID. Technical White Paper. Analyzing Results. For the following: LexisNexis Bridger Insight XG. Contact LexisNexis Sales:
Technical White Paper LexisNexis InstantID Analyzing Results For the following: LexisNexis Bridger Insight XG Contact LexisNexis Sales: 877-922-5757 C ONTENTS Executive Summary..................................................
Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.
Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints
WHITE PAPER. Internet Gambling Sites. Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
WHITE PAPER Internet Gambling Sites Expose Fraud Rings and Stop Repeat Offenders with Device Reputation Table of Contents Confident Casinos: How to stop fraud before it starts 1 Organized Fraud: A Growing
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
I know what is identity theft but how do I know if mine has been stolen?
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
Identity Theft Victims Universal Complaint Form (FTC)
Average time to complete: 10 minutes A voluntary form for filing a report with law enforcement and disputes with credit reporting agencies and creditors about identity theft-related problems. Visit ftc.gov/idtheft
IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT
CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but
Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty
Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty Conducted by Javelin Strategy & Research June 2010 All Rights Reserved Rising Fraud
Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT
Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection Foreword The consumerization
An effective approach to preventing application fraud. Experian Fraud Analytics
An effective approach to preventing application fraud Experian Fraud Analytics The growing threat of application fraud Fraud attacks are increasing across the world Application fraud is a rapidly growing
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
Sample Report: LexisNexis RiskView Report
Sample Report: LexisNexis RiskView Report LexisNexis RiskView Report delivers insights into key consumer data and behavior attributes to help strengthen lending decisions, expand your addressable market
MoneyGram International
MoneyGram International Detects and prevents money transfer fraud before it impacts customers Smart is... Optimizing decision making processes to mitigate fraud and safeguard business Using a powerful
Five Steps Towards Effective Fraud Management
Five Steps Towards Effective Fraud Management Merchants doing business in a card-not-present environment are exposed to significantly higher fraud risk, costly chargebacks and the challenge of securing
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
Do s & Don ts Reference website. www.farmersidentityshield.com
What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What
Designing an Identity Theft Prevention Program
The Federal Trade Commission has indicated that mortgage brokers are covered by the Red Flags Rule and must design identity theft prevention programs to comply with the law. The FTC has published a How-To
The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and
The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and to enhance existing efforts to educate Hoosiers about
Identity Theft Victim s Complaint and Affidavit
Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors
A Business Case for Fixing Provider Data Issues
White Paper Save money, reduce waste and improve member services. Proactive provider data management Risk Solutions Health Care The health care industry is plagued by low quality provider information,
SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF
PRODUCT BRIEF SAS Fraud Management Real-time scoring of all transactions for fast, accurate fraud detection Overview Organizations around the globe lose approximately 5 percent of annual revenues to fraud,
Best Practices for Managing Bank Transaction Risk Using a Continuous Data Analytics Approach
Best Practices for Managing Bank Transaction Risk Using a Continuous Data Analytics Approach Co-authored by: Focus Technology Group Contents Introduction The Approach Risk Assessment Risk Data Analytics
SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
Red Flag Rules and Aging Services: What You Need to Know
Red Flag Rules and Aging Services: What You Need to Know Late in 2007, six federal agencies, including the Federal Trade Commission ( FTC ), jointly issued final rules and accompanying guidelines to implement
Solve Your Toughest Challenges with Data Mining
IBM Software Business Analytics IBM SPSS Modeler Solve Your Toughest Challenges with Data Mining Use predictive intelligence to make good decisions faster Solve Your Toughest Challenges with Data Mining
How child identity theft happens.
How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver
Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments
Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments Executive Summary Modern Banks increasingly find the need to enable customers to sign up for Banking products without having
Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014)
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Financial Institution Letter FIL-127-2008 November 7, 2008 GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July
Ultimate Beneficial Ownership The Implications of Not Knowing
White Paper Ultimate Beneficial Ownership The Implications of Not Knowing September 2014 Ultimate Beneficial Ownership The Implications of Not Knowing Author: Ana Maria H. de Alba Beneficial ownership
How To File An Identity Theft Complaint And Affidavit
Average time to complete: 10 minutes Identity Theft Victims Complaint and Affidavit A voluntary form for filing a report with law enforcement and disputes with credit reporting agencies and creditors about
Solve your toughest challenges with data mining
IBM Software IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster Solve your toughest challenges with data mining Imagine if you could
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
Acquire with retention in mind.
White Paper A Driver of Long-Term Profitability for Personal Auto Carriers Acquire with retention in mind. Use data and analytics to help identify and attract prospects with the highest potential for long-term
