Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions



Similar documents
Wholesale Broker Red Flag/Identity Theft Prevention Program Certification

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009

University Policy: Identity Theft Prevention Policy

University of Nebraska - Lincoln Identity Theft Prevention Program

Designing an Identity Theft Prevention Program

RESOLUTION TO ADOPT IDENTITY THEFT POLICY

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0

Identity Theft Policy

identity TheFT PREVENTION Programs and Response

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

POLICY: Identity Theft Red Flag Prevention

RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule

CENTENARY COLLEGE POLICIES UNDER THE FAIR & ACCURATE CREDIT TRANSACTION ACT S RED FLAG RULES

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions

IDENTITY THEFT PREVENTION PROGRAM OVERVIEW

Facts About FACTA Red Flag Identity Theft Prevention Program

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

Central Oregon Community College. Identity Theft Prevention Program

DMACC IDENTITY THEFT- RED FLAGS PROCEDURES

ORDINANCE NUMBER 644 AN ORDINANCE ESTABLISHING THE TOWN OF YORKTOWN IDENTITY THEFT PREVENTION PROGRAM

Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model

California State University, Chico. Identity Theft Prevention Red Flags Program

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);

Questions and Answers About the Identity Theft Red Flag Requirements

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE. University of Cincinnati Red Flags Rule Protecting Against Identity Fraud

FACTA Identity Theft Red Flags Program.

POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY

Identity Theft Prevention Program

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy

IDENTITY THEFT DETECTION POLICY

Identity Theft Prevention Program

policy All terms used in this policy that are defined in 16 C.F.R shall have the same meaning provided in that section.

Ouachita Baptist University. Identity Theft Policy and Program

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES

Identity Theft Prevention Policy. Effective Date: January 1, Policy Statement

MCPHS IDENTITY THEFT POLICY

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

COUNCIL POLICY STATEMENT

DSU Identity Theft Prevention Policy No. DSU

Red Flag Rules and Aging Services: What You Need to Know

THE LUTHERAN UNIVERSITY ASSOCIATION, INC. d/b/a Valparaiso University IDENTITY THEFT PREVENTION PROGRAM

Christopher Newport University Policy and Procedures

Identity theft prevention program and red flag compliance policy.

PROVISIONS IDENTITY THEFT RED FLAG FAQS

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

Integrity We are above reproach in everything we do.

City of Lathrop, California - Red Flags and Preventing Identity Theft

University of Arkansas at Monticello Identity Theft Prevention Program

USF System & Preventing Identity Fraud

City of Hercules Hercules Municipal Utility Identity Theft Prevention Program

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor;

PREPARED AS GUIDANCE FOR NAAA MEMBERS DO NOT USE WITHOUT CONSULTING LEGAL COUNSEL.

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

Red Flags Identity Theft Training Program. Fall 2015

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

The Florida A&M University. Identity Theft Prevention Program. Effective May 1, 2009

CHAPTER 99: IDENTITY THEFT PREVENTION PROGRAM

A Guide to Benedictine College and Identity Theft

Policies and Procedures: IDENTITY THEFT PREVENTION

Understanding our requirements and ensuring compliance

Identity Theft Prevention Program

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM

UNIVERSITY OF RICHMOND IDENTITY THEFT PREVENTION PROGRAM

Detecting, Preventing, and Mitigating Identity Theft

Identity Theft Prevention Program

IDENTITY THEFT PREVENTION PROGRAM

MOTLOW STATE COMMUNITY COLLEGE

Northeast Technology Center Board Policy 2110 Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS)

RESOLUTION NO

DHHS POLICIES AND PROCEDURES

IDENTITY THEFT PREVENTION PROGRAM COUNTY OF DUPLIN, NORTH CAROLINA

Red Flag Identity Theft Financial Policy 1.10

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules

COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM

identity Theft Prevention and Identification Requirements For Utility

Detecting, Preventing and Mitigating Identity Theft. Presented by the Bursar s Office

Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended:

University of North Dakota. Identity Theft Prevention Program

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009

IDENTITY THEFT PROCEDURES

IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule

RESOLUTION NO IDENTITY THEFT PREVENTION PROGRAM

Model Identity Theft Policy and Adopting Resolution

Board of Commissioners Policy. Town of Nags Head Identity Theft Protection Program. Adopted October 22, 2008

IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

ST. CLOUD STATE UNIVERSITY IDENTITY THEFT PREVENTION PROGRAM Effective November 1, 2009

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, Effective Date: Last Revised Date: Responsible Office:

Delta Township Compiled Policy Manual

MARSHALL UNIVERSITY BOARD OF GOVERNORS

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

Springfield Technical Community College Identity Theft Prevention Program

CFTC and SEC Jointly Propose Identity Theft Rules

Transcription:

Leveraging Risk & Compliance for Strategic Advantage IBM Information Management software Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions XXX Astute financial services leaders know that they need to leverage Red Flags Compliance investments to not only meet regulatory requirements but to also achieve additional business advantages. g Integrate IBM Entity Analytics Solutions into existing systems to help meet 11 of the 26 Red Flags g Assure you know the people behind the transactions to improve AML compliance Highlights g Detect and prevent in real-time many other forms of fraud (credit card fraud, mortgage loan fraud, insider fraud, etc.) Financial Services organizations are rushing to meet the new Identity Theft Red Flags guidelines jointly issued by the OCC, Board, FDIC, OTS, NCUA and FTC implementing section 114 of the Fair and Accurate Credit Transactions Act of 2003 (FACT Act) and final rules implementing section 315 of the FACT Act. The rules implementing section 114 require each financial institution or creditor to: Develop and implement a written Identity Theft Prevention Program (Program) to detect, prevent, and mitigate identity theft in connection with the opening of certain accounts or certain existing accounts. Requires credit and debit card issuers to assess the validity of notifications of changes of address under certain circumstances.

Additionally, the Agencies are issuing joint rules under section 315 that provide guidance regarding reasonable policies and procedures that a user of consumer reports must employ when a consumer reporting agency sends the user a notice of address discrepancy. Four seemingly unique identities... Given the mandatory compliance date of November 1, 2008, most financial institutions are looking to incorporate these new requirements in the context of their existing Anti-Money Laundering (AML) systems. Assuring Compliance with IBM Entity Analytics Solutions The ID theft Red Flags guidelines are divided into four major categories: Information from Consumer Reporting Agencies Suspicious Documents Suspicious Personal Identifying Information Notice from Customers, Victims of Identity Theft, Law Enforcement Authorities, or Other Persons Across these four major categories, the flags deal with detecting and/or responding to events that may help detect and prevent identity theft. The challenge is how to differentiate between an event that is normal and one that is suspicious or potentially suspicious. Figure 1: How would your system decide if this is a potentially suspicious pattern? However, this is not an easy task for identities to carry out a variety of illegal activities. a variety of reasons. Even the best banking systems are exposed to naturally occurring data degradation Now look at the same scenario in such as data entry errors, or naturally occurring events (people move, show where data has been reused Figure 2. The red boxes and arrows change their names, etc.). Much without any modifications (ex: using more difficult to detect are deliberate the same telephone number with different names and addresses). The deceptions. Consider the example in Figure 1. How would your system grey boxes and arrows show where decide if this is a potentially suspicious pattern? then reused (i.e. adding or dropping data has been modified slightly and a digit in an address or reversing date The IBM Identity Resolution solution has algorithms and intelligence and month of birth). that will flag to your systems and/or Even one identity thief can do a fraud analysts the fact that there significant amount of damage, but are, indeed, suspicious patterns consider how much greater harm above. These capabilities are based can be done by a group of fraudsters on decades of best practices and working together. For example: could insights gained from analyzing the your system identify someone who techniques that are typically used is related in non-obvious ways to a repeatedly by people attempting to known fraud suspect? steal an identity or create fraudulent

... or one customer attempting to use multiple identities? fraud analysts the fact that there are non-obvious relationships between current or potential account holders and people who are known fraudsters. These capabilities are based on decades of best practices and insights gained from analyzing the techniques that groups of criminals typically use to work together to carry out a variety of illegal activities. Figure 2: IBM Identity Resolution detects and flags many techniques typically used to create fraudulent identities. Quickly determine if a client or prospect has relationships with anyone that is considered high risk IBM Entity Analytic Solutions and 11 of the 26 Red Flags Let s examine a summary of 11 selected red flags and consider briefly how the IBM Entity Analytics Solution can help lower identity thefts and achieve compliance automatically and in near real-time: Information from Consumer Reporting Agencies Red Flag 1. A fraud or active duty alert is included with a consumer report. Ensure that you do not have accounts for people related in any way to persons who are named in fraud alerts. Figure 3: IBM Relationship Resolution detects and flags subtle and hidden linkages between individuals that may represent criminal networks. In Figure 3, we can see that the person on whom we have just received a fraud alert, Larry Cho, is related by only three degrees of separation to an existing account holder. This alerts you to the fact that you should beware of continuing to have Joseph Carbella as a client. The IBM Relationship Resolution solution has algorithms and intelligence that will flag to your systems and/or Red Flag 2. A consumer reporting agency provides a notice of credit freeze in response to a request for a consumer report. Examine accounts for people related in any way to persons who are named in credit freeze reports.

Red Flag 3. A consumer reporting agency provides a notice of address discrepancy, as defined in 571.82(b) of this part. Examine current accounts and applications for suspicious patterns relating to address discrepancy information. Suspicious Documents Red Flag 5. Documents provided for identification appear to have been altered or forged. Examine current accounts and applications for suspicious patterns relating to name(s), addresses, phone numbers, etc., used on the suspicious documents to determine if you have other clients you may not want to continue to have as clients. Red Flag 9. An application appears to have been altered or forged, or gives the appearance of having been destroyed and reassembled. Examine current accounts and applications for suspicious patterns relating to name(s), addresses, phone numbers, etc., used on the suspicious application to determine if you have other clients you may not want to continue to have as clients. Suspicious Personal Identifying Information Red Flag 10. Personal identifying information provided is inconsistent when compared against external information sources used by the financial institution or creditor. For example: a. The address does not match any address in the consumer report; or b. The address on an application is fictitious, a mail drop, or a prison; or c. The phone number is invalid, or is associated with a pager or answering service. Examine current accounts and applications for non-obvious relationships where the same inconsistent information (address, phone number, etc.) is being used. Red Flag 12. Personal identifying information provided is associated with known fraudulent activity as indicated by internal or third-party sources used by the financial institution or creditor. For example: a. The address on an application is the same as the address provided on a fraudulent application; or b. The phone number on an application is the same as the number provided on a fraudulent application. Examine applications real-time for obvious and non-obvious re-use of known fraudulent addresses, phone numbers, etc., to flag people who should be denied accounts. Red Flag 14. The SSN provided is the same as that submitted by other persons opening an account or other customers. Automatically receive alert when a Social Security Number on an application matches that of an existing customer or account. Red Flag 15. The address or telephone number provided is the same as or similar to the account number or telephone number submitted by an unusually large number of other persons opening accounts or other customers. Automatically receive alerts when prospects or clients are attempting to use information that is same or similar to that of others (see figure 2 above). Red Flag 17. Personal identifying information provided is not consistent with personal identifying information that is on file with the financial institution or creditor. Automatically receive alerts real-time when inconsistent information is provided. For example,

the same name with two different addresses or two different home telephone numbers. Notice from Customers, Victims of Identity Theft, Law Enforcement Authorities, or Other Persons Red flag 26. The financial institution or creditor is notified by a customer, a victim of identity theft, a law enforcement authority, or any other person that it has opened a fraudulent account for a person engaged in identity theft. Quickly determine if any information used in the fraudulent account (address, phone number, date of birth, SSN, etc.) has been used (either exactly or modified lightly) in found in any other accounts or applications. Leveraging Red Flags Compliance for Additional Business Advantage Astute financial services leaders know that they need to leverage compliance investments to not only meet regulatory requirements but to also achieve additional business advantages. As previously noted, most financial institutions plan to implement Identity Theft Red Flags guidelines within their AML systems. IBM Entity Analytics Solutions can complement existing transactional AML systems and help reduce the possibility of money being laundered through a financial institution. Transaction monitoring systems do just that they monitor transactions within an account. They cannot differentiate between monitoring the accounts of multiple people versus monitoring accounts of a person using multiple identities. IBM Entity Analytics Solutions can complement existing transactional AML systems by automatically flagging in real-time persons trying to create fraudulent identities as well as networks of people related in obvious and non-obvious ways. The fact that this is done in near real-time means that you can detect and prevent money laundering and payments fraud before it happens. For more information Identity Theft Red Flags guidelines must be implemented by November 1, 2008. IBM Entity Analytics Solutions (Identity Resolution and Relationship Resolution) can be integrated into your existing AML systems to help assure compliance with various identity-related red flags and, at the same time, extend and enhance your AML capabilities and reduce payments fraud. IBM has other related assets that can help with other flags, such as unstructured searches, ETL requirements and best practices relating to compliance. For more information about these solutions, please visit www.ibm.com/software/data/ ips/solutions/tfi/banking.html

Copyright IBM Corporation 2008 IBM (United States of America) Entity Analytic Solutions 6600 Bermuda Rd, Suite A Las Vegas, Nevada United States of America, 89119 Printed in the United States of America 3/08 All Rights Reserved. DB2, IBM, the IBM logo, and the On Demand logo are trademarks of International Business Machines Corporation in the United States, other countries or both. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. Printed in the United States of America on recycled paper containing 10% recovered post-consumer fiber.