Identity Verification & The Need For Speed. Tom Stiles Identification Systems Group

Similar documents
THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

Identity Theft Prevention Program

University of Nebraska - Lincoln Identity Theft Prevention Program

Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009

Texas A&M International University Identity Theft Prevention Program

University of North Dakota. Identity Theft Prevention Program

The Florida A&M University. Identity Theft Prevention Program. Effective May 1, 2009

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

ADRIAN COLLEGE IDENTITY THEFT POLICY

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

University of Arkansas at Monticello Identity Theft Prevention Program

The University of North Carolina at Charlotte Identity Theft Prevention Program

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

MARSHALL UNIVERSITY BOARD OF GOVERNORS

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009

IDENTITY THEFT PREVENTION (Red Flag) POLICY

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

Identity Theft Prevention Policy and Procedure

University of Alaska. Identity Theft Prevention Program

Z1.01 Guideline: Identity Theft Prevention Program

City of Lathrop, California - Red Flags and Preventing Identity Theft

IDENTITY THEFT DETECTION POLICY

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

Central Oregon Community College. Identity Theft Prevention Program

Christopher Newport University Policy and Procedures

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

II. F. Identity Theft Prevention

University System of New Hampshire. Identity Theft Prevention Program

Florida Agricultural & Mechanical University Board of Trustees Policy

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

Oregon University System Identity Theft Prevention Program Effective May 1, 2009

Approved by the Audit Committee of the Board of Trustees, effective February 3, 2009.

Red Flag Rules Information and Training

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009

Ouachita Baptist University. Identity Theft Policy and Program

POLICY TITLE: IDENTITY THEFT PROTECTION POLICY

identity Theft Prevention and Identification Requirements For Utility

IDENTITY THEFT AND MUNICIPAL UTILITIES

Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended:

Identity Theft Prevention Program

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM

Identity theft. A fraud committed or attempted using the identifying information of another person without authority.

To detect identity theft at your institution/organization.

RED FLAGS IDENTITY THEFT PREVENTION PROGRAM. Raleigh Radiology Cedarhurst, Wake Forest and Clayton. May 1, 2009

Springfield Technical Community College Identity Theft Prevention Program

IDENTITY THEFT PREVENTION

Identity theft prevention program and red flag compliance policy.

VAN BUREN COMMUNITY MENTAL HEALTH AUTHORITY POLICIES & PROCEDURES

Facts About FACTA Red Flag Identity Theft Prevention Program

RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM

IDENTITY THEFT PREVENTION PROGRAM

UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule

University Policy: Identity Theft Prevention Policy

PITTSBURGH CARE PARTNERSHIP, INC. COMMUNITY LIFE PROGRAM POLICIES AND PROCEDURES. Identity Theft Prevention Program Policy for Health Care Providers

Number: Index

IDENTITY THEFT PROCEDURES

POLICY: Identity Theft Red Flag Prevention

Identification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy

State Of Florida's Real Estate Law

IDENTITY THEFT PREVENTION PROGRAM

Identity Theft Prevention Program

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

CATAWBA COUNTY IDENTITY THEFT RED FLAGS POLICY

City of Hercules Hercules Municipal Utility Identity Theft Prevention Program

Chatsworth Water Works Commission. Identity Theft Prevention Program. Effective beginning December 1, 2008

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT

Community College System of New Hampshire Identity Theft Prevention Program Revised 5/4/2009

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009

IDENTITY THEFT PREVENTION PROGRAM OVERVIEW

[Institution or GPLS Name] Red Flag Rules - Identity Theft/Fraud Prevention Program. Effective beginning, 2009

Identity Theft Prevention Program

OLYMPIC COLLEGE POLICY

Delta Township Compiled Policy Manual

IDENTITY THEFT PREVENTION PROGRAM

UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM

RESOLUTION TO ADOPT IDENTITY THEFT POLICY

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

Identity Theft Prevention Program. Effective: November 1, 2009

UNIVERSITY OF RICHMOND IDENTITY THEFT PREVENTION PROGRAM

RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009

University of Dayton Red Flag ID Theft Prevention Program

Identity Theft Prevention & Detection Red Flags Rule Compliance Policy Procedures I. Identify red flags.

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE. University of Cincinnati Red Flags Rule Protecting Against Identity Fraud

identity TheFT PREVENTION Programs and Response

2.1 IDENTITY THEFT PREVENTION PROGRAM

DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:

Personal Information. About you. Personal information and your identity.

ORDINANCE IDENTITY THEFT PREVENTION PROGRAM

TITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM

Integrity We are above reproach in everything we do.

POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, Effective Date: Last Revised Date: Responsible Office:

policy All terms used in this policy that are defined in 16 C.F.R shall have the same meaning provided in that section.

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)

Transcription:

Identity Verification & The Need For Speed Tom Stiles Identification Systems Group

Identification Systems Group A network of dealer integrators covering all of the USA and most of Canada. www.identificationsystemsgroup.com NACCU 2016 2

Subject An easy idea that helps you.. Save 10-15 seconds per card issued, or more. Improve detection of fraudulent driver s licenses. NACCU 2016 3

Survey says.. Talked to many universities Number one response is increased speed. Examples: Desire for faster card printers. Movement to on-line photo submission. Most schools ask for driver s license to be presented at time of ID card issuance. Many schools manually enter record if it is not found in the database search. Implemented procedures to comply with FTC Red Flags Rule. NACCU 2016 4

Rapid Registration A solution will save 10-15 seconds per card, simply by automating the recall of a record from the database. If you manually enter the complete record when it is not in the database, the solution saves about one minute in these cases. Casinos, hotels, stores, many more NACCU 5 2016 5

Discussion I read that only about 75% of millennials have a driver s license. Is this what you are seeing? Do those without driver s license carry a state issued ID instead? How do your verify identity? NACCU 2016 6

Search NACCU 2016 7

Enroll NACCU 2016 8

Demonstration NACCU 2016 9

Benefits 1. Application independent means there is no integration needed with your database. You use your current software applications and screens. The system simply emulates human keystrokes by reading the electronic information from the ID card. 2. Fast and accurate recall of the correct person s record. 3. Automatically enter the person s information when adding a new record. Any information available on the driver license or government issued ID cards can be automatically populated to your enrollment screen. 4. Reduction of duplicate records caused by errors, typos, and common names (John Smith, Jonathan Smith, Johnny Smith, J. Smith). The technology allows for multiple search fields to be entered, such as Name, Date of Birth, City, State, and so on. 5. Greater privacy in the enrollment process by reducing verbal exchange of information. 6. Enhance customer satisfaction. 7. Reduce fraud by detecting use of fraudulent ID cards. NACCU 2016 10

Any screen NACCU 2016 11

Easy to configure Customizable messages like: Happy Birthday This license has expired Under age NACCU 2016 12

FTC Red Flags Rule VI. Red Flag Detection To detect the Red Flags identified above, the following actions will be taken, when appropriate given the particular covered account at issue and under the particular circumstances, to confirm the identity of students and individuals when they open and/or access their covered accounts: 1. Appropriate personal identifying information (e.g., photo identification, date of birth, academic status, user name and password, address, etc.) shall be obtained from the student or individual account holder, prior to issuing a new or replacement ID card, opening a covered account, or allowing access to a covered account. 2. When certain changes to a covered account are made online, students and individuals holding covered accounts shall receive notification to confirm the change was valid and to provide instruction in the event the change is invalid. 3. Suspicious changes made to covered accounts that relate to an account holders identity, administration of the account, and billing and payment information shall be verified. NACCU 13 2016 13

Red Flags program The Red Flags Rule tells you how to develop, implement, and administer an identity theft prevention program. A program must include reasonable policies and procedures to identify the red flags of identity theft that may occur in your day-to-day operations. Red Flags are suspicious patterns or practices, or specific activities that indicate the possibility of identity theft. For example, if a customer has to provide some form of identification to open an account with your company, an ID that doesn t look genuine is a red flag for your business. A program must be designed to detect the red flags you ve identified. If you have identified fake IDs as a red flag, for example, you must have procedures to detect possible fake, forged, or altered identification. NACCU 2016 14

Information on Driver s License Information contained in barcode or magnetic stripe is same as shown on front of the license. NACCU 2016 15

South Carolina example NACCU 2016 16

Cards Accepted State driver s licenses and ID cards Federal government ID cards Your student ID cards Financial credit/debit cards NACCU 2016 17

Image of license? Do you capture an image of the driver s license? How? Would it be good to save image of license electronically? NACCU 2016 18

ID Card Authenticator The E-Seek Model M500 Forensic Reader extracts hidden security features of a drivers' license, Military ID or any identity card for authentication purposes in addition to reading and decoding the electronic information contained in the barcode or magnetic stripe. Both sides of the submitted card are also captured with the high resolution imager during this single card insertion. The captured data can be analyzed on the host computer via the TWAIN connection. NACCU 2016 19

Thank you! Tom Stiles Identification Systems Group 816-582-1596 Tstiles@IdentificationSystemsGroup.com NACCU 2016 20