IDAnalytics Comply360. Improving operational efficiencies and regulatory compliance in the customer onboarding process
|
|
- Brooke Lloyd
- 5 years ago
- Views:
Transcription
1 Improving operational efficiencies and regulatory compliance in the customer onboarding process August, 2012
2 Introduction The regulatory landscape today It is no secret that financial organizations are facing more regulations than ever before. Most of the current regulatory requirements are driven by a general desire for greater confidence, coupled with the fluctuating nature of the global economy. Regardless of the statute, banks and other institutions that handle money and extend credit have an obligation to know with whom they are dealing before opening accounts or providing services. Increased levels of customer and applicant identity confirmation are, in essence, the basis of many current and evolving regulations. Primary regulations One of the most significant regulations in this regard is the U.S. PATRIOT Act, requiring financial institutions to obtain enough identifying information, including Name, Address, DOB and ID Number to form a reasonable belief about the true identity of the applicant or customer. The Treasury s Office of Foreign Assets Control (OFAC), the group that administers and enforces U.S. economic and trade sanctions against specific foreign countries, individuals, entities, governments, vessels and activities also has identity-checking regulations. The goal of OFAC is to ensure that money is not being funneled into terrorist activities or laundered. To facilitate this, OFAC provides a regularly updated list of names of people and firms whose assets may be frozen or who are otherwise barred from normal banking activities. Lenders must confirm that the name of an applicant cannot be found on that list. More recently, the Federal Trade Commission (FTC) has established Red Flags Rules requiring each financial institution and creditor to develop, implement and maintain up-to-date identity theft prevention programs. This means that just about any company that performs a service and extends credit terms to consumers must have written procedures in place to spot suspicious identity anomalies that may arise, and address the steps they ll take to prevent and mitigate identity theft. Every consumer is unique Information about a consumer s unique financial history is no longer limited by traditional credit relationships. Today s consumer shares their identity and transacts with a wide variety of service providers, such as telecom, e-payments, cable/satellite, e-commerce, and alternate lenders. It is not so difficult to research and validate a person who already has a strong traditional credit history that might include a home mortgage, a car loan and a variety of credit cards. These people tend to move less frequently and their credit activities are easy to track through any of the major credit bureaus. But what about a young person who is just embarking on the world of personal finance? Millions of consumers lack a history with traditional credit information sources, but may have solid relationships with other service providers. For example, a younger consumer may be a steady earner who does not own a home or car, but is extremely likely to have a cell phone plan, cable TV or an Internet service plan with several years of history already; access to this type of information can be invaluable in assessing risk. Another group that can be difficult to assess are consumers who don t have any recent traditional credit activities and have simply paid-off their obligations some time ago, such as car and home loans. Obtaining and validating the requisite information about these consumers can be quite challenging and may require drawing from alternate data resource pools. Clearly, institutions need a way to validate the identity of today s unique and diverse consumers, many of whom lack traditional credit histories. 2
3 The Challenge For Financial Institutions Failure to comply with the regulations above, as well as other federal and state statutes, exposes financial institutions to the risk of significant fines and penalties, but achieving and maintaining regulatory compliance takes time and is expensive. In lieu of an official source of truth, most companies rely on third party commercial solutions that gather, sort and provide Personally Identifiable Information (PII) for them. But, these solutions can be expensive, upwards of $.50 per validated applicant is fairly typical. And when the PII of an applicant cannot be automatically validated (for instance, Name and SSN elements match, but Address does not,) the applicant is usually put in a queue for manual remediation. These additional screening processes can escalate remediation costs to more than $5.00 per consumer. The manual review process can also create significant consumer friction ( Why are you making this so complicated?, Why is this taking so long? ) which leads to lost opportunities as consumers give up and take their business elsewhere. Financial institutions clearly face a difficult balancing act since each applicant represents an upfront data expense for automated validation of their identity information, those that do not pass the first time need a more extensive review costing lenders even more in time, data, money and critical resources while the complexity of manual remediation can even drive consumers away. And all this occurs against the backdrop of significant regulatory fines and penalties. What is needed is a cost-effective, competitive solution that provides: The data necessary to comply with USAPA, OFAC, FTC Red Flags and more An efficient means to auto-screen applicants A fast and affordable way to access data from many differing sources A tool to help reduce and simplify costly manual reviews While there are a number of companies that gather and sell or provide some of the necessary data, current solutions are piecemeal, expensive and lack a crossindustry view that highlights the market behaviors of today s diverse consumers. But there is one solution that provides everything the other solutions provide and more, at a lower price and with the added benefit of timeliness of data collection. That solution is Comply360 from ID Analytics. The Solution: Comprehensive, Cost-Effective Compliance Comply360 is an identity risk management solution that makes regulatory compliance more efficient by automatically combing through huge amounts of crossindustry data to help clear and remediate identities. It does this by drawing on the vast storehouse of real-time data accessed by the ID Network, helping to support regulatory compliance mandates for USAPA, OFAC, the FTC Red Flag Rules and others. How it works Comply360 relies on the unique and proprietary ID Network, the only real-time, cross-industry compilation of identity data in the nation. ID Network contains information about credit applications, credit transactions, payments, change of address information and demographic data. Contributors include a wide range of industries including financial services, DDA-accounts, retail, auto finance, telecommunications, e-commerce and mortgage lenders, as well as consumers themselves. Even more valuable, the ID Network has information on how, where and when these identity elements are used, and whether or not they were used legitimately. The ID Network is comprised of 1.7 billion applications and events from over 300 million consumers. It supplies the data that allows Comply360 to deliver an accurate, comprehensive, up-to-the minute perspective on the compliance risk of identities for potential customers. By doing this it ultimately reduces the volume of manual reviews needed to comply with government regulations. And because the ID Network gets information more quickly and organizes it better than typical credit bureaus, no other company can offer a solution this comprehensive. 3
4 Proven performance This unique cross-industry insight combined with ID Analytics award-winning analytical expertise enables Comply360 to clear and remediate identities that other solutions cannot address. This makes Comply360 effective as either a primary clearing tool or as an additional screening tool before placing questionable identities into a manual review queue. When used as a primary solution, Comply360 repeatedly produces autoclear rates that can exceed 90%. When used to screen customers that would typically be sent to manual review by other solutions, clearance rates in excess of 70% have been observed. Comply360 in action Imagine a scenario where a medium-sized lender (50,000 applicants per month) is aiming to increase the number of customers passing automated compliance checks. To reduce costs, the lender must also reduce manual intervention costs. Using an existing solution, the current pass rate is 73%, with a first-pass data cost of $0.53 per record. The average remediation cost for the second-pass review averages $5.25 per case. The lender then employed Comply360 to improve their first-pass clearance rate and their second-pass case remediation rate. Using field-level verification and warning codes provided by Comply360, the lender was able to further define the review population and automated stipulation assignment. The results were a pass rate and case remediation improvement of 22%. That translated to 86% of applicants clearing firstpassed compliance checks with no additional review, reducing direct data costs by over 50%. In this example, the lender saved over $567,000 annually and generated additional savings by automating the stipulation assignment for the remaining review population. Benefits of Comply360 By engaging the power and flexibility of Comply360 to draw upon the comprehensive, data-rich ID Network, lenders reap benefits that other solutions simply cannot offer: Unique insight into differentiated data in new and emerging markets Industry-leading fraud visibility from the largest repository of known frauds Up-to-the-minute updates to ensure data is never outdated Cutting-edge, advanced features driven by decades of analytic expertise Economical, affordable way of meeting extensive compliance requirements Access to the most comprehensive real-time cross-industry database available today What Comply360 provides Comply360 analyzes personally identifiable information (PII) and provides the following: Easy-to-understand grading system: Letter grades are determined by the match strength of the PII to our cross-industry real-time data, risk level, and potential OFAC matches. Every applicant will receive a grade from A F, making it easy to determine level of risk. Identity element verification: Comply360 will identify which PII elements were successfully matched. Element level verification speeds the manual review process by clearly indicating which PII elements need to be verified with the consumer. Specific result codes: Codes that describe specific conditions observed within the identity and provide guidance for remediation activities. Conditions addressed by Comply360 include: - Address matches those on a list of prison addresses, PO box or private mail facilities - Social Security Number has been reported as deceased - PII element(s) are associated with suspected or confirmed fraud - Name possibly matches that on the OFAC list The added advantage of the ID Network Cross industry coverage The comprehensive, differentiated data in the ID Network spans a wide variety of markets, giving Comply360 the power to perform strongly in all sectors 4
5 Performance data The ID Network gathers performance data from all clients and contains nearly three million reported frauds, highlighting negative experiences associated with an identity Up-to-the-minute visibility The ID Network is fueled by real-time updating of event and performance data, providing timely insights that are always based on the latest data in the marketplace Conclusion It is clear that sound business practices require institutions to make the best efforts to know their customers and comply with regulations. In order for financial institutions to avoid stiff fines and penalties and to create a healthy fiscal foundation, compliance is not only necessary, but desirable. At the same time, core data sources have been reduced and consolidated, making the task of compliance more costly and complicated. The time has come for an effective, efficient, comprehensive and affordable solution to keep the wheels of commerce moving. Comply360 effectively clears and remediates identities, including those with limited credit histories, at a lower price point than any verification solution on the market. Unique, cross-industry data addresses regulatory compliance with USAPA, OFAC, FTC Red Flags Rules and more. For more information about Comply360, or to discuss a portfolio analysis for your organization, please contact us today at , send us an inquiry for more information to marketinginfo@idanalytics.com ID Analytics, Inc. All rights reserved. 5
Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy
CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions
More informationCoreLogic Credco First American Way Poway, CA (800)
Red Flag Regulation WHAT IT IS The Red Flag Regulation implements Sections 114 and 315 of the FACT Act. It finalizes three distinct requirements two of which are relevant to automotive, RV and marine dealers,
More informationGet Connected. Use one mortgage network to connect with settlement partners to streamline closing. Closing is critical. Fraud is on the rise
WHITE PAPER Get Connected Use one mortgage network to connect with settlement partners to streamline closing. Closing is critical For lenders, a mortgage closing is a critical business process. Most lenders
More informationAlternative Credit Scores: The Key to Financial Inclusion for Consumers
WHITEPAPER Alternative Credit Scores: The Key to Financial Inclusion for Consumers May 2017 WHITEPAPER Alternative Credit Scores: The Key to Financial Inclusion for Consumers May 2017 Executive summary
More informationUniversity of Connecticut IDENTITY THEFT PREVENTION PROGRAM
University of Connecticut IDENTITY THEFT PREVENTION PROGRAM I. BACKGROUND II. III. IV. PURPOSE AND SCOPE DEFINITIONS IDENTIFICATION & DETECTION OF RED FLAGS V. APPROPRIATELY RESPONDING WHEN RED FLAGS ARE
More informationRed Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper
Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance see} white paper see} white paper Red Flag! Now What? If you are a large bank, credit union or credit card issuer, you are well aware of
More informationWEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program
WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54 Rule on Identity Theft Detection and Prevention Program Section 1. General 1.1 Purpose: The purpose of this policy is to establish an Identity Theft
More informationSecure Opening Plus Requirements for the Identity Theft Red Flag Program
Secure Opening Plus Requirements for the Identity Theft Red Flag Program Secure Opening Plus is a solution that assists financial institutions in obtaining identifying information and opening accounts
More informationIDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008
IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 Introduction: Under the Fair and Accurate Credit Transactions Act (FACT Act), financial institutions (and creditors) that offer or maintain covered accounts
More informationLENDING SHORT TERM AND INSTALMENT LENDING. 10 Reasons why Callcredit will help you make smarter decisions
SHORT TERM AND INSTALMENT LENDING 10 Reasons why Callcredit will help you make smarter decisions CONTENTS WE HELP DELIVER FAST, ACCURATE AND RESPONSIBLE LENDING DECISIONS 2 1. Unrivalled Data Coverage
More informationBank Secrecy Act and OFAC Compliance Board of Directors Training
Bank Secrecy Act and OFAC Compliance Board of Directors Training Introduction Today s presenters: Karen M. Janota Assurance Manager Disclaimer: The contents of this presentation are intended to provide
More informationReduce cost and streamline lending processes through pre-closing automation
Reduce cost and streamline lending processes through pre-closing automation find problems early validate data boost accuracy save money Catching potential compliance violations before you fund a loan saves
More informationData Facts Fraud Prevention Information You Trust
Data Facts Fraud Prevention Table of Contents Simply scroll through this PDF to view ALL products or select the specific product information that you need! ADV 120 AVM BankerVMS Debt Monitoring EMP ID
More informationBetter Experiences, Better Outcomes
Better Experiences, Better Outcomes Finicity is transforming the lending process through borrower-permissioned access to financial account information. Finicity allows you to verify customer assets and
More informationBEYOND. THE CREDIT HEADER FILE How Your Business Can Use Unregulated Data to Boost Revenue, Increase Agility and Reduce Risk WHITEPAPER
WHITEPAPER BEYOND THE CREDIT HEADER FILE How Your Business Can Use Unregulated Data to Boost Revenue, Increase Agility and Reduce Risk BEYOND THE CREDIT HEADER FILE Table of Contents Executive Summary
More informationA Step By Step Guide To Dealership Compliance Team One research and Training /Summit Group
A Step By Step Guide To Dealership Compliance 2008 Team One research and Training /Summit Group As you probably already know, 2008 has brought the automobile dealer a whole new set of compliance issues
More informationIdentity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009
Identity Theft Prevention Program Approved by the Board of Trustees on February 20, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules
More informationServices & Features for Employee Benefit Members
Services & Features for Employee Benefit Members IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific
More informationALTERNATIVE DATA TRENDS GIVE INTELLIGENCE TO LENDERS
ALTERNATIVE DATA TRENDS GIVE INTELLIGENCE TO LENDERS FEBRUARY 2016 The Alternative Credit Bureau National experts agree that a full 20 percent of U.S. households or nearly 50 million consumers -- are underbanked,
More informationQuick Credit Repair Guide
1 Quick Credit Repair Guide Beacon score? You will most likely have heard of this bizarre term at some point during your home buying process and wondered what they meant and how they affect the mortgage
More informationEffective Corporate Budgeting
Effective Corporate Budgeting in 8 Easy Steps This ebook will offer 8 easy and easy and proven steps for improving your corporate budgeting and planning process. You will see that by making a few small
More informationPrevention of Identity Theft in Student Financial Transactions
AP 5800 Reference: Prevention of Identity Theft in Student Financial Transactions 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA)) Date Issued: November 5,
More informationIdentity Theft Prevention Program
Slide 1 Identity Theft Prevention Program Welcome to the Identity Theft Prevention Program annual training course. Your personal identification information can be used by individuals seeking to use your
More informationLexisNexis Developing an Effective Red Flags Rule Program
LexisNexis Developing an Effective Red Flags Rule Program Program Checklist R O I : R E T U R N O N I N F O R M AT I O N S O LU T I O N S Customer Development Authentication & Screening Fraud Prevention
More informationCombining Financial Management and Collections to Increase Revenue and Efficiency
Experience the commitment SOLUTION BRIEF FOR CGI ADVANTAGE ERP CLIENTS Combining Financial Management and Collections to Increase Revenue and Efficiency CGI Advantage ERP clients have a unique opportunity
More informationServices and Features
Services and Features IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific services and features.
More informationSubject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New
Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),
More informationTrans-Fast Remittance LLC. AML Compliance Training for Agents
Trans-Fast Remittance LLC AML Compliance Training for Agents 2016 Trans-Fast expects all of its agents to adhere to the following: terms of agent agreement; establish AML Program as per Section 352 of
More information13.1. Reading a Credit Report EXERCISE. THEME 4 Lesson 13: Applying for Credit NAME: CLASS PERIOD:
13.1 NAME: CLASS PERIOD: Reading a Credit Report Your ability to qualify for a loan depends on a credit report. A credit report is a record of an individual s personal credit history. It is probably a
More informationFinancial Transaction
Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transaction I. The Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention Program
More informationUnderstanding Credit. Lisa Mitchell, Sallie Mae April 6, Champions of Financial Aid ILASFAA Conference
Understanding Credit Lisa Mitchell, Sallie Mae April 6, 2017 Credit Management Agenda Understanding Your Credit Report Summary: Financial Health Tips Credit Management Credit Basics Credit health plays
More informationHow much can increased predictive power impact profits?
How much can increased predictive power impact profits? Expand market share across the consumer continuum, from full-file to no-file, with LexisNexis RiskView. LexisNexis RiskView Solutions Risk Solutions
More informationAutomobile Insurance Market Conduct Assessment Report. Part 1: Statutory Accident Benefits Schedule Part 2: Rating and Underwriting Process
Automobile Insurance Market Conduct Assessment Report Part 1: Statutory Accident Benefits Schedule Part 2: Rating and Underwriting Process Phase 2 2013 Financial Services Commission of Ontario Market Regulation
More informationBetter Compliance Adapting to the shifting landscape of AML compliance
Business Information & Credit Risk Better Compliance Adapting to the shifting landscape of AML compliance The Shifting Landscape The world of compliance is changing. Are you ready? Vision-net is Ireland
More informationFIGHTING FRAUD & CHARGEBACKS 5 STRATEGIES FOR WINNING
FIGHTING FRAUD & CHARGEBACKS 5 STRATEGIES FOR WINNING 2 2016 was a strong year for online sales growth. But fraud and chargebacks more than kept pace. The good news? You can dramatically reduce losses
More informationSCOPE AND APPLICABILITY: This policy is applicable to all University faculty and staff.
SUBJECT: DETECTION OF AND RESPONSE TO IDENTITY THEFT RED FLAGS NUMBER: 412 AUTHORIZING BODY: RESPONSIBLE OFFICE: PRESIDENT S EXECUTIVE COUNCIL FINANCE AND ADMINISTRATION DATE ISSUED: OCTOBER 29, 2008 LAST
More informationUnderstanding Credit
Understanding Credit LAURA STEINBECK DIRECTOR OF BUSINESS DEVELOPMENT, SALLIE MAE 2018 MASFAP CONFERENCE Agenda 2 Credit Management Protect Yourself Understanding Credit Reports Summary: Financial Health
More informationAnti-Money Laundering and Counter Terrorism
1 Anti-Money Laundering and Counter Terrorism 1. INTRODUCTION SimpleFX Ltd. ( The Company ) aims to prevent, detect and not knowingly facilitate money laundering and terrorism financing activities. The
More informationAP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS
Last Reviewed May 24, 2016 AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Reference: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA))
More informationThe Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age
The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age Scoping Out Synthetic ID Fraud In the 18 years since synthetic identity fraud emerged as a significant
More informationAML/CTF and Sanctions Policy
AML/CTF and Sanctions Policy May 2018 Purpose and Objective The purpose of this policy is to set the high-level principles and standards of management of financial crime risks, including money laundering,
More informationAffordable Care Act Management Put ACA compliance on autopilot WORKFORCE SOLUTIONS
Affordable Care Act Management Put ACA compliance on autopilot WORKFORCE SOLUTIONS The Affordable Care Act brings unprecedented changes to workforce management and compliance. In order to properly manage
More informationClarion University Identity Theft Prevention Program
Clarion University Identity Theft Prevention Program A) Purpose The purpose of the Identity Theft Prevention Program (Program) is to detect, prevent and mitigate identity theft in connection with any covered
More informationPREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS
AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS References: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA)) I. The Purpose of the Identity
More informationDriven. FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 L50
Driven NADA Management series L50 A Dealer Guide to THE FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 The National Automobile Dealers Association (NADA) has prepared
More informationACFE and ACAMS South Florida Chapter 2015 AML/Fraud Conference
ACFE and ACAMS South Florida Chapter 2015 AML/Fraud Conference Marc Benson Director, Global Investigations & Compliance Navigant Consulting Inc. Salvatore LaScala Managing Director, Global Investigations
More informationMind the Retail Mortgage Gap. To Close More Loans, First Close the Gap
Mind the Retail Mortgage Gap To Close More Loans, First Close the Gap Mind the Retail Mortgage Gap Table of Contents Executive Summary Shifting Lending Landscape............. 2 An Industry Riddled with
More informationHow Credit Card Chargebacks Really Impact your Bottom Line
How Credit Card Chargebacks Really Impact your Bottom Line Reducing Fraud, Chargebacks, and Lost Profits for Recurring Merchants There are many considerations to take into account when attempting to prevent,
More informationStatement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC. Before the. Subcommittee on Crime, Terrorism and Homeland Security
Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC Before the Subcommittee on Crime, Terrorism and Homeland Security Of the Judiciary Committee HR 1731: The Identity Theft
More informationUniversity of Cincinnati FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
More informationUsing alternative data, millions more consumers qualify for credit and go on to improve their credit standing
NO. 89 90 New FICO research shows how to score millions more creditworthy consumers Using alternative data, millions more consumers qualify for credit and go on to improve their credit standing Widespread
More informationNEW FTC RED FLAG REQUIREMENTS AS APPLICABLE TO CREDITORS AND COVERED ACCOUNTS
NLBMDA STAFF ANALYSIS NEW FTC RED FLAG REQUIREMENTS AS APPLICABLE TO CREDITORS AND COVERED ACCOUNTS SUMMARY The new Red Flag rule, finalized in November 2007, goes into effect on November 1, 2008. The
More informationIdentity Theft Prevention Program Lake Forest College Revision 1.0
Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:
More informationIdentity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009
Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009 Rebekah A. Z. Monson Pepper Hamilton LLP 215.981.4031 monsonr@pepperlaw.com
More informationModule 7 - Credit Reporting HANDOUT 7-1
ParticipantHandbook 1 Module 7 - Credit Reporting HANDOUT 7-1 Credit bureaus Credit bureaus are agencies that collect information about how we use credit. They produce personal credit reports. Credit bureaus
More informationA Losing Bet: Binary Options
A Losing Bet: Binary Options What are Binary Options? Binary options the latest investment scam that s costing victims everything. - CBC, March 2017 Binary Options are a sort of wager where investors bet
More informationKYC Automation: Scale, Speed, Standardize Merchant Underwriting
Know Your Customer (KYC) KYC Automation: Scale, Speed, Standardize Merchant Underwriting Visit www.macmember.org to join in MAC Benefits include: Protect and invest in your organization by receiving fraud
More informationIDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY PC 6.9 Date of Last Update: May 05, 2009 Approved By: President's Cabinet Responsible Office: Business and Finance POLICY STATEMENT Grand Valley State University (GVSU)
More informationGlobalization is real and is just as real for
Closing Panel: Improving Rural Capital Markets Gary Warren Globalization is real and is just as real for the banking industry, if not more so, than most industries. Information technology advancements
More informationEXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud
EXECUTIVE SUMMARY A systematic approach for combating enrollment fraud OCTOBER 2017 Enrollment fraud is a serious and growing problem The proliferation of identity fraud and new ways of enrolling in health
More informationSAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
More informationGREENPATH FINANCIAL WELLNESS SERIES
GREENPATH FINANCIAL WELLNESS SERIES UNDERSTANDING YOUR CREDIT REPORT & SCORE Empowering people to lead financially healthy lives. TABLE OF CONTENTS Understanding credit reports...2 What s in a credit
More information2016 BSA/AML/OFAC Training Series
Session 1: April 21, 2016 at 9:00 a.m. Part I: AML Basics Junior/newly hired legal, compliance, audit, and operations 3 hours The session will address the (i) History of the Bank Secrecy Act; (ii) Regulatory
More informationPalomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS
1 STUDENT SERVICES 2 3 AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 References: Fair
More informationA Credit Smart Start. Michael Trecek Sr. Risk Analyst Commerce Bank - Retail Lending
A Credit Smart Start Michael Trecek Sr. Risk Analyst Commerce Bank - Retail Lending Agenda Credit Score vs. Credit Report Credit Score Components How Credit Scoring Helps You 10 Things that Hurt Your Credit
More informationChurch Mutual Recommends First Advantage
Church Mutual Recommends First Advantage After careful review, Church Mutual selected First Advantage as its preferred background screening vendor. First Advantage offers premier-level, Web-based screening
More informationADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT
ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS The purpose of this Identity Theft Prevention Program (ITPP) is to control
More informationPAI Secure Program Guide
PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS
More informationFocused on card fraud prevention
Focused on card fraud prevention The evolution of credit card fraud As EMV adoption increases, counterfeit cards are harder to create and use 76% decrease in counterfeit fraud at U.S. chip-enabled merchants*
More informationAnti-Money Laundering Awareness Training Insurance Industry-Hong Kong
Anti-Money Laundering Awareness Training Overview This program is intended to give individuals working in the Hong Kong Insurance Industry a basic knowledge of money laundering and terrorism financing,
More informationFrequently Asked Questions Guide
Global Card Access Frequently Asked Questions Guide Table of Contents Section I: General Overview... 2 Section II: Registration... 2 Section III: Alerts... 3 Section IV: Online PIN Check... 5 Section V:
More informationUnderstanding Your FICO Score. Understanding FICO Scores
Understanding Your FICO Score Understanding FICO Scores 2013 Fair Isaac Corporation. All rights reserved. 1 August 2013 Table of Contents Introduction to Credit Scoring 1 What s in Your Credit Reports
More informationRed Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010
Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Princeton University employees are responsible for detecting Red Flags consistent with
More informationImprove business results by first improving your vendor selection
Improve business results by first improving your vendor selection Executive summary Don t let your legacy be your legacy systems. For years, life insurance companies have been unable to leverage many
More informationChapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS
AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS I. Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention Program (ITPP) is to control reasonably
More informationCompliance With the Red Flags Rules
For Audio Participation, Please Call 1.866.281.4322, *1382742* Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321
More informationQUESTIONS FOR PUBLIC COMMENT
QUESTIONS FOR PUBLIC COMMENT 1. Policy Implementation Entities engaged in virtual currency activities might not be engaged in traditional money transmitter activities involving only fiat, government backed
More informationRiverside Community College District Policy No Student Services PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS
Riverside Community College District Policy No. 5900 Student Services BP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Reference: Fair and Accurate Credit Transactions Act, (15 U.S.C.
More informationSTATEMENT OF ANTI-MONEY LAUNDERING (AML) AND COMBATING THE FINANCING OF TERRORISM (CFT) POLICIES AND PRINCIPLES
STATEMENT OF ANTI-MONEY LAUNDERING (AML) AND COMBATING THE FINANCING OF TERRORISM (CFT) POLICIES AND PRINCIPLES Scope AstroBank Limited (the Bank ) has established and implemented appropriate policies
More informationUNDERSTANDING CREDIT. WASFAA Conference Seattle, WA Speakers: Thalassa Naylor, Sallie Mae Anthony Lombardi, Sallie Mae Date: April 10, 2017
UNDERSTANDING CREDIT WASFAA Conference Seattle, WA Speakers: Thalassa Naylor, Sallie Mae Anthony Lombardi, Sallie Mae Date: April 10, 2017 Agenda 2 Credit Management Protect Yourself Understanding Your
More informationBlockchain: A true disruptor for the energy industry Use cases and strategic questions
Blockchain: A true disruptor for the energy industry Use cases and strategic questions Phoenix rising The oilfield services sector transforms again In its ongoing journey to power and move the world, the
More information11/14/ FNBT FACT ACT
1 FNBT FACT ACT This class addresses the Fair Credit Reporting Act which governs the collection and use of information considered in connection with granting credit, providing insurance or offering employment.
More informationMortgage Origination Done Better: Improving Data Quality and Making Compliance Checks More Efficient and Effective With Automation
Presented by Sponsored by Mortgage Origination Done Better: Improving Data Quality and Making Compliance Checks More Efficient and Effective With Automation Digital loan origination processes can still
More informationUnderstanding. What you need to know about the most widely used credit scores
Understanding What you need to know about the most widely used credit scores 300 850 The score lenders use. FICO Scores are the most widely used credit scores according to a recent CEB TowerGroup analyst
More informationProduct User Guide It s Your Credit. Keep It That Way with 5LINX Safe Score.
Product User Guide It s Your Credit. Keep It That Way with 5LINX Safe Score. Features & Benefits Identity Verification Credit Monitoring Score Simulator Full Access to Credit Reports Score Tracker Resource
More informationDAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.
DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box 777 - Lexington, Nebraska - 68850 Tel. No.- 308/324/2386 Fax No.-308/324/2907 CUSTOMER POLICY IDENTITY THEFT PREVENTION I. OBJECTIVE Page
More informationQuick Reference Guide. Employer Health and Safety Planning Tool Kit
Operating a WorkSafeBC Vehicle Quick Reference Guide Employer Health and Safety Planning Tool Kit Effective date: June 08 Table of Contents Employer Health and Safety Planning Tool Kit...5 Introduction...5
More information1120 Connecticut Avenue, NW Washington, DC BANKERS John J. Byrne
1120 Connecticut Avenue, NW Washington, DC 20036 1-800-BANKERS www.aba.com World-Class Solutions, Leadership & Advocacy Since 1875 January 23, 2003 John J. Byrne Senior Counsel and Compliance Manager Government
More information16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.
16 CFR 681.2 681.2 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and creditors that are subject to administrative
More informationNEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 8 Chapter 13,
More informationPROCEDURE. This procedure is intended to identify third party arrangements and red flags involving College activities that will:
Subject Source PROCEDURE Identity Theft Prevention Vice President, Finance and Administrative Services Number: 1.07.02 Reference (Rule #) 6HX14-1.07 President s Approval/Date: 12/21/2017 POLICY: PURPOSE:
More informationHow to Choose a Total Chargeback Management Provider
How to Choose a Total Chargeback Management Provider Chargebacks impact all types of merchants physical goods, recurring, digital goods merchants to the tune of $40 billion every year. This problem continues
More informationINSURANCE. Forensic services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY. kpmg.com/in
INSURANCE Forensic services Helping to protect your business from fraud, misconduct and non-compliance ADVISORY kpmg.com/in The insurance industry has been growing at a fast pace in India. To differentiate
More informationTelematics Usage- Based Insurance
Telematics Usage- Based Insurance Smart solutions for the motor insurance industry m2m.vodafone.com Vodafone Power to you Telematics Usage-Based Insurance Usage-based insurance Consumers want lower premiums
More informationTable of Contents. Money Smart for Small Business Page 2 of 19
Table of Contents Welcome... 4 What Do You Know? Credit Reporting for a Small Business... 5 Pre-Test... 6 Credit Reporting... 7 Credit Report Impact... 7 Business Credit Reports... 7 Discussion Point #1:
More informationThe Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial
DEVELOPING YOUR DEALERSHIP S WRITTEN PROGRAM TO DETECT, PREVENT, AND MITIGATE IDENTITY THEFT AS REQUIRED BY THE THE RED FLAG RULES AND TO RESPOND TO NOTICES OF ADDRESS DISCREPANCIES The Interagency Guidelines
More informationFirst Timer s Guide: Credit Cards. Used the right way, your credit card can be your new financial BFF.
First Timer s Guide: Credit Cards Used the right way, your credit card can be your new financial BFF. Like most things, with great power comes great responsibility. And credit cards are no different. Used
More informationWholesale Originations Best Practices
Wholesale Originations Best Practices Available at: http://www.freddiemac.com/singlefamily/quality_control.html Table of Contents CHAPTER 1 WHOLESALE ORIGINATIONS... WO1-1 INTRODUCTION... WO1-1 GENERAL
More informationblockchain bitcoin cryptography currency Blockchain: The Next Big Digital Disruptor for CFOs cryptocurrency exchange transaction financial market
cryptography business digital virtual currency network transaction internet coin cryptocurrency market blockchain ledger data exchange electronic payments business technology money contract transaction
More informationThe Smartest Employee Benefit Is Identity Theft Management
The Smartest Employee Benefit Is Identity Theft Management HELP PROTECT YOUR EMPLOYEES. Proposal For: Date: Presented By: Provide peace of mind. Raise your benefits to a new level. Every employee has a
More information