Synthetic Identities. Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved.

Size: px
Start display at page:

Download "Synthetic Identities. Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved."

Transcription

1 Synthetic Identities Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved.

2 Synthetic Identities A combination of fictitious and potentially stolen personally identifiable information (PII) leveraged to compose a false and fabricated identity. True Name Manipulated Synthetic Stolen Real Fabricated Name Social Security Number Date of Birth Address Phone Number Address Name Social Security Number Date of Birth Address Phone Number Address

3 Credit write-offs are skyrocketing in financial services, but economic pressures are not the cause. Security and risk management leaders must apply fraud prevention and secure payment technologies and strategies to new account use cases in digital channels. Gartner, Inc. 1 Synthetic identity fraud losses in the U.S. credit card market are estimated to reach over $1.2 billion in Aite Group 2 1 Gartner, Inc. (March 2018) The Growing Problem of Synthetic Identity and First-Party Fraud Masquerades as Credit Losses 2 Aite Group (2018) Synthetic Identity Fraud: The Elephant in the Room 2018 Fair Isaac Corporation. All rights reserved. 3

4 Growth Drivers Behind Synthetic Identities Social security number (SSN) randomization Although SSNs are now randomly distributed in order to reduce identity fraud, lenders find it more challenging to authenticate SSNs. Migration to EMV cards EMV cards have forced fraudsters away from transactional fraud and have instead moved towards identity-based fraud. Lack of personal identification controls Lenders are unable to automatically validate certain identity systems.

5 No victim to report a crime Most victims of identity-based fraud are unaware that a portion of their personal information has been used for fraudulent activity, making it difficult for victims to report their stolen personal information. Increased use of digital channels, particularly online and mobile Fraudsters create identities that appear to be real identities by establishing social media accounts and activating mobile devices, making it difficult to differentiate a real identity from a fabricated one. Surge of data breaches Identity-based fraud continues to increase as more personally identifiable information becomes available through cyber breaches Fair Isaac Corporation. All rights reserved. 5

6 How Are Synthetic Identities Used? Bust-Out Fraud A fraudster opens a credit account and acts as a trusted customer for a period of time. After building credit and maintaining normal customer patterns, the fraudster maxes out the credit line before abruptly vanishing from the account. Data Furnishing A fraudster creates a false company to artificially verify fake data elements. Piggybacking Fraudsters attach themselves as authorized users (AU) on accounts with a good standing. The authorized users can be added willingly or covertly.

7 How they are used Bust-Out Fraud Data Furnishing Piggybacking Anonymously obtain funds and merchandise Sell merchandise on the dark web 1 Make false transactions for a fake or legitimate business Money laundering / funding of terrorist activity 1 The Part of the World Wide Web that is only accessible by means of special software, allowing user and website operators to remain anonymous or untraceable 2018 Fair Isaac Corporation. All rights reserved. 7

8 Bust-Out Fraud The fraudster opens a credit account with a mixture of stolen and fabricated personal data. The fraudster maintains consistent spending patterns and fulfills payments for a period of time, which eventually leads to a higher credit limit. Suddenly, the fraudster makes large purchases in a short period of time before abruptly abandoning the account.

9 Fraudster Bank Bureau No History Frank Johnson 123 Main St. Synthetic Identity Created Frank Johnson Multiple Lenders Fraudster Bureau Frank Johnson History Builds credit line Frank Johnson 2018 Fair Isaac Corporation. All rights reserved. 9

10

11 Fraudster Data Furnishing The fraudster creates a fabricated company. After the falsified company is established, the fraudster creates fabricated employee identities. The fabricated employee information is fed to the credit bureaus to build lines of credit. Creates a falsified company Fabricated company Furnishes falsified data Bureau Fabricated identity established with a good line of credit Frank Johnson 2018 Fair Isaac Corporation. All rights reserved. 11

12 Fraudster Piggybacking Organized Fraud ring uses its own business account to add fictitious employees. The fabricated employee information is sent to credit bureaus to build lines of credit. Fictitious identities are eventually removed from the initial account in order for the fraudsters to build their own lines of credit. Add fabricated AUs to legitimate account Fake ID #1 Fake ID #2 Fake ID #3 Bureau Fabricated identity established with a good line of credit Fake 1 Fake 2 Fake 3

13 Fraudster Piggybacking Surrogate Fraudster adds a fabricated identity as an authorized user to an account with good credit, called a surrogate account. A surrogate account may be a willing participant (established via credit repair agency). The fabricated identity is sent to the credit bureau to build a good line of credit. The fraudster eventually removes the fictitious identities from the surrogate accounts and uses the lines of credit to build other accounts. Leverage credit repair agencies to authorize fabricated AUs to business and individual accounts with good credit Fake ID #1 Fake ID #2 Fake ID #3 Bureau Fabricated identity established with a good line of credit Fake 1 Fake 2 Fake Fair Isaac Corporation. All rights reserved. 13

14 Combating Synthetic Identities Combine and analyze the data from multiple sources consisting of bureaus, public records, consortia-based databases and digital identity in order to detect potential synthetic identities. Examine where and how the new identity was created within the credit file. Find the root of the synthetic identity by leveraging link analysis to discover inconsistencies indicative of compilation and manipulation. Filter out synthetic identities at the point of origination to prevent them from being written off as credit losses or bad debt. Leverage advanced analytics as risk engines to deploy machine learning models at scale. For more information about synthetic identities contact us at info@fico.com or visit

15 2018 Fair Isaac Corporation. All rights reserved. 15

16 For more information North America Latin America & Caribbean Europe, Middle East & Africa Asia Pacific (0) FICO is a registered trademark of Fair Isaac Corporation in the United States and in other countries. Other product and company names herein may be trademarks of their respective owners Fair Isaac Corporation. All rights reserved. 4596BR 08/18

The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age Scoping Out Synthetic ID Fraud In the 18 years since synthetic identity fraud emerged as a significant

More information

FICO s analysis indicates:

FICO s analysis indicates: FICO s analysis indicates: No observed material impact to the FICO Score due to expected NCAP changes. Minimal impact to risk prediction, odds-to-score relationship, and score distributions. No impact

More information

Kasasa Protect. FAQ and Product Overview

Kasasa Protect. FAQ and Product Overview Kasasa Protect FAQ and Product Overview Kasasa Protect... 3 Key Contact Info... 3 Included Benefits... 3 Credit Reporting... 4 Monthly Credit Score & Plotter... 4 24/7 Credit Monitoring... 5 Full-Service

More information

The Science of Call Success

The Science of Call Success The Science of Call Success Speech analytics for collection performance and compliance 2014 Fair Isaac Corporation. All rights reserved. 1 In Collections: People are your strength... You depend on your

More information

WHITE PAPER Fraud methods for identifying synthetic identities in credit applications and portfolios

WHITE PAPER Fraud methods for identifying synthetic identities in credit applications and portfolios WHITE PAPER Fraud methods for identifying synthetic identities in credit applications and portfolios Identifying trends and solutions to confirm proof of life based on alternative data. AUGUST 2017 Table

More information

For competitive advantage, refresh more frequently. FICO s analysis indicates:

For competitive advantage, refresh more frequently. FICO s analysis indicates: FICO s analysis indicates: A notable percentage of scores migrated up or down more than 20 points over just one month. Scores in the lower range are more likely to fluctuate. Higher scores tend to remain

More information

PREVENTING ACQUISITION FRAUD EXPERT PANEL

PREVENTING ACQUISITION FRAUD EXPERT PANEL PREVENTING ACQUISITION FRAUD EXPERT PANEL JUNE 1, 2018 Company Overview Public company, on NASDAQ: MITK HQ in San Diego with offices in Amsterdam, London, and Barcelona Leader in financial services, Mobile

More information

Key findings. FICO s analysis indicates: A notable percentage of scores migrated up or down more than 20 points over just one month.

Key findings. FICO s analysis indicates: A notable percentage of scores migrated up or down more than 20 points over just one month. FICO s analysis indicates: A notable percentage of scores migrated up or down more than 20 points over just one month. Scores in the lower range are more likely to fluctuate. Higher scores tend to remain

More information

See how these companies overcame their auto lending challenges and were able to:

See how these companies overcame their auto lending challenges and were able to: See how these companies overcame their auto lending challenges and were able to: Increase profit by providing prospects with the sophisticated online experiences they expect and communicating through the

More information

Busting Fraud Rings with. Social Link Analysis

Busting Fraud Rings with. Social Link Analysis Busting Fraud Rings with Social Link Analysis Table of Contents INTRODUCTION... 1 WHAT IS BUST-OUT FRAUD AND WHY IS IT SO HARD TO DETECT?... 2 SOCIAL LINK ANALYSIS (SLA): A POWERFUL NEW WEAPON... 3 HOW

More information

Dig Deep into the Root Causes of Fraud to Prevent Future Attacks

Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Presented by: Ann Davidson, VP of Risk Consulting at Allied Solutions & Tammy Behnke, Credit Union Program Director at ProSight Specialty

More information

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions

More information

Defending against digital fraud. Jon Karl Co-Founder and Executive Vice President Iovation, a TransUnion Company

Defending against digital fraud. Jon Karl Co-Founder and Executive Vice President Iovation, a TransUnion Company Defending against digital fraud Jon Karl Co-Founder and Executive Vice President Iovation, a TransUnion Company 3 PERSONAL Identities HAVE UNITED WITH DIGITAL Identities 4 Unifying personal and digital

More information

State of Card Fraud: 2018

State of Card Fraud: 2018 State of Card Fraud: 2018 A deep dive into the evolution of card fraud + industry benchmark data for financial institutions. Stopping Fraud at the Speed of Data Continuing the trend of prior years, the

More information

Basil Doyle, Sr. Manager Corporate Investigations Department. Synthetic Credit Identities

Basil Doyle, Sr. Manager Corporate Investigations Department. Synthetic Credit Identities Basil Doyle, Sr. Manager Corporate Investigations Department Synthetic Credit Identities May 26, 2016 Are Your UBO s Synthetic? The Problem 4 2015 TransUnion LLC All Rights Reserved The Federal Trade Commission

More information

FOUNDATION SERIES ON DEMAND. Fraud Red Flags Workbook

FOUNDATION SERIES ON DEMAND. Fraud Red Flags Workbook FOUNDATION SERIES ON DEMAND Workbook INTRODUCTION TO FRAUD RED FLAGS Red flags can be found in any document at any point during the review of a loan file. It is our job to recognize these irregularities

More information

Synthetic Identity Fraud. Kathy Druckenmiller, CFCI, CCCI, CIRM, ACT Specialist May 2017

Synthetic Identity Fraud. Kathy Druckenmiller, CFCI, CCCI, CIRM, ACT Specialist May 2017 Synthetic Identity Fraud Kathy Druckenmiller, CFCI, CCCI, CIRM, ACT Specialist May 2017 Synthetic Identity/Ghosting Identity Theft vs Identity Fraud Identity Theft Legitimate Identity is stolen Identity

More information

EXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud

EXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud EXECUTIVE SUMMARY A systematic approach for combating enrollment fraud OCTOBER 2017 Enrollment fraud is a serious and growing problem The proliferation of identity fraud and new ways of enrolling in health

More information

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),

More information

Banking Title Application Fraud: The Enemy at the Gates

Banking Title Application Fraud: The Enemy at the Gates WHITE PAPER Banking Title Application Fraud: The Enemy at the Gates It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C. ii Contents Overview... 1 What Is Application

More information

Tax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Shannon Vernieuw

Tax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Shannon Vernieuw Tax Refund Fraud and Identity Theft IRS Criminal Investigation Special Agent Shannon Vernieuw Internal Revenue Service Criminal Investigation Criminal Investigation serves the American public by investigating

More information

27 th Year of Publication. A monthly publication from South Indian Bank. To kindle interest in economic affairs... To empower the student community...

27 th Year of Publication. A monthly publication from South Indian Bank. To kindle interest in economic affairs... To empower the student community... Experience Next Generation Banking A monthly publication from South Indian Bank To kindle interest in economic affairs... To empower the student community... www.southindianbank.com Student s corner ho2099@sib.co.in

More information

University of Connecticut IDENTITY THEFT PREVENTION PROGRAM

University of Connecticut IDENTITY THEFT PREVENTION PROGRAM University of Connecticut IDENTITY THEFT PREVENTION PROGRAM I. BACKGROUND II. III. IV. PURPOSE AND SCOPE DEFINITIONS IDENTIFICATION & DETECTION OF RED FLAGS V. APPROPRIATELY RESPONDING WHEN RED FLAGS ARE

More information

Using alternative data, millions more consumers qualify for credit and go on to improve their credit standing

Using alternative data, millions more consumers qualify for credit and go on to improve their credit standing NO. 89 90 New FICO research shows how to score millions more creditworthy consumers Using alternative data, millions more consumers qualify for credit and go on to improve their credit standing Widespread

More information

Tax-Related Identity Theft

Tax-Related Identity Theft Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman

More information

Jason B. Freeman, J.D., CPA

Jason B. Freeman, J.D., CPA Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman

More information

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM TITLE II ADMINISTRATIVE REGULATIONS CHAPTER 30 IDENTITY THEFT PREVENTION PROGRAM 30.01 Program The Town of Flower Mound, Texas, as a utility provider ( Utility ), has developed an Identity Theft Prevention

More information

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 8 Chapter 13,

More information

CoreLogic Credco First American Way Poway, CA (800)

CoreLogic Credco First American Way Poway, CA (800) Red Flag Regulation WHAT IT IS The Red Flag Regulation implements Sections 114 and 315 of the FACT Act. It finalizes three distinct requirements two of which are relevant to automotive, RV and marine dealers,

More information

Middlebury Institute of International Studies Identity Theft Prevention Program

Middlebury Institute of International Studies Identity Theft Prevention Program Middlebury Institute of International Studies Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury Institute of International Studies, hereafter referred to as the Institute, has developed

More information

SureRent 2020 Private Landlord Tenant Screening Application Package

SureRent 2020 Private Landlord Tenant Screening Application Package Page 1 of 9 SureRent 2020 Private Landlord Tenant Screening Application Package Welcome to Alliance 2020. Your membership packet includes several forms that you must complete before service can be started,

More information

Contents. Introduction...3. Current & Future Usage of Financing Channels...4. The Start: Beginning the Financing Journey...7

Contents. Introduction...3. Current & Future Usage of Financing Channels...4. The Start: Beginning the Financing Journey...7 USA Edition Contents Introduction...3 Current & Future Usage of Financing Channels...4 The Start: Beginning the Financing Journey...7 The Middle: Navigating the Deal...13 The End: Reflecting On the Financing

More information

WHITE PAPER. The Evolution of Fraud in the Insurance Industry

WHITE PAPER. The Evolution of Fraud in the Insurance Industry WHITE PAPER The Evolution of Fraud in the Insurance Industry Introduction The insurance industry is certainly no stranger to online fraud, whether it s being directed at insurers or the consumers they

More information

CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA

CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. CREDIT CARD FRAUD SCHEMES Introduction Consumers make purchases using credit every day. Credit card companies

More information

Guide to Credit Scoring, Credit Reference and Fraud Prevention Agencies

Guide to Credit Scoring, Credit Reference and Fraud Prevention Agencies Guide to Credit Scoring, Credit Reference and Fraud Prevention Agencies 2 Credit scoring what is it? Assessing applications for credit As a responsible lender, we take into account your personal and/or

More information

UI ID Theft in Texas UI Director s Conference. Paul Carmona Director, Regulatory Integrity Division

UI ID Theft in Texas UI Director s Conference. Paul Carmona Director, Regulatory Integrity Division UI ID Theft in Texas 2014 UI Director s Conference Paul Carmona Director, Regulatory Integrity Division Overview Desired End State What We Know What We re Experiencing What We re Doing About It Near-Term

More information

LOAN. Guide to credit scoring

LOAN. Guide to credit scoring PERSONAL LOAN Guide to credit scoring GUIDE TO CREDIT SCORING, CREDIT REFERENCE AND FRAUD PREVENTION AGENCIES Scoring credit what is it? Assessing applications for credit As a responsible lender, we take

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Identity Theft Prevention Program In December 2008 the VSC Board of Trustees recognized that some activities of the VSC are subject to the provisions of the Fair and Accurate Credit Transactions Act (FACT

More information

Middlebury College Identity Theft Prevention Program

Middlebury College Identity Theft Prevention Program Middlebury College Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury College has developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's Red

More information

Identity Theft: Shifting Focus from Criminals and Consumers to Businesses

Identity Theft: Shifting Focus from Criminals and Consumers to Businesses Identity Theft: Shifting Focus from Criminals and Consumers to Businesses Chris Jay Hoofnagle Director, Information Privacy Programs For The John Jay College of Criminal Justice October 20, 2009 1 Thesis:

More information

POLICY: Identity Theft Red Flag Prevention

POLICY: Identity Theft Red Flag Prevention POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information

More information

MIS 520 Data Analytics for IT Auditors

MIS 520 Data Analytics for IT Auditors MIS 520 Data Analytics for IT Auditors Week 1: Introduction to Fraud Ed Ferrara, MSIA, CISSP eferrara@temple.edu The Many Faces of Fraud Fraud Theft (Misappropriation) Deceptive Statements Corruption Fraud

More information

Prevention of Identity Theft in Student Financial Transactions

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Prevention of Identity Theft in Student Financial Transactions 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA)) Date Issued: November 5,

More information

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Princeton University employees are responsible for detecting Red Flags consistent with

More information

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM

Washington Association of Sewer and Water Districts (WASWD) IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Note: This sample identity theft prevention program is for informational purposes only. It may not be suitable for your district depending on its size, complexity and

More information

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS I. Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention Program (ITPP) is to control reasonably

More information

Identity Theft Prevention Program (DRAFT)

Identity Theft Prevention Program (DRAFT) Identity Theft Prevention Program (DRAFT) Subject: Revised: Effective date: Review date: Responsible Party: Financial Affairs N/A TBD Annually TBD MSU-Bozeman Vice President for Administration & Finance

More information

LexisNexis Developing an Effective Red Flags Rule Program

LexisNexis Developing an Effective Red Flags Rule Program LexisNexis Developing an Effective Red Flags Rule Program Program Checklist R O I : R E T U R N O N I N F O R M AT I O N S O LU T I O N S Customer Development Authentication & Screening Fraud Prevention

More information

2/10/2015 CREDIT FOR SUCCESS TODAY S NEW RISK FACTORS MOBILE BANKING. The new Consumer Financial Protection Act, the ATR Rule (Ability to Repay Rule)

2/10/2015 CREDIT FOR SUCCESS TODAY S NEW RISK FACTORS MOBILE BANKING. The new Consumer Financial Protection Act, the ATR Rule (Ability to Repay Rule) CREDIT FOR SUCCESS TODAY S NEW RISK FACTORS Written and Presented by Serge Bevil, Credit Specialist VantagePoint Credit Corp. MOBILE BANKING We have become a social media society that wants information,

More information

Year-end 2016 fraud update: Payment cards, remote banking and cheque

Year-end 2016 fraud update: Payment cards, remote banking and cheque Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments

More information

Insuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a

More information

ORGANIZATIONAL MANUAL

ORGANIZATIONAL MANUAL I. PURPOSE ORGANIZATIONAL MANUAL IDENTITY THEFT PROTECTION A. To establish an Identity Theft Prevention Program designed to detect, prevent and mitigate Identity Theft in connection with the opening of

More information

B. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.

B. The College is considered a creditor under the Red Flags Rule because it defers payment for services rendered. COLLEGE of CENTRAL FLORIDA ADMINISTRATIVE PROCEDURE Title: Identity Theft Prevention Program Procedure Page 1 of 5 Implementing Procedure For Policy # # 2.04 Date Approved: 07/07/11 Division: Administration

More information

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704 RE: Identity Theft Claim You recently notified Fay Servicing, LLC that you are the victim of identity theft with respect to the above referenced loan (also referred to in this notice as the debt or account

More information

What is Credit Monitoring?

What is Credit Monitoring? 5LINX SafeScore Overview Fraud Facts What is Credit Monitoring How is Credit Monitoring different from Identity Monitoring Why choose Credit Monitoring Credit Monitoring package details Compensation How

More information

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No. DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box 777 - Lexington, Nebraska - 68850 Tel. No.- 308/324/2386 Fax No.-308/324/2907 CUSTOMER POLICY IDENTITY THEFT PREVENTION I. OBJECTIVE Page

More information

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS The purpose of this Identity Theft Prevention Program (ITPP) is to control

More information

Identity Theft Information for Tax Professionals. August 2017

Identity Theft Information for Tax Professionals. August 2017 Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!

More information

MONROE COUNTY SHERIFF S OFFICE. General Order

MONROE COUNTY SHERIFF S OFFICE. General Order MONROE COUNTY SHERIFF S OFFICE General Order CHAPTER: 34 - D EFFECTIVE DATE: August 19, 2009 REFERENCE: CALEA 42.2.8 NO. PAGES: 8 TITLE: Identification Theft Investigation Procedures AMENDED: RESCINDS:

More information

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE Purpose This document explains the benefits of using Risk Based Authentication (RBA) a dynamic method of cardholder authentication

More information

Financial Transaction

Financial Transaction Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transaction I. The Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention Program

More information

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan May 28, 2010 1.0 INTRODUCTION... 3 2.0 PURPOSE... 3 3.0 DEFINITIONS... 4 4.0 THE PROGRAM... 4 4.1. Program

More information

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions Barry Altland Director, Partner Engagement Who/What is FPP? A Thank You to

More information

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54 Rule on Identity Theft Detection and Prevention Program Section 1. General 1.1 Purpose: The purpose of this policy is to establish an Identity Theft

More information

Identity Theft Prevention. Red Flags. Training Program

Identity Theft Prevention. Red Flags. Training Program Identity Theft Prevention Red Flags Training Program 1 Red Flags Training Program Adoption Amendment passed in 2003 to the Fair Credit Reporting Act called The Fair and Accurate Credit Transactions Act

More information

IRS Criminal Investigation

IRS Criminal Investigation IRS Criminal Investigation Kurt Bertram Special Agent Public Information Officer November 5, 2015 IRS Criminal Investigation Mission Criminal Investigation serves the American public by investigating potential

More information

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Last Reviewed May 24, 2016 AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Reference: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA))

More information

White Paper. Banking Application Fraud: The Enemy at the Gates. It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C.

White Paper. Banking Application Fraud: The Enemy at the Gates. It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C. White Paper Banking Application Fraud: The Enemy at the Gates It is a fraud to borrow what we are unable to pay. Publilius Syrus, first century B.C. Contents Overview... 1 What Is Application Fraud?...

More information

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS References: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA)) I. The Purpose of the Identity

More information

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS BP 5800 Allan Hancock Joint Community College District Board Policy Chapter 5 Student Services BP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS The District is required to provide

More information

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010 I. Introduction THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART RED FLAGS IDENTITY THEFT PREVENTION PROGRAM A. Purpose February 24, 2010 The Cooper Union for the Advancement of Science and Art

More information

University Identity Theft and Detection Program

University Identity Theft and Detection Program NUMBER: FINA 4.12 (formerly BUSF 4.12) SECTION: SUBJECT: Administration and Finance University Identity Theft and Detection Program DATE: March 3, 2011 REVISED: March 8, 2016 Policy for: All Campuses and

More information

Minnesota State Colleges and Universities Identity Theft Prevention Program

Minnesota State Colleges and Universities Identity Theft Prevention Program Effective 3-18-09 Identity Theft Prevention Program 1 This is the Minnesota State Colleges and Universities Identity Theft Prevention Program, including more detailed guidelines. The initial Program was

More information

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial DEVELOPING YOUR DEALERSHIP S WRITTEN PROGRAM TO DETECT, PREVENT, AND MITIGATE IDENTITY THEFT AS REQUIRED BY THE THE RED FLAG RULES AND TO RESPOND TO NOTICES OF ADDRESS DISCREPANCIES The Interagency Guidelines

More information

January to June 2016 fraud update: Payment cards, remote banking and cheque

January to June 2016 fraud update: Payment cards, remote banking and cheque January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.

More information

Medical Identity Theft Prevention Policy

Medical Identity Theft Prevention Policy SUBJECT: NUMBER: EFFECTIVE DATE: SUPERSEDES SPP: APPROVED BY: DISTRIBUTION: Medical Identity Theft Prevention Policy (signature) DATED: I. STATEMENT OF PURPOSE: To define medical identity theft and outline

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

How Are Credit Line Decreases Impacting Consumer Credit Risk?

How Are Credit Line Decreases Impacting Consumer Credit Risk? How Are Credit Line Decreases Impacting Consumer Credit Risk? As lenders reduce or close credit lines to mitigate exposure, new research explores its impact on FICO scores Number 22 August 2009 With recent

More information

Clarion University Identity Theft Prevention Program

Clarion University Identity Theft Prevention Program Clarion University Identity Theft Prevention Program A) Purpose The purpose of the Identity Theft Prevention Program (Program) is to detect, prevent and mitigate identity theft in connection with any covered

More information

ABA Deposit Account Fraud Survey

ABA Deposit Account Fraud Survey ABA Deposit Account Fraud Survey Presented by: Doug Johnson, SVP & Chief Advisor Payments and Cybersecurity Policy, American Bankers Association aba.com 1-800-BANKERS 1 2015 ABA Survey Methodology The

More information

IBM Financial Crimes Insight for Insurance

IBM Financial Crimes Insight for Insurance IBM Financial Crimes Insight for Insurance Highlights Improve outcomes and reduce cost of counterfraud efforts Optimize assets for efficient and effective fraud management Quickly distinguish fraudsters

More information

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 Introduction: Under the Fair and Accurate Credit Transactions Act (FACT Act), financial institutions (and creditors) that offer or maintain covered accounts

More information

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 1 STUDENT SERVICES 2 3 AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 References: Fair

More information

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting

More information

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft. 16 CFR 681.2 681.2 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and creditors that are subject to administrative

More information

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records; 3359-11-10.8 Identity theft detection, prevention and mitigation policy. (A) Introduction. (1) The university of Akron is committed to the detection, prevention and mitigation of identity theft associated

More information

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance see} white paper see} white paper Red Flag! Now What? If you are a large bank, credit union or credit card issuer, you are well aware of

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

A Model for Calculating User-Identity Trustworthiness in Online Transactions

A Model for Calculating User-Identity Trustworthiness in Online Transactions A Model for Calculating User-Identity Trustworthiness in Online Transactions Brian A. Soeder Suzanne Barber 2015 UT CID Report #1505 This UT CID research was supported in part by the following organizations:

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Identity theft and identity fraud are terms used to refer to all types

More information

Identity Theft: World s Fastest Growing Crime!!

Identity Theft: World s Fastest Growing Crime!! Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all

More information

c» BALANCE C:» Financially Empowering You The World of Credit Reports Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You The World of Credit Reports Podcast [Music plays] Nikki: The World of Credit Reports Podcast [Music plays] Nikki: You re listening to world of credit. Hi, I m Nikki, your host for today s podcast. Credit reports and credit scores influence our lives in many

More information

More information is needed by more organisations to talk to more customers in more countries than ever before

More information is needed by more organisations to talk to more customers in more countries than ever before Experian May 2004 The information age More information is needed by more organisations to talk to more customers in more countries than ever before We connect organisations to their customers in sectors

More information

Fighting back against synthetic identity fraud

Fighting back against synthetic identity fraud Fighting back against synthetic identity fraud Digging deep into the data trails people leave behind can help banks detect whether their customers are real or not and stem losses from this fast-growing

More information

Synthetic identity fraud is the fastest growing type of ID fraud. The number and frequency of occurrences have surpassed true-name identity theft.

Synthetic identity fraud is the fastest growing type of ID fraud. The number and frequency of occurrences have surpassed true-name identity theft. CONTACT: Research Section 5000 NASA Blvd. Suite 2400 Fairmont, WV 26554 Ph: 304-367-1994 Fax: 304-366-9095 Web: www.nw3c.org Synthetic Identity Fraud (August 2017) Background Synthetic identity (ID) fraud

More information

Comprehensive and versatile confirmation of identity and bank account details

Comprehensive and versatile confirmation of identity and bank account details Comprehensive and versatile confirmation of identity and bank account details Part of the Progressive Authentication suite Bank Account Verifier is a comprehensive and versatile service that quickly verifies

More information

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Reference: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA)) I. The Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention

More information

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag Page 1 Austin Peay State University Identity Theft Prevention POLICIES Issued: March 25, 2017 Responsible Official: Vice President for Finance and Administration Responsible Office: Information Technology

More information

The Risk of Economic Crime

The Risk of Economic Crime The Risk of Economic Crime 0 ACFE European Fraud Conference London, March 7, 0 GROUP SECURITY HERE TO PROTECT OUR WORLD Torsten Wolf Group Head of Crime and Fraud Prevention Agenda Introduction Economic

More information