<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Fraud Advisor</title>
	<atom:link href="http://www.experian.com/blogs/fraud-advisor/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/fraud-advisor</link>
	<description>Quarterly newsletter dedicated to the fraud industry</description>
	<lastBuildDate>Tue, 18 Dec 2012 00:22:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Introducing Precise Match</title>
		<link>http://www.experian.com/blogs/fraud-advisor/2012/12/precise-match/</link>
		<comments>http://www.experian.com/blogs/fraud-advisor/2012/12/precise-match/#comments</comments>
		<pubDate>Fri, 14 Dec 2012 00:31:50 +0000</pubDate>
		<dc:creator>traci.krepper</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Fraud Prevention]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[new product]]></category>
		<category><![CDATA[Precise Match]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/fraud-advisor/?p=119</guid>
		<description><![CDATA[One of our largest initiatives to date — the optimization and expansion of Checkpoint, our demographic and identity-element matching database. Checkpoint is undergoing comprehensive enhancements using a phased approach. As part of the development, a new name has been created for the launch: Precise Match.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Ffraud-advisor%2F2012%2F12%2Fprecise-match%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;style=normal&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/12/precise-match-300x300.jpg"><img class="size-full wp-image-142 alignleft" title="precise-match-300x300" src="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/12/precise-match-300x300.jpg" alt="" width="300" height="300" /></a>Experian Fraud and Identity Solutions continues to invest in its fraud risk and identity verification platform. This commitment is demonstrated by one of our largest initiatives to date — the optimization and expansion of Checkpoint<sup>SM</sup>, our demographic and identity-element matching database. Checkpoint is undergoing comprehensive enhancements using a phased approach. As part of the development, a new name has been created for the launch: Precise Match<sup>SM</sup>. <sup> </sup></p>
<p>Phase 1 of Precise Match (aka Checkpoint) includes many technology enhancements: a new architectural environment using new technology on a new and improved Fraud platform. The new environment was designed to scale for future growth with the capability of handling big data, yet it still maintains the integrity of the legacy system and provides the Checkpoint data quality as well.</p>
<p>Precise Match has enhanced matching logic, and the search and match now includes the ability to identify a match under conditions where the match is less than exact, such as close matches, partial matches and even low confidence matches. As a result of the new search and match algorithm, Precise Match will add more than 400 more granular result codes to those available in the existing Checkpoint. To facilitate use, the result codes have been grouped into six confidence levels and clients may opt in to receive them via the confidence group. A chart highlighting differences between Precise Match and Checkpoint follows.</p>
<p align="left"><strong>Comparison Chart</strong></p>
<table border="1" cellspacing="4" cellpadding="4">
<tbody>
<tr>
<td valign="top" width="319"><strong>Precise Match</strong><sup>SM</sup><strong> </strong></td>
<td valign="top" width="319"><strong>Checkpoint</strong><sup>SM</sup><strong> </strong></td>
</tr>
<tr>
<td valign="top" width="319">Optimized search logic designed to capture the most records for matching purposes</td>
<td valign="top" width="319">Standard search logic</td>
</tr>
<tr>
<td valign="top" width="319">Expanded match logic allowing clients to opt in to “close match” and “partial match” rules, in addition to “exact match” rules</td>
<td valign="top" width="319">Standard match logic using “exact match” rules for address and simple fuzzy match for names via nickname, etc.</td>
</tr>
<tr>
<td valign="top" width="319">More than 400 new, additional result codes providing additional granularity when a close or partial match rule fires</td>
<td valign="top" width="319">Standard result code set of 28</td>
</tr>
<tr>
<td valign="top" width="319">New data sources used in individual segments, with plans for additional data sources in the future</td>
<td valign="top" width="319">Standard data sources used for matching</td>
</tr>
<tr>
<td valign="top" width="319">New configurability options to provide greater control and flexibility</td>
<td valign="top" width="319">Existing configurability</td>
</tr>
</tbody>
</table>
<p>Note: Precise Match is not available to the legacy Authentication Services platform or within Biz ID<sup>SM</sup>.</p>
<p>With robust personally identifying information (PII) data and enhanced match result codes featuring client-selected confidence levels, Precise Match represents Experian’s next generation of demographic and identity-element matching. Deeper regulatory and compliance checks, increased efficiency, lower operational costs and reduced customer friction are just a few of the many benefits. Precise Match Phase I features enhanced address search and match and is available starting in January 2012. Existing clients who are interested in learning more should contact their Experian representative. To use Precise Match, it will be necessary to submit a change request, opt in and identify which Result Code Confidence Groups will be used.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/fraud-advisor/2012/12/precise-match/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The difficulty in finding “average” fraud rates</title>
		<link>http://www.experian.com/blogs/fraud-advisor/2012/12/finding-average-fraud-rates/</link>
		<comments>http://www.experian.com/blogs/fraud-advisor/2012/12/finding-average-fraud-rates/#comments</comments>
		<pubDate>Fri, 14 Dec 2012 00:31:36 +0000</pubDate>
		<dc:creator>traci.krepper</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Fraud Prevention]]></category>
		<category><![CDATA[average rate]]></category>
		<category><![CDATA[Fraud Rate]]></category>
		<category><![CDATA[fraud risk]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/fraud-advisor/?p=112</guid>
		<description><![CDATA[The concept of an “average fraud rate” is an elusive one. In this article we look at several reasons why. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Ffraud-advisor%2F2012%2F12%2Ffinding-average-fraud-rates%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;style=normal&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/12/avg-fraud-300x300.jpg"><img class="alignleft size-full wp-image-136" title="avg-fraud-300x300" src="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/12/avg-fraud-300x300.jpg" alt="" width="300" height="300" /></a>While it is a common question or discussion topic, the concept of an “average fraud rate” is an elusive one. Here are several reasons why.</p>
<p><strong>Natural fraud rate versus production fraud rate</strong></p>
<p>The natural fraud rate is the number of fraudulent attempts divided by overall attempts in a given period. Many businesses don’t know their natural fraud rate, simply because in order to measure it accurately, you need to let every single customer pass authentication regardless of fraud risk. However, who wants to sacrifice their bottom line for the empirical purity? So the question becomes, “If I stop a transaction due to fraud risk, how do I really know if that was fraud versus a legitimate customer that I have turned away?</p>
<p>What most businesses can and do see, however, is their production fraud rate — that is, the fraud rate of approved customers after using some fraud prevention strategy. If your fraud model offers any detection value at all, then your production fraud rate will be somewhat lower than your natural fraud rate. Since everyone has their own specific fraud-prevention strategies in practice, any attempts at finding an “average” are muddied.</p>
<p><strong>How do you count frauds?</strong></p>
<p>You can count frauds in terms of dollar loss or raw units. A dollar-based approach might be more appropriate when estimating the return on investment of your overall authentication strategy. A unit-based approach might be more appropriate when considering the impact on victimized consumers and the subsequent impact on your brand. If using the unit-based approach, you can count frauds in terms of raw transactions or unique consumers. If one fraudster is able to get through your risk management strategy by coming through the system five times, then the consumer-based fraud rate might be more appropriate. In this example, a transaction-based fraud rate would over-represent this fraudster by a factor of five. Any fraud models based solely on transactional fraud data would thus be biased toward the fraudsters who game the system through repeat usage. Clearly, then, how you quantify your fraud impacts how you measure it. Therefore, another sticking point for determining the “average fraud rate” is based on what makes up the numerator and the denominator.</p>
<p><strong>Different industries. Different populations. Different uses.</strong></p>
<p>Experian’s fraud-risk and authentication tools are used by companies from a wide variety of industries. Would you expect the fraud rate of a utility company to be comparable to that of a money wire service? What about online lending versus deposit account opening? Furthermore, different companies use different fraud prevention strategies with different risk buckets within their own portfolios. One company might put every customer at account opening through a knowledge based authentication (KBA) session, while another might only ask the riskier customers out-of-wallet questions. Some companies use authentication tools in the middle of the Customer Life Cycle, while others employ fraud-detection strategies at account opening only. All of these components further complicate the notion of an “average fraud rate.”</p>
<p><strong>Different levels of authentication strength</strong></p>
<p>Even if you have two companies from the same industry, with the same customer base, the same fraudsters, the same natural fraud rate, counting fraud the same way, using the same basic authentication strategies, they still might have vastly different fraud rates. Let’s say Company A has a KBA strategy configured to give them a 95 percent pass rate, while Company B is set up to get a 70 percent pass rate. All else being equal, we would expect Company A to have a higher fraud rate, by virtue of having a less stringent fraud prevention strategy. If you lower the bar, you’ll definitely have fewer false positives, but you’ll also have more frauds getting through (false negatives). An “average fraud rate” is therefore highly dependent on the specific configuration of your fraud prevention tools.</p>
<p><strong>Natural instability of fraud behavior</strong></p>
<p>Fraud behavior can be volatile. For openers, one fraudster seldom equals one fraud attempt. Fraudsters often use the same techniques to defraud multiple consumers and companies, sometimes generating multiple transactions for each. You might have hundreds of fraud attempts from the same fraudster. Whatever the true ratio of fraud attempts to fraudsters is, you can be confident that your total number of frauds is unlikely to be representative of an equal number of unique fraudsters. What this means is that the fraud behavior is even more volatile than your general consumer behavior, including general fraud trends such as seasonality. This volatility, in and of itself, correlates to a greater degree of variance in fraud rates.</p>
<p><strong>The value of feedback</strong></p>
<p>One of the best tactics you can take to better understand your fraud rate, and more importantly, to win against those that would commit fraud against you, is to close the feedback loop on the outcome — what was fraud and what wasn’t. As a client, one easy way to realize more value from the services and products you employ is to share that — confidentially of course — with the product analysts who know them best and can provide invaluable analysis and recommendations on optimum settings to ensure you protect yourself.</p>
<p><strong>Conclusion</strong></p>
<p>For the reasons described here, claims of an industry average fraud rate should be considered very subjective, and any claims of an authoritative average should be taken with a grain of salt. At the very least, fraud rates are a volatile thing with a great deal of variance from one case to the next. It is much more important to know <em>your</em> average fraud rate, than <em>the</em> average fraud rate.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/fraud-advisor/2012/12/finding-average-fraud-rates/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Knowledge based authentication for sales enablement</title>
		<link>http://www.experian.com/blogs/fraud-advisor/2012/12/knowledge-based-authentication/</link>
		<comments>http://www.experian.com/blogs/fraud-advisor/2012/12/knowledge-based-authentication/#comments</comments>
		<pubDate>Fri, 14 Dec 2012 00:31:27 +0000</pubDate>
		<dc:creator>traci.krepper</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Fraud Prevention]]></category>
		<category><![CDATA[KBA]]></category>
		<category><![CDATA[Knowledge IQ]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/fraud-advisor/?p=97</guid>
		<description><![CDATA[Consumers today want to transact on demand and instantly, while businesses want to make safe, instant decisions and distribute their goods and services right away to recognize the revenue. Instant decisioning and immediate purchase approval is now more important than ever before.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Ffraud-advisor%2F2012%2F12%2Fknowledge-based-authentication%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;style=normal&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/12/kba-300x300.jpg"><img class="alignleft size-full wp-image-140" title="kba-300x300" src="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/12/kba-300x300.jpg" alt="" width="300" height="300" /></a>Let’s face it. Today’s world is fast-paced. Consumers today want to transact on demand and instantly. On the flip side, businesses want to make safe, instant decisions and distribute their goods and services right away to recognize the revenue. Add to that the fact that the “point of sale” is now everywhere the consumer is. For example, shop for a car online, get directions to the dealership on your smartphone, finance it, then drive it home tonight. Same goes for retailers. Order a new flat-screen television from your tablet and have it shipped overnight, and you’re ready to go for the big game. You get the point. Is instant decisioning and immediate purchase approval really that important? Absolutely.</p>
<p>To illustrate the point, let’s consider a hypothetical example of a credit card company that issues bankcards online via Web applications. They’ve done a good job of setting up credit score criteria to auto-decision around, but they didn’t bother including knowledge based authentication (KBA), as they thought that the costs were high and that missed customer opportunities wouldn’t really add up over the long term. Were they right? Let’s run some numbers and see.</p>
<p>Over the course of any given week, our card issuer runs an average of 1,000 credit card applications, or 4,000 applications per month on average. The average credit limit they approve is $2,000. So for any given week, they approve $700,000 in new lines or $2.8 million per month.</p>
<p>A summary of their monthly processing stats prior to running applications through KBA service looks like the following:</p>
<ul>
<li>Automatic system approvals — 35 percent ($2.8 million  in new credit limits)</li>
<li>Automatic system declines — 25 percent ($2.0 million in new credit limits)</li>
<li>Manual review applications — 40 percent $3.2 million in new credit limits)</li>
</ul>
<p><a href="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/12/KBA-graph1.jpg"><img class="size-full wp-image-106 alignnone" title="KBA - graph1" src="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/12/KBA-graph1.jpg" alt="" width="442" height="327" /></a></p>
<p>Now let’s say this same company decided to add in KBA to their online account opening process in an effort to reduce the manual reviews. More approvals mean more new bookings today, new revenues recognized more quickly and a reduction in manual labor costs. What’s the benefit? Try the fact that the average credit limits approved for any given month goes from $2,800,000 to $4,400,000 million, which represents a 57 percent lift in new credit limits. The icing on the cake is the card issuer saves $12,000 ($144k/year) in labor costs by having consumers self-authenticate through KBA questions.A summary of their monthly processing stats after switching to run applications through KBA looks like the following:</p>
<ul>
<li>Automatic system approvals — 55 percent ($4,400,000 in new credit limits, a 57 percent lift in dollars approved)</li>
<li>Automatic system declines — 25 percent (same as previous, since credit risk policies did not change)</li>
<li>Manual review applications — 20 percent ($12,000 per month ($144k/year) in labor cost savings (800 applications/month times 1 hour of labor at $15 an hour)</li>
</ul>
<p><a href="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/12/KBA-graph2.jpg"><img class="size-full wp-image-107 alignnone" title="KBA - graph2" src="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/12/KBA-graph2.jpg" alt="" width="649" height="338" /></a></p>
<p>Booking more customers today can really add up!</p>
<hr />
<p><strong>One of the most frequently asked questions is: How do I “try-out” KBA? Or similarly, how do I run a head-to-head test against my current vendor?</strong></p>
<p>We’ve had more clients recently express interest in the ability to “try-out” KBA. After all, why risk moving your business in a direction that you’re not comfortable with up front? Makes sense, right? We at Experian agree. You deserve full disclosure up front, and you deserve the ability to run a test to understand the benefit. We heard you, and as a result, we now have additional options and testing processes in place to help you do just that. Additionally, we’ve created a consulting process to help you evaluate the current KBA vendor you’re doing business with, in an effort to truly understand if you’re getting the most out of the service or if Experian’s Fraud tools would do a better job.</p>
<p><strong>New to KBA?</strong></p>
<p>The testing process is simple and straightforward. If you’re new to KBA, then you’ll simply provide information to us about the consumers with whom you’re doing business, and we’ll take it from there. We’ll come back to you with an overall analysis of what KBA questions could have been presented to your customers, along with suggestions around how to best interact with those consumers to retain their business, while at the same time balancing the necessary fraud checks to keep your company secure.</p>
<p><strong>Want to compare Experian to your current KBA provider?</strong></p>
<p>Again, the testing process is simple and straightforward. You would simply provide information to us about the consumers with whom you’re doing business, along with your current business operating processes and procedures where KBA is in use, and we’ll take it from there. We’ll come back to you with an overall analysis of what KBA questions could have been presented to your customers, along with opportunities to improve your business processes using Experian. If you’d like, we can even take it a step further by evaluating the effectiveness of the current KBA service you have in place.</p>
<p><strong>What to look for if you decide to run a test on your own without Experian:</strong></p>
<p>i.  For the KBA vendor, what data source categories are used to generate questions? Tip:  You want a provider that has a data diversification strategy comprised of multiple data sources, both credit and noncredit, from which to draw questions.</p>
<p>ii.  Does the KBA vendor offer its own consulting services that include performance monitoring of the KBA service, so you know how and if the product is working correctly? Tip: This is critical to knowing whether the KBA service is working. Think of it simply as your very own KIQ optimization strategy.</p>
<p>iii.  Does the KBA vendor provide product configuration options that include a scoring matrix?</p>
<ol>
<li>Combination of fraud score and question performance</li>
<li>Customizable score breaks and thresholds</li>
<li>Increase the pass rate of good consumers while eliminating fraud with custom velocity checks like use limits and concurrency checks</li>
</ol>
]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/fraud-advisor/2012/12/knowledge-based-authentication/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fraud and deposits</title>
		<link>http://www.experian.com/blogs/fraud-advisor/2012/12/fraud-and-deposits/</link>
		<comments>http://www.experian.com/blogs/fraud-advisor/2012/12/fraud-and-deposits/#comments</comments>
		<pubDate>Fri, 14 Dec 2012 00:31:15 +0000</pubDate>
		<dc:creator>traci.krepper</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Fraud Prevention]]></category>
		<category><![CDATA[Deposit Accounts]]></category>
		<category><![CDATA[Fraud detection]]></category>
		<category><![CDATA[fraud prevention]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/fraud-advisor/?p=116</guid>
		<description><![CDATA[Fraud in the deposit space is an underserved, often misunderstood area. Traditionally, fraud for financial institutions and retailers has been identity-related fraud where misuse of a third party’s identity leads to an unauthorized credit account. This credit account is then used to make purchases, cash advances, etc. until the line is depleted.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Ffraud-advisor%2F2012%2F12%2Ffraud-and-deposits%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;style=normal&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/12/avg-fraud-300x300.jpg"><img class="alignleft size-full wp-image-136" title="avg-fraud-300x300" src="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/12/deposit-300x300.jpg" alt="" width="300" height="300" /></a>Fraud in the deposit space is an underserved, often misunderstood area. Traditionally, fraud for financial institutions and retailers has been identity-related fraud where misuse of a third party’s identity leads to an unauthorized credit account. This credit account is then used to make purchases, cash advances, etc. until the line is depleted.</p>
<p>Deposit fraud is a different animal. For purposes of clarity, let’s make a distinction between two types of deposit-based fraud.</p>
<p><strong>Deposit first-party fraud</strong></p>
<p>This type of fraud occurs when an individual uses his or her own name, address and information to obtain an account or goods without any intention of repayment. First-party fraud can range from the hundreds to tens of thousands of dollars, but the key component is that the individual perpetrating the fraud is the true applicant and the information provided is true and valid.</p>
<p><strong>Deposit new account fraud</strong></p>
<p>This type of fraud occurs when perpetrators, often groups of fraudsters or fraud rings, open accounts using completely fictitious information, semi-fictitious information or “mules.” Mules are people who are recruited by a ring to commit fraud typically in exchange for a cash payment. Deposit new account fraud generally isn’t high dollar, but the volume of fraud accounts drives up processing costs and operational costs. These losses can often fall to the “cost of doing business” loss lines, with higher dollar outliers being the only evidence of the larger issue.</p>
<p>Unlike identity theft, deposit new account fraud is not a hot-button consumer topic or exciting media story. It often does not fall into an investigation bucket to be addressed by law enforcement due both to the low dollar amounts and the absence of “real” applicants. It is, however, a source of pain, an operational expense, and a large distraction for many banks and deposit institutions.</p>
<p>By its nature, deposit new account fraud is high-volume, low-dollar, “trade your name and possibly get arrested for less than $100” fraud. This is not to say that the criminals orchestrating schemes are not sophisticated. Fraud ring leaders running deposit new account fraud often deal with high volumes of applications, high volumes of applicant data, multiple email addresses, fake IDs, financial mules and debit/ATM cards for access. Let’s examine these components in more detail:</p>
<ul>
<li>High volumes of applications: Deposit new account fraud is often profitable due to volume. Applicants are generally not “one and done” fraudsters. The payoff comes through multiple applications that may be made at multiple locations, and, if online, through multiple financial institutions.</li>
<li>Multiple email addresses: Email addresses are the new verification engines in the digital world. Applications by phone or online are made easier by either providing an email for pseudo-verification or for correspondence. Fraudsters may be managing dozens of email addresses as part of their scheme.</li>
<li>Fake IDs: customers with no credit file can meet an institution’s Know Your Customer requirements by presenting physical identification. New account desk representatives are expected or trained to verify physical identification. Fraudsters must manage which IDs are used for which accounts or purchases as the same ID is typically used multiple times.</li>
<li>Financial mules: These are individuals who are paid to perpetrate fraud. They are the account opening parties, the cash advance parties, the face to the crime. Mules are traditionally young student/college-aged individuals who are thin file/no file. Mules also can be recruited through the drug trade or in larger cities, the homeless. Ring leaders using mules must select individuals who are capable of opening an account and are willing to return the majority of the funds from the fraud to the handler. Mules are often used for multiple fraud attempts in a very short period of time.</li>
<li>Debit/ATM cards: This is the faceless channel. The ATM is the deposit product channel of choice for fraudsters. ATMs accept deposits, which is ideal for someone committing deposit new account fraud. Managing these deposits is often a science, as playing the timing game is critical to getting funds access.</li>
</ul>
<p>So what are some tactics to managing deposit new account fraud? Often, combating deposit new account fraud comes down to deterring the fraudster’s application completely. Risk-based, trend-based funds availability can create controls that fraudsters cannot dodge. In these cases, account age, deposit amount, deposit channel (ATM, in-person, remote deposit) can drive “tiered availability,” allowing most valid customers to transact while restricting fraudsters from the “big score.”</p>
<p>Addressing both the applicant’s identity and the transactional risk can work to deter fraudsters from even attempting deposit new account fraud. Creating an environment that deters fraud is much more cost-effective than having an environment to recover from fraud.</p>
<p>Looking forward, some fraud-prevention techniques are evolving to better combat deposit new account fraud. This includes taking a broader “panorama” view of a new applicant’s behavior and looking at the relationship among all of the separate but related applicant data elements. Rather than providing a series of “snapshots,” this approach begins to predict an applicant’s risk based on the sheer volume of data element linkages that can be identified. Once integrated or layered into your existing fraud-prevention processes, this moves fraud identification toward an active, real-time function rather than a standard “bad account” matching process.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/fraud-advisor/2012/12/fraud-and-deposits/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>5 FFIEC Compliance Tips For Banks</title>
		<link>http://www.experian.com/blogs/fraud-advisor/2012/08/5-ffiec-compliance-tips-for-banks/</link>
		<comments>http://www.experian.com/blogs/fraud-advisor/2012/08/5-ffiec-compliance-tips-for-banks/#comments</comments>
		<pubDate>Wed, 15 Aug 2012 19:14:25 +0000</pubDate>
		<dc:creator>traci.krepper</dc:creator>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Social Security Numbers]]></category>
		<category><![CDATA[FFIEC]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/fraud-advisor/?p=21</guid>
		<description><![CDATA[The Federal Financial Institutions Examination Council recently released the supplement to its &#8220;Authentication in an Internet Banking Environment&#8221; guidance. The deadline for meeting the new requirements is now.  These updates of the FFIEC regulations specifically address customer authentication, layered security, and other controls in the growing online environment.  Listed below are five questions about compliance [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Ffraud-advisor%2F2012%2F08%2F5-ffiec-compliance-tips-for-banks%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;style=normal&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>The Federal Financial Institutions Examination Council recently released the supplement to its &#8220;Authentication in an Internet Banking Environment&#8221; guidance. The deadline for meeting the new requirements is now.</p>
<p> These updates of the FFIEC regulations specifically address customer authentication, layered security, and other controls in the growing online environment.</p>
<p> Listed below are five questions about compliance with the recent guidance. </p>
<ol>
<li><strong>What does &#8220;layered security&#8221; actually mean?</strong> Layered security&#8217; refers to the arrangement of fraud tools in a sequential fashion, starting with the most simple and progressing toward more stringent controls as the activity unfolds and risk increases.</li>
<li><strong>What does &#8220;multi-factor&#8221; authentication actually mean?</strong> A simple example of multi-factor authentication is the use of a debit card at an ATM machine. The plastic card is an item that you must physically possess to withdraw cash, but the transaction also requires the PIN number to complete the transaction. The card is one factor, the PIN is a second. The two combine to deliver a multi-factor authentication.</li>
<li><strong>Who does this guidance affect?</strong> And does it affect each type of credit grantor/lender differently? The guidance pertains to all financial institutions in the U.S. that fall under the FFIEC&#8217;s influence. While the guidance specifically mentions authenticating in an online environment, it&#8217;s clear that the overall approach advocated by the FFIEC applies to any environment.</li>
<li> <strong>What will the regulation do to help mitigate fraud risk in the near-term and long-term?</strong> The guidance is an important reinforcement of several critical ideas: Fraud losses undermine faith in our financial system, and the tools to fight fraud must evolve constantly. Fraud tactics evolve constantly.</li>
<li> <strong>How are organizations responding?</strong> Research indicates that less than half of the institutions impacted by this guidance are prepared for the exams. Many fraud tools, particularly those used to authenticate individuals, were deployed as point-solutions. There is a need for a feedback loop to identify vulnerabilities, or the ability to deploy a risk-based, &#8220;layered&#8221; approach the guidance is seeking.</li>
</ol>
<p><a title="FFIEC Guidelines" href="http://www.experian.com/decision-analytics/ffiec-guidelines.html" target="_blank"> Click here </a>for more information on FFIEC compliance.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/fraud-advisor/2012/08/5-ffiec-compliance-tips-for-banks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Speed Is the Key to Beating New Account Fraud</title>
		<link>http://www.experian.com/blogs/fraud-advisor/2012/08/speed-is-the-key-to-beating-new-account-fraud/</link>
		<comments>http://www.experian.com/blogs/fraud-advisor/2012/08/speed-is-the-key-to-beating-new-account-fraud/#comments</comments>
		<pubDate>Wed, 15 Aug 2012 19:14:14 +0000</pubDate>
		<dc:creator>traci.krepper</dc:creator>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[fraud prevention]]></category>
		<category><![CDATA[identity verification]]></category>
		<category><![CDATA[New account fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/fraud-advisor/?p=18</guid>
		<description><![CDATA[Banks and other lenders need more advanced tools to help them detect and catch fraud perpetrators, as well as find new ways to improve profit margins on their credit holdings. The lifespan of a fraudster is short, but prolific. After a sharp and unexplained drop in identity thefts in 2010, fraud schemes climbed 12.6 percent [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Ffraud-advisor%2F2012%2F08%2Fspeed-is-the-key-to-beating-new-account-fraud%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;style=normal&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><strong><a href="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/08/bw-lock-300x300.jpg"><img class="alignleft size-full wp-image-42" title="bw-lock-300x300" src="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/08/bw-lock-300x300.jpg" alt="" width="300" height="300" /></a>Banks and other lenders need more advanced tools to help them detect and catch fraud perpetrators, as well as find new ways to improve profit margins on their credit holdings.</strong></p>
<p>The lifespan of a fraudster is short, but prolific. After a sharp and unexplained drop in identity thefts in 2010, fraud schemes climbed 12.6 percent in 2011, according to research by Javelin Strategy &amp; Research.</p>
<p>The cost adds up: The mean cost for new-account fraud is $3,197, according to the recent &#8220;Javelin Strategy &amp; Research 2012 Identity Fraud Report.&#8221; In addition, if someone succeeds in opening up an account, it typically only takes about seven days to wreak millions of dollars of damage across a wide network of unsuspecting customers, Javelin reports. Yet it typically takes institutions an average of 151 days to detect a fraud occurrence. This means that by the time account holders realize they&#8217;ve been cleaned out and their banks are calling their customers about irregular account activity, or when their credit card companies are sending them notification letters, fraudsters have already vanished into thin air. But they&#8217;ll most assuredly be back.</p>
<p>Where is the disconnect? Why is our industry &#8212; on the whole &#8212; so slow to react?</p>
<p>Some lenders simply contend that they have the strongest defense against industry theft at origination, so don&#8217;t see the need to check again after the accounts are opened. Further, to some degree, a certain amount of fraud is bound to get through because the cost of ferreting out all of it would prove prohibitive.</p>
<p>With so many accounts being hacked in the first seven days of a fraudster&#8217;s scheme, no financial institution or person is immune &#8212; even with the best systems in place. Fortunately, technology advances in this field have delivered new weapons to flag suspicious consumer data patterns early in an account&#8217;s history &#8212; a huge milestone. Old tactics are simply insufficient to uncover criminal activity at its current level.</p>
<p><strong> </strong><strong>One Fraudster, Geometric Damage</strong></p>
<p>These two graphs assess the fraudster process at Day 0, then again at Day 7. For the latter, note how the volume of fraud can grow geometrically if risk managers are not proactive.</p>
<p><a href="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/08/new-account-fraud-example563.jpg"><img class="size-full wp-image-95 alignnone" title="new-account-fraud-example563" src="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/08/new-account-fraud-example563.jpg" alt="" width="563" height="399" /></a></p>
<p>&nbsp;</p>
<p><a href="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/08/new-account-fraud-example-day-7-553.jpg"><img class="alignnone size-full wp-image-94" title="new-account-fraud-example-day-7-553" src="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/08/new-account-fraud-example-day-7-553.jpg" alt="" width="553" height="395" /></a></p>
<p>&nbsp;</p>
<p>As the charts suggest, we have found that accounts that may have looked good when opened may have turned high-risk because of activity picked up by technology that can hone in on how data is used across numerous transactions. For example, Experian&#8217;s Precise ID for Customer Management takes advantage of data previously unavailable to identify and prevent current-account fraud during the first 30 days of an account being opened. By shifting strategies and monitoring newly opened accounts, we have found significant lift for fraud captures among our customers due to the use of this technology.</p>
<p><strong>Some Tips to Help Stop or Prevent Fraud </strong></p>
<p>Be aware that fraudsters bulldoze their way through accounts and disappear within 15 days, yet it takes an average of 151 days to identify fraud.</p>
<ul>
<li>Be vigilant to warn your customers about fraudsters and identity thieves.</li>
<li>Ask your customers to pinpoint questionable behavior, such as new account openings without a birth date, but with the same name and Social Security number.</li>
<li>Re-check accounts after they have been opened, which can identify suspicious activity allows for a significant lift in fraud captures.</li>
<li>Last year, victims of a data breach were 9.5 times more likely to be a victim of identity fraud. Consumers who were part of a data breach had a fraud incidence rate of 19 percent, while consumers who were not had a breach rate of two percent. Also, with a shocking 67 percent jump in data breach victims in 2011, the increase correlates directly with the rise in identity fraud victims.</li>
</ul>
<p>This rise in identity crime comes as banks and lenders continue to look for ways to improve their profit margins on their credit holdings. It also underscores the need for more advanced tools to help credit companies, banks and others detect and nab fraud perpetrators, who steal billions of dollars &#8212; both from lenders as well as innocent consumers.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/fraud-advisor/2012/08/speed-is-the-key-to-beating-new-account-fraud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The role of the Social Security number in fraud prevention</title>
		<link>http://www.experian.com/blogs/fraud-advisor/2012/08/the-role-of-the-social-security-number-in-fraud-prevention/</link>
		<comments>http://www.experian.com/blogs/fraud-advisor/2012/08/the-role-of-the-social-security-number-in-fraud-prevention/#comments</comments>
		<pubDate>Wed, 15 Aug 2012 19:13:59 +0000</pubDate>
		<dc:creator>traci.krepper</dc:creator>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[fraud prevention]]></category>
		<category><![CDATA[identity verification]]></category>
		<category><![CDATA[SSN]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/fraud-advisor/?p=15</guid>
		<description><![CDATA[The value of the Social Security number (SSN) in the fraud prevention process is an oft-debated topic. Some companies put a great deal of emphasis on the SSN, while others feel the value of it has been lost. Those in the latter category may not even request it from their customers in the application process. [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Ffraud-advisor%2F2012%2F08%2Fthe-role-of-the-social-security-number-in-fraud-prevention%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;style=normal&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/08/ssn-dollars-300x300.jpg"><img class="alignleft size-full wp-image-41" title="ssn-dollars-300x300" src="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/08/ssn-dollars-300x300.jpg" alt="" width="300" height="300" /></a>The value of the Social Security number (SSN) in the fraud prevention process is an oft-debated topic. Some companies put a great deal of emphasis on the SSN, while others feel the value of it has been lost. Those in the latter category may not even request it from their customers in the application process. The position is that the value they get from the SSN for fraud prevention does not outweigh the customer experience principles they are working to achieve.</p>
<p>The use of Social Security numbers in authentication and fraud prevention has been a constant topic for the media in terms of how this process impacts a person’s privacy. Recent policy changes by the Social Security Administration (SSA) have affected the availability of SSN data. The most notable change took place in July 2011. This is when the SSA started issuing Social Security numbers by random versus issuing them in a range by state and date. In November 2011, the SSA announced that it would no longer include death records obtained from protected state records in the Public Death Master File (Public DMF), used by many as a means to prevent the use of deceased SSNs. This change creates additional challenges for quickly and accurately confirming an individual’s Social Security number, which is something consumers have come to expect.</p>
<p>Despite these new challenges, the SSN is still a critical component when it comes to fraud prevention and risk assessment. Older fraud alerts tied to the SSN often are not predictive of fraud as a standalone element. Criminals are well-versed in the application process, so they typically use a valid and issued Social Security number when attempting to perpetrate fraud. Interestingly, despite low fraud find rates, it’s still considered a common best practice to flag and review any application where a deceased SSN has been used. The next level of fraud prevention involves the common practice of data matching. For example, does the SSN match to the individual’s name and address? This tactic provides better fraud separation than the older SSN alerts but still creates some challenges. For example, when you look at SSN matches to name (meaning the full name matched but the address did not) in a sample population, 40 percent of the frauds had this match. The challenge is that 25 percent of the goods also had this message. There is clearly some separation of fraud here, but probably not enough to use this message independently for fraud prevention.</p>
<p>Given these challenges, is the SSN really an important piece in the fraud prevention puzzle? Despite some of the limitations, the power of analytics tells us yes.</p>
<p>Analytics takes in the variables of the basic SSN alerts and the matching components and blends these with other data to develop highly predictive fraud scores. Other variables tied to the SSN that lead to predictiveness in the models are the velocity indicators tied to the SSN — for example, how many times the SSN has been used in a certain period of time. There also are more sophisticated rules tied to the SSN such as if the SSN is being used by multiple parties via recent inquiries, indicating that the SSN may have been compromised and actively is being used for fraud.</p>
<p>To be clear, SSN information is only one part of the larger picture of risk that is composed by today’s fraud prediction models.  That said, it remains a key piece of information in providing strong fraud detection and separation. The use of analytics provides the opportunity to find the majority of fraud while impacting a manageable number of cases that are not fraud. Strong scores can find approximately 60 percent or more of identity theft in a review population of 10 percent based on model validations.</p>
<p>So what is the bottom line? Capture and use the SSN for use in fraud prevention if you can. There is value realized by the use of analytics that really can help drive workable review rates. This approach creates the best balance between stopping fraud and keeping the customer experience “friendly.”</p>
]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/fraud-advisor/2012/08/the-role-of-the-social-security-number-in-fraud-prevention/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Data breaches — How will your company retain the confidence of your customers?</title>
		<link>http://www.experian.com/blogs/fraud-advisor/2012/08/data-breaches-how-will-your-company-retain-the-confidence-of-your-customers/</link>
		<comments>http://www.experian.com/blogs/fraud-advisor/2012/08/data-breaches-how-will-your-company-retain-the-confidence-of-your-customers/#comments</comments>
		<pubDate>Tue, 14 Aug 2012 22:02:59 +0000</pubDate>
		<dc:creator>traci.krepper</dc:creator>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[identity theft]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/fraud-advisor/?p=12</guid>
		<description><![CDATA[Stolen passwords, stolen credit card numbers, stolen identity information: Open any newspaper or news service, and quickly you can find a cybercrime having been committed against large, and now increasingly, midsize companies. When this happens to your company, do you have a crisis plan in place, from mandatory letters to proactive public relations? In a [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Ffraud-advisor%2F2012%2F08%2Fdata-breaches-how-will-your-company-retain-the-confidence-of-your-customers%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;style=normal&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/08/corporate-security-300x300.jpg"><img class="alignleft size-full wp-image-43" title="corporate-security-300x300" src="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/08/corporate-security-300x300.jpg" alt="" width="300" height="300" /></a>Stolen passwords, stolen credit card numbers, stolen identity information: Open any newspaper or news service, and quickly you can find a cybercrime having been committed against large, and now increasingly, midsize companies.</p>
<p>When this happens to your company, do you have a crisis plan in place, from mandatory letters to proactive public relations?</p>
<p>In a recent study by the Ponemon Institute, 72 percent of consumers who recall receiving a data breach notification letter expressed dissatisfaction with it. That feeling can directly translate into dissatisfaction with the company that sent the letter.</p>
<p><a title="Data Breach article" href="http://www.experian.com/data-breach/newsletters/fix-notification-letter-problems.html">Read a recent article</a> by Experian Data Breach Resolution, which can help your company improve upon the customer experience in the event that a confidence-busting data breach occurs.</p>
<p>Do you think you’re not a target for criminal data attacks because you’re not the size of Yahoo! or LinkedIn? The FCC recently released <a title="Tips for Small Businesses" href="http://www.experian.com/data-breach/newsletters/cyber-security-for-small-businesses.html" target="_blank">tips for small businesses</a>, in response to an increasing number of criminal attempts and activity around small and midsize companies.</p>
<p>Given that in 2010, for the 11th year in a row, the overwhelming top consumer complaint to the FTC was identity theft, how you take action can help you regain the trust of your customers. The FTC advises organizations that handle Personally Identifiable Information (PII) to adhere to the following easily controllable measures:</p>
<ul>
<li><strong>Take stock</strong>. Know what personal information you have in your files and on your computer. Understand how personal information moves into, through and out of your business and who has access or could have access to it.</li>
<li><strong>Scale down</strong>. Keep only what you need for your business. That old business practice of holding on to every scrap of paper is “so 20th century.” These days, if you don’t have a legitimate business reason to have sensitive information in your files or on your computer, don’t keep it.</li>
<li><strong>Lock it.</strong> Protect the information you keep. Be cognizant of physical security, electronic security, employee training, and the practices of your contractors and affiliates.</li>
<li><strong>Pitch it</strong>. Properly dispose of what you no longer need. Make sure papers containing personal information are shredded, burned or pulverized so they can’t be reconstructed by an identity thief.</li>
<li><strong>Plan ahead</strong>. Draft a plan to respond to security incidents. Designate a senior member of your team to create an action plan before a breach happens.</li>
</ul>
<p>As customers become more knowledgeable as to how their personal information is being collected and stored and by whom, more scrutiny and legal action will become the norm, and expectations from customers will continue to grow.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/fraud-advisor/2012/08/data-breaches-how-will-your-company-retain-the-confidence-of-your-customers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Experian’s Precise ID(SM) platform achieves Assurance Level 3 FICAM recognition for identity proofing</title>
		<link>http://www.experian.com/blogs/fraud-advisor/2012/08/kantara-framework/</link>
		<comments>http://www.experian.com/blogs/fraud-advisor/2012/08/kantara-framework/#comments</comments>
		<pubDate>Tue, 14 Aug 2012 16:38:27 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[fraud prevention]]></category>
		<category><![CDATA[Kantara]]></category>
		<category><![CDATA[Precise ID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/fraud-advisor/?p=1</guid>
		<description><![CDATA[Experian is first to receive recognition for identity proofing component under Kantara Trusted Framework You might liken it to winning a gold medal if there were Olympics for fraud-prevention platforms. On July 26, Experian’s Precise IDSM platform was recognized for identity proofing at Assurance Level 3, under the Kantara Initiative’s  Identity Assurance Framework, one of [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Ffraud-advisor%2F2012%2F08%2Fkantara-framework%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;style=normal&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><strong><a href="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/08/keys-lock-300x300.jpg"><img class="alignleft size-full wp-image-44" title="keys-lock-300x300" src="http://www.experian.com/blogs/fraud-advisor/wp-content/uploads/2012/08/keys-lock-300x300.jpg" alt="" width="300" height="300" /></a>Experian is first to receive recognition for identity proofing component under Kantara Trusted Framework</strong></p>
<p><em>You might liken it to winning a gold medal if there were Olympics for fraud-prevention platforms. </em></p>
<p>On July 26, Experian’s Precise ID<strong><sup>SM</sup></strong> platform was recognized for identity proofing at Assurance Level 3, under the <a title="Kantata Initiative" href="http://kantarainitiative.org" target="_blank">Kantara Initiative’s</a>  Identity Assurance Framework, one of the Federal Identity Credential Access Management (FICAM) Trusted Framework providers. As part of the process, a Kantara-Accredited Assessor determined that Experian’s Precise ID service conformed to the Identity Assurance Framework’s Service Assessment Criteria, which enable a relying party to trust the identity and security assurances from an identity or credential service provider.</p>
<p>This success follows months of collaborative effort between Experian’s Fraud and Identity Solutions division; an independent auditor; and Kantara Initiative, the certifying authority.</p>
<p><em>So what do all the acronyms, officious titles and identity proofing certifications mean?</em></p>
<p>Precise ID now is uniquely positioned to deliver identity proofing services (the ability to verify with reasonable certainty that a person is whom he or she is claiming to be) to the vast majority of public sector, healthcare and perhaps soon-to-be private sector entities that likely will cite certification as a requirement more often than not. Recent examples of this capability can be found in Experian being awarded the contracts for the United States Department of Veterans Affairs (VA) and the Centers for Medicare and Medicaid Services (CMS), both of which require such certification.</p>
<p><em>Several more examples of these initiatives in action:</em></p>
<p>The Drug Enforcement Administration mandated that doctors who issue prescriptions online (e-prescriptions) must conform to National Institute of Standards and Technology (NIST) guidelines that recommend technical safeguards.</p>
<p>The White House’s identity-management initiative to make online transactions more trustworthy — known as the National Strategy for Trusted Identities in Cyberspace (NSTIC) — is aimed at creating an Internet-identity ecosystem that uses interoperable technology standards and policies to authenticate not only consumers, but also organizations and IT infrastructure.</p>
<p>Experian’s <a title="Precise ID" href="http://www.experian.com/decision-analytics/identity-and-fraud/fraud-detection-and-prevention.html" target="_blank">Precise ID platform </a>is being used by the Social Security Administration, Centers for Medicare &amp; Medicaid Services and DrFirst.</p>
<p><em>Lest you think all of this applies only to the government and public entities:</em></p>
<p>Although today the National Institute of Standards and Technology (NIST) levels of assurance are most closely associated with public sector service requirements and the NSTIC Identity Ecosystem, it is highly likely in upcoming years that many private sector identity verification and fraud risk initiatives also will align with NIST levels of assurance.</p>
<p>As one of only two identity proofing services with this level of approval, Experian and Precise ID are well on their way to providing the standard in identity assessment and fraud risk management for both the private and public sectors.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/fraud-advisor/2012/08/kantara-framework/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>