Tag: document verification

Loading...

This article was updated on February 23, 2024. First impressions are always important – whether it’s for a job interview, a first date or when pitching a client. The same goes for financial services onboarding as it’s an opportunity for organizations to foster lifetime loyalty with customers. As a result, financial institutions are on the hunt now more than ever for frictionless online identity verification methods to validate genuine customers and maintain positive experiences during the online onboarding process. In a predominantly digital-first world, financial companies are increasingly focused on the customer experience and creating the most seamless online onboarding process. However, according to Experian’s 2023 Identity and Fraud Report, more than half of U.S. consumers considered dropping out during account opening due to friction and a less-than positive experience. And as technology continues to advance, digital financial services onboarding, not surprisingly, increases the demand for fraud protection and authentication methods – namely with digital identity (ID) verification processes. According to Experian’s report, 64% of consumers are very or somewhat concerned with online security, with identity theft being their top concern. So how can financial institutions guarantee a frictionless online onboarding experience while executing proper authentication methods and maintaining security and fraud detection? The answer? While a “frictionless” experience can seem like a bit of a unicorn, there are some ways to get close: Utilizing better data - Digital devices offer an extensive amount of data that’s useful in determining risk. Characteristics that allow the identification of a specific device, the behaviors associated with the device and information about a device’s owner can be captured without adding friction for the user. Analytics – Once the data is collected, advanced analytics uses information based on behavioral data, digital intelligence, phone intelligence and email intelligence to analyze for risk. While there’s friction in the initial ask for the input data, the risk prediction improves with more data. Document verification and biometric identity verification – Real-time document verification used in conjunction with facial biometrics, behavioral biometrics and other physical characteristics allows for rapid onboarding and helps to maintain a low friction customer journey. Financial institutions can utilize document verification to replace manual long-form applications for rapid onboarding and immediately verify new data at the point of entry. Using their mobile phones, consumers can photograph and upload identity documents to pre-fill applications. Document authenticity can be verified in real-time. Biometrics, including facial, behavioral, or other physical characteristics (like fingerprints), are low-touch methods of customer authentication that can be used synchronously with document verification. Optimize your financial services onboarding process Experian understands how critical identity management and fraud protection is when it comes to the online onboarding process and identity verification. That’s why we created layered digital identity verification and risk segmentation solutions to help legitimize your customers with confidence while improving the customer experience. Our identity verification solutions use advanced technology and capabilities to correctly identify and verify real customers while mitigating fraud and maintaining frictionless customer experiences. Learn more

Published: February 23, 2024 by Kelly Nguyen

Today’s digital-first world is more interconnected than ever. Financial transactions take place across borders and through various channels, leaving financial institutions and their customers at increasing risk from evolving threats like identity theft, fraud and others from sophisticated crime rings. And consumers are feeling that pressure. A recent Experian study found that over half of consumers feel like they are more of a target for online fraud than a year ago. Likewise, more than 40% of businesses reported increased fraud losses in recent years. It’s not only critical that organizations ensure the security and trustworthiness of digital transactions and online account activity to reduce risk and losses but what consumers expect. In the same Experian study, more than 85% of consumers said they expect businesses to respond to their fraud concerns, an expectation that has increased over the last several years.   Businesses and financial institutions most successful at mitigating fraud and reducing risk have adopted a layered, interconnected approach to identity confirmation and fraud prevention. One vital tool in this process is identity document verification. This crucial step not only safeguards the integrity of financial systems but also protects individuals and organizations from fraud, money laundering and other illicit activities. In this blog, we will delve into the significance of identity document verification in financial services and explore how it strengthens the overall security landscape.  Preventing identity theft and fraud Identity document verification plays a vital role in thwarting identity theft and fraudulent activities. By verifying the authenticity of identification documents, financial institutions can ensure that the individuals accessing their services are who they claim to be. Sophisticated verification processes, including biometric identification and document validation, help detect counterfeit documents, stolen identities and impersonation attempts. By mitigating these risks, financial institutions can protect their customers from unauthorized access to accounts, fraudulent transactions and potential financial ruin. Compliance with regulatory requirements Financial institutions operate in an environment governed by stringent regulatory frameworks designed to combat money laundering, terrorist financing and other financial crimes. Identity document verification is a key component of these regulatory requirements. By conducting thorough verification checks, financial service providers can adhere to Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations. Compliance safeguards the institution's reputation and helps combat illicit financial activities that can have far-reaching consequences for national security and stability. Mitigating risk and enhancing trust Effective identity document verification mitigates risks associated with financial services. By verifying the identity of customers, financial institutions can reduce the likelihood of fraudulent activities, such as account takeovers, unauthorized transactions and loan fraud. This verification process bolsters the overall security of the financial system and creates a more trustworthy environment for stakeholders. Trust is fundamental in establishing long-lasting customer relationships and attracting new clients to financial institutions.   Facilitating digital onboarding and seamless customer experience As financial services embrace digital transformation, identity document verification becomes essential for smooth onboarding processes. Automated identity verification solutions enable customers to open accounts and access services remotely, eliminating the need for in-person visits or cumbersome paperwork. By streamlining the customer experience and minimizing the time and effort required for account setup, financial institutions can attract tech-savvy individuals and enhance customer satisfaction.  Combating money laundering and terrorist financing Proper document verification is a key component of combating money laundering and terrorist financing activities. By verifying customer identities, financial institutions can establish the source of funds and detect suspicious transactions that may be linked to illicit activities. This proactive approach helps protect the integrity of the financial system, supports national security efforts, and contributes to the global fight against organized crime and terrorism. Identity document verification is a vital component in the layered, interconnected approach to mitigating and preventing fraud in modern financial services. By leveraging advanced technologies and robust verification processes, financial institutions can ensure the authenticity of customer identities, comply with regulatory requirements, mitigate risk and enhance trust.  As financial services continue evolving in an increasingly digital landscape, identity document verification will remain a crucial tool for safeguarding the security and integrity of the global financial system.  For more information on how Experian can help you reduce fraud while delivering a seamless customer experience, visit our fraud management solutions hub.   Learn more

Published: August 3, 2023 by Jesse Hoggard

What Is Identity Proofing? Identity proofing, authentication and management are becoming increasingly complex and essential aspects of running a successful enterprise. Organizations need to get identity right if they want to comply with regulatory requirements and combat fraud. It's also becoming table stakes for making your customers feel safe and recognized. 63 percent of consumers expect businesses to recognize them online, and 48 percent say they're more trusting of businesses when they demonstrate signs of security. Identify proofing is the process organizations use to collect, validate and verify information about someone. There are two goals — to confirm that the identity is real (i.e., it's not a synthetic identity) and to confirm that the person presenting the identity is its true owner. The identity proofing process also relates to and may overlap with other aspects of identity management. Identity proofing vs identity authentication Identity proofing generally takes place during the acquisition or origination stages of the customer lifecycle — before someone creates an account or signs up for a service. Identity authentication is the ongoing process of re-checking someone's identity or verifying that they have the authorization to make a request, such as when they're logging into an account or trying to make a large transaction. How does identity proofing work? Identity proofing typically involves three steps: resolution, validation, and verification. Resolution: The goal of the first step is to accurately identify the single, unique individual that the identity represents. Resolution is relatively easy when detailed identity information is provided. In the real world, collecting detailed data conflicts with the need to provide a good customer experience. Resolution still has to occur, but organizations have to resolve identities with the minimum amount of information. Validation: The validation step involves verifying that the person's information and documentation are legitimate, accurate and up to date. It potentially involves requesting additional evidence based on the level of assurance you need. Verification: The final step confirms that the claimed identity actually belongs to the person submitting the information. It may involve comparing physical documents or biometric data and liveness tests, such as a comparison of the driver's license to a selfie that the person uploads. Different levels of identity proofing may require various combinations of these steps, with higher-risk scenarios calling for additional checks such as biometric or address verification. Service providers can implement a range of methods based on their specific needs, including document verification, database validation, or knowledge-based authentication. Building an effective identity proofing strategy By requiring identity proofing before account opening, organizations can help detect and deter identity fraud and other crimes. You can use different online identity verification methods to implement an effective digital identity proofing and management system. These may include: Document verification plus biometric data: The consumer uploads a copy of an identification document, such as a driver's license, and takes a selfie or records a live video of their face. Database validations: The proofing solution verifies the shared identifying information, such as a name, date of birth, address and Social Security number against trusted databases, including credit bureau and government agency data. Knowledge-based authentication (KBA): The consumer answers knowledge-based questions, such as account information, to confirm their identity. It can be a helpful additional step, but they offer a low level of assurance, partially because data breaches have exposed many people's personal information. In part, the processes you'll use may depend on business policies, associated risks and industry regulations, such as know your customer (KYC) and anti-money laundering (AML) requirements. But organizations also have to balance security and ease of use. Each additional check or requirement you add to the identity proofing flow can help detect and prevent fraud, but the added friction they bring to your onboarding process can also leave customers frustrated — and even lead to customers abandoning the process altogether. Finding the right amount of friction can require a layered, risk-based approach. And running different checks during identity proofing can help you gauge the risk involved. For example, comparing information about a device, such as its location and IP address, to the information on an application. Or sending a one-time password (OTP) to a mobile device and checking whether the phone number is registered to the applicant's name. With the proper systems in place, you can use high-risk signals to dynamically adjust the proofing flow and require additional identity documents and checks. At the same time, if you already have a high level of assurance about the person's identity, you can allow them to quickly move through a low-friction flow. Experian goes beyond identity proofing Experian builds on its decades of experience with identity management and access to multidimensional data sources to help organizations onboard, authenticate and manage customer identities. Our identity proofing solutions are compliant with National Institute of Standards and Technology (NIST) and enable agencies to confidently verify user identities prior to or during account opening, biometric enrollment or while signing up for services. Learn more   This article includes content created by an AI language model and is intended to provide general information.

Published: March 13, 2023 by Guest Contributor

Across all levels of government, we are seeing a surge in digital modernization — transforming the delivery of traditional services into a contactless, digital environment. Whether it is with the Social Security Administration’s digital modernization effort, the state of California’s Vision 2023, or even at the local level with counties modernizing digital access to records for their citizens. This comes at a time when identity fraud in government services is growing at an alarming rate, with an increase of over 2,900 percent related to government benefits or document fraud in 2020 according to the FTC. A key challenge for any agency planning digital modernization is balancing access with security. This is particularly critical in an environment where over 1 billion records were exposed over a recent five-year span. Given the U.S. population is currently about 330 million, that means each citizen had an average of three breach exposures. Therefore, identity proofing must be a critical part of any agency modernization effort. National Institute of Standards and Technology Special Publication (NIST SP) 800-63 revision 3 lays out a risk assessment to help organizations determine the appropriate level of security to apply based on six areas of impact. However, identity proofing a new citizen through digital channels requires significant friction at levels above Identity Assurance Level 1 (IAL1). The stringent requirement for a biometric match in this standard at IAL2 presents a real challenge to the balance mentioned above, which has led agencies to seek alternatives that both combat the risk of fraud and identity theft and are operationally sound. Experian has been supporting the private sector in this endeavor for years, helping them effectively manage identity theft and fraud concerns while allowing seamless access to services for the vast majority of their consumers. This risk-based approach through our CrossCore® platform and multitude of options to identify and combat fraud allows agencies to deliver the security and accessibility expected by their citizens. CrossCore allows agencies to verify and identify citizens using multiple data points: Traditional personally identifiable information (name, address, Social Security number, date of birth) Email Phone number Device identification Biometrics CrossCore can instantly take the risk information from these risk signals above and initiate additional verification where there is a higher risk of identity theft or fraud, including knowledge-based verification (KBV), one-time passcode (OTP) to a trusted phone number linked to the identity being presented, or even remotely verifying identity documents (e.g., driver’s license, passport, etc.) through our new CrossCore Doc Capture solution. Just recently, Experian helped a state lottery agency implement an efficient identity proofing system to enable digital redemption of winning tickets, saving both the government and the citizens time and money. Experian’s identity, verification, and fraud solutions can help government agencies of all sizes on their journey to digital modernization. To learn more about the options available to your agency, visit us or request a call. CrossCore Doc Capture

Published: August 4, 2022 by Guest Contributor

Recently, I wrote about how Experian is assisting NASWA (National Association of State Workforce Agencies) with identity verification to help mitigate the spike in fraudulent unemployment insurance claims. Because of this I was not all that surprised when I found a letter in my mailbox from the Texas Workforce Commission with a fraudulent claim using my identity, inspiring me to follow up on this topic with a focus on fraud prevention best practices. Identity theft is on the rise According to Experian data analysis and a recent study on unemployment insurance fraud, at least 25% of new claims are a result of identity theft. This is 50 times higher than what we have traditionally seen in the highest ID theft fraud use case, new credit card applications, which generally amounts to less than 0.5% of new applications. Increasing digitization of the last few years—culminating in the huge leap forward in 2020—has resulted in a massive amount of information available online. Of that information, a reported 1.03 billion records were exposed between 2016 and 2020. There are currently approximately 330 million Americans, so on average more than three records per person have been exposed, creating an environment ripe for identity theft. In fact, a complete identity consisting of name, address, date of birth, and Social Security number (SSN) can be purchased for as little as $8. This stolen data is then often leveraged by both criminal rings who are able to perpetrate fraud on a large scale and smaller scale opportunists – like the ones in Riverside, CA leveraging access to identities of prison inmates. Fraud prevention through layered identity controls In the 20 years that I have been combatting ID theft both in the private and public sectors, I’ve learned that the most effective identity proofing goes beyond traditional identity resolution, validation, and verification. To be successful, you must take advantage of all available data and incorporate it into a layered and risk-based approach that utilizes device details, user behavior, biometrics, and more. Below, I outline three key layers to design an effective process for ID proofing new unemployment insurance claims. Layer 1: Resolve and Validate Identities Traditional identity data consists of the same basic information—name, address, date of birth, telephone number, and SSN—which is now readily available to fraudsters. These have been the foundation for ID proofing in the past and are still critical to resolving the identity in question. The key is to also include additional identity elements like email address and phone number to gain a more holistic view of the applicant. Layer 2: Assess Fraud Risk Determining an identity belongs to a real-life subject is not sufficient to mitigate the risk of ID theft associated with a new unemployment insurance claim. You must go beyond identity validation to assess the risk associated with their claim. Risk assessment risk falls into two categories – identity and digital risk. Identity Risk When assessing a claim, it’s important to check the identity for: Velocity: How often have you (or other states) seen the information being presented with this application? Has the information been associated with multiple identities? Recency of change: How long has the identity been associated with the contact information (phone, email, address, etc.)? Red flags: Has the subject been a recent victim of ID theft, or are they reported as deceased? Synthetic Identity: Are there signs that the identity itself is fictitious or manipulated and does not belong to a real-life person? Digital Risk Similar to the identity risk layer above, the device itself and how the subject interacts with the device are significantly important in identifying the likelihood a new claim is fraudulent. Device risk can be assessed by utilizing geolocation and checking for inconsistent settings or high-risk browsers, while behavioral risk might check for mouse movement, typing speed, or screen pressure. Layer 3: Verify Highest Risk Subjects The final stage in this process is to require additional verification for the highest risk claims, which helps to balance the experience of your valid subjects while minimizing the impact of fraud. Additional steps might include: Document verification: Scanning a government-issued ID (driver’s license, passport, or similar), which includes assessing for document security features and biometric comparison to the applicant. One-time passcode (OTP): It is key to deploy this sparingly only to phone numbers that have been associated with the subject for a significant time frame and incorporate checks to determine if it is at high risk (e.g., recently ported or forwarded). Knowledge-based verification (KBV): Leveraging non-public information from a variety of sources. By adding additional, context-based identity elements, it becomes possible to improve the three main objectives of most agencies’ identity proofing process – get good constituents through the first time, protect the agency and citizens from fraud, and deliver a smooth and secure customer experience in online channels. While there’s no quick fix to prevent unemployment insurance fraud, a layered identity strategy can help prevent it. Finding a partner that has a single, holistic solution empowers agencies to defend against unemployment insurance fraud while minimizing friction for the end-user, and preparing for future fraud schemes. To learn more about how you can protect your constituents and your agency from unemployment insurance fraud request a call today. Contact us

Published: April 15, 2021 by Eric Thompson

Since 2002, lenders have been aware of the importance of Know Your Customer (KYC) and the associated Customer Identification Program (CIP) requirements. As COVID-19 has changed procedures and priorities for businesses and consumers across the board, it’s more important than ever for institutions to ensure their CIP process includes ongoing monitoring of identity risk.   What is CIP?   Standard KYC programs include a Customer Identification Program to verify and validate identities along with due diligence to assess the risks associated with each identity.   CIP defines the process by which a business collects data to establish a reasonable belief that the identity is valid, and that the individual is eligible to participate in our financial system. While this process works in conjunction with other fraud mitigation tactics, they serve different purposes. A good CIP program emphasizes the customer experience, regulatory compliance, cost control, and smart growth. Fraud mitigation focuses on ensuring that an eligible identity is being presented by its true owner, rather than as part of a scheme to acquire goods and services with intent to default on repayment obligations.   Businesses who focus on solely on fraud mitigation rather than complying with KYC and CIP regulations run the risk of potential harm to business reputation, and of course, financial penalties. Fenergo found that as of the end of 2019, global penalties for AML and KYC non-compliance totaled $36 billion.   CIP vs. Fraud Mitigation Many financial institutions equate a CIP program with efforts to mitigate fraud. It’s understandable, as both processes include emphasis on the accuracy of an identity as it’s presented by a consumer. It is assumed that only the true owner of the identity would possess the detailed information necessary to meet CIP requirements and therefore would not likely be committing fraud.   There was a time—prior to large scale thefts of stored information, personal details shared through social media and other behavior changes that made personal information very public—when this would have been true. Unfortunately, those days have passed and even an amateur criminal with limited experience and resources could find current, accurate identity information for sale online, information good enough to pass the CIP test and be considered a legitimate consumer.   The real challenge is that when they go through CIP, many real consumers may inadvertently provide true information that doesn’t meet the verification standard. This is a result of consumer lifestyle changes outpacing the sources of data used to verify the information they’ve provided. It makes sense; in most years roughly 13% of American adults change their address. New homes, job changes and changes in marital status impact a large number of people every day. Adding to the confusion—it’s life’s changes that prompt people to borrow and purchase. The result is that many of the people that are more likely to fail CIP verification are the very people trying to legitimately access financial services.   The result is that CIP verification often isn’t a challenge for those intending to commit fraud, but it can be for genuine consumers.   The challenges of CIP In a recent internal study, Experian reviewed the ability to pass a standard CIP strategy that assessed the accuracy of the name, current address, date of birth and Social Security number provided by a large sample of consumers. We then compared legitimate consumers to those later confirmed to have been identity thieves impersonating a victim. Consistently, the identity thieves were at least as proficient at passing CIP as their true-consumer counterparts.   In a second step, we applied a fraud score that looked for identity theft by assessing the past uses of the identities, their consistency, velocity and many other characteristics unrelated to the accuracy of the data. The difference between CIP verification and a fraud risk assessment was striking. Across the entire range of fraud risk, the percentage of records that passed CIP verification remained the same.   That said, CIP still plays a very important role in risk mitigation. In fact, CIP and fraud prevention are inextricable in financial services. Just as a CIP verified identity can still be fraud, a record that may appear to be low fraud risk may not pass CIP. Since both processes have existed side by side for nearly two decades, each presumes that the other is in place and both are necessary to detect and prevent fraud.   Striking a balance   CIP verification and fraud mitigation strategies are both necessary and important to protecting assets and the broader financial system from fraud. It’s important to leverage a layered approach where both eligibility and risk are assessed, and next steps for verification include resolution of identity discrepancies alongside verification that ensures an identity is not being misused for fraud.   Experian can help you confidently verify customer identities, understand and anticipate customer activities, and implement ongoing monitoring. If you’d like to set up a review of your current strategy or learn more about how we can help you with CIP and fraud mitigation to strengthen your ability to know your customer compliantly, let us know. Contact us

Published: February 23, 2021 by Chris Ryan

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe