Presentation is loading. Please wait.

Presentation is loading. Please wait.

This is a presentation Cover. Place one copy of this slide at both the beginning and end of your presentation or meeting.

Similar presentations


Presentation on theme: "This is a presentation Cover. Place one copy of this slide at both the beginning and end of your presentation or meeting."— Presentation transcript:

1 This is a presentation Cover. Place one copy of this slide at both the beginning and end of your presentation or meeting.

2 R253 G200 B47 R112 G144 B183 R227 G127 B28 R76 G51 B39 Charts and Graphs Color Palette R173 G175 B175 R0 G53 B145 ID Analytics Confidential © 2008 R109 G39 B106 R0 G87 B81 R119 G49 B65 R167 G25 B48 R118 G106 B101 R106 G138 B127 ID Analytics Thomas Oscherwitz Vice President Government Affairs and Chief Privacy Officer ID Analytics, Inc. The Privacy Symposium August 20,

3 R253 G200 B47 R112 G144 B183 R227 G127 B28 R76 G51 B39 Charts and Graphs Color Palette R173 G175 B175 R0 G53 B145 ID Analytics Confidential © 2008 R109 G39 B106 R0 G87 B81 R119 G49 B65 R167 G25 B48 R118 G106 B101 R106 G138 B127 I am Sam. Yes, I am. More OpportunityLess Risk I am Sam. Yes, I am. Am I Sam? Identify and isolate high risk customers Reduce fraud losses Identify bust-out, collection problems Deliver better targeted offers Supplement credit decisioning processes More potential from more customers Lower abandonment rates Lower customer acquisition costs Drive incremental revenue Improve the customer experience 3

4 R253 G200 B47 R112 G144 B183 R227 G127 B28 R76 G51 B39 Charts and Graphs Color Palette R173 G175 B175 R0 G53 B145 ID Analytics Confidential © 2008 R109 G39 B106 R0 G87 B81 R119 G49 B65 R167 G25 B48 R118 G106 B101 R106 G138 B127 Advanced Analytics Patent-pending analytics for identity risk Compares identity patterns to fraud behavior patterns New identity elements add additional dimensions ( , device fingerprints, IP geo-location, etc.) Linkages enable unique insight of identity risk 4 Two names, and phone numbers are associated with a common address, IP Address, and Device Two SSNs are associated with one address, yet one SSN is associated with two names Good Pattern Fraud Pattern Address Phone SSNName (non-applicant) Applicant Name IP Address Device Finger Print

5 R253 G200 B47 R112 G144 B183 R227 G127 B28 R76 G51 B39 Charts and Graphs Color Palette R173 G175 B175 R0 G53 B145 ID Analytics Confidential © 2008 R109 G39 B106 R0 G87 B81 R119 G49 B65 R167 G25 B48 R118 G106 B101 R106 G138 B127 ID Network ® First national, cross-industry compilation of identity information 360 billion total aggregated attributes 750 million unique identity elements Average daily flow = 45 million 2 million reported frauds 1 billion consumer transactions Contains information about: Credit applications Card transactions Payments Change of name/address Demographics Data is never sold or distributed ID Network 5

6 R253 G200 B47 R112 G144 B183 R227 G127 B28 R76 G51 B39 Charts and Graphs Color Palette R173 G175 B175 R0 G53 B145 ID Analytics Confidential © 2008 R109 G39 B106 R0 G87 B81 R119 G49 B65 R167 G25 B48 R118 G106 B101 R106 G138 B127 Examples of Unique Visibility High-risk identity patterns -Address/phone associated with reported fraud in separate industry -High velocity of cross-industry activity using a single identity -High number of individuals claiming to live in single family residenc Low-risk identity patterns -Consistent stable identity activity at a given address -Related names using same address/phone combination as identity asserted in an order Risk-based analytics interpret relationships and multiple important risk factors

7 R253 G200 B47 R112 G144 B183 R227 G127 B28 R76 G51 B39 Charts and Graphs Color Palette R173 G175 B175 R0 G53 B145 ID Analytics Confidential © 2008 R109 G39 B106 R0 G87 B81 R119 G49 B65 R167 G25 B48 R118 G106 B101 R106 G138 B127 Address Phone SSN Applicant Name Asserted Info on App Invalid SSN Date of birth occurs after SSN issuance 2 apps on same day, different addresses 10 people at this address, invalid SSNs Real World Example 7

8 R253 G200 B47 R112 G144 B183 R227 G127 B28 R76 G51 B39 Charts and Graphs Color Palette R173 G175 B175 R0 G53 B145 ID Analytics Confidential © 2008 R109 G39 B106 R0 G87 B81 R119 G49 B65 R167 G25 B48 R118 G106 B101 R106 G138 B127 1 Social Security Number 3 Names 4 Addresses >30 Applications over 2 years Oct ‘05Feb ‘06June ‘06Oct ‘06Feb ‘07June ‘05 Applications from “Jim” Applications from “Bob” Applications from “Gary” Address 1 Address 2 Address 3 Address 4 Cross-industry insight “Bob” submitted only one credit application to this specific company Cross-industry view of data required to pinpoint identity fraud Identity Risk: High Power of Cross-Industry Data – Identity Fraud Case Study

9 R253 G200 B47 R112 G144 B183 R227 G127 B28 R76 G51 B39 Charts and Graphs Color Palette R173 G175 B175 R0 G53 B145 ID Analytics Confidential © 2008 R109 G39 B106 R0 G87 B81 R119 G49 B65 R167 G25 B48 R118 G106 B101 R106 G138 B % 68.8% 75.3% 83.0% 0.0% 10.0% 20.0% 30.0% 40.0% 50.0% 60.0% 70.0% 80.0% 90.0% Riskiest 1%Riskiest 3%Riskiest 5%Riskiest 10% Top 5 Financial Services Provider Fraud Loss Prevention Opportunity: $12MM/year % of Fraud Losses Detected 69% of fraud losses isolated in riskiest 3% of credit applications ID Network Results – Fraud Detection

10 This is a presentation Cover. Place one copy of this slide at both the beginning and end of your presentation or meeting.


Download ppt "This is a presentation Cover. Place one copy of this slide at both the beginning and end of your presentation or meeting."

Similar presentations


Ads by Google