Screening Topics Larry Newcomer Director Domin-8 Value Added Services This session is designed for current Domin-8 Background Screening Users © 2009 Domin-8.

Slides:



Advertisements
Similar presentations
Assurance Services Independent professional services that “improve the quality of information, or its context, for decision makers” Assurance service encompass.
Advertisements

1 ICOTS (Interstate Compact Offender Tracking System) Attachments Training.
The ABCs of Credit Card Finance Essential Facts for Students 2007 Carol A. Carolan, Ph.D.
The ABCs of Credit Card Finance Essential Facts for Students 2012 Carol A. Carolan, Ph.D.
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
The ABCs of Credit Credit Scores Establishing Credit Maintaining Good Credit Credit Cards Managing Credit Challenges.
Understanding the Credit Application Review Process August 2009 By Cheryl Fatnassi-President/CEO Opportunities Credit Union.
Understanding Your Credit Purdue Employees Federal Credit Union.
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
1 Module 1.2 Analyze Your Credit Report and Score Core PFRP for Transition Module 1.2.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
MARKETING INFORMATION AND RESEARCH
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Creating CSUIDs for Associates Eric Galyon ACNS
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
A person or company to whom a debt is owed.
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up © 2009.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
About ONLINE Industry leader for more than 50 years Headquartered in North Carolina Originally a small merchant credit bureau In 1997, focus shifted from.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
MONEY MANAGEMENT II Credit Reports. What We’re Covering Today What a credit report is and why it’s important Credit bureau basics What is actually on.
To Your Credit 1. 2 Introduction Instructor and student introductions. Module overview.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Chapter 9-Section 1 Resolving Credit Problems. Disputing Charges—Credit Card Statement  Disputing Charges—the process of informing a credit card company.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
To Your Credit 1. 2 Purpose To Your Credit will: Show you how to read a credit report. Help you build and repair your credit history.
Credit Reports Take Notes. Cost of CarInterest Rate# of PaymentsMonthly Payment $ 25, %60($438.19) $ 25, %60($460.41) $ 25, %60($483.32)
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
FIXING Your Credit Objectives: Understanding how credit scores are determined. Understanding how consumers actions impact their credit scores.
Is Your Background Check Process Compliant?. 2 © Copyright 2015 ADP, LLC. Proprietary and Confidential Information. Agenda Privileged & Confidential.
Credit Cards. When thinking of getting a Credit Card follow the Three C’s: Character: Will you repay the debt? How you used credit before? Do you pay.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Chapter 3 What You Need to Know about Your Credit Report Identity Theft.
1 Identity Theft Prevention and the Red Flag Rules.
The Costs and Methods of Obtaining Credit Morgan Napier and Kaitlin Nelke.
Presented by: David Reid, DBA International
Small Business and Personal Credit
Chapter 3: IRS and FTC Data Security Rules
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Your Credit and the Law Chapter 27 5/24/2019.
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Screening Topics Larry Newcomer Director Domin-8 Value Added Services This session is designed for current Domin-8 Background Screening Users © 2009 Domin-8 Enterprise Solutions LLC. All rights reserved.

2 Agenda Current Trends What is your screening profile and why might it need attention? Maximizing your screening results Know your applicant: Identity Verification Federal Trade Commissions new Red Flag rules A look ahead Your questions

3 Screening in Todays Market How has the current economic client affected your applicants? Headlines point to higher unemployment, foreclosures and growing consumer debt. So applicant credit quality should follow, right?

4 Screening in Todays Market Analysis of Applicants – Last 6 months vs. previous Surprisingly, the average applicant credit profile has actually improved slightly Source: Domin-8 Enterprise Solutions Screening Data, September 1, 2009; Rental Applicants Only

5 Screening in Todays Market From a broader perspective Increase in credit scores across all geographies, during the March 2009 to June 2009 time period, BUT… For the third straight month the percent of credit scores rising has tapered off and more consumers are seeing their credit scores remain stable. (source: CreditKarma) Currently, people with higher credit scores maintain more stable credit scores while those with marginal credit scores tend to be in flux. Younger people scores see the highest increase, while older people tend to have more stable credit. Geographic fluctuations may increase, as some areas experience larger economic changes such as job loss, foreclosure, bankruptcy or impacts of the economic stimulus plans. (source: Equifax)

6 Screening in Todays Market Whats ahead? –BusinessWeek - July 14, 2009 Credit Scores Will Keep Dropping Even though the recession is more than a year old, it is only recently that credit scores began dropping Credit scores have just begun to fall dramatically as banks and jobs keep tightening

7 Your screening profile…does it need attention? Your companys screening profile defines the minimum standard for acceptable applicants Some companies are re-evaluating resident selection criteria in light of the current economy. –Balancing risk vs. occupancy –Slightly loosening credit criteria…more focus on factors that tend to be predictive of short term behavior Focus on landlord/tenant records (evictions, landlord collections) Foreclosure forgiveness Shorter time horizons Remember, bankruptcy laws have changed If you see a rising number of declines and overrides… –Overrides introduces higher subjectivity…and fair housing risk –Let us know if you need a screening profile review

8 Maximizing your screening results Always examine the report…even when approved –Look at ID section for Red Flags –Check residence history. Is there another previous residence that should be verified? –OFAC alertsOFAC alerts –We return Serious Criminal Records Matching on Name Only. Usually not the applicant, but just in case. Not used in the decision since we cant match the record on anything other than the name. Usually occurs with very common names. Often a photo returned with the record.photo We check for known aliases and run additional criminal checks if any last names found are different. Identity information on the application may not be as strong as what is on the Government issued ID. You can decline an applicant in screening if they fail Identity Verification Sex Offender Records in 9 states dont provide a specific DOB…Hawaii doesnt provide any age informations

9 Maximizing your screening results Domin-8 Background Screening incorporates: –Non-proprietary, industry leading data sources CSC Credit Services and Equifax backgroundchecks.com criminal data –Industry Leading 542 Sources LexisNexis eviction records –Sourced from billions of public court records LexisNexis Instant ID Verification –Billions of records and thousands of independent data sources –Advanced Screening Options Adds direct to the jurisdiction search Recommended to aid the formidable line of defense minded Especially important in areas where criminal records are less available to third party data bases

10 Know your applicant: Identity Verification Why is Identity Verification important? –Is the applicant being truthful? –Is there info they dont want you to know? Previous landlord Criminal record Eviction Other credit issues –Are they hiding behind someone elses identity? –Is the applicants info difficult to read on the application? –Can a digit in the SSN or date of birth be mis-keyed?

11 How does Identity Verification work? Most adults in the United States have some footprint in public and non-public databases through credit accounts, phone records, shipments, address records, etc. Mis-information on the application usually comes in the form of one inconsistent data element –Transposed numbers in SSN –Different last name –Altered date of birth –Phony, temporary of previous address Input information is checked against this database Inconsistencies flagged…identity verification score (risk index) Can be a test, that if failed, stops the screening process

12 How does Identity Verification work? (continued) Common identity issues to watch for: –Multiple or other names associated with the SSN. These may be legitimate in situations such as newly married spouses with new last names –Fraudulent Social Security Numbers. Some people will try transposing numbers in their SSN, use a friend or relatives SSN, or make up an SSN. –Input address may be a previous address. If the applicant doesnt want you to know where they last lived, often they will provide a previous address. –Unverifiable Date of Birth. To avoid detection, some may use a transposed or made-up Date of Birth

13 How does Identity Verification work? (continued) Some applicants may legitimately have unverifiable identity information –Applicants who are very young and just starting out –Special care residents –Elderly spouses –New immigrants may not have had the opportunity to establish themselves in US consumer information databases.

14 Getting the most from Identity Verification Check the input Info from ID vs. Application If your software has a separate field for middle name or initial, enter that information as often as possible. Middle names or initials are very important, especially when the persons first and last name is very common. Use the name as it appears on the government issued ID whenever possible If the person is very recently married, use the maiden name. If the newlywed is now using a compound or hyphenated last name, consider using only the maiden part of the last name. For Hispanic culture names, where a primary and secondary last name is used, only enter the primary or first last name. For example, if the last name provided is Lopez Martinez, enter Lopez only as the last name. If your software does not have a separate field for name suffixes, do not enter them in the last name field. Suffixes include Jr. or Junior, Sr. or Senior, or II or III, etc.

15 Social Security Numbers and ITINs SSNs are, of course, important in verifying the identity of an applicant and returning accurate screening results. –We recommend requiring –Never enter a random SSN. Leave blank or use and obvious substitute SSN such as –A random SSN will Identity Verification issues, possibly return inaccurate information, mis-identification of credit history or even delay your result. –May trigger an Identity Theft Red Flag Individual Tax Identification Numbers (ITIN) –9 digit numbers that are formatted like SSNs and are issued by the IRS for foreign nationals. –ITIN may be entered in lieu of a SSN, however, they do not aid in the Identity Verification process IF associated with credit info. –If the applicant with an ITIN has established any credit associated with that ITIN, including the ITIN in the SSN field may help find such credit records. As identity theft increases, more SSNs will have multiple names associated.

16 Entering addresses Use a complete street address and become familiar with US Postal Service (USPS) formats and abbreviations –Most addresses in public records have been standardized to USPS standards. Never guess at the zip code Never use PO Boxes or temporary addresses such as motels or the address someone is living with temporarily. Use the last known established address if possible. –Keep track of temporary address for correspondance and AAL.

17 More precision in entering applicant info = better screening results

18 FTC Red Flag Rules Consult with your attorney. This is not legal advice. Part of the 2003 Fair and Accurate Credit Transactions Act or FACTA Commonly known as the Red Flag and Address Discrepancy Rule Overall objective is to prompt businesses to take additional steps to authenticate a persons identity when certain warning signs of potential id theft are present. –A Red Flag occurs when a key element of a provided persons identity is inconsistent with information found primarily in credit files. –Names, addresses, SSNs, date of birth Rules effective date delayed until November 1, 2009

19 FTC Red Flag Rules NMHC Guideline statement: –While apartment owners solely engaged in the business of renting apartments are not expressly obliged to comply with the rule in its entirety, given the complex nature of some business operations, firms are encouraged to familiarize themselves with the entire rule and to consult with counsel to ensure their overall compliance obligations. Pretty vague? This part seems pretty clear… –Civil fines of up to $2,500 per violation for knowing violations of the rule that constitute a pattern or practice.

20 FTC Red Flag Rules NMHC Guideline statement (contd): –The apartment industry as "users" and "furnishers" of credit report files, have more limited compliance obligations, but they are still extremely important. –Landlords are obliged to comply with the third section of the rule that implements Section 315 of the FACT Act and applies to users of credit reports. –Section 315 of the FACT Act requires users of consumer reports to develop reasonable policies and procedures that they must apply when they receive a notice of address discrepancy from a consumer reporting agency.

21 FTC Red Flag Rules No apparent requirement to report Red Flags to Credit Bureaus unless you are reporting accounts today. List of compliance provisions apartment firms should include in their screening process and ID theft programs. –Data Destruction. The FTCs Data Disposal Requirements require firms that use consumer reports, or information derived from such reports, to take "reasonable measures" to protect against unauthorized access to such data during disposal. –Adverse Action Notice. When firms take an adverse action based solely or partly on the basis of the information derived from a consumer credit report, they must provide a notice of this action to the consumer. –Law Enforcement Requests. Firms must comply with requests from law enforcement officials to turn over any records related to a transaction that may involve identity theft such as rental applications. –Debt Collection Prohibition. Property owners and managers are prohibited from pursuing debt collection efforts with a third party if notice had been provided to the owner that the debt is the result of identity theft. –Refurnishing Information Prohibition. Once property owners are notified by a consumer reporting agency (CRA) that consumer information provided by the owner is the result of identity theft, owners are prohibited from refurnishing that information to anyone else. –Reinvestigation of Consumer Information. Under certain conditions, property owners will be required to reinvestigate the accuracy of information provided to a CRA if it is disputed by the consumer as being the result of identity fraud.

22 FTC Red Flag Rules No express requirement that the required policies and procedures on address discrepancies be in writing. However, to ensure appropriate measures are being followed by employees company-wide, and to reduce the potential for violation, a written policy is highly recommended. Red Flag events your policy should cover: –Suspicious Documents –Identification is not consistent with information provided by the person or information that is on file with the financial institution or creditor –Address does not match any address in the consumer report –Social Security number (SSN) has not been issued, or is listed on the Social Security Administrations Death Master File. –Personal identifying information provided is of a type commonly associated with fraudulent activity (Transient or fictitious address, PO Box, etc.)

23 Key Elements of a Red Flag Program IDENTIFY –Identify red flags or ID theft warning signs relevant to apartment business operations. DETECT –Monitor business operations to assess or detect the occurrence of one or more of your company identified red flags. RESPOND –Implement the appropriate response based on red flag(s) detected. REPORT –If red flag is an address discrepancy and you meet criteria, report accurate information to CRA. UPDATE –Review effectiveness of your program and update annually. Source: NMHC Publication "Red Flags" and "Address Discrepancy" Rules Quick Reference Steps to Compliance

24 Overview of a Red Flag Program Source: NMHC Publication "Red Flags" and "Address Discrepancy" Rules Quick Reference Steps to Compliance

25 Domin-8 Screening Red Flag Features Decline based on Identification failure –Insures appropriate attention given Discrepancies noted on report –Note: Discrepancies dont necessarily hinder a successful background check… –Lets look at some examples…

26 Suspicious Address Alert

27 Potential Use Of Previous Address Valid Street Address

28 A look ahead… Web accessible Management Reports –Screening Recap Report Single property or groups Recaps Applicant Quality/Demographics, Results Variable time horizons Future? –Bad, ex-resident analysis –Override analysis –Others? Marketing Source Analysis Zip Code Analysis Rental Payment History –Use history in decisions –Provide history Decisioning Profile Maintenance Criminal Monitoring and Alert Option for AALs in Spanish

29 Questions?