New Products for the Public Sector The products that will change your work life Presented by: Derek O’Halloran Date: 14 th June 2007.

Slides:



Advertisements
Similar presentations
Red Flag Rules: What they are? & What you need to do
Advertisements

Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Christian Brooks 19 th October 2005 Keep your data clean.
Wheel of misfortune The pitfalls of leaving data to chance Presented by: Hannah Graham & Alex Mountain Date: 13 th November 2007.
Janice Kephart Director of National Security Policy, Center for Immigration Studies Heritage Foundation July 14, 2009.
Enter date here Authenticate Pro Helen Clift 15 th November 2005.
A Future with E-cheques Mr. Shu-Pui Li Head, Financial Infrastructure Development Division Financial Infrastructure Department Hong Kong Monetary Authority.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
The fundamentals of European address management Presented by: Derek O’Halloran Date: 13 th February 2007.
Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Technology for an easier life The products that will change your work life Presented by: Elaine Roche Date: 14 th June 2007.
BANK WIZARD Bank account verification Presented by: Aidan Sparrowhawk Date: 18 th September 2007.
The Rental Exchange Julie Alexander Income Collection Policy.
FDIC Money Smart for Young Adults
SOLVE THE PROBLEM OF IDENTITY THEFT An online, real-time solution for KYC, POPI, RICA and FICA compliance May
E-Banking is the use of electronic means to conduct banking business, such as telephone, Internet, cell phone, or other device by way of secure internet.
 Voter ID Laws GROUP 24 Joyce Anderson, Douglas Grant Caitlyn Smith, & Alice Willis.
MIFOS TRAINING SLIDES. 2 KNOW YOUR CUSTOMER KNOW YOUR CUSTOMER It is the policy of (ENTER YOUR ORGANIZATION’S NAME HERE) to comply with the (ENTER REGULATORY.
Royal Aeronautical Society : Using QAS to capture accurate contact details Presented by: Andrew Little Date: 25 th May 2007.
Wireless Password: ONLINE GAMING / GAMBLING KNOW - YOUR - CUSTOMER AND RISK MANAGEMENT.
Back to basics Presented by: Adam Mellor Date: 12 th June 2007.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Identity verification in the private sector Chris Gration 30 March 2006.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
1 Permits, Licenses and Inspections Regional Project Introductions: Home Builders & Remodelers Association of Cape Cod State Project Sponsor & Technical.
Identity theft: Real or Virtual? By: Alex Metzler.
ICT in Banking.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
New Jersey Driver License System
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Electronic authentication: validating and verifying customer identities and bank details Presented by: Stan Matthews & Scott Robertson 13 th November 2007.
Be Cautious of Identity Theft By: Sydney Langley.
CHAPTER ONE YOUR NJ DRIVER LICENSE. I. Your NJ Driver License A. Things to have on you when driving: 1. Drivers License 2. Proof of Insurance 3. Registration.
 Komal  Hareesh  Pawan  PrasannJit  Shivam THE IMPROVISERS.
Maintaining accurate contact data throughout its lifecycle Presented by: Hayley-Jayne Cone & Ben Sekhon Date: 13th November 2007.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Database What is a database? A database is a collection of information that is typically organized so that it can easily be storing, managing and retrieving.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
Advanced Secure Technologies Secure Document Technologies.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Can you spot the honest customer… …from the fraudster? Presentation by: Alex Bowes, Corporate Sales Manager, 192.com Business Services.
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
SABRE VIRTUAL PAYMENTS Karen Frayer Sabre Virtual Payments Manager.
Introduction to Bank Accounts. Questions? Why do some people choose not have a bank account? What are some advantages to having a bank account? What is.
Electronic Outage Reporting Proof Of Concept Report July 8, 2002.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
LexisNexis Risk Management. LexisNexis. Content Corporate Risk Solutions Legal Research International Legal, News & Business Database § Lexis.com § LexisLibrary.
U.S. Department of Agriculture eGovernment Program eAuthentication Initiative eAuthentication Solution Screens Review Meeting October 7, 2003.
By Brooke Rogers Identity theft is the act of acquiring and collecting a persons information with the intent of using it for criminal purposes. Identity.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Monty Faidley Director, Market Planning The Iowa story 3.
Home business. Online shopping and searching for products on websites Many people search for and order services and products using the Internet. Online.
Protecting Your Credit Identity
Smart Data infrastructure
Home business.
When you get caught for Identity Theft
Client Onboarding Process Flow
Intrinsic URU ID System Self Learning Module
Identity Theft Prevention Program Training
Protecting Your Identity
Presentation transcript:

New Products for the Public Sector The products that will change your work life Presented by: Derek O’Halloran Date: 14 th June 2007

Dislikes

Technology is the answer

What’s new? Up to date data (Electronic data updates) Streamlined and accurate bank account validation (Bankwizard) Identity Theft – Reducing the time, cost and risk of paper-based proofs Identity Theft – Paper-based proof of ID checks

Up to date data

Improves processes Removes updating data from your to do list Substantial time savings Eliminated risk of data expiry Removes need for downtime

Up to date data

Bank account validation Inaccurate DD Headache for finance/admin getting it corrected/annoying for customer QAS, George West House, Clapham, London, SW4 0QL 5.QAS Ref

Implications of getting it wrong Financial Admin Chance of losing customers Negative PR

Technology for an easier life “Since implementing BANK WIZARD we have virtually eliminated the problems associated with processing incorrect bank details. I would have no hesitation in recommending BANK WIZARD to any organisation processing large volumes of Direct Debits” Shelagh Osey, Financial Services Manager

Proof of identification Typical Requirements: Photo Proof – Passport, Driving License Proof of Address – Driving License, Utility Bill Fake ID’sStolen ID’s

Documentary evidence Cost of Processing/Storage Training Customer Service EFFECTIVENESS Easily forged Easy to obtain genuine documents Detection of forgeries

How does it work? Data Input Name and Address validation Validation Establishing the existence of a real world identity Verification Positive corroboration of identity and biographic details supplied Key fraud indicators Authentication

How to… create your own fake identity

How big is the problem? Source: CIFAS Online YearCases Recorded , , , , , , ,000 Identity fraud cost the economy £1.7 billion / year (Home Office, February 2006) Identity fraud accounts for a criminal cash-flow of £10m per day There are 80 million active National Insurance numbers in the UK, with a population of 60 million

How does it work? Authenticate Capture Fields Validated Name and Address Date of Birth Time at address Former Addresses Time at these addresses Male or Female Telephone Numbers No of Dependents Bank Details Owner Occupier PAF QuickAddress Pro ER Name Address Data Input Yes No 70 Authentication Index Authentication Secure Internet Connection Validation Verification

Breadth & depth weighting  Breadth No. corroborative matches against data sources  Depth How far back in time the record goes  Quality Type of record and level of due diligence performed in its creation Authentication Index

Authenticate Hosted, Integrated or bespoke Solution fast & easy to implement Name & Address verification on entry Breadth & depth of Experian data Pre-configured authentication templates Easy to use – improves business process Compliant

Validating paper proofs

Thank you for listening Presented by: Derek O’Halloran Date: 14 th June