Own Your Identity.

Slides:



Advertisements
Similar presentations
Identity Theft and Online Identity Solutions Heidi Inman May 29, 2008.
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
JPMorgan Chase Purchasing Card Training
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Understanding Commercial Card and the use of Controls Louisiana GFOA Fall Conference October 9, 2014 Rhonda C. Engel, SVP Commercial Card Sales Manager.
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Paychecks and Tax Forms. Where Does My Money Go? Almost 31% of an individual’s paycheck is deducted  Taxes are the largest expense most individuals will.
Paychecks and Tax Forms Take Charge of your Finances
Warm-up: April 11 What’s the difference between a checking and savings account?
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
House Committee on Business and Industry House Bill Implementation of Closed Account Notification System Texas Department of Banking April 22, 2008.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
Electronic Payment Systems
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
An owner or “holder” of a credit or debit card or the person who is using a credit card to pay for goods or services CARDHOLDER.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Safe and Secure Internet Gambling Financial Model.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Traditional and Electronic Payment Methods Chapter 3.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
G1 © Family Economics & Financial Education – Revised March 2008 – Paychecks and Taxes Unit – Understanding Your Paycheck Funded by a grant from.
PAYPAL PRESENTED TO:SIR ADNAN PRESENTED BY:SAIMA ASGHAR
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
CREDIT CARD PAYMENT SYSTEM System involves Several major participants Purchaser that is cardholder Card Issuer that issues credit card Merchant that makes.
Electronic Banking 7.3. EFT  Electronic Funds Transfer Banks ability to move money from one account to another by computer  Advantages to Banks (Cost.
A Brief Introduction Radiant Pay, a global provider of payment processing services to all kinds of business, Radiant Pay Services.
Banking in the United States. U.S. Banking System Overview  The Federal Reserve System is the central banking system of the United States.  Regulates.
Protecting Your Credit Identity
ELECTRONIC PAYMENT SYSTEM
Take Charge of your Finances
Checking Account & Debit Card Simulation
Gift Card Risk Mitigation – Presentation A
Entrepreneurship Secure Ordering Presented By Mrs. Bowden.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Electronic/Online Banking & Bill Pay
Take Charge of your Finances
Federal Reserve Bank of Atlanta-Retail Payments Risk Forum
Paychecks and Tax Forms Take Charge of your Finances
Protecting Your Credit
17 Banking and Financial Services
Own Your Identity.
Identity Checkpoint is
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Checking Services and Credit-Card Transactions
WorldWidePIN Corporation
Protecting Yourself from Fraud including Identity Theft
Identity Checkpoint is
Smart Business for eGeneration Companies
Protecting Your Credit Identity
Checking Services and Credit-Card Transactions
Take Charge of your Finances
Checking Accounts, Debit Cards & Check Writing
Protecting Yourself from Fraud including Identity Theft
Ski Clubs and E-Commerce
Checking Services and Credit- Card Transactions
Getting the Green Light on the Red Flags Rule
Smart Business for eGeneration Companies
Identity Theft and Credit Safety
Presentation transcript:

Own Your Identity

The Problem: Identity Theft Identity theft was the number one consumer complaint to the Federal Trade commission last year. In 2014 alone, more than 1 Billion personal records were leaked. Financial losses totaled more than $50 Billion 1 . Once your information is out there, its difficult to regain control. There are two primary forms of identity theft: Personal Identity Theft SSN’s, Passports, Computer User IDs Financial Instrument Theft Cards, Checks, Electronic Transfers

Current Providers: After-the-fact Identification Credit monitoring services do not protect consumers from identity theft. They only notify impacted individuals after their information has been compromised. Models that scan activity and look for anomalies in transaction requests do hinder malicious activity, but they can create friction for consumers in the process. Those who have had their cards and accounts locked incorrectly express significant frustration with the process. Most systematic indicators and ‘red flags’ are triggered at the end of transaction processes generating millions in fees and losses for processors and banks each year. Identity Fraud Continues to Grow Credit Card Fraud by Source   Credit Card Fraud World Wide 1983- 2014 Losses Continue to Rise  

The Problem: Identity Theft The predominant targets for identity theft focus on easily-accessible identifiers including card numbers, bank account details and personally identifiable data elements. All processes are at risk. Card Transactions Card Present transactions are more mainstream but still do not allow the merchant to confirm your identity. CNP transactions continue to grow reducing the ability to prohibit identity theft through card design. Systematic methods require massive data processing and storage expenses. And they block less than 50% of fraudulent activity. Back-Office Operations Industry standard procedures enforce dual validation. However, back office personnel are still accountable for final approval / release of funds allowing for misuse of personal information. In addition, processes are often cumbersome for both the front and back office due to the required validations. Electronic Fund Transfer The fastest growing segment of the payments space is Electronic Funds Transfer. Millennials are more comfortable using ETF and Cards than paying in cash or check. This opens more transaction channels to the risk of identity theft. Personal Account Details Once compromised, data can be leveraged again and again. New accounts can be created, loans can be secured and monies can be transferred away. And, this data can now be used in other areas of a person’s life like health and tax records. Current processes fail to verify a persons identity prior to authorizing transactions.

The Solution: Sentry Using Software as a Service (SaaS) functionality, Identity Checkpoint’s Sentry service contacts registered account owners directly on their device for approval prior to releasing transactions to processing systems. Back-Office Operations Industry standard procedures enforce dual validation. However, back office personnel are accountable for final approval / release of funds. Processes are often cumbersome Card Transactions CNP transactions continue to grow rendering physical card changes to prohibit fraud less effective. Systematic methods require massive data processing and storage expenses. And they block less than 50% of fraudulent activity. Processing & Payment integration at the bank and processor level Decrease in the losses associated with identity theft Electronic Fund Transfer The fastest growing segment of the payments space is Electronic Fund Transfer. Millennials are more comfortable using ETF and Cards than paying in cash or check. Personal Account Details Once compromised, data can be leveraged again and again. New accounts can be created and monies can be transferred away…. Point of Sale identity theft prevention opportunity Direct Consumer Engagement Current processes fail to verify a persons identity prior to authorizing transactions.

Sentry by Identity Checkpoint Using a pre-authorized device, registered users authorize/ decline transactions. Only those that are approved are released to processing engines. Fraudulent activity is stopped by the identity owner up front. No wasted processing. No Chargebacks. Immediate knowledge of suspicious activity. No Financial loss to bank or consumer.

Electronic Funds Transfer Solution: Sentry from Identity Checkpoint. Each bank leverages disparate processes, particularly within the back office. Sentry can be integrated at several potential points. SWIFT SWIFT Front Office FedWire FedWire ACH ACH Sender Sending Bank Intermediary Bank Receiving Bank Receiver I1, I2, I3,… Fed Back Office Batching (Manual / Electronic) Operator Management Approval (Multistep)

Credit/Debit Card Solution: Sentry from Identity Checkpoint. Transactions are sent to the registered individual for approval BEFORE being released to credit card company for processing. Real-Time approval via registered device –or- Pre-defined approval parameters that ‘green light’ the transaction: Dollar Amount, Store, Physical Location, etc. Customers: Confidence- Only items they approve are sent to processing. Merchants/Vendors: Savings- Only validated transactions get through. No lost stock, no chargebacks, decreased costs.

In Store Purchase Solution: Sentry from Identity Checkpoint. RFID, Chip and Swipe technologies help validate that the card is legitimate. However, they do not validate that the person using the card is authorized to do so. Real-Time approval via registered device –or- Pre-defined approval parameters that ‘green light’ the transaction: Dollar Amount, Store, Physical Location, etc. Customers: Confidence- Only items they approve are sent to processing. Merchants/Vendors: Savings- Only validated transactions get through. No lost stock, no chargebacks, decreased costs.

Wire Transfers (Front Office) Solution: Sentry from Identity Checkpoint. Prior to processing final wire submission, account owner is prompted for approval. Real-Time approval via registered device Negative responses are not released for processing. Customers: Confidence- Only items they approve are sent to processing. Banks: Confidence- Only approved items are processed; Savings- Only validated transactions get through. No lost funds.

Check Solution: Sentry from Identity Checkpoint. Retailer can use the online verification check to validate checking account numbers use and issuance of a specific check. No release of product without validation of account. More manual process but it enables Customers: Confidence- Only items they approve are sent to processing. Banks: Confidence- Only approved items are processed; Savings- Only validated transactions get through. No lost funds.

Personal Account Information Solution: Sentry from Identity Checkpoint. Individuals can maintain their own information on sites, via apps and via established in-person protocols. Individual oversite of all changes. If the individual did not prompt the request to update/modify personal information, the change is not released into database. ‘Safety Net’ review of the modified elements via Sentry. i.e., Do you approve address change of XXX?

Demonstrations (recorded) Credit/Debit Card – Online Credit/Debit Card – In Store Check – Online Check – Written Transfer Between Bank Accounts Wire Transfer User ID Use Government ID Use