BANK WIZARD Bank account verification Presented by: Aidan Sparrowhawk Date: 18 th September 2007.

Slides:



Advertisements
Similar presentations
A business makes payments for what it buys, In return it receives payments for goods it sells or services it provides.
Advertisements

Derek OHalloran 15 th March 2006 Improving Service, Delivering on Efficiency.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Christian Brooks 19 th October 2005 Keep your data clean.
Wheel of misfortune The pitfalls of leaving data to chance Presented by: Hannah Graham & Alex Mountain Date: 13 th November 2007.
1 Introduction General Accounting is responsible for managing the University’s general ledger accounting system. The General Accounting office’s main goal.
Enter date here Authenticate Pro Helen Clift 15 th November 2005.
New Products for the Public Sector The products that will change your work life Presented by: Derek O’Halloran Date: 14 th June 2007.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Intact from QAS Presented by: Scott Mair Date: 15 th June 2005.
About ONLINE Industry leader for more than 50 years Headquartered in North Carolina Originally a small merchant credit bureau In 1997, focus shifted from.
Technology for an easier life The products that will change your work life Presented by: Elaine Roche Date: 14 th June 2007.
Basic Banking Services - Activity 1
Completing a new CRB Form: Guidance notes for Safeguarding Officers / CRB Verifiers August 2012.
The Rental Exchange Julie Alexander Income Collection Policy.
Back to basics Presented by: Nichola Fletcher, Central Government Account Manager.
SOLVE THE PROBLEM OF IDENTITY THEFT An online, real-time solution for KYC, POPI, RICA and FICA compliance May
CS 501: Software Engineering Fall 2000 Lecture 14 System Architecture I Data Intensive Systems.
UNIVERSITY OF PENNSYLVANIA PAYROLL CUSTOMER SERVICE OVERVIEW July 1, 2003.
MLC Online Applications Adviser Guide. 2 Introduction MLC Online Applications have been designed to provide you with an improved means of submitting client.
Mark Hollyhead 4 th May 2005 Maintain your data, retain your customers.
Rebecca Clayton 4 th May 2005 The lifeblood of a healthy organisation.
Depository Accounts Reconciliation CASH, CHECKS, E-CHECKS and LOCKBOXES 1.
Royal Aeronautical Society : Using QAS to capture accurate contact details Presented by: Andrew Little Date: 25 th May 2007.
Chapter 13 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Auditing Human Resources Processes: Personnel and Payroll in Service Industries.
Back to basics Presented by: Adam Mellor Date: 12 th June 2007.
Gaining Efficiency from Technology  Budgets are being slashed but workloads are not changing.  Government can not afford not to invest in new Technology.
The ABCs of Credit Card Finance Essential Facts for Students 2010 Carol A. Carolan, Ph.D.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Safe and Secure Internet Gambling Financial Model.
ICT in Banking.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
LEVERAGING SAP SOLUTIONS FOR UTILITIES AND PUBLIC SECTOR June 2004 Karen Larkin, City of Tacoma.
Coloplast Case Study Suppressing data to increase customer confidence Presented by: Adam Guest & David Edgeworth Date: 13 November 2007.
Payment Gateways for e-Government services 24 May 2007
Traditional and Electronic Payment Methods Chapter 3.
Electronic authentication: validating and verifying customer identities and bank details Presented by: Stan Matthews & Scott Robertson 13 th November 2007.
PURE MICHIGAN STATE TRADE and EXPORT PROMOTION (STEP) PROGRAM For Global Business Club of Mid-Michigan November 17, 2011 By Deanna Richeson MEDC Director,
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Maintaining accurate contact data throughout its lifecycle Presented by: Hayley-Jayne Cone & Ben Sekhon Date: 13th November 2007.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
© 2015 Universal Service Administrative Company. All rights reserved. Direct BEAR Payment Process E-rate Program Applicant Training Washington DC Tampa.
Mexican Tax Administration Service Major Developments & Results September, 2006 Mexican Tax Administration Service.
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
November 20, 2015 Entry task: List two do’s and two don’ts for credit card use. Target: Identify how to use credit cards properly to establish good credit.
Protecting Your Assets By Preventing Identity Theft 1.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
2016 PROPOSED BUDGET: FINANCE DEPARTMENT OCTOBER 20, 2015 DEAN ROHLA FINANCE DIRECTOR.
SAFEGUARDING IS EVERYONE’S RESPONSIBILITY Page No 1 Acceptable Documents for Verification - ROUTES 1 ROUTE ONE ALL APPLICANTS MUST INITIALLY BE CONSIDERED.
Protecting Your Assets By Preventing Identity Theft
TUNGSTEN NETWORK AND PAPER INVOICING
Small Business and Personal Credit
Regular Payments First and Subsequent Payments
Depository Accounts reconciliation
Consider cards over cash
Consider cards over cash
When you get caught for Identity Theft
Consider cards over cash
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Conditions to be met and documents required   to apply for financial aid (cash, iPad, laptop)
Proof Of Identification
Depository Accounts Reconciliation
Presentation transcript:

BANK WIZARD Bank account verification Presented by: Aidan Sparrowhawk Date: 18 th September 2007

BANK WIZARD

“Without bank account validation, most organisations experience a data entry error of between 2% and 8%. It is estimated that the cost of these errors to UK businesses is £1.56bn each year.” “50 million Direct Debits and 2 million Direct Credit rejections each year resulting in delayed receipt of payments.” “…an average cost of £30 to fix each rejected payment.” BACS Research May 2007 “Without bank account validation, most organisations experience a data entry error of between 2% and 8%. It is estimated that the cost of these errors to UK businesses is £1.56bn each year.” “50 million Direct Debits and 2 million Direct Credit rejections each year resulting in delayed receipt of payments.” “…an average cost of £30 to fix each rejected payment.” BACS Research May 2007

Bank account validation QAS, George West House, Clapham, London, SW4 0QL 5.QAS Ref

Benefits Ensure details can exist Supplement/correct data provided Pick up errors at point of capture

Implications of getting it wrong Financial (£30 average to fix) Administration Reduced citizen perception

Benefits of getting it right Improve collection/payment processes Save transactional and administrative costs Free up resources

Why BANK WIZARD? A leading bank account validation system Valid and accurate bank data Supports rigorous validation requirements Regular updates

What our customers say… “Direct Debit is our preferred payment collection methods for a range of services – BANKWIZARD allows us to process payments efficiently and sits perfectly alongside our mission statement to bill and collect local taxes efficiently and effectively and continuously improve our services” Malcolm Hayward, Wolverhampton City Council

Using suppression for proactive data quality improvement Presented by: Elaine Roche

Database degradation 13%* 600,000* 14% per year *Source: ONS 1.2 m

What is Suppression data? Goneaway / Movers Change of Address Deceased Preference Service

QuickAddress Batch with Suppression “86% of respondents see clear benefits to suppressing data” QAS suppression research July 2007

Compliance 42% Improved citizen Perception 79% Why does suppression matter? Ability to make informed decisions on accurate data – 39%

Assess the state of your data Employ QAS data audit Stage 1

Stage 2 What can you do about it? – Use QuickAddress Batch to clean your database

Stage 2

Why? Because data isn’t static E.g. Elaine Roche Aug 04: Moved Cork, Ireland  Gunnersbury Ave, Acton Aug 05: Moved Gunnersbury Ave, Acton  Honeywell Rd, Clapham Aug 06: Moved Honeywell Rd, Clapham  Balham Grove, Balham Name and address captured pre-2006 is no longer accurate Valuable contact information lost

Solution? – Use QuickAddress Batch to clean and suppress Stage 2a

– Use QuickAddress Batch to maintain over time Stage 3

Benefits of suppression Cost savings Improved citizen perception Reduced risk of fraud Compliance Internal joined up working Ability to make informed decisions based on accurate data

What can you do next? Request free data health check Contact your account manager for a free copy of Butler Group Technology Audit

Electronic Data Updates Making your life easier

Dislikes

Presenting EDU

What does it mean to you? Improves processes No regular data updates One less task on your to do list Impact on level of service Consistent service Distribute benefits correctly/tackle fraud

What does it mean to you?

Authentication for the public sector Presented by: James Blake

Authenticate

Scale of the problem ID theft 'costs UK £1.7bn a year‘ ‘£35/person’ Home Office Minister Andy Burnham Feb 2006 “In benefits thieves stole an estimated £700 million of public funds.” Department for Work and Pensions

Where do you authenticate individuals? Where do you authenticate citizens? Revenues and Benefits Parking permits Self service HR Contact channels Face to face Via post Contact centre Websites

How can you authenticate customers? Documentary evidence Electronic authentication Database OR

What currently does “proof of identification” mean? Typical Requirements: Photo proof Passport, Driving License Proof of address Driving License, Utility Bill Fake ID’s Stolen ID’s

How to commit ID Fraud

“You name it we fake it”

What’s the cost of doing it this way? Processing/Storage Training Customer Service

What is electronic authentication? Proves your customers identity by comparing bio-graphical information given at point of application against data held within authoritative databases

What is Authenticate for Public Sector? Validation Proving an identity exists Verification Proving the applicant is the owner of that identity ….does James Blake exist? ….am I James Blake?

Functional Overview Authenticate Capture Fields Validated Name and Address Date of Birth Time at address Former Addresses Time at these addresses Male or Female Telephone Numbers No of Dependents Bank Details Owner Occupier PAFER Name Address Data Input Yes No Authentication Index Authentication Secure Internet Connection Validation Verification High Risk Alerts Matches RDC

What are the benefits? Fraud Paperless process Customer service Compliance

Thank you for listening