SOLVE THE PROBLEM OF IDENTITY THEFT An online, real-time solution for KYC, POPI, RICA and FICA compliance May 2015 www.fidescloud.co.za.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

CORPORATE SERVICES EXPENSE MANAGEMENT SOLUTIONS MANAGE GLOBALLY | MAXIMISE CONTROL | DRIVE SAVINGS | BENEFIT EMPLOYEES | MANAGE GLOBALLY | MAXIMISE CONTROL.
Digital Certificate Installation & User Guide For Class-2 Certificates.
EURIM Personal Identity Group Data Sharing Model for Public Services 13 th January 2005 Jim Lound © Experian Ltd 2005.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Digital Certificate Installation & User Guide For Class-2 Certificates.
G Dealer Security Have you ever experienced? Running around town to collect keys from owners to open the properties listed with you? Worried about leaving.
VOTER REGISTRATION AND IDENTIFICATION
Approved Person for e-Insurance Account PROCESS GLOBAL FINSOL PRIVATE LIMITED { Erstwhile TEAM LIFE CARE COMPANY (I) PVT. LTD }
1 Online Services. 2 RMS has licensed the Tenstreet online application and driver qualification platform in order to offer our clients this comprehensive.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
Data Ownership Responsibilities & Procedures
BANK WIZARD Bank account verification Presented by: Aidan Sparrowhawk Date: 18 th September 2007.
Completing a new CRB Form: Guidance notes for Safeguarding Officers / CRB Verifiers August 2012.
UL Workshop April 28th 2011 Diploma Supplement: Practice at UL and completing the Supplement.
1 Steps for incorporation of company in India. 2 Obtain Digital Signature Certificate (DSC) Summarized steps for incorporation of company in India Obtain.
Secure Electronic Data Communications and Transactions.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
1 IDOT Vendor Portal Training August 5, 2013 Illinois Department of Transportation Presenter: Betsy Calcara.
Virtual Terminal Point-Of-Sale Check Processing American Payment E x change.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Safe and Secure Internet Gambling Financial Model.
PCT-SAFE and e-Services developments Webinar September 7/
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
Florida Information Protection Act of 2014 (FIPA).
Introducing Paperless Bill Management and Accounts Receivable Processing.
Fire Safe Cigarette Online Registration Instructions.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Louisiana Department of Revenue Electronic Filing.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Advanced Secure Technologies Secure Document Technologies.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
Visit Your School’s Financial Aid Website! Contact the Financial Aid Office if You Need Additional Information! Complete ALL Paperwork Carefully. Read.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Perceptions of Government Technology, Surveillance and Privacy: The UK Identity Cards Scheme Dr Edgar A. Whitley Reader in Information Systems London School.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
MS Invoice E-Invoice Solution Overview March 2016.
The Points Based System Sponsorship Responsibilities Employer’s Obligations Cheryl Pellew.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Copyright 2013 Exostar LLC.| All Rights Reserved.| Proprietary and Confidential1 Identity Proofing Service United Technologies Corporation September 26.
Problem being addressed –Fraudsters file in advance of the actual taxpayer resulting in lost government dollars ($5.2M in payments to fraudulent identities.
U.S. Immigration Center.  Green card also refers to an immigration process of becoming a permanent resident.  The green card serves as proof that its.
Digital Gujarat Portal – Citizen User Manual. How Do I Open A Portal? Go to the URL :- Screen 1.1:-
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
company registration, india trademark registration, trademark attorneys india, patent attorneys india, patent registration india company registration,
By Brooke Rogers Identity theft is the act of acquiring and collecting a persons information with the intent of using it for criminal purposes. Identity.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
Online Applications. Login / Register If a student has already registered then they may login with their username and password. If not registered they.
BioIdentity Fraud Elimination & Verification System.
Smart Data infrastructure
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
How Can NRCS Clients Use the Conservation Client Gateway
NATIONAL ACADEMIC DEPOSITORY
Streamline your HR document management processes
NATIONAL ACADEMIC DEPOSITORY
2016 Annual CPNI Training CPNI & PI Awareness Beth Slough,
Subject Access Request Online Form
GDPR (General Data Protection Regulation)
Installation & User Guide
Buy SSN Online. Are you looking to Buy SSN Online?. So you've come to the right place, Because we have years of experience in this industry, we have made.
Modern benefits administration and HR software, supported by us.
Getting the Green Light on the Red Flags Rule
Integration Services.
Streamlining Processes Across Retail Banking Channels
How to Apply for Canada Tourist Visa OECC IMMIGRATION AUSTRALIA.
Presentation transcript:

SOLVE THE PROBLEM OF IDENTITY THEFT An online, real-time solution for KYC, POPI, RICA and FICA compliance May

SOLVE THE PROBLEM OF IDENTITY THEFT What is the Fides Trusted Vault? The Fides Trusted Vault solution verifies individuals by providing access to a number of identity verification checks which, in combination, provide reliable authentication. Through authentication and the ability to upload compliance documentation your organization can rest assured that it complies with all relevant legislation The Trusted Vault is POPI compliant and is a cloud solution for KYC, FICA and RICA The Trusted Vault is accessible by the individual and anyone to whom the individual has granted permission to access his vault, e.g. a bank or service provider The Services allow for the capture, storage and retrieval of: Fingerprints - enrolment and verification Photographs Document Storage of Digitally-signed documents Digital Signatures Home Affairs Checks – Real-time online identity verification Credit Bureau Checks – Real-time online CPA & Non-CPA Reports Qualification Checks – Matric & Tertiary Online SAPS Criminal Checks Drivers License Checks

SOLVE THE PROBLEM OF IDENTITY THEFT What are the POPI Compliance Requirements? POPI RequirementFides Compliance Only collect information that you need for a specific purposeFides gathers information for the client based on the individual’s consent. This consent is an electronic consent that is recorded through an audit trail. The information captured is used for compliance purposes only and is not made available to third parties. Apply reasonable security measures to protect itThe Fides Trusted Vault is subject to best practice security standards and undergoes routine testing such as Web Application Vulnerability Assessments. A full audit trail of all activity is recorded for each individual’s Trusted Vault. Ensure it is relevant and up to dateFides gathers all historical information related to an individual from authorized sources and has the ability to update the details upon request by the corporate and individual Only hold as much as you need, and only for as long as you need it Fides gathers information based only on the client’s needs, the information that is gathered is only stored based on individual’s consent. Allow the subject of the information to see it upon requestFides Trusted Vaults can be viewed through an internet connection by the client or the individual at any place and at anytime via their web browser and security credentials.

SOLVE THE PROBLEM OF IDENTITY THEFT What are the FICA KYC Compliance Requirements? For individual customers who are South African Citizens and / or who are South African Residents Fides Compliance IdentificationVerification South African issued green bar-coded identity document Perform an RSA Identity Verification Check which retrieves all these fields in real-time from credit bureaus. The vault also has the ability to update the individual’s latest address and upload their latest Proof of Residence into the vault. Full Names Date of Birth Nationality Identifying Number Residential AddressAn approved document to verify residential address, reflecting at least your initial(s) and surname and (physical) residential address Income Tax Ref NumberIncome tax reference number (if issued) A document issued by the South African Revenue Service to verify your income tax reference number A copy of the individual’s SARS issued Income Tax document will be uploaded into the vault Contact DetailsContact details (i.e. name, telephone number(s), address, etc.) Does not need to be verified Contact Details – An entire list of all registered contact details as well as previous employment details can be retrieved through credit bureaus in real time and stored in the vault.

SOLVE THE PROBLEM OF IDENTITY THEFT What are the RICA KYC Compliance Requirements? For individual customers who are South African Citizens and / or who are South African Residents Fides Compliance IdentificationVerification South African issued green bar-coded identity document Perform an Identity Verification Check which retrieves all fields in real-time from credit bureaus. The Vault has the ability to update the Cellphone Number related to the RICA registration. The vault also has the ability to update the individual’s latest address and upload their latest Proof of Residence into the vault. Full Names Cellphone Number Nationality Identifying Number Residential AddressAn approved document to verify residential address, reflecting at least your initial(s) and surname and (physical) residential address The SIM Card to be registered The Verification Agent at any walk-in customer care centre can register the SIM The SIM Card details can be linked to the individual in their vault and be viewed by the service provider and individual at any time.

SOLVE THE PROBLEM OF IDENTITY THEFT Why use the Fides Trusted Vault? A cloud-based offering simplifies adoption and eliminates expensive start-up costs by providing: A 24x7 online service enabling enrolment and verification from any location with internet access Hardware agnostic solution that supports all major vendors Annual subscription or Per-Transaction cost for the service Tracks all system activity for compliance reporting purposes Secure and compliant storage of all information

SOLVE THE PROBLEM OF IDENTITY THEFT Contact Fides Cloud 26 Saddle Drive Woodmead Office Park Van Reenen Ave, Woodmead Johannesburg, South Africa Phone Fax Web.