© 2011 Aristotle, Inc. All Rights Reserved. Why Johnny Can't Play: Creating Websites for Grown Ups.

Slides:



Advertisements
Similar presentations
Hiring/Onboarding in Compliance Meetings with Supervisors Hiring/Onboarding Compliance Training for Supervisors.
Advertisements

Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
DM CONVERGENCE OCTOBER 11TH. FEATURE: YEAR END CLOSE PROGRESS BAR © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Managing Your Credit 2014/2015 Office of Student Financial Assistance.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
4 Jo Anne Bernal El Paso County Attorneywww.epcounty.com/CA/ HOT CHECK SEMINAR.
About ONLINE Industry leader for more than 50 years Headquartered in North Carolina Originally a small merchant credit bureau In 1997, focus shifted from.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
Aristotle International Integrity™ Age and ID Verification Presentation to ISTTF September 23, 2008 Aristotle’s Integrity™ ISTTF Presentation 9/23/2008.
Protecting Children Leon Thomas Head of Regulatory Compliance, PartyGaming EGBA Chair of Compliance and Responsible Gaming Committee.
SOLVE THE PROBLEM OF IDENTITY THEFT An online, real-time solution for KYC, POPI, RICA and FICA compliance May
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Current Topics. Trends in Banking G & K Chps. 16, 17 & 18 G & K Chps. 16, 17 & 18 Financial Services Financial Services Electronic Banking Electronic.
How To Protect Your Privacy and Avoid Identity Theft Online.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Regulating Online Gaming Pre-Licensing Process Lotteries and Gaming Authority - Malta.
Illegal Interactive Gambling The role the banking industry system can play in combating this challenge Presented by : Elijah Mazibuko.
Last update: 2010 Bringing Smart Policies to Life The basics: AML/CFT for financial inclusion.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Wireless Password: ONLINE GAMING / GAMBLING KNOW - YOUR - CUSTOMER AND RISK MANAGEMENT.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Identity verification in the private sector Chris Gration 30 March 2006.
Representing NEA90 Product Overview. Powered By Flexpay LLC Product Knowledge.
Becoming A Customer SICOR Securities, Inc.. How? In order to establish the client (customer) relationship between yourself, as a registered representative.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Program Adds for RSS Webinar Presentation Version 1
Payroll Taxes and Forms
Objective 4.02 Understand the banking system Classification of financial institutions.
How to address underage gaming? Who should take responsibility? Responsible Gaming Day 17 th April 2008 How to address underage gaming? Who should take.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Can you spot the honest customer… …from the fraudster? Presentation by: Alex Bowes, Corporate Sales Manager, 192.com Business Services.
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Intelligence Reform: The Process Begins National Association for Public Health Statistics and Information Systems June 7, 2005.
Hiring/Onboarding in Compliance Meetings with Supervisors.
Copyright © 2009, Thinking Media, a division of SAI Interactive, Inc. All rights reserved. The Career Ready 101 logo is a registered trademark and Career.
World Bank International Standards and their Measures for Financial Institutions and Non-Financial Businesses and Professions to Prevent Money Laundering.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 I-9 Completion for People Managers Hiring Manager Training Version January 2016.
Overview of the BSP’s KYC Policy Meeting of the Cash Working Group UN WFP Office, Bonifacio Global City, Taguig 12 November 2015.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Chief Accounting Officers Database List A chief accounting officer or a CAO plays a vital role in the organization as he/she is responsible for.
Banking in the United States. U.S. Banking System Overview  The Federal Reserve System is the central banking system of the United States.  Regulates.
Identity Theft It’s a crime!
I-9 Instructions and FAQs
QUESTRA HOLDINGS ACCOUNT REGISTRATION
EXPORT SALES Locating a partner.
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
Getting Started Basic Paperwork I-9 W-4 Direct deposit
JP Morgan spends $500 million per year on cyber security
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Client Onboarding Process Flow
CIP Express Software 11/15/2018 6:40 PM Ragini
© 2014 Cengage Learning. All Rights Reserved.
Federal Reserve Retail Payments Risk Forum
NetSuite’s Value Propositions
Identity Theft Prevention Program Training
© 2014 Cengage Learning. All Rights Reserved.
Buy SSN Online. Are you looking to Buy SSN Online?. So you've come to the right place, Because we have years of experience in this industry, we have made.
Protecting Yourself from Fraud including Identity Theft
Getting Started Basic Paperwork I-9 W-4 Direct deposit
Austria Business List Presented by Globalmailmedia,
Denmark Business List Presented by Globalmailmedia,
China Business List Presented by Globalmailmedia,
Korea Business List Presented by Globalmailmedia,
Australian Business List Presented by Globalmailmedia
Presentation transcript:

© 2011 Aristotle, Inc. All Rights Reserved. Why Johnny Can't Play: Creating Websites for Grown Ups

© 2011 Aristotle, Inc. All Rights Reserved. Aristotle Misconceptions about Age Verification  Many websites offer Age “Affirmation” and call it Age Verification including large in Alcohol, Tobacco, even Twitter/Apple

© 2011 Aristotle, Inc. All Rights Reserved.  What the public thinks… Aristotle Misconceptions about Age Verification  Perception is that access to iGaming for under age cannot be controlled, or restricted. Causes political fallout that supports non-gaming interests and PR issues for brand conscious gaming companies

© 2011 Aristotle, Inc. All Rights Reserved.  European Approaches  Many tools to combat underage access  US Approaches –Nevada –New Jersey –Lotteries  Other Considerations  Good examples from other industries Aristotle What is the Real Story about Age Verification and Johnny

© 2011 Aristotle, Inc. All Rights Reserved. Aristotle European Approaches Government Data Access Italy, Spain, Denmark Country supplies data to iGaming Operators for Age Verification In-Person Verification German (Proposed) Customer must be verified “in Person” at post office or bank Risk Based Approach England, Gib., Alderney, Malta, others iGaming Operator must apply a risk- based approach to validation of age and Identity – Financial Svcs. Approach similar to KYC Document and Post Office France Customer must upload Identity Documents and enter code that is mailed to the home address

© 2011 Aristotle, Inc. All Rights Reserved. Aristotle Many Tools to Age Verification  Gold Standard in Age Verification is a risk based approach  Employ multi-level approach to respond to level of risk and the validity of the identity response  Financial service approach Integrity IDV: Age and Identity Check using Multiple Databases and identity algorithms Integrity Quiz: Knowledge Based Authentication (KBA) using out of pocket challenge questions Integrity Documents: review ID Documents with manual and software checks on identity information and document form Integrity Face-to- Face: Video Verification using Skype of another form of video interaction  Aristotle provides an integrated service that restricts access based upon a combination of technology, data resources, and risk based service offering

© 2011 Aristotle, Inc. All Rights Reserved. Aristotle State iGaming Age Verification  Age Verification in Nevada and New Jersey  Regulations and developing Regulations  Other States and Lottery Market

© 2011 Aristotle, Inc. All Rights Reserved. Aristotle Other Considerations  The Credit Card Accountability Responsibility and Disclosure “CARD” Act of 2009 and how impacts visibility of younger clients  Good because it limited access to credit for under 18; Bad because credit reference agencies have no visiblity  Consider other government data such as Drivers License and Voter data

© 2011 Aristotle, Inc. All Rights Reserved. Aristotle Other Considerations  “Soft Mark” from Credit Inquiry not so soft Credit impact for identity verification leaves an inquiry in name of casino or iGaming operating entity In Ireland this impacted borrowing limits for online gamblers

© 2011 Aristotle, Inc. All Rights Reserved. Aristotle Good Example from Tobacco  California Business & Professions Code §22963 requires internet sellers of tobacco products to attempt to ‘match the name, address, and date of birth provided by the customer to information contained in records in a database of individuals whose age has been verified to be 18 years or older by reference to an appropriate database of government records kept by the distributor, a direct marketing firm, or any other entity.’  Federal PACT Act: verifying the information provided in sub-clause (I), through the use of a commercially available database or aggregate of databases, consisting primarily of data from government sources, that are regularly used by government and businesses for the purpose of age and identity verification and authentication.

© 2011 Aristotle, Inc. All Rights Reserved. Integrity: Gold Standard in Online Age and ID Verification  World Class Customers  Verification of Adult Citizens in over 150 Nations  Sophisticated Multi-Level Approach to Age Verification –Datasets comprising of government issued & publicly available personal data and algorithmic analysis  Ten+ years of age and ID verification experience

© 2011 Aristotle, Inc. All Rights Reserved. Aristotle Integrity: Global Gold Standard for Identity and Age