Fraud Investigative Tools - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Fraud Investigative Tools

Description:

Equifax Proprietary and Confidential. 2. Agenda. ID Fraud Market Overview ... Equifax Proprietary and Confidential. 4. How Victims' Information is Misused ... – PowerPoint PPT presentation

Number of Views:142
Avg rating:3.0/5.0
Slides: 17
Provided by: ener3
Category:

less

Transcript and Presenter's Notes

Title: Fraud Investigative Tools


1
  • Fraud Investigative Tools

2
Agenda
  • ID Fraud Market Overview
  • Equifax Solutions Suite
  • Discussion/QA

3
Current Situation
4
How Victims Information is Misused
  • Credit card fraud 28
  • Bank fraud 18
  • Phone or utility fraud 20
  • Wireless 10
  • Telephone 5.9
  • Utilities 4.2

Source FTC Identity Theft Clearing House
5
Equifax Fraud Investigation Solutions
Product Suite
eIDcompare
eIDverifier
SSN Verified
POSID
SAFESCAN
Hierarchy of solutions based on risk, channel,
etc.
6
SSN Verified Indicator
  • A YES/NO flag indicating whether or not an
    applicants Social Security number has been
    verified against three or more major Equifax tape
    customers.

7
SAFESCAN
  • Online warning service that compares customer
    inquiry information against Equifaxs fraud
    database and alerts customers when potentially
    fraudulent information elements (address, Social
    Security number, etc.) are found.

8
POSID
  • Online identity verification solution that uses
    an applicants Social Security number to verify
    identity information before service is
    established
  • Searches the Equifax nationwide consumer credit
    reporting database and returns match results that
    include full name, current and former addresses,
    age and other names and addresses associated with
    the applicants SSN
  • Can be accessed along with our exchange services
    that include a clearing house of
    industry-specific, new-applicant and
    unpaid-final-bill.

9
eIDcompare
  • An economical identity validation solution
  • Validates that an identity, of itself, is
    legitimate
  • Does NOT authenticate whether consumers are who
    they say they are
  • Can be accessed in real-time or batch

10
eIDverifier
  • A patented, online authentication process for
    Internet-based transactions that takes
    identification beyond fraud checks and data
    matching
  • In-and-Out of Wallet Matching
  • Multiple-choice question Interactive session
  • Internet, Call Center, and POS/POP Applications
  • Real-time Pass/Manual Review Recommendation
  • Binds user to the identity being used

11
eIDverifier Process Flow
App data captured by enterprises web site or cc
and passed to Equifax
Equifax
Data Source
Data Source
Questionnaire passed to customer to present to
consumer
Data Source
Step 1. Consumer applicant provides personal
identifier information
Step 2. Applicant information is passed to
Equifax
Step 3. eIDverifier checks for data integrity,
suspicious fraud alerts, and pattern recognition
Step 4. eIDverifier creates multiple choice
questionnaire by waterfalling through data
sources as necessary
Step 5. Questions are passed back to customer to
present to end-consumer
Step 6. Consumer answers questions answers are
captured by customers web site and passed to
Equifax
Step 7. eIDverifier authenticates consumer
Step 8. Assessment score and reason codes are
passed to customer customer decides whether to
pass or review applicant further
12
eIDverifier Process Summary
Applicant
Pass
Fail
Fail
Pass
Manual review
Congratulations
13
Examples
14
Examples
15
Examples
16
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com