Verifying Identities to Stop Synthetic Identity Theft
As technology advances, so do fraud techniques. Online platforms are changing the ways criminals perform their nefarious activities. These customer-not-present environmen...
Read moreAs technology advances, so do fraud techniques. Online platforms are changing the ways criminals perform their nefarious activities. These customer-not-present environmen...
Read moreIn 2015, the European Union (EU) passed Payment Service Directive 2 (PSD2), revising existing regulations aimed at regulating payment services and payment service provide...
Read moreCustomer onboarding is the process a user goes through to start a relationship with your company, such as creating an account. It helps determine the relationship your cu...
Read moreThe header information is top-level data from a credit file. It provides basic information about the person to verify identity. The types of data found in credit reports ...
Read moreBiometric ID checks were developed to verify individuals based on who they are. They make use of statistical, mathematical, imaging and computing techniques to determine ...
Read moreThe Financial Action Task Force (FATF) defines a politically exposed person (PEP) as someone who has been be abused. There have been many examples of PEPs being associate...
Read moreTechnology is going to play a significant role in simplifying the anti-money laundering (AML) process. Money laundering around the world makes up about 5% of the global G...
Read moreThere has been a steady growth of biometrics for personal identification. Authorities consider it more important than ever. They aim to bring more security to consumers a...
Read moreIn recent years face recognition has become a widely used biometric approach. Apple has popularized its use with FaceID in the iPhone X, taking it from a far-fetched tech...
Read more