MXPA06002498A - Method and system for identity theft prevention, detection and victim assistance - Google Patents

Method and system for identity theft prevention, detection and victim assistance

Info

Publication number
MXPA06002498A
MXPA06002498A MXPA/A/2006/002498A MXPA06002498A MXPA06002498A MX PA06002498 A MXPA06002498 A MX PA06002498A MX PA06002498 A MXPA06002498 A MX PA06002498A MX PA06002498 A MXPA06002498 A MX PA06002498A
Authority
MX
Mexico
Prior art keywords
client
identity theft
victim
present
assistance
Prior art date
Application number
MXPA/A/2006/002498A
Other languages
Spanish (es)
Inventor
Freiberg Steven
Original Assignee
Citicorp Credit Services Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Citicorp Credit Services Inc filed Critical Citicorp Credit Services Inc
Publication of MXPA06002498A publication Critical patent/MXPA06002498A/en

Links

Abstract

A method and system for providing comprehensive assistance to victims dealing with the aftermath of identity theft fraud. An identity theft prevention/detection service is combined with a comprehensive victim assistance program wherein victims of identity theft not only have the capability of restoring their good name and credit worthiness on an individual tradeline basis, but also on the basis of all their creditor relationships.

Description

METHOD AND SYSTEM FOR PREVENTION OF IDENTITY THEFT, DETECTION AND ASSISTANCE TO THE VICTIM PRIORITY This application claims the priority of the Request for Provisional North American Patent Series No. 60 / 499,378, filed on September 3, 2003, whose full definition is incorporated herein by reference. Field of the Invention The present invention generally relates to a method and system for providing extensive assistance to victims who have been the subject of identity theft. More particularly, but not by way of limitation, the present invention is a method and system for a hybrid method that offers the service of prevention / detection of identity theft combined with a program of extensive assistance to the victim. BACKGROUND OF THE INVENTION Identity theft is the unauthorized use of personal information, such as the name, address, social security number, date of birth and the mother's name para_.e_stabLacer_o_a.sju_rr? Ü: a low price , the norrLbre_d_e-. aJgun.a__ another person. Identity theft manifests itself primarily in two ways: first, as a fraudulent application in which a new credit relationship is established using the personal information of some other person, and second, through the acquisition of the account in which an existing credit re-election is assumed giving the personal information of another person. Identity theft occurs through various means, for example, through the increased availability of information online or elsewhere (MMN, passwords, etc.); illegal access to information from the credit bureau; the legal sale of information by reliable sources (government agencies, collusive employees, etc.); fraudulent rogues who seek this information directly from consumers; acquaintances / family members who generally have access to the victim's personal information and the theft of information from unsecured post office boxes, stolen purses / bags or information discarded in the trash. Current processes that exist to assist victims of identity theft are mainly based on a creditor relationship of the institution (for example, a bank) with the victim. Therefore, there are several different systems (even within an institution, such as between a bank card business and banking businesses) by means of which the victim has to work with different units in order to obtain their identity reestablished. For example, the victim would make contact with a particular unit of a bank to close a particular account. Then the victim is transferred to another unit for another account and even to a third unit that would provide assistance to the victim. Accordingly, there is a need for a victim assistance method and system that provides the victim of identity theft, not only the ability to restore his good name and credit credibility on an individual business line basis, but also in basis to all your relationships with creditors. BRIEF DESCRIPTION OF THE DRAWINGS In the drawings: Figure 1 illustrates a theft prevention process flow in one embodiment of the present invention; and Figure 2 illustrates a process flow of assistance to the victim of a modality of the present invention. Detailed Description of the Invention Reference will now be made in detail to the embodiments of the invention, in which one or more examples are illustrated in the accompanying drawings. Each example is provided by way of explanation of the invention, not as a limitation of the invention. Those skilled in the art will appreciate that various modifications and variations may be made to the present invention, without departing from the scope or spirit of the invention. For example, the features illustrated or described as part of one embodiment may be used in another embodiment to still produce an additional embodiment. Thus, it is intended that the present invention cover all such modifications and variations that are within the scope of the present invention. One embodiment of the present invention relates to the prevention of identity theft. See Figure 1. An additional modality refers more particularly to prevention actions that comprise a free service product. These modalities verify suspicious changes in account data that match a fraud reporting system, such as the Known Fraud Indicator System (KFIS) and industry data, such as the Issuer Clarification Service (ICS) alerts. . The modality also includes monitoring internal collusion to identify potential complement problems and monitor suspicious requests, transaction activities and high-risk requests. The modality also verifies the activity with the client to ensure that it was authorized. Another embodiment of the present invention relates to prevention actions that comprise a product based on payments. This modality includes a methodology for sending reports to the consumer credit bureau, for example, on a quarterly or semi-annual basis and to assist it in reviewing potentially unauthorized commercial lines, not limited to a particular institution. The methodology includes working with the client to establish an actual password in all accounts and recommending that the customer update all their relationships with suppliers with a password. In addition, in this modality, at the time of the changes of the data of an account (for example, address), the changes are verified with the client to ensure that they were authorized. In another embodiment, the present invention ensures that any new requests received, which have information that matches the data of the enrolled person, are verified with the client. In an additional modality, discounts are offered on preventive merchandise that can help protect the customer (for example, shredders, insurance for postal sections, etc.). - - - -. . . . In another embodiment of the present invention, bank card detection actions with fraudulent applications are provided. For example, postcards are sent to verify fraudulent requests; authorization detection strategies are used to detect out-of-pocket expenses and payments and the potential victim can be contacted in a proactive manner to validate transactions; KFIS databases register all fraudulent addresses and phone numbers on the list in the accounts, manual reports look for new accounts with balance transfer review requests; they carry out investigations in the accounts that have requests for credit by collusive subscribers of the credit bureau, the police reports are filled when the perpetrators of the identity theft are identified; Research intelligence shared in a working relationship is done by enforcing the law to prosecute criminals. In a further embodiment of the present invention, bank card detection actions against Account Possession (ATO) are provided. For example, a modality performs an incremental verification when high-risk requests are made on an account; Authorization detection strategies monitor high-risk ATO transactions and the KFIS database records all fraudulent addresses and phone numbers found in the list in accounts identified as an ATO. This database then monitors the central system for any other accounts that are changed to that address. An additional embodiment of the present invention includes reports of high risk transactions (for example, including changes of address and applications for cards sent to a high-risk zip code or an overnight card request to a localized alternate boarding address) in a high-risk zip code). Additionally, customers who are victims of ATO fraud have their accounts posted to ensure that a next representative customer management request is warned to customers who have been impacted by ATO fraud. The modalities also include internal collusion detection controls managed, for example, through a police unit against Frauds / Internal Investigations. The embodiments of the present invention also include identity theft controls such as support for password prioritization, IP address capture, improved fraud TPR variable or CBR fraud alerts. The modalities also include, for example, private brand-detection actions pertaining to checks from a high-risk customer, by means of which more applications with a higher fraud index based on historical details are reviewed. Other modalities include the FEW suspect activity monitoring situations such as billing address / address mismatches for boarding. The additional embodiments of the present invention also relate to the following: the qualification of fraud by means of which a systemic rating attempts to predict the likelihood of fraud in an application; fraud controls of a new accounts processing system (NAPS) where the verification of the NAPS information is provided by the client; the California identity theft legislation that targets the application from California where the bureau details differ from the details of the application; a database that searches for bureau variations, such as a suspicious database; statements of fraud victims in which calls are made to the telephone number provided to verify that the applicant requested the account. The embodiments of the present invention also include victim assistance actions. See Figure 2. For unauthorized commercial lines, for example, the merchant is removed from the bureau and reported as suppressed. The collection calls are stopped immediately and the declarations are no longer sent to the accounts. The victims refer to the credit bureaus to request a statement from the victim to each of the bureaus and the disputes of the card members are investigated as individual businesses. further, the victims refer to other creditors to close their accounts. The embodiment of the present invention also includes giving instructions to the victim to file reports to the police to enforce local law, provide identity theft catalogs to the client, if requested, and send a letter to a mortgage company if the client is trying to get a loan. The modalities of the present invention also comprise the following: at the time of the notification by the client, extract the reports from the bureau and review the transactions with the client to determine if some are not authorized; contact the bureau with the client on the line to assist him in applying a victim's statement; complete all the paperwork required to substantiate the victim's statement; and send the information to the client who will then sign the notification and send it to the bureaus. The embodiments of the present invention further include action to provide assistance and / or assistance to the client to make it easier for him to recover from an incident of identity theft. In a further embodiment of the present invention, as a first step, a new account is established and the victim obtains his new cards, for example, within 24 hours as a quick card and a case is created to track and track. The information is taken from the client to help so that it helps him fill out the universal declaration form for the client, stating that he is a victim of identity fraud. The client is assisted to complete the declaration. The statement is sent to the client, for example, either by fax, email or in the worst case, through regular mail, so that the client can sign the declaration and then send it to a creditor. The report of the credit bureau is extracted with the client online, so that the requests and commercial lines in those bureaus can be reviewed with the client in order to determine which items were not authorized or have been committed. The credit bureaus are then contacted in order to place the victim's statement in those bureaus and indicate which items are in dispute. Working with the client, they contact the suppliers in order to close the affected accounts or correct the disputed items. Additionally, correspondence is issued to creditors to indicate that the customer has initiated an identity theft claim. In a further embodiment of the present invention, if the client indicated the need for an additional credit, a review, for example, for an increase of the credit line is made if a valid account is open or at the time of the client's request. , an account is established through which the credit could be provided. In one modality, a follow-up is programmed, for example, within 30 days to get back in touch with the client to review once again the bureau reports for any new requests or commercial lines that have arrived that are, either authorized or committed. The activity will continue to be monitored on a case-by-case basis. For example, monitoring could last from 90 days to six months until the case has reached a full resolution. Additional embodiments of the present invention include providing information, which will allow the customer to contact unauthorized creditors and request that the affected accounts be closed. If approved by the supplier, a universal statement as noted above is sent and filled out to the client for signature. Then the client sends it to a representative who will follow it in all the research units. Subsequently, the client sends the statement to other creditors that are required. Other embodiments of the present invention comprise complying with a field research staff to highlight the typical questions used in police reports and to document these items for the client. These questions are specified and this information is sent to the client. Then, the client brings this information to the local law enforcement authority. Additional modalities include filling out the documentation of the appropriate government agent (for example, the Federal Trade Commission, the Social Security Administration, etc.) and sending it to the client for review and presentation. Acquisition of account and limited fraud enforcement incidents, embodiments of the present invention include working with the client to determine whether an extension of credit can be facilitated to cover the necessary transaction activity during the investigation. Additionally, potential credit extension opportunities are to identify theft victims are underlined in the credit police unit. If the customer is applying for a mortgage, the embodiments of the present invention provide a letter that will be written including the lender who has reported an identity theft and the creditors are currently investigating the claims. The representatives of the individual commercial disputes proactively contact the victim to explain the actions that will be taken on the accounts. A written explanation of the actions that will be taken to assist the victim is also provided. The unauthorized commercial lines continue to be eliminated from the bureau's report, and the bureau's report is suppressed and the collection and clarification calls are stopped. At the time of the next billing cycle, the account is again requested, and the customer is contacted to review the transaction activity. When the investigations are finished, the final resolution of the investigation is communicated to the client. Because identity theft incidents are often committed by family members or acquaintances, the client is assisted regardless of the way in which identity theft may have occurred. Additional embodiments of the present invention comprise establishing a specialized unit to receive service calls for an identity theft program. The unit has access to all card platforms. Certain accounts are assigned to a specialized unit in which a specific person is appointed to work with the victim. This allows a relationship to be established between the victim and service representative, while providing stability during the traumatic event. Additionally, this minimizes the need for the client to repeatedly explain their situation. The embodiments of the present invention also include, at the time of initial enlistment, providing the customer with a welcome team of identity theft that focuses on the way to prevent identity theft. This includes an internal link and a checklist of actions that should be taken to minimize the potential for identity theft. Also included are telephone numbers to call in case of suspected identity theft.
The embodiments of the present invention have been described in compliance with the above objectives. It will be appreciated that these effects are only illustrative of the invention. Those skilled in the art will find many variations and modifications.

Claims (1)

1.- A method that comprises: the electronic monitoring of at least one account associated with a client for a potential fraudulent activity; identify potential fraudulent activity based on one or more fraud indicators; Verify fraudulent activity with the client; automatically store information related to the account and fraudulent activity in a database; assist the client to rectify the fraudulent activity.
MXPA/A/2006/002498A 2003-09-03 2006-03-03 Method and system for identity theft prevention, detection and victim assistance MXPA06002498A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US60/499,378 2003-09-03

Publications (1)

Publication Number Publication Date
MXPA06002498A true MXPA06002498A (en) 2006-12-13

Family

ID=

Similar Documents

Publication Publication Date Title
US20050144143A1 (en) Method and system for identity theft prevention, detection and victim assistance
JP7350819B2 (en) Transaction monitoring system
Macdonald et al. Understanding fraud: The nature of fraud offences recorded by NSW Police
AU2004311581A1 (en) Method and system for identity theft prevention, detection and victim assistance
MXPA06002498A (en) Method and system for identity theft prevention, detection and victim assistance
Hayward Identity theft
Taylor-Butts et al. Fraud Against Businesses in Canada: Results from a National Survey
Stanley Identity Theft: Supporting Victims in Recovering From the Crime of the Information Age
AU2016201497A1 (en) Method and system for identity theft prevention, detection and victim assistance
Allison A case study of identity theft
MXPA06005848A (en) Method and system for identity theft prevention, detection and victim assistance
Burns Consumer and Business Perspectives
Gallagher Statement by the Captain of the Miami-Dade Police Department Economic Crimes Bureau Edward Gallagher, Before the FCIC
Lyngklip et al. Preventing credit damage in divorce cases
May STOP
Briefing IDENTITY FRAUD
Hoar Oregon Law Review: Vol. 80, No. 4, p. 1423-1448: Identity Theft: The Crime of the New Millennium
Park Frauds, scams and slams: Don't fall prey to identity theft