SlideShare a Scribd company logo
1 of 49
Download to read offline
Mortgage Industry Overview
      July 10, 2009




                             1
Our goals today




                  2
Our goals today
 ‣ To give you the WHAT…




                           2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules




                                2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…




                                2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
   ‣ demo the idBUSINESS Red Flag Compliance
     Module




                                               2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
   ‣ demo the idBUSINESS Red Flag Compliance
      Module
 ‣ but also give you the WHY




                                               2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
   ‣ demo the idBUSINESS Red Flag Compliance
      Module
 ‣ but also give you the WHY
   ‣ Why information security is an
      OPPORTUNITY, not a burden



                                               2
FILE CABINETS???




                   3
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The Opportunity
‣ There is a unique opportunity to grow a
  mortgage business by leveraging strong
  information security policy and sharing it with
  borrowers
  ‣ Build trust with borrowers
  ‣ Strengthen employee relationships
  ‣ Tighten lender/broker operations




                                                    5
The Risk
‣ The mortgage industry has a unique burden to
  protect borrower information
  ‣ Government mandate for regulation
  ‣ Financial industry scrutiny
  ‣ The Consumer’s Age of Transparency




                                                 6
The facts

                                                30%
     40%

                     60%
                                                             70%



     Business has suffered breach         Thief is employee or knows employee
     Business has yet to incur a breach   Thief is unknown


 •   Since 2/15/05, over 251,000,000 Americans have had
     identities or other personal information compromised




                                                                                7
The facts
The average breach and its impact on customer confidence is growing.


                                            58% of customers will
                                            lose confidence in your
                                            business after a breach.




                                            31% of your customers
                                            will immediately cease
                                            doing business with
                                            you following a breach.




Source: Ponemon Institute, 2008.



                                                                       8
The Red Flag Rules




                     9
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act




                                                9
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:




                                                9
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:
  ‣ you hold “covered accounts”




                                                9
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:
  ‣ you hold “covered accounts”
  ‣ your customer records present a “reasonably
     foreseeable risk of identity theft”




                                                  9
Why are mortgage cos.
COVERED ENTITIES?
‣ Deferring payment
      ‣ The mortgage process is by definition a
            deferred payment and credit-granting
            process
‣ Reasonably foreseeable risk
      ‣ Borrower files are a treasure trove
      ‣ Each record worth between $80-300 each*


 * Source: Black Market Identity Auction attended by Net Reaction mole, 2008.

                                                                                10
Red Flag
REQUIREMENTS




               11
Red Flag
REQUIREMENTS
1. A Written Information Security Program




                                            11
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft




                                                                11
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management




                                                                11
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis




                                                                11
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees




                                                                11
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees
6. Must contain an incident response capability




                                                                11
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees
6. Must contain an incident response capability
7. Must ensure that vendors and suppliers are also compliant



                                                                11
“What happens
if I don’t comply?”
• Legal liability
  – Civil lawsuits, class-action litigation
• Government penalties
  – FTC & State enforcement
• Damage to brand reputation and borrower trust




                                                  12
The solution
‣ The idBUSINESS Red Flag Compliance Module
  ‣ Built on real-world forensic fieldwork
  ‣ Includes tools & benefits that actively involve
    employees in your compliance efforts
  ‣ Transitions information security from a
    compliance issue into a competitive advantage




                                                      13
The Red Flag
Compliance Module




‣ Secure online interface

                            14
The Red Flag
Compliance Module




‣ Learning tools available as text or video webinar
                                                      15
The Red Flag
Compliance Module




‣ Risk Assessment tool provides ranking of your
   company in 12 key focus areas
                                                  16
The Red Flag
Compliance Module




‣ Customizable checklist of 26 Red Flags to meet
   requirements of FACT Act
                                                   17
The Red Flag
Compliance Module




‣ Employee training automated & easy, integrates
   automatically with your compliance report
                                                   18
The Red Flag
Compliance Module




‣ Ability to evaluate supplier compliance practices using
   our proprietary Vendor Integrity Assessment
                                                        19
The Red Flag
Compliance Module



‣ Access individual identity recovery protection using
   FraudStop and Restore from ID Experts
  ‣   Available as employee benefit, cafeteria-style add-on,
      customer blanket, or new revenue stream
‣ In the event of a breach, one-click access to best-in-
   breed data breach services and forensic services


                                                           20
Mortgage Industry
BENEFITS
‣ NAMB Preferred Provider
  ‣ www.majesticsecurityidsafe.com
‣ Because We Care
  ‣ www.mortgagedashboard.com
‣ Mortgage Insurance Agency
  ‣ www.mtgins.com



                                     21
“Can’t I do this myself?”

• A self-written policy meets the letter of the law, but
  leaves gaps:
  – No vendor integrity assessment
  – No employee training, just signature line
  – No mitigation of damages in the event of an incident
    • Who will you call when you have a question?
• No context of how Red Flag Policy fits into your business
  – What’s worth doing is worth doing right.
  – Missing an opportunity to GROW your business


                                                              22
So I’m compliant...
  ‣ NOW WHAT?
    ‣ Don’t let it sit on a shelf
    ‣ Talk to your employees
    ‣ Talk to your borrowers
  ‣ Use your policy as a business-building tool




                                                  23
The file cabinets?




                     24
Thank you!




             25

More Related Content

Recently uploaded

What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
srcw2322l101
 
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
drm1699
 
ابو ظبي اعلان | - سايتوتك في الامارات حبوب الاجهاض للبيع ف حبوب الإجهاض ... ا...
ابو ظبي اعلان | - سايتوتك في الامارات حبوب الاجهاض للبيع ف حبوب الإجهاض ... ا...ابو ظبي اعلان | - سايتوتك في الامارات حبوب الاجهاض للبيع ف حبوب الإجهاض ... ا...
ابو ظبي اعلان | - سايتوتك في الامارات حبوب الاجهاض للبيع ف حبوب الإجهاض ... ا...
brennadilys816
 
Presentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelledPresentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelled
CaitlinCummins3
 
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
daisycvs
 
Powerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsPowerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metrics
CaitlinCummins3
 

Recently uploaded (20)

What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
 
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
 
Should Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their BookkeepingShould Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their Bookkeeping
 
ابو ظبي اعلان | - سايتوتك في الامارات حبوب الاجهاض للبيع ف حبوب الإجهاض ... ا...
ابو ظبي اعلان | - سايتوتك في الامارات حبوب الاجهاض للبيع ف حبوب الإجهاض ... ا...ابو ظبي اعلان | - سايتوتك في الامارات حبوب الاجهاض للبيع ف حبوب الإجهاض ... ا...
ابو ظبي اعلان | - سايتوتك في الامارات حبوب الاجهاض للبيع ف حبوب الإجهاض ... ا...
 
wagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORIwagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORI
 
hyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statementshyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statements
 
Navigating Tax Season with Confidence Streamlines CPA Firms
Navigating Tax Season with Confidence Streamlines CPA FirmsNavigating Tax Season with Confidence Streamlines CPA Firms
Navigating Tax Season with Confidence Streamlines CPA Firms
 
stock price prediction using machine learning
stock price prediction using machine learningstock price prediction using machine learning
stock price prediction using machine learning
 
Beyond Numbers A Holistic Approach to Forensic Accounting
Beyond Numbers A Holistic Approach to Forensic AccountingBeyond Numbers A Holistic Approach to Forensic Accounting
Beyond Numbers A Holistic Approach to Forensic Accounting
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 
Exploring-Pipe-Flanges-Applications-Types-and-Benefits.pptx
Exploring-Pipe-Flanges-Applications-Types-and-Benefits.pptxExploring-Pipe-Flanges-Applications-Types-and-Benefits.pptx
Exploring-Pipe-Flanges-Applications-Types-and-Benefits.pptx
 
Raising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesRaising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE Ventures
 
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Harare
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In HarareTop^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Harare
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Harare
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 
Presentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelledPresentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelled
 
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
 
Powerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsPowerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metrics
 
Moradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in PenacovaMoradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in Penacova
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

idBUSINESS for Mortgage Professionals

  • 1. Mortgage Industry Overview July 10, 2009 1
  • 3. Our goals today ‣ To give you the WHAT… 2
  • 4. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules 2
  • 5. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… 2
  • 6. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… ‣ demo the idBUSINESS Red Flag Compliance Module 2
  • 7. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… ‣ demo the idBUSINESS Red Flag Compliance Module ‣ but also give you the WHY 2
  • 8. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… ‣ demo the idBUSINESS Red Flag Compliance Module ‣ but also give you the WHY ‣ Why information security is an OPPORTUNITY, not a burden 2
  • 10. The PII Lifecycle - MORTGAGE 4
  • 11. The PII Lifecycle - MORTGAGE 4
  • 12. The PII Lifecycle - MORTGAGE 4
  • 13. The PII Lifecycle - MORTGAGE 4
  • 14. The PII Lifecycle - MORTGAGE 4
  • 15. The PII Lifecycle - MORTGAGE 4
  • 16. The PII Lifecycle - MORTGAGE 4
  • 17. The PII Lifecycle - MORTGAGE 4
  • 18. The Opportunity ‣ There is a unique opportunity to grow a mortgage business by leveraging strong information security policy and sharing it with borrowers ‣ Build trust with borrowers ‣ Strengthen employee relationships ‣ Tighten lender/broker operations 5
  • 19. The Risk ‣ The mortgage industry has a unique burden to protect borrower information ‣ Government mandate for regulation ‣ Financial industry scrutiny ‣ The Consumer’s Age of Transparency 6
  • 20. The facts 30% 40% 60% 70% Business has suffered breach Thief is employee or knows employee Business has yet to incur a breach Thief is unknown • Since 2/15/05, over 251,000,000 Americans have had identities or other personal information compromised 7
  • 21. The facts The average breach and its impact on customer confidence is growing. 58% of customers will lose confidence in your business after a breach. 31% of your customers will immediately cease doing business with you following a breach. Source: Ponemon Institute, 2008. 8
  • 22. The Red Flag Rules 9
  • 23. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act 9
  • 24. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: 9
  • 25. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: ‣ you hold “covered accounts” 9
  • 26. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: ‣ you hold “covered accounts” ‣ your customer records present a “reasonably foreseeable risk of identity theft” 9
  • 27. Why are mortgage cos. COVERED ENTITIES? ‣ Deferring payment ‣ The mortgage process is by definition a deferred payment and credit-granting process ‣ Reasonably foreseeable risk ‣ Borrower files are a treasure trove ‣ Each record worth between $80-300 each* * Source: Black Market Identity Auction attended by Net Reaction mole, 2008. 10
  • 29. Red Flag REQUIREMENTS 1. A Written Information Security Program 11
  • 30. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 11
  • 31. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 11
  • 32. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 11
  • 33. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 11
  • 34. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 6. Must contain an incident response capability 11
  • 35. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 6. Must contain an incident response capability 7. Must ensure that vendors and suppliers are also compliant 11
  • 36. “What happens if I don’t comply?” • Legal liability – Civil lawsuits, class-action litigation • Government penalties – FTC & State enforcement • Damage to brand reputation and borrower trust 12
  • 37. The solution ‣ The idBUSINESS Red Flag Compliance Module ‣ Built on real-world forensic fieldwork ‣ Includes tools & benefits that actively involve employees in your compliance efforts ‣ Transitions information security from a compliance issue into a competitive advantage 13
  • 38. The Red Flag Compliance Module ‣ Secure online interface 14
  • 39. The Red Flag Compliance Module ‣ Learning tools available as text or video webinar 15
  • 40. The Red Flag Compliance Module ‣ Risk Assessment tool provides ranking of your company in 12 key focus areas 16
  • 41. The Red Flag Compliance Module ‣ Customizable checklist of 26 Red Flags to meet requirements of FACT Act 17
  • 42. The Red Flag Compliance Module ‣ Employee training automated & easy, integrates automatically with your compliance report 18
  • 43. The Red Flag Compliance Module ‣ Ability to evaluate supplier compliance practices using our proprietary Vendor Integrity Assessment 19
  • 44. The Red Flag Compliance Module ‣ Access individual identity recovery protection using FraudStop and Restore from ID Experts ‣ Available as employee benefit, cafeteria-style add-on, customer blanket, or new revenue stream ‣ In the event of a breach, one-click access to best-in- breed data breach services and forensic services 20
  • 45. Mortgage Industry BENEFITS ‣ NAMB Preferred Provider ‣ www.majesticsecurityidsafe.com ‣ Because We Care ‣ www.mortgagedashboard.com ‣ Mortgage Insurance Agency ‣ www.mtgins.com 21
  • 46. “Can’t I do this myself?” • A self-written policy meets the letter of the law, but leaves gaps: – No vendor integrity assessment – No employee training, just signature line – No mitigation of damages in the event of an incident • Who will you call when you have a question? • No context of how Red Flag Policy fits into your business – What’s worth doing is worth doing right. – Missing an opportunity to GROW your business 22
  • 47. So I’m compliant... ‣ NOW WHAT? ‣ Don’t let it sit on a shelf ‣ Talk to your employees ‣ Talk to your borrowers ‣ Use your policy as a business-building tool 23