SlideShare a Scribd company logo
FraudNet can help protect
your credit union and your
members from potentially     Credit unions using EasyPay powered by
    devastating loss.        Fiserv can now enjoy the benefits of
                             FraudNet.


                             FRAUDNET
                             ALERT TRAINING
                             Upon      completion    of  this
                             training, you will be able to
                             understand, prioritize,     and
                             respond to FraudNet alerts you
                             receive from the SettleMINT EFT
                             team.
WHAT IS FRAUDNET?
 FraudNet is a cutting-edge fraud-detection system that identifies
  fraudulent bill pay activity in real time using a complex set of
  algorithms.
 This state-of-the-art fraud-detection tool also helps credit unions
  meet FFIEC requirements to monitor suspicious activity on high-
  risk accounts.
HOW DOES FRAUDNET WORK?
The FraudNet Detection Engine identifies unusual bill pay activity by
gathering the following types of data from payments scheduled through
bill pay:
 Behavioral data
    Predefined rules are used to target specific types of behaviors that have been
      associated with previous fraud. Each rule is assigned a code to help the
      investigator determine why an alert was triggered and how the investigation should
      be approached.
 Negative data
    Extracted from confirmed fraud cases, this data is used to detect repeat
      occurrences of fraud.
 Statistical data
    This data permits FraudNet to detect and return more
      negative alerts.
COMMON TYPES OF FRAUD
The definitions below are provided to help you better understand common
types of fraud detected by the FraudNet Detection Engine.


 Electronic kiting
     The perpetrator uses a funding account with
       limited or no funds to process payments via bill pay.
 Phishing
     This is the practice of luring unsuspecting Internet users to a fake website by
       using authentic-looking email with the real organization’s logo in an attempt to
       steal passwords and financial or personal information, or to introduce a virus
       attack.
COMMON TYPES OF FRAUD (continued)
The definitions below are provided to help you better understand
common types of fraud detected by the FraudNet Detection
Engine.

 Man in the browser
     Related to “man in the middle,” described below, this is a Trojan horse that
       infects a web browser and has the ability to modify pages, change transaction
       content, or insert additional transactions, all in a completely covert fashion
       invisible to both the consumer and the host application. These types of
       attacks can be successful whether or not security mechanisms such as
       SSL/PLI and/or multi-factor authentication solutions are in place. The only
       way to counter these types of attacks is to use transaction verification.
 Man in the middle
     The perpetrator funnels communication between a consumer and a legitimate
       organization through a fake website. In these attacks, neither the consumer
       nor the organization is aware that the communication is being illegally
       monitored. The criminal is in the middle of a transaction between the
       consumer and his or her bank, credit card company, or retailer.
COMMON TYPES OF FRAUD (continued)
The definitions below are provided to help you better understand common
types of fraud detected by the FraudNet Detection Engine.


 Third-party receiver of funds
     A person who transfers money and reships high-value
       goods that have been fraudulently obtained in one
       country, usually via the Internet, to another country,
       typically where the perpetrator lives.
 Trojan horse
     A program that installs malicious software (malware) on a consumer’s
       computer without their knowledge. Trojan horses often come in links or as
       attachments from unknown email senders. Once installed, the malicious
       software can detect the consumer’s access to online banking sites and record
       their username and password, which is then transmitted to the perpetrator.
WHAT IS A FRAUDNET ALERT?
 FraudNet harnesses the power of collaboration by offering users the
  ability to post instant alerts and maintain a black list shared and
  viewable by financial institutions across the nation.
 When the SettleMINT EFT team receives a FraudNet alert that
  pertains to a transaction relating to one of your members, they will
  use AnswerBook to pass this alert on to your credit union’s FraudNet
  contact, who will then need to use the Alert Priority List (referenced
  on Slides 9-14) to prioritize the alert in case there are others that also
  need to be researched.
 Once the alert is prioritized, your credit union’s FraudNet contact will
  then need to research the transaction referenced in the alert to
  determine whether or not it is fraudulent.
 Once the legitimacy of the transaction has been determined, your
  FraudNet contact will need to reply through AnswerBook to request
  that the transaction be processed or stopped/returned.
ALERT TIMELINE
 If there is an alert that requires your attention, the SettleMINT EFT team
  will notify you via AnswerBook during one of the two time periods listed
  below. Also listed below is the time at which they’ll need your response
  on whether or not to process the transaction referenced in the alert.
    Between 8-9 AM ET (Respond by 2 PM ET same day.)
    Between 2-3 PM ET (Respond by 8 AM ET next day.)
    Note: Cases will not be worked on weekends and holidays.

 It is extremely important that you respond to the SettleMINT
  EFT team via AnswerBook by the times listed above as we cannot
  make the decision on your behalf regarding whether to process
  or stop the transaction. If we do not hear from you with a decision by
  the times indicated above, then:
    The payment will remain on hold for up to 5 business days.
    After that, the payment will be cancelled, in which case the payment would not be
      delivered and the member could receive late fees/penalties.
ALERT PRIORITY LIST
FIRST PRIORITY
 Negative List – DDA: The subscriber’s bank account number is on a
  list of bank accounts associated with confirmed cases of fraud.
 Negative List – Email: The subscriber’s email address is on a list of
  email addresses associated with confirmed cases of fraud.
 Negative List – Payee Account #: The subscriber’s account number
  with the payee is on a list of payee account numbers associated with
  confirmed cases of fraud.
 Negative List – SSN: The subscriber’s Social Security Number is on
  a list of Social Security Numbers associated with confirmed cases of
  fraud.
    When a Social Security Number is added, all payments made by that subscriber
     are alerted in FraudNet.
    Prior to adding a Social Security Number to the Negative List, you must obtain a
     “Declaration of Fraud,” which is a letter stating that the subscriber never has and
     never will use bill pay.
 Negative List – ZIP + 11: The payee’s 11-digit ZIP code is on a list of
  payee address zip codes linked to confirmed cases of fraud.
ALERT PRIORITY LIST
FIRST PRIORITY (CONTINUED)
 Manual Alert: This is externally reported fraud that FraudNet
  missed or that failed to trigger an alert. It’s generated by the
  sponsor to notify Fiserv of the missed data.
 Manual Alert Search: A sponsor using FraudNet generated an
  alert for an item that was linked to confirmed fraud data (generally
  associated with email address, ZIP code, or payee account
  number).
    It is crucial that these accounts be entered into the FraudNet system so fraud
      analysts can track and modify client-scoring parameters in the event their
      detection statistics begin to drop.
 Quick Hitter Rule: Multiple payments have been made to a newly
  added payee.
ALERT PRIORITY LIST
SECOND PRIORITY
 Subscriber Info Change: The subscriber’s email address has recently
  changed.
 Personal Payments Receiver Velocity: This measures velocity of
  transactions and cumulative dollar amounts received by an
  individual. Sponsors subscribing to ZashPay should work with their
  fraud specialist to establish the appropriate velocity and amount
  thresholds.
 Personal Payment Sender Velocity: This measures velocity of
  transactions and cumulative dollar amounts sent by an individual.
  Sponsors subscribing to ZashPay should work with their fraud
  specialist to establish the appropriate velocity and amount
  thresholds.
 A2A Velocity: This monitors the velocity of account-to-account
  transfers being made by a specific subscriber. Variables are
  dependent on the specific business unit’s needs.
ALERT PRIORITY LIST
SECOND PRIORITY (CONTINUED)
 Account Transfers Sleep: This monitors for previously created
  transactions being scheduled on a previously dormant account.
 Bust-Out: The subscriber is attempting to make a
  payment to a recently added payee, and the payee’s
  address is located near the subscriber’s address.
 Bust-Out II: The subscriber is attempting to make a
  payment to a recently added payee, and the payee’s address is
  located far from the subscriber’s address.
 Model: This is a statistical rule that is usually triggered by payment
  size. This is usually a large payment with a small chance of fraud.
ALERT PRIORITY LIST
THIRD PRIORITY
 DDA = Payee Account #: This monitors for transactions where the
  funding account matches the receiving or payee account number.
  This rule monitors both electronic and paper transactions.
 MOE (Merchant Online Enrollment): This rule monitors all newly
  established MOE merchant payments in the Fiserv system. Verify
  the payment with the subscriber.
    MOE was a process created at Fiserv that allowed unmanaged, non-common
     payees to become electronically enabled. This program is no longer being
     used, but fraud mitigation practices still exist to monitor MOE merchants who
     are still electronically enabled within the Fiserv bill payment network.
ALERT PRIORITY LIST
THIRD PRIORITY (CONTINUED)
 Managed Velocity Payment: This is an optional rule used to
  monitor velocity of payments within a particular industry or set of
  industries. Contact your assigned fraud specialist to establish the
  thresholds for this velocity rule. For example, this rule helps
  detect               multiple payments being transmitted to various
  credit card numbers, not just the same number.
 Transfer Monitor: This monitors newly created
  account-to-account transfers, timeframes, and
  amount thresholds per business unit specifications.
 Bank by Mail: This monitors transactions being remitted directly to
  financial-institution branches for deposit into a checking account.
    Effective fall 2011
ALERT RESEARCH TIPS
The tips below are guidelines for researching a transaction flagged in a
FraudNet alert. Please note that these are just recommendations and there
may be additional research required to determine whether or not a
transaction is fraudulent. When researching or making a decision on a
transaction referenced in a FraudNet alert, please follow your credit union’s
fraud/identity theft procedures.
1.   Evaluate the transaction against normal member activity for the
     past three months.
      Why? If the transaction is out of the member’s norms, this could be a sign of
        fraud.
      How? From Member Inquiry, click the Transaction Activity button.

2.   Review the open date of the membership or sub-account.
      Why? If the membership/sub-account was recently opened or if it was opened
        a long time ago with no activity until recently, this could be a sign of fraud.
      How? Within Member Inquiry, the membership open date will be listed in the
        top right corner of the Contact Information tab. The sub-account open date will
        be listed in the top right corner of the Member Account Inquiry screen,
        accessed by clicking the sub-account and then Select.
ALERT RESEARCH TIPS (CONTINUED)
The tips below are guidelines for researching a transaction flagged in a
FraudNet alert. Please note that these are just recommendations and there
may be additional research required to determine whether or not a
transaction is fraudulent.


3.   Review documents used at account opening
     (i.e. copy of driver’s license).
      Why? If the member’s ID looks fake or suspicious, this
           could be a sign of fraud.
      How? Follow your specific credit union procedures for where these documents
        are stored.
4.   Review the member’s credit report.
      Why? If the credit score has suddenly plunged, this could be a sign of fraud.
      How? From MNLOAN #1-Process Member Applications, enter the account
        base and press Enter. Then type in action code VC and press Enter. Select the
        report and click View Report.
ALERT RESEARCH TIPS (CONTINUED)
The tips below are guidelines for researching a transaction flagged in a
FraudNet alert. Please note that these are just recommendations and there
may be additional research required to determine whether or not a
transaction is fraudulent.
5.   Review any changes in contact information and by whom the
     changes were made.
      Why? Identity thieves often change contact information to reroute mail to
        themselves.
      How? Go to MNAUDT #24-Audit File Maintenance.

6.   If, after performing the above research, you determine it’s likely
     that the transaction is fraudulent, contact the member to verify
     the legitimacy of the transaction.
      Tip: Use any previous contact information that may
        exist for the member to reduce the chances of contacting
        the identity thief.
ALERT RESEARCH TIPS (CONTINUED)
The tips below are guidelines for researching a transaction flagged in a
FraudNet alert. Please note that these are just recommendations and there
may be additional research required to determine whether or not a
transaction is fraudulent.



                                                      X
If you determine that the                If you determine that the
transaction is legitimate and            transaction is fraudulent and
you want the SettleMINT EFT              you want the SettleMINT EFT
team to proceed with the                 team to deny the
transaction, respond via                 transaction, respond via
AnswerBook with instructions             AnswerBook with instructions
to process the transaction.              to stop or return the
                                         transaction.
    For response deadlines, refer to timeline on Slide
                          8.
THANK YOU FOR ATTENDING THIS
        WEB CONFERENCE.

                     REMINDER
 Please contact us no later than Friday, March 1 with the
    names and contact information of three FraudNet
 contacts from your credit union so that we always have
someone to speak with regarding transactions referenced
in FraudNet alerts and so that your timely response to our
                    alerts is ensured.

More Related Content

What's hot

Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Michael Abernathy
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
Elijah Ezendu
 
Alternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesAlternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slides
Callcredit123
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
Evan Francen
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
The ID Co.
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
Dominic Sroda Korkoryi
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
whbrown5
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
Gerald Johnson
 
Internet fraud
Internet fraudInternet fraud
Internet fraud
Yasha Singh
 
Prevent banking frauds through identity management
Prevent banking frauds through identity managementPrevent banking frauds through identity management
Prevent banking frauds through identity management
GARL
 
IRS scams continue to pose serious threat
IRS scams continue to pose serious threatIRS scams continue to pose serious threat
IRS scams continue to pose serious threat
PMMBA, LLC The Tax Magnate
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
Steve Mitchinson
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
Improve My Credit USA
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
N F
 
Memberguide ppt
Memberguide pptMemberguide ppt
Memberguide ppt
EmilyKPope
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
anthonytaylor01
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
mbachnak
 
Ten things to know about identity theft
Ten things to know about identity theftTen things to know about identity theft
Ten things to know about identity theft
PMMBA, LLC The Tax Magnate
 
Security team training
Security team trainingSecurity team training
Security team training
FrankSobotka
 
C6 intelligence Fraud Glossary Whitepaper
C6 intelligence Fraud Glossary WhitepaperC6 intelligence Fraud Glossary Whitepaper
C6 intelligence Fraud Glossary Whitepaper
C6 Intelligence Information Systems Ltd
 

What's hot (20)

Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Alternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesAlternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slides
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
Internet fraud
Internet fraudInternet fraud
Internet fraud
 
Prevent banking frauds through identity management
Prevent banking frauds through identity managementPrevent banking frauds through identity management
Prevent banking frauds through identity management
 
IRS scams continue to pose serious threat
IRS scams continue to pose serious threatIRS scams continue to pose serious threat
IRS scams continue to pose serious threat
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Memberguide ppt
Memberguide pptMemberguide ppt
Memberguide ppt
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Ten things to know about identity theft
Ten things to know about identity theftTen things to know about identity theft
Ten things to know about identity theft
 
Security team training
Security team trainingSecurity team training
Security team training
 
C6 intelligence Fraud Glossary Whitepaper
C6 intelligence Fraud Glossary WhitepaperC6 intelligence Fraud Glossary Whitepaper
C6 intelligence Fraud Glossary Whitepaper
 

Viewers also liked

Splunk .conf2011: Real Time Alerting and Monitoring
Splunk .conf2011: Real Time Alerting and MonitoringSplunk .conf2011: Real Time Alerting and Monitoring
Splunk .conf2011: Real Time Alerting and Monitoring
Erin Sweeney
 
Time to Think Differently: The case for change
Time to Think Differently: The case for changeTime to Think Differently: The case for change
Time to Think Differently: The case for change
The King's Fund
 
IBM Monitoring and Event Management Solutions
IBM Monitoring and Event Management SolutionsIBM Monitoring and Event Management Solutions
IBM Monitoring and Event Management Solutions
IBM Danmark
 
Web traffic analysis example
Web traffic analysis exampleWeb traffic analysis example
Web traffic analysis example
Enrique Delgado Itt
 
IBM Netcool Operations Insight
IBM Netcool Operations InsightIBM Netcool Operations Insight
IBM Netcool Operations Insight
Tulsie Narine
 
R12 Business Case Process Manufacturing
R12 Business Case Process ManufacturingR12 Business Case Process Manufacturing
R12 Business Case Process Manufacturing
Vaddadi Anil Srinivas
 
Monitoring solutions comparison
Monitoring solutions comparisonMonitoring solutions comparison
Monitoring solutions comparison
Wouter Hermans
 
NetScope network traffic monitoring
NetScope network traffic monitoringNetScope network traffic monitoring
NetScope network traffic monitoring
Heath Snoek
 
Basic Six Sigma Presentation
Basic Six Sigma PresentationBasic Six Sigma Presentation
Basic Six Sigma Presentation
vivekissar
 
How to build a case for change
How to build a case for changeHow to build a case for change
How to build a case for change
thechangesource
 
How to Design a Sales Process for B2B Sales - #1 Tool for the Dream Sales Team
How to Design a Sales Process for B2B Sales - #1 Tool for the Dream Sales Team How to Design a Sales Process for B2B Sales - #1 Tool for the Dream Sales Team
How to Design a Sales Process for B2B Sales - #1 Tool for the Dream Sales Team
Daniel Nilsson
 

Viewers also liked (11)

Splunk .conf2011: Real Time Alerting and Monitoring
Splunk .conf2011: Real Time Alerting and MonitoringSplunk .conf2011: Real Time Alerting and Monitoring
Splunk .conf2011: Real Time Alerting and Monitoring
 
Time to Think Differently: The case for change
Time to Think Differently: The case for changeTime to Think Differently: The case for change
Time to Think Differently: The case for change
 
IBM Monitoring and Event Management Solutions
IBM Monitoring and Event Management SolutionsIBM Monitoring and Event Management Solutions
IBM Monitoring and Event Management Solutions
 
Web traffic analysis example
Web traffic analysis exampleWeb traffic analysis example
Web traffic analysis example
 
IBM Netcool Operations Insight
IBM Netcool Operations InsightIBM Netcool Operations Insight
IBM Netcool Operations Insight
 
R12 Business Case Process Manufacturing
R12 Business Case Process ManufacturingR12 Business Case Process Manufacturing
R12 Business Case Process Manufacturing
 
Monitoring solutions comparison
Monitoring solutions comparisonMonitoring solutions comparison
Monitoring solutions comparison
 
NetScope network traffic monitoring
NetScope network traffic monitoringNetScope network traffic monitoring
NetScope network traffic monitoring
 
Basic Six Sigma Presentation
Basic Six Sigma PresentationBasic Six Sigma Presentation
Basic Six Sigma Presentation
 
How to build a case for change
How to build a case for changeHow to build a case for change
How to build a case for change
 
How to Design a Sales Process for B2B Sales - #1 Tool for the Dream Sales Team
How to Design a Sales Process for B2B Sales - #1 Tool for the Dream Sales Team How to Design a Sales Process for B2B Sales - #1 Tool for the Dream Sales Team
How to Design a Sales Process for B2B Sales - #1 Tool for the Dream Sales Team
 

Similar to FraudNet PowerPoint

How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfHow to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
Bhekumuzi Xaba
 
Claims Fraud Network Analysis
Claims Fraud Network AnalysisClaims Fraud Network Analysis
Claims Fraud Network Analysis
Cogitate.us
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments Fraud
Kyriba Corporation
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
- Mark - Fullbright
 
How to fight chargebacks. part 1
How to fight chargebacks. part 1How to fight chargebacks. part 1
How to fight chargebacks. part 1
Ikajo International
 
Payments 101
Payments 101Payments 101
Payments 101
Cory Barba
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
Security B-Sides
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdf
ssuser7464571
 
Is this a scam.pdf
Is this a scam.pdfIs this a scam.pdf
Is this a scam.pdf
AvaAmelia
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
Ramiro Cid
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
OilPriceInformationService
 
Tackling Fraud and Compliance in Performance Marketing - Heiko Hildebrandt
Tackling Fraud and Compliance in Performance Marketing - Heiko HildebrandtTackling Fraud and Compliance in Performance Marketing - Heiko Hildebrandt
Tackling Fraud and Compliance in Performance Marketing - Heiko Hildebrandt
auexpo Conference
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention
CMR WORLD TECH
 
Ntrust case study_iovation
Ntrust case study_iovationNtrust case study_iovation
Ntrust case study_iovation
TransUnion
 
ATM2.pdf.pdf
ATM2.pdf.pdfATM2.pdf.pdf
ATM2.pdf.pdf
Rashmibansal15
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
Naval OPSEC
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
FraudBusters
 
IBM Counter Finalcial Crimes Management
IBM Counter Finalcial Crimes ManagementIBM Counter Finalcial Crimes Management
IBM Counter Finalcial Crimes Management
Carlos Martin Hernandez
 
IBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementIBM Counter Financial Crimes Management
IBM Counter Financial Crimes Management
Virginia Fernandez
 
ATM Fraud Prevention Management White Paper from ESQ
 ATM Fraud Prevention Management White Paper from ESQ ATM Fraud Prevention Management White Paper from ESQ
ATM Fraud Prevention Management White Paper from ESQ
ESQ Business Services
 

Similar to FraudNet PowerPoint (20)

How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfHow to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
 
Claims Fraud Network Analysis
Claims Fraud Network AnalysisClaims Fraud Network Analysis
Claims Fraud Network Analysis
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments Fraud
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
How to fight chargebacks. part 1
How to fight chargebacks. part 1How to fight chargebacks. part 1
How to fight chargebacks. part 1
 
Payments 101
Payments 101Payments 101
Payments 101
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdf
 
Is this a scam.pdf
Is this a scam.pdfIs this a scam.pdf
Is this a scam.pdf
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Tackling Fraud and Compliance in Performance Marketing - Heiko Hildebrandt
Tackling Fraud and Compliance in Performance Marketing - Heiko HildebrandtTackling Fraud and Compliance in Performance Marketing - Heiko Hildebrandt
Tackling Fraud and Compliance in Performance Marketing - Heiko Hildebrandt
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention
 
Ntrust case study_iovation
Ntrust case study_iovationNtrust case study_iovation
Ntrust case study_iovation
 
ATM2.pdf.pdf
ATM2.pdf.pdfATM2.pdf.pdf
ATM2.pdf.pdf
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
 
IBM Counter Finalcial Crimes Management
IBM Counter Finalcial Crimes ManagementIBM Counter Finalcial Crimes Management
IBM Counter Finalcial Crimes Management
 
IBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementIBM Counter Financial Crimes Management
IBM Counter Financial Crimes Management
 
ATM Fraud Prevention Management White Paper from ESQ
 ATM Fraud Prevention Management White Paper from ESQ ATM Fraud Prevention Management White Paper from ESQ
ATM Fraud Prevention Management White Paper from ESQ
 

More from cuanswers

Tila/Respa Changes
Tila/Respa ChangesTila/Respa Changes
Tila/Respa Changes
cuanswers
 
Making Mortgage Payments in CU*BASE and It's Me 247
Making Mortgage Payments in CU*BASE and It's Me 247Making Mortgage Payments in CU*BASE and It's Me 247
Making Mortgage Payments in CU*BASE and It's Me 247
cuanswers
 
Tour of ATM Maintenance Screens
Tour of ATM Maintenance ScreensTour of ATM Maintenance Screens
Tour of ATM Maintenance Screens
cuanswers
 
Making Mortgage Payments in CU*BASE and It's Me 247
Making Mortgage Payments in CU*BASE and It's Me 247Making Mortgage Payments in CU*BASE and It's Me 247
Making Mortgage Payments in CU*BASE and It's Me 247
cuanswers
 
Meet Edward
Meet EdwardMeet Edward
Meet Edward
cuanswers
 
Leveraging Talent
Leveraging TalentLeveraging Talent
Leveraging Talent
cuanswers
 
2008 Leadership Conference
2008 Leadership Conference2008 Leadership Conference
2008 Leadership Conference
cuanswers
 
CU*Answers CEO Strategies CEO School
CU*Answers CEO Strategies CEO SchoolCU*Answers CEO Strategies CEO School
CU*Answers CEO Strategies CEO School
cuanswers
 
CU*Answers CEO Strategies Collaboration Workshop
CU*Answers CEO Strategies Collaboration WorkshopCU*Answers CEO Strategies Collaboration Workshop
CU*Answers CEO Strategies Collaboration Workshop
cuanswers
 

More from cuanswers (9)

Tila/Respa Changes
Tila/Respa ChangesTila/Respa Changes
Tila/Respa Changes
 
Making Mortgage Payments in CU*BASE and It's Me 247
Making Mortgage Payments in CU*BASE and It's Me 247Making Mortgage Payments in CU*BASE and It's Me 247
Making Mortgage Payments in CU*BASE and It's Me 247
 
Tour of ATM Maintenance Screens
Tour of ATM Maintenance ScreensTour of ATM Maintenance Screens
Tour of ATM Maintenance Screens
 
Making Mortgage Payments in CU*BASE and It's Me 247
Making Mortgage Payments in CU*BASE and It's Me 247Making Mortgage Payments in CU*BASE and It's Me 247
Making Mortgage Payments in CU*BASE and It's Me 247
 
Meet Edward
Meet EdwardMeet Edward
Meet Edward
 
Leveraging Talent
Leveraging TalentLeveraging Talent
Leveraging Talent
 
2008 Leadership Conference
2008 Leadership Conference2008 Leadership Conference
2008 Leadership Conference
 
CU*Answers CEO Strategies CEO School
CU*Answers CEO Strategies CEO SchoolCU*Answers CEO Strategies CEO School
CU*Answers CEO Strategies CEO School
 
CU*Answers CEO Strategies Collaboration Workshop
CU*Answers CEO Strategies Collaboration WorkshopCU*Answers CEO Strategies Collaboration Workshop
CU*Answers CEO Strategies Collaboration Workshop
 

Recently uploaded

Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
nimaruinazawa258
 
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
rlo9fxi
 
13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx
ILC- UK
 
Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!
FinTech Belgium
 
Power point analisis laporan keuangan chapter 7 subramanyam
Power point analisis laporan keuangan chapter 7 subramanyamPower point analisis laporan keuangan chapter 7 subramanyam
Power point analisis laporan keuangan chapter 7 subramanyam
FarhanRafifSidqi
 
TechnoXander Confirmation of Payee Product Pack 1.pdf
TechnoXander Confirmation of Payee Product Pack 1.pdfTechnoXander Confirmation of Payee Product Pack 1.pdf
TechnoXander Confirmation of Payee Product Pack 1.pdf
richardwellington119
 
FCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptxFCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptx
nalamynandan
 
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
k4ncd0z
 
Accounting Information Systems (AIS).pptx
Accounting Information Systems (AIS).pptxAccounting Information Systems (AIS).pptx
Accounting Information Systems (AIS).pptx
TIZITAWMASRESHA
 
一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查
一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查
一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查
taqyea
 
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
brunasordi905
 
International Sustainability Standards Board
International Sustainability Standards BoardInternational Sustainability Standards Board
International Sustainability Standards Board
Kumar Ramaiah
 
Who Is Abhay Bhutada, MD of Poonawalla Fincorp
Who Is Abhay Bhutada, MD of Poonawalla FincorpWho Is Abhay Bhutada, MD of Poonawalla Fincorp
Who Is Abhay Bhutada, MD of Poonawalla Fincorp
beulahfernandes8
 
Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...
Labour Market Information Council | Conseil de l’information sur le marché du travail
 
Dr. Alyce Su Cover Story - China's Investment Leader
Dr. Alyce Su Cover Story - China's Investment LeaderDr. Alyce Su Cover Story - China's Investment Leader
Dr. Alyce Su Cover Story - China's Investment Leader
msthrill
 
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
yeuwffu
 
Initial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.pptInitial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.ppt
ribhi87
 
Governor Olli Rehn: Inflation down and recovery supported by interest rate cu...
Governor Olli Rehn: Inflation down and recovery supported by interest rate cu...Governor Olli Rehn: Inflation down and recovery supported by interest rate cu...
Governor Olli Rehn: Inflation down and recovery supported by interest rate cu...
Suomen Pankki
 
Macroeconomic-digest-of-Ukraine-0624-Eng.pdf
Macroeconomic-digest-of-Ukraine-0624-Eng.pdfMacroeconomic-digest-of-Ukraine-0624-Eng.pdf
Macroeconomic-digest-of-Ukraine-0624-Eng.pdf
olaola5673
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
asukqco
 

Recently uploaded (20)

Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
 
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
 
13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx
 
Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!
 
Power point analisis laporan keuangan chapter 7 subramanyam
Power point analisis laporan keuangan chapter 7 subramanyamPower point analisis laporan keuangan chapter 7 subramanyam
Power point analisis laporan keuangan chapter 7 subramanyam
 
TechnoXander Confirmation of Payee Product Pack 1.pdf
TechnoXander Confirmation of Payee Product Pack 1.pdfTechnoXander Confirmation of Payee Product Pack 1.pdf
TechnoXander Confirmation of Payee Product Pack 1.pdf
 
FCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptxFCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptx
 
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
 
Accounting Information Systems (AIS).pptx
Accounting Information Systems (AIS).pptxAccounting Information Systems (AIS).pptx
Accounting Information Systems (AIS).pptx
 
一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查
一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查
一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查
 
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
 
International Sustainability Standards Board
International Sustainability Standards BoardInternational Sustainability Standards Board
International Sustainability Standards Board
 
Who Is Abhay Bhutada, MD of Poonawalla Fincorp
Who Is Abhay Bhutada, MD of Poonawalla FincorpWho Is Abhay Bhutada, MD of Poonawalla Fincorp
Who Is Abhay Bhutada, MD of Poonawalla Fincorp
 
Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...
 
Dr. Alyce Su Cover Story - China's Investment Leader
Dr. Alyce Su Cover Story - China's Investment LeaderDr. Alyce Su Cover Story - China's Investment Leader
Dr. Alyce Su Cover Story - China's Investment Leader
 
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
 
Initial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.pptInitial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.ppt
 
Governor Olli Rehn: Inflation down and recovery supported by interest rate cu...
Governor Olli Rehn: Inflation down and recovery supported by interest rate cu...Governor Olli Rehn: Inflation down and recovery supported by interest rate cu...
Governor Olli Rehn: Inflation down and recovery supported by interest rate cu...
 
Macroeconomic-digest-of-Ukraine-0624-Eng.pdf
Macroeconomic-digest-of-Ukraine-0624-Eng.pdfMacroeconomic-digest-of-Ukraine-0624-Eng.pdf
Macroeconomic-digest-of-Ukraine-0624-Eng.pdf
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
 

FraudNet PowerPoint

  • 1. FraudNet can help protect your credit union and your members from potentially Credit unions using EasyPay powered by devastating loss. Fiserv can now enjoy the benefits of FraudNet. FRAUDNET ALERT TRAINING Upon completion of this training, you will be able to understand, prioritize, and respond to FraudNet alerts you receive from the SettleMINT EFT team.
  • 2. WHAT IS FRAUDNET?  FraudNet is a cutting-edge fraud-detection system that identifies fraudulent bill pay activity in real time using a complex set of algorithms.  This state-of-the-art fraud-detection tool also helps credit unions meet FFIEC requirements to monitor suspicious activity on high- risk accounts.
  • 3. HOW DOES FRAUDNET WORK? The FraudNet Detection Engine identifies unusual bill pay activity by gathering the following types of data from payments scheduled through bill pay:  Behavioral data  Predefined rules are used to target specific types of behaviors that have been associated with previous fraud. Each rule is assigned a code to help the investigator determine why an alert was triggered and how the investigation should be approached.  Negative data  Extracted from confirmed fraud cases, this data is used to detect repeat occurrences of fraud.  Statistical data  This data permits FraudNet to detect and return more negative alerts.
  • 4. COMMON TYPES OF FRAUD The definitions below are provided to help you better understand common types of fraud detected by the FraudNet Detection Engine.  Electronic kiting  The perpetrator uses a funding account with limited or no funds to process payments via bill pay.  Phishing  This is the practice of luring unsuspecting Internet users to a fake website by using authentic-looking email with the real organization’s logo in an attempt to steal passwords and financial or personal information, or to introduce a virus attack.
  • 5. COMMON TYPES OF FRAUD (continued) The definitions below are provided to help you better understand common types of fraud detected by the FraudNet Detection Engine.  Man in the browser  Related to “man in the middle,” described below, this is a Trojan horse that infects a web browser and has the ability to modify pages, change transaction content, or insert additional transactions, all in a completely covert fashion invisible to both the consumer and the host application. These types of attacks can be successful whether or not security mechanisms such as SSL/PLI and/or multi-factor authentication solutions are in place. The only way to counter these types of attacks is to use transaction verification.  Man in the middle  The perpetrator funnels communication between a consumer and a legitimate organization through a fake website. In these attacks, neither the consumer nor the organization is aware that the communication is being illegally monitored. The criminal is in the middle of a transaction between the consumer and his or her bank, credit card company, or retailer.
  • 6. COMMON TYPES OF FRAUD (continued) The definitions below are provided to help you better understand common types of fraud detected by the FraudNet Detection Engine.  Third-party receiver of funds  A person who transfers money and reships high-value goods that have been fraudulently obtained in one country, usually via the Internet, to another country, typically where the perpetrator lives.  Trojan horse  A program that installs malicious software (malware) on a consumer’s computer without their knowledge. Trojan horses often come in links or as attachments from unknown email senders. Once installed, the malicious software can detect the consumer’s access to online banking sites and record their username and password, which is then transmitted to the perpetrator.
  • 7. WHAT IS A FRAUDNET ALERT?  FraudNet harnesses the power of collaboration by offering users the ability to post instant alerts and maintain a black list shared and viewable by financial institutions across the nation.  When the SettleMINT EFT team receives a FraudNet alert that pertains to a transaction relating to one of your members, they will use AnswerBook to pass this alert on to your credit union’s FraudNet contact, who will then need to use the Alert Priority List (referenced on Slides 9-14) to prioritize the alert in case there are others that also need to be researched.  Once the alert is prioritized, your credit union’s FraudNet contact will then need to research the transaction referenced in the alert to determine whether or not it is fraudulent.  Once the legitimacy of the transaction has been determined, your FraudNet contact will need to reply through AnswerBook to request that the transaction be processed or stopped/returned.
  • 8. ALERT TIMELINE  If there is an alert that requires your attention, the SettleMINT EFT team will notify you via AnswerBook during one of the two time periods listed below. Also listed below is the time at which they’ll need your response on whether or not to process the transaction referenced in the alert.  Between 8-9 AM ET (Respond by 2 PM ET same day.)  Between 2-3 PM ET (Respond by 8 AM ET next day.)  Note: Cases will not be worked on weekends and holidays.  It is extremely important that you respond to the SettleMINT EFT team via AnswerBook by the times listed above as we cannot make the decision on your behalf regarding whether to process or stop the transaction. If we do not hear from you with a decision by the times indicated above, then:  The payment will remain on hold for up to 5 business days.  After that, the payment will be cancelled, in which case the payment would not be delivered and the member could receive late fees/penalties.
  • 9. ALERT PRIORITY LIST FIRST PRIORITY  Negative List – DDA: The subscriber’s bank account number is on a list of bank accounts associated with confirmed cases of fraud.  Negative List – Email: The subscriber’s email address is on a list of email addresses associated with confirmed cases of fraud.  Negative List – Payee Account #: The subscriber’s account number with the payee is on a list of payee account numbers associated with confirmed cases of fraud.  Negative List – SSN: The subscriber’s Social Security Number is on a list of Social Security Numbers associated with confirmed cases of fraud.  When a Social Security Number is added, all payments made by that subscriber are alerted in FraudNet.  Prior to adding a Social Security Number to the Negative List, you must obtain a “Declaration of Fraud,” which is a letter stating that the subscriber never has and never will use bill pay.  Negative List – ZIP + 11: The payee’s 11-digit ZIP code is on a list of payee address zip codes linked to confirmed cases of fraud.
  • 10. ALERT PRIORITY LIST FIRST PRIORITY (CONTINUED)  Manual Alert: This is externally reported fraud that FraudNet missed or that failed to trigger an alert. It’s generated by the sponsor to notify Fiserv of the missed data.  Manual Alert Search: A sponsor using FraudNet generated an alert for an item that was linked to confirmed fraud data (generally associated with email address, ZIP code, or payee account number).  It is crucial that these accounts be entered into the FraudNet system so fraud analysts can track and modify client-scoring parameters in the event their detection statistics begin to drop.  Quick Hitter Rule: Multiple payments have been made to a newly added payee.
  • 11. ALERT PRIORITY LIST SECOND PRIORITY  Subscriber Info Change: The subscriber’s email address has recently changed.  Personal Payments Receiver Velocity: This measures velocity of transactions and cumulative dollar amounts received by an individual. Sponsors subscribing to ZashPay should work with their fraud specialist to establish the appropriate velocity and amount thresholds.  Personal Payment Sender Velocity: This measures velocity of transactions and cumulative dollar amounts sent by an individual. Sponsors subscribing to ZashPay should work with their fraud specialist to establish the appropriate velocity and amount thresholds.  A2A Velocity: This monitors the velocity of account-to-account transfers being made by a specific subscriber. Variables are dependent on the specific business unit’s needs.
  • 12. ALERT PRIORITY LIST SECOND PRIORITY (CONTINUED)  Account Transfers Sleep: This monitors for previously created transactions being scheduled on a previously dormant account.  Bust-Out: The subscriber is attempting to make a payment to a recently added payee, and the payee’s address is located near the subscriber’s address.  Bust-Out II: The subscriber is attempting to make a payment to a recently added payee, and the payee’s address is located far from the subscriber’s address.  Model: This is a statistical rule that is usually triggered by payment size. This is usually a large payment with a small chance of fraud.
  • 13. ALERT PRIORITY LIST THIRD PRIORITY  DDA = Payee Account #: This monitors for transactions where the funding account matches the receiving or payee account number. This rule monitors both electronic and paper transactions.  MOE (Merchant Online Enrollment): This rule monitors all newly established MOE merchant payments in the Fiserv system. Verify the payment with the subscriber.  MOE was a process created at Fiserv that allowed unmanaged, non-common payees to become electronically enabled. This program is no longer being used, but fraud mitigation practices still exist to monitor MOE merchants who are still electronically enabled within the Fiserv bill payment network.
  • 14. ALERT PRIORITY LIST THIRD PRIORITY (CONTINUED)  Managed Velocity Payment: This is an optional rule used to monitor velocity of payments within a particular industry or set of industries. Contact your assigned fraud specialist to establish the thresholds for this velocity rule. For example, this rule helps detect multiple payments being transmitted to various credit card numbers, not just the same number.  Transfer Monitor: This monitors newly created account-to-account transfers, timeframes, and amount thresholds per business unit specifications.  Bank by Mail: This monitors transactions being remitted directly to financial-institution branches for deposit into a checking account.  Effective fall 2011
  • 15. ALERT RESEARCH TIPS The tips below are guidelines for researching a transaction flagged in a FraudNet alert. Please note that these are just recommendations and there may be additional research required to determine whether or not a transaction is fraudulent. When researching or making a decision on a transaction referenced in a FraudNet alert, please follow your credit union’s fraud/identity theft procedures. 1. Evaluate the transaction against normal member activity for the past three months.  Why? If the transaction is out of the member’s norms, this could be a sign of fraud.  How? From Member Inquiry, click the Transaction Activity button. 2. Review the open date of the membership or sub-account.  Why? If the membership/sub-account was recently opened or if it was opened a long time ago with no activity until recently, this could be a sign of fraud.  How? Within Member Inquiry, the membership open date will be listed in the top right corner of the Contact Information tab. The sub-account open date will be listed in the top right corner of the Member Account Inquiry screen, accessed by clicking the sub-account and then Select.
  • 16. ALERT RESEARCH TIPS (CONTINUED) The tips below are guidelines for researching a transaction flagged in a FraudNet alert. Please note that these are just recommendations and there may be additional research required to determine whether or not a transaction is fraudulent. 3. Review documents used at account opening (i.e. copy of driver’s license).  Why? If the member’s ID looks fake or suspicious, this could be a sign of fraud.  How? Follow your specific credit union procedures for where these documents are stored. 4. Review the member’s credit report.  Why? If the credit score has suddenly plunged, this could be a sign of fraud.  How? From MNLOAN #1-Process Member Applications, enter the account base and press Enter. Then type in action code VC and press Enter. Select the report and click View Report.
  • 17. ALERT RESEARCH TIPS (CONTINUED) The tips below are guidelines for researching a transaction flagged in a FraudNet alert. Please note that these are just recommendations and there may be additional research required to determine whether or not a transaction is fraudulent. 5. Review any changes in contact information and by whom the changes were made.  Why? Identity thieves often change contact information to reroute mail to themselves.  How? Go to MNAUDT #24-Audit File Maintenance. 6. If, after performing the above research, you determine it’s likely that the transaction is fraudulent, contact the member to verify the legitimacy of the transaction.  Tip: Use any previous contact information that may exist for the member to reduce the chances of contacting the identity thief.
  • 18. ALERT RESEARCH TIPS (CONTINUED) The tips below are guidelines for researching a transaction flagged in a FraudNet alert. Please note that these are just recommendations and there may be additional research required to determine whether or not a transaction is fraudulent.  X If you determine that the If you determine that the transaction is legitimate and transaction is fraudulent and you want the SettleMINT EFT you want the SettleMINT EFT team to proceed with the team to deny the transaction, respond via transaction, respond via AnswerBook with instructions AnswerBook with instructions to process the transaction. to stop or return the transaction. For response deadlines, refer to timeline on Slide 8.
  • 19. THANK YOU FOR ATTENDING THIS WEB CONFERENCE. REMINDER Please contact us no later than Friday, March 1 with the names and contact information of three FraudNet contacts from your credit union so that we always have someone to speak with regarding transactions referenced in FraudNet alerts and so that your timely response to our alerts is ensured.