This white paper discusses the benefits of migrating from ink-based fingerprinting processes to livescan fingerprinting processes for background checks. It outlines the typical ink-based process, which is slow and error-prone, involving collecting fingerprints on ink cards and mailing them for processing. The paper then describes the benefits of livescan fingerprinting, which is faster, more accurate, secure, and cost-effective. It provides an overview of how a complete end-to-end background checking process using livescan would work when outsourced to a company like Daon Trusted Identity Services.
This new publication, Cyber Claims Insight from Aon Benfield’s Cyber Practice Group, empowers readers with the resources and tools they need to understand the cyber landscape, including legal trends, claims and insurance coverage disputes.
CI Breaks down the new 2013 rules for CFPB:
The Consumer Financial Protection Bureau (CFPB) now has primary rule making authority over the Federal Fair Credit Reporting Act.
New forms are required for the effective date of January 1, 2013.
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Steve Werby
Data breach notification laws have proliferated worldwide, beginning with California’s law, which was enacted nearly a decade ago. As a result, citizens are being bombarded by breach notifications and media coverage of data exposures has skyrocketed. But are these increasingly onerous laws leading to stronger information security and better decisions by citizens or are they backfiring? I’ll compare existing laws, analyze data breach notifications and explore the effects of these laws, including feedback from citizens and information security professionals. By comparing data exposure disclosure to other negative events that don't require disclosure and sharing alternate disclosure models, I'll leave the audience questioning whether there's a better way.
This new publication, Cyber Claims Insight from Aon Benfield’s Cyber Practice Group, empowers readers with the resources and tools they need to understand the cyber landscape, including legal trends, claims and insurance coverage disputes.
CI Breaks down the new 2013 rules for CFPB:
The Consumer Financial Protection Bureau (CFPB) now has primary rule making authority over the Federal Fair Credit Reporting Act.
New forms are required for the effective date of January 1, 2013.
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Steve Werby
Data breach notification laws have proliferated worldwide, beginning with California’s law, which was enacted nearly a decade ago. As a result, citizens are being bombarded by breach notifications and media coverage of data exposures has skyrocketed. But are these increasingly onerous laws leading to stronger information security and better decisions by citizens or are they backfiring? I’ll compare existing laws, analyze data breach notifications and explore the effects of these laws, including feedback from citizens and information security professionals. By comparing data exposure disclosure to other negative events that don't require disclosure and sharing alternate disclosure models, I'll leave the audience questioning whether there's a better way.
Consumer protection is your smartphone too smartarcherlaw1
Archer & Greiner is a full service, regional law firm with a reputation for providing the highest quality, result-driven legal services to corporate and individual clients.
Summary description of an existing system that prevents doctor shopping. Patient prescription patterns are checked for the doctor before writing a new prescription. For the pharmacist, the claim is matched against valid prescriptions, and the filling of similar prescriptions are checked before drugs are dispensed.
Describes a joint CMS/WellPoint voluntary project that demonstrates the effectiveness of Castlestone's VisitEye in preventing many forms of outpatient insurance fraud, in this case Durable Medical Equipment (DME)
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
17 U.S. Code § 107 - Limitations on exclusive rights: Fair use
Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
Privacy and Data Security: Minimizing Reputational and Legal RisksTechWell
Privacy and data security are hot topics among US state and federal regulators as well as plaintiffs’ lawyers. Companies experiencing data breaches have been fined millions of dollars, paid out millions in settlements, and spent just as much on breach remediation efforts. In the past several years, data breaches have occurred in the hospitality, software, retail, and healthcare industries. Join Tatiana Melnik to see how stakeholders can minimize data breach risks, and privacy and security concerns by integrating the Privacy by Design Model into the software development lifecycle. To understand how to minimize risks, stakeholders must understand the regulatory compliance scheme surrounding personally identifiable information; the Privacy by Design approach and the Federal Trade Commission’s involvement; and enforcement actions undertaken by federal agencies, State Attorneys’ General, and class action suits filed by plaintiffs.
Operation Phish Phry commenced in 2007 when FBI agents, working with United States financial institutions, took proactive steps to identify and disrupt sophisticated criminal enterprises targeting the financial infrastructure in the United States.
Investigators in both countries uncovered an international conspiracy allegedly operating an elaborate scheme to steal identities through a method commonly called “phishing.” The group is accused of conspiring to target American-based financial institutions and victimize an unknown number of account holders by fraudulently using their personal financial information.
The multinational investigative effort resulted in 53 defendants being named in the federal indictment and 47 suspects being identified by Egyptian authorities. The domestic defendants were arrested in California, Nevada, and North Carolina. In California, defendants reside in the counties of Los Angeles, Orange, San Bernardino, Riverside, and San Diego.
Egyptian-based hackers obtained bank account numbers and related personal identification information from an unknown number of bank customers through phishing
Defendants were accused with conspiracy to commit wire fraud and bank fraud. Various defendants are charged with bank fraud; aggravated identity theft; conspiracy to commit computer fraud, specifically unauthorized access to protected computers in connection with fraudulent bank transfers and domestic and international money laundering
Many lawyers are unfamiliar with the nuances of computer technology and data security essential to comply with 21st century ethic rules. There are many hidden dangers in frequently used tools and platforms, including email, social-media and “The Cloud.” This topic helps attorneys in law firms and legal departments learn about risks of which they may not be aware. The topic also explains some suggested practices and solutions. With law firms a prime target of hackers, now more than ever attorneys must be vigilant as to client data and firm/department technology resources. This information is critical for attorneys to become more sophisticated in risk management in various technology contexts.
This webinar will provide important information and tips on lawyer technology ethics and the best law office management practices to potentially avoid Bar complaints and legal malpractice claims. Participants will also receive important information regarding Bar rules related to technology ethics, lawyer social media ethics, ethics and electronic devices, and ethics issues related other technology that is used in the practice of law. Among other things, the webinar will cover topics such as:
• The importance of lawyer technology competence
• Relationship between technology and lawyer ethics
• How to comply with ethics rules
• How to identify and resolve technology ethics issues
• How to maintain an ethical practice in today’s rapidly evolving legal ethics and technology environment
Ethics of Online Forms and E-Signatures for AttorneysGreg McLawsen
Did you really ever think you’d see the day when a pen-
and-ink signature on a document, or even an original document, wasn’t required? Well, that day has come – and you need to insure you are not only in compliance with court rules, but also ethics rules. We’ll examine:
• The RPCs relevant to documents and signatures (RPC 1.6 on confidentiality of information), and touch upon on the attorneys duty to supervise associate attorneys, legal support staff, and LLLTs (5.1, 5.2, 5.3, and 5.10)
• The competent use of various e-signature services
• The ethical and technical requirements for safeguarding client signatures
• How to competently and safely complete and submit on-line forms
This presentation was given at the January 22, 2016 annual CLE of the Washington State Bar Association's Solo and Small Practice Section
The purpose of this paper is to review the topic of data breach from two perspectives: first, an overview of the trends in data breach litigation, and second, a more granular perspective of practical data protection processes that may serve as a guidepost to help reduce the risk of likelihood of data breach. Taken together the reader will understand why a measured approach to data protection can reduce the risk of financial liability from a data breach lawsuit.
Consumer protection is your smartphone too smartarcherlaw1
Archer & Greiner is a full service, regional law firm with a reputation for providing the highest quality, result-driven legal services to corporate and individual clients.
Summary description of an existing system that prevents doctor shopping. Patient prescription patterns are checked for the doctor before writing a new prescription. For the pharmacist, the claim is matched against valid prescriptions, and the filling of similar prescriptions are checked before drugs are dispensed.
Describes a joint CMS/WellPoint voluntary project that demonstrates the effectiveness of Castlestone's VisitEye in preventing many forms of outpatient insurance fraud, in this case Durable Medical Equipment (DME)
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
17 U.S. Code § 107 - Limitations on exclusive rights: Fair use
Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
Privacy and Data Security: Minimizing Reputational and Legal RisksTechWell
Privacy and data security are hot topics among US state and federal regulators as well as plaintiffs’ lawyers. Companies experiencing data breaches have been fined millions of dollars, paid out millions in settlements, and spent just as much on breach remediation efforts. In the past several years, data breaches have occurred in the hospitality, software, retail, and healthcare industries. Join Tatiana Melnik to see how stakeholders can minimize data breach risks, and privacy and security concerns by integrating the Privacy by Design Model into the software development lifecycle. To understand how to minimize risks, stakeholders must understand the regulatory compliance scheme surrounding personally identifiable information; the Privacy by Design approach and the Federal Trade Commission’s involvement; and enforcement actions undertaken by federal agencies, State Attorneys’ General, and class action suits filed by plaintiffs.
Operation Phish Phry commenced in 2007 when FBI agents, working with United States financial institutions, took proactive steps to identify and disrupt sophisticated criminal enterprises targeting the financial infrastructure in the United States.
Investigators in both countries uncovered an international conspiracy allegedly operating an elaborate scheme to steal identities through a method commonly called “phishing.” The group is accused of conspiring to target American-based financial institutions and victimize an unknown number of account holders by fraudulently using their personal financial information.
The multinational investigative effort resulted in 53 defendants being named in the federal indictment and 47 suspects being identified by Egyptian authorities. The domestic defendants were arrested in California, Nevada, and North Carolina. In California, defendants reside in the counties of Los Angeles, Orange, San Bernardino, Riverside, and San Diego.
Egyptian-based hackers obtained bank account numbers and related personal identification information from an unknown number of bank customers through phishing
Defendants were accused with conspiracy to commit wire fraud and bank fraud. Various defendants are charged with bank fraud; aggravated identity theft; conspiracy to commit computer fraud, specifically unauthorized access to protected computers in connection with fraudulent bank transfers and domestic and international money laundering
Many lawyers are unfamiliar with the nuances of computer technology and data security essential to comply with 21st century ethic rules. There are many hidden dangers in frequently used tools and platforms, including email, social-media and “The Cloud.” This topic helps attorneys in law firms and legal departments learn about risks of which they may not be aware. The topic also explains some suggested practices and solutions. With law firms a prime target of hackers, now more than ever attorneys must be vigilant as to client data and firm/department technology resources. This information is critical for attorneys to become more sophisticated in risk management in various technology contexts.
This webinar will provide important information and tips on lawyer technology ethics and the best law office management practices to potentially avoid Bar complaints and legal malpractice claims. Participants will also receive important information regarding Bar rules related to technology ethics, lawyer social media ethics, ethics and electronic devices, and ethics issues related other technology that is used in the practice of law. Among other things, the webinar will cover topics such as:
• The importance of lawyer technology competence
• Relationship between technology and lawyer ethics
• How to comply with ethics rules
• How to identify and resolve technology ethics issues
• How to maintain an ethical practice in today’s rapidly evolving legal ethics and technology environment
Ethics of Online Forms and E-Signatures for AttorneysGreg McLawsen
Did you really ever think you’d see the day when a pen-
and-ink signature on a document, or even an original document, wasn’t required? Well, that day has come – and you need to insure you are not only in compliance with court rules, but also ethics rules. We’ll examine:
• The RPCs relevant to documents and signatures (RPC 1.6 on confidentiality of information), and touch upon on the attorneys duty to supervise associate attorneys, legal support staff, and LLLTs (5.1, 5.2, 5.3, and 5.10)
• The competent use of various e-signature services
• The ethical and technical requirements for safeguarding client signatures
• How to competently and safely complete and submit on-line forms
This presentation was given at the January 22, 2016 annual CLE of the Washington State Bar Association's Solo and Small Practice Section
The purpose of this paper is to review the topic of data breach from two perspectives: first, an overview of the trends in data breach litigation, and second, a more granular perspective of practical data protection processes that may serve as a guidepost to help reduce the risk of likelihood of data breach. Taken together the reader will understand why a measured approach to data protection can reduce the risk of financial liability from a data breach lawsuit.
Concurso público de Escala Magisterial de primera a segunda escala.Marly Rodriguez
Norma para evaluar a los profesores que se encuentran en Ia primera escala de Ia Carrera Pública Magisterial, permitiendo su acceso a Ia segunda escala magisterial, en el marco de lo dispuesto en Ia Ley N° 29944, Ley de Reforma Magisterial.
This presentation was given by Rachel Quinn (One East Midlands) on 27 March 2014 in York.
In the presentation Rachel discussed the role of LEP's.
Find out more about NCVO's european policy work:
New Manasik umrah gsm, tata laksana umrah, jadwal perjalanan umrah, doa umrah, gema shafa marwa, pusat informasi haji plus dan umroh 081298216016, 87782122
Data Privacy: What you should know, what you should do!
CSMFO Data Privacy in the Governmental Sector, Local Government. Data Privacy Laws, PCI, Breaches, AICPA – Generally Accepted Privacy Principles
Identity federation = Biometrics and Governments Sept 2017Guy Huntington
We live in an increasingly small world with rapid technological changes. Our existing identity verification systems were designed for the early 1900s. This was long before the rise of the internet with the fast, easy movement of people between government borders, electronic identity federation between enterprises and genetic cloning.
The use of high identity assurance, i.e. strong identity verification, is required to accomplish things like citizens easily being able to use digital signatures, vote online, conduct large financial transactions, etc. It requires a trusted government issued identity, from the date of birth onwards through an identity’s life. We must re-design our systems to answer the question “How do I know if you are really you?” while protecting the citizen’s privacy and their biometrics. That's what this paper discusses.
What is Social KYC?
We generate large amounts of data about ourselves online every single day. All of this activity, when analysed as a whole, builds up a very deep and unique digital footprint — something that’s exceedingly difficult for someone to steal or fake convincingly.
Social KYC harnesses this data and uses it to establish a person’s identity — on a consent driven basis, of course. Using algorithms to analyse and corroborate various data attributes across multiple online accounts it is possible to quickly establish the likelihood of a person being:
- real
- who they claim to be (including various demographic data related thereto)
- a legitimate potential user (rather than a fraudster trying to access your platform with malicious intent)
We’re all used to Single Sign On – using an existing social media account to sign up to a new service — and Social KYC is an extension of this. As all you’re doing is asking a user to log in to a variety of their online accounts to prove who they are, it makes for a far more fluid sign up experience which in turn will encourage more users onto your platform.
Cyber risk related to information security is growing. A potentially huge exposure for transportation companies is the personal data of their current and prospective drivers.
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Neo4j
Investigating fraud often involves identifying suspicious patterns among mountains of uninteresting transactional data. A new partnership between Neo Technologies and Cambridge Intelligence allows fraud investigators and data analysts to uncover these patters far more easily. By combining the power of Neo4j's graph database and the visualization capabilities of KeyLines, a web-based graph visualization engine tightly integrated with Neo4j's data model, these investigators and analysts can visually drill down from aggregate data to the individual suspicious data elements quickly and without requiring significant technical expertise in query languages. This presentation will summarize the Neo Technology and Cambridge Intelligence partnership, discuss the technical integration between the two products, and demonstrate a number of different scenarios of uncovering fraud across multiple domains and data types.
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Scott Mills
2:45pm Dec1/2012 From Osgoode Hall of York University, Toronto
Social Networking Media: Crowd Sourcing the Investigation
Cst. Scott Mills, Corporate Communications, Social Media Officer, Toronto Police Service
Steven Johnston, Crown Prosecutor, Special Prosecutions Branch, Alberta Justice
• Social networking as part of the electronic footprint of a criminal case
• Discovery of evidence
• Understanding the digital profile of your witness
• Using essential "old school" investigative techniques
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
White Paper 2011 BOC
1. White Paper
Migration from Ink Card to Livescan based
processes for fingerprinting and background
checking
October 10, 2011
Brian J. O’Connor
Director
703-625-1124
Boc3@earthlink.net
Daon – your trusted identity partner
Delivering identity services to federal, state, local, and
commercial clients across the US and around the world. Visit
our website, www.daon.com, to learn how Daon Trusted
Identity Services can provide an economical, secure, and
Daon
11955 Freedom Drive
Suite 16000
Reston, VA 20190
Tel: 703-984-4000
Fax: 703-984-4099
Trust Starts Here
2. DTIS White Paper
Livescan versus Ink-Card Processes
efficient solution to your identity assurance needs.
Overview
Increasingly, governments at all levels are implementing regulations requiring extensive
background checks, including FBI Criminal History Record Checks, for an ever widening array
of individuals. Teachers, Soccer Coaches, Daycare Providers, Financial Consultants, Tax
Preparers, Mortgage Brokers, Casino Workers, Foster Parents, Nursing Home attendants,
Insurance Salespersons, and Saloon owners are just a few of the regulated industries that many
states require some form of background check prior to granting a license, approving employment
or otherwise permitting the person to engage in a regulated activity.
Traditionally, state agencies, regulatory agencies, and other entities worked in combination with
local law enforcement to collect the fingerprints and submit the applicant’s biographic
information to the State Police and/or FBI for the criminal history record check (CHRC). Over
the last 5 years there has been a trend towards outsourcing this function to third party entities. In
many jurisdictions, law enforcement is understaffed and would rather not be bothered attending
to these “civil” functions. Similarly, state and federal agency budgets are being squeezed and
many cannot devote the space, capital for IT infrastructure, and personnel resources required to
run such a program efficiently.
Furthermore, in these traditional programs, fingerprints are collected on ink-based cards. This is
partially because many law enforcement organizations (especially at the county and local level)
do not have the resources to invest in modern Livescan fingerprint devices. Secondly, many
entities and agencies have not yet adapted their paper-based processes to deal with electronic
fingerprints.
Ink-based fingerprint collection has two fundamental problems. First, the process is inherently
slow. In a report to the U.S. Congress, the Congressional Research Service reported that:
“Background check requests electronically submitted to the FBI take on average about two
hours to process, whereas requests submitted with 10-finger print cards require an additional
five to 10 business days to process.”1 Secondly, manual ink-based processes are error prone. A
study by the Illinois State Police determined that: “When using the old ink and roll method, poor
quality prints could not be determined until they had been sent through the mail to the BOI
{Bureau of Identification} and processed by a fingerprint technician. The manual submission
and processing of fingerprint cards always increases the potential of errors and results in
increased response times.”2 The FBI Rejection Rate for Livescan submissions is on the order of
2% whereas the rejection rate for ink card submissions averages about 6-8%. In some
jurisdictions, rejection rates in excess of 10% have been reported.
1 Congressional Research Service, (2004), Child Care and Child Welfare: Background Checks - CRS Report for
Congress,Retrieved October 5, 2011 from:
http://congressionalresearch.com/RL32430/document.php?study=Child+Care+and+Child+Welfare+Background+C
hecks
2 Illinois State Police, (2011), Guide to Understanding Criminal History Record Check Information, Retrieved
October 5, 2011, from www.isp.state.il.us/docs/5-727.pdf
3. DTIS White Paper
Livescan versus Ink-Card Processes
TYPICAL INK-BASED FINGERPRINT COLLECTION AND
SUBMISSION PROCESS
1.Traditionally, the process begins
with the applicant obtaining an
FBI certified fingerprint card from
the regulatory entity requiring the
background check. This card is
often pre-printed with an entity
identifier and other “program
specific” information.
2. The applicant takes this card to
their local law enforcement
station. The officer verifies the
applicant’s identity by inspection
of driver’s license or other forms
of identification and then captures
the applicant’s fingerprints in ink
and transfers them to the card.
3. The card is then securely mailed
or hand-delivered back to the
originating entity.
4. The entity, or a third party
contractor, scan the card and
convert it into a digital format.
The applicant’s biographic data
and digitized fingerprints are then
sent to the State Police and/or FBI
to conduct the criminal history
background check.
Typical Ink-based Process
Disadvantages of Fingerprinting by Law Enforcement on Ink Based Cards
1. Inconvenient - Many law enforcements agencies do not provide the service. Local
police may refer the individual to the State police or a county Sherriff that may be a
distance from the applicant’s home or place of work.
2. Inflexible - Generally speaking Law Enforcement entities do not accept appointments for
fingerprinting. As the service is always secondary to any emergency, drop-in applicants
may be turned away or may have a long wait.
3. Messy - Ink based printing can be “messy” – potentially staining clothes or other
valuables.
4. DTIS White Paper
Livescan versus Ink-Card Processes
4. High Error Rates - Ink based printing is not as reliable as electronic fingerprinting.
Fingerprint images that are too light, too dark, or inconsistent in density, smudged, or
exhibit other anomalies may be rejected by the FBI requiring the individual to be re-
printed. With electronic fingerprinting, sophisticated software algorithms can determine
the quality of the fingerprints in real time and alert the operator that they need to re-
collect one or more fingers. Nationally, the rejection rate for electronic prints is in the
range of 2% - 4% where as ink based cards are rejected at rates ranging from 10% to
15%. In some jurisdictions, we have heard of rejection rates as high as 30%.
a. Physical Handling of Cards in an Additional Source of Errors - The excessive
amount of physical handling of the card leads to smudges, stains, folds and creases all
of which can lead to errors and potential rejection by the FBI.
b. Extra Process Steps Introduce Additional Errors - The FBI requires fingerprints
for CHRC to be submitted electronically, therefore, the ink card must be digitized
using an FBI-certified card scanner. This requires a human operator and more
important is an additional source of errors that can lead to rejection of the prints by
the FBI.
5. Expensive - Some law enforcement agencies provide fingerprinting to local citizens “free
of charge”. On average, those agencies that do charge a fee, charge $15-$20 (just for the
fingerprinting itself).
6. Slow, Manual Processes - A lot of unnecessary time is spent in the movement of the
physical card: agency to applicant, applicant to law enforcement, than back to the agency
- delaying submission and increasing overall processing time.
Commercial organizations, such as Daon Trusted Identity Services, can provide state, federal,
and commercial entities a very efficient, cost effective, and secure alternative to internally run
programs. Such firms are also adept at helping organizations move away from ink-card based
programs to Livescan systems wherever possible.
There are several factors that have directly attributed to the advent of these services. First, the
FBI has designated several companies as Certified FBI 3rd Party Channelers. The Channelers are
able to submit fingerprints to the FBI on behalf of any entity that is authorized to request a
CHRC and view the resulting Criminal History Response Information (CHRI). Secondly,
Livescan technology has significantly improved over the past decade and increased competition
combined with technological advancement have lead to significant decreases in the cost of
Livescan devices. Third, and perhaps foremost, a small handful of companies have established
statewide or national networks of locations where individuals can go to be fingerprinted
electronically. Consequently, these organizations are able to offer federal, state, and commercial
entities fingerprinting and background checking services on a “fee for use” basis that does not
rely on any client infrastructure or resources. The clients only task is to review the CHRI and
make theeligibility determination
5. DTIS White Paper
Livescan versus Ink-Card Processes
Typical Livescan Fingerprint Collection and Submission Process
1. Applicant visits a program
website and enters their
biographic information. They
select a convenient date, time, and
place for fingerprint. Later, the
applicant can use this same
website to check on the status of
their background check.
2. Applicant visits the fingerprinting
location on the date and time
reserved. After verifying the
applicant’s identity, by inspection
of “breeder” documents, the agent
scans the applicant’s prints. The
prints are encrypted and then
transmitted over a secure channel
to the State Police and/or FBI.
Advantages to Livescan Printing
1. Fewer Errors and Rejected Prints - Collection errors and image quality issues are
detected in real-time, reducing the likelihood of the prints being rejected by the FBI and
help ensuring that the applicant needs to make only one trip to the fingerprinting location.
2. Significantly Reduced Processing Time - Prints can be submitted directly to the FBI
within “seconds” of being collected. No need to hand carry or mail an ink card to a
conversion center.
3. Higher Security – Fully electronic systems are significantly more confidential and
secure than paper-based approaches. Electronic fingerprint images and other applicant
data are encrypted upon capture and are securely transmitted to the FBI and/or State
Police.
4. Higher Confidence in Results - With certain vendor solutions, there is a significant
increase in the “chain of trust” and less likelihood of tampering or falsification. Some
solutions require the fingerprint technicians to digitally sign the electronic package before
submission to the FBI. When combined with multi-factor biometric authentication it is
possible to determine with certainty which agent collected which prints. Some systems
also will automatically reject prints from agents that are not specifically trained and
vetted to collect prints for a specific program.
5. Less Messy - None of the mess associated with ink.
6. Lower Cost - The cost to collect and process a set of fingerprints via a Livescan system
are typically significantly less than the cost of ink card based approaches.
6. DTIS White Paper
Livescan versus Ink-Card Processes
Cost Comparison
The table below highlights the primary cost elements associated with a fingerprinting and
background checking program.
Task
Internally Run Program
3rd Party Contractor
Infrastructure Resources
Fingerprinting Live Scan Devices
(or sub to Law
Enforcement)
Fingerprinting
Technicians
Network of convenient
locations across the region.
Staffed by skilled and vetted
Trusted Agents for the “peace of
mind” of the program
applicants.
Card
Scanning
Card Scanning
Equipment
Technicians Not necessary- available as an
optional service when needed.
Temporary
Storage and
Submission
Secure IT Platform
meeting NIST
Guidelines and
Interfaced to the FBI
and/or State Police
IT Personnel for
O&M, support,
enhancement
FBI Certified 3rd Party
Channeler. FISMA-Compliant
FBI and DHS certified Identity
Services platform. Certified in
multiple states.
Results
Processing
Secure IT Platform
meeting NIST
Guidelines
IT Personnel for
O&M, support,
enhancement
Secure, on-line access to CHRI
results provided to authorized
individuals: included in
transaction-based pricing
Customer
Service
Infrastructure Customer Service
Representatives
Toll-free number for applicants
and entity personnel for
assistance with all aspects of the
program.
Program
Management
PM, Finance,
Quality Control,
Compliance,
Security, and other
IT professionals as
needed
FBI compliant (and audited)
Security Program. Client
provided on-line access to a
host of management
information including: QC
data, financial reports, and
program statistics.
Typically vendors charge a single per-transaction fee covering: fingerprinting, submission to the
proper authority (e.g. State Police and/or FBI), results posting, payment collection and
processing and all associated customer services. Details vary from program to program; but, fees
on average range from $10 - $20 per applicant. Compare this to the tremendous investment in
capital equipment, development costs, and operational costs that an entity would have to spend in
order to provide the same services in-house. Furthermore, the vendor run programs provide
significantly more choice and flexibility to the citizens/members in terms of when and where
they go to be fingerprinted. In-house programs simply do not have the real estate and resources
7. DTIS White Paper
Livescan versus Ink-Card Processes
to offer the range of services that can be provided by a competent third party. 3rd Party run
programs free-up client resources to focus on other pressing priorities and the needs of their
constituents.
8. DTIS White Paper
Livescan versus Ink-Card Processes
A Complete End-to-End Background Checking Process
The following provides a high-level overview of a typical end-to-end process for Livescan
fingerprinting, background checks, and results dissemination. Entities such as DTIS typically
tailor the program websites and workflows to match the specific needs of each client and user
agency.
The process typically begins with the applicant visiting a DTIS pre-registration website. There
they provide basic biographical information, arrange payment, and select a time and location to
be fingerprinted. Applicants without internet access can pre-register by phone via the DTIS toll-
free customer support line. Following pre—registration, the applicant is given the opportunity
to print a receipt confirming payment and the date, time, and location of their appointment (if
one is scheduled). Applicants without internet access may pre-register by phone and
fingerprinting sites often accept “walk-in customers” how have not pre-registered.
9. DTIS White Paper
Livescan versus Ink-Card Processes
At The UPS Store a Trusted Agent verifies the applicant’s identity and pre-registration data
using proof-of-identity documents (Federal ID, driver’s license, passport, etc.). The applicant is
then fingerprinted via FBI-certified Livescan device. The information is encrypted and
transmitted via a secure VPN connection to the DTIS Data Center where it is in turn transmitted
to the FBI and/or the State Police.
All information concerning when, where, and who fingerprinted the applicant is stored in secure,
non-reputable audits trails in our Data Center.
The CHRI results from the FBI are stored on a secure server in the Data Center. Access to the
CHRI is strictly controlled and is limited to only those individuals authorized by the submitting
agency. Agency personnel can securely access the CHRI and make a suitability determination.
Depending on the needs of the client, DTIS can generate and mail an acceptance/rejection letter
to the applicant based on client review of the CHRI.
Through this same administrative portal, authorized users can access status information on any
applicant, financial data, statistical and management reports and can generate ad hoc report
queries.
10. DTIS White Paper
Livescan versus Ink-Card Processes
About Daon Trusted Identity Services
Daon Trusted Identity Services operates the nation’s largest civilian clearinghouse (also known
as the TSC) for fingerprint, biometric and biographic processing. Since our inception, Daon
Trusted Identity Services has facilitated more than 5.5M biometrically based and 2.4M
biographical background checks, and have processed in excess of $220M in electronic funds
transfers. We enjoy a customer satisfaction rating of 96% (an unheard of mark in any
credentialing or security program), and have achieved an industry low error rate for fingerprint
transmissions to the FBI of <2% through value added processing prior to submission. (The
average government error rate is 8%). We have never had a service interruption that has
impacted any of our service level agreements.
Created to provide cost effective and
expedient background checking services,
Daon Trusted Identity Services provides
biometric background checking for every
active DHS regulated airport employee (1.2
million people) including all airport
workers, Federal Transportation Security
Officers (TSA screeners) and Air Marshals,
Alien Flight School participants and general
aviation crews. Our experience goes well
beyond aviation. Other organizations such
as the IRS, State of Alabama, State of
Florida, General Information Services
(GIS), and Citi Group have turned to Daon
Trusted Identity Services to address their
requirements. The IRS for example chose
DTIS to provide fingerprinting and FBI
background checking services for the nearly
1.2 million people that prepare and/or assist
in the preparation of federal tax returns. In
the State of Alabama (Department of
Human Resources) we provide channeling,
data storage and project management for
new hires, day care workers and elderly care
givers. Our contract with GIS is to provide
FBI criminal history record checks for PNC Bank headquartered in Pennsylvania. Our contract
with Citi Group is to provide identity verification and assurance services throughout the United
States and Canada.
Daon Trusted Identity Services – Services We Offer
As an FBI certified channeler, Daon Trusted Identity Services offers a streamlined, cost
effective, consistent and proven approach for collecting and managing biometric and biographic
data to address the needs of business and government. An expansive network of Identity Data
Collection centers allows us to provide an easily accessible and consistent methodology for
collecting biometric and biographic data while creating a positive experience for our customer
11. DTIS White Paper
Livescan versus Ink-Card Processes
We have never had a security
breach or compromise of a single
identity record… We have never
had a service interruption that
has impacted any service level
agreement (SLA).
based on accuracy, speed, efficiency and simplicity.
Our capabilities include the ability to not only capture
fingerprints electronically, but to process fingerprint
cards electronically as well. Our strategic relationship
with The UPS Store® provides us with a significant
network for fingerprint collection locations (more than
4,400 locations domestically) that far exceeds our
competition.
Once the biometric and biographic data has been collected, it is sent to our secure operations
center. Upon receipt, our Identity Data Management services allows us to provide national
criminal history background checking services, and the ability to use the data collected to search
other national and/or local data bases to verify citizenship, immigration status, employment
status, educational background, professional licenses, etc., as required. Daon Trusted Identity
Services is an FBI certified channeler for receiving EFTS and transmitting directly to FBI CJIS.
We recently passed an extensive audit by the FBI, and our infrastructure and processes have been
Certified and Accredited to federal information security standards. Fingerprints are received in
our secure operations center via livescan transmission or via inked cards, which and are scanned
and digitized. All fingerprint records are assessed for quality and completion and sent via a
secure dedicated channel to the FBI. Results are returned through a secure website, where they
can be accessed and adjudicated.