At A Glance
It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.Paragraph Block- is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


Heading 2
Heading 3
Heading 4
Heading 5
- This is a list
- Item 1
- Item 2
- Sub list
- Sub list 2
- Sub list 3
- More list
- More list 2
- More list 3
- More more
- More more
This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation

This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation
| Table element | Table element | Table element |
| my table | my table | my table |
| Table element | Table element | Table element |

Media Text Block
of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum
My Small H5 Title


The news of the latest breach last week reported that tens of millions of customer and employee records were stolen by a sophisticated hacker incursion. The data lost is reported to include names, birth dates, Social Security numbers, and addresses. The nature of the stolen data has the potential to create long-term headaches for the organization and tens of millions of individuals. Unlike a retailer or financial breach, where stolen payment cards can be deactivated and new ones issued, the theft of permanent identity information is, well, not easily corrected. You can’t simply reissue Social Security numbers, birth dates, names and addresses. What’s more, the data likely includes identity data on millions of dependent minors, who are prime targets for identity thieves and whose credit goes frequently unmonitored. According to the Identity Theft Resource Center’s 2014 Data Breach Report, a record 783 breaches, representing 85 million records, occurred from January through September 2014 alone. The breaches have ranged across virtually every industry segment and data type. So where does all this breached data go? It goes into the massive, global underground marketplace for stolen data, where it’s bought and sold, and then used by cybercriminals and fraudsters to defraud organizations and individuals. Like any market, supply and demand determines price, and the massive quantity of recent breaches has made stolen identities more affordable to more fraudsters, exacerbating the overall problem. In fact, stolen health credentials can go for $10 each, about 10 or 20 times the value of a U.S. credit card number, according to Don Jackson, director of threat intelligence at PhishLabs, a cyber crime protection company. The big question: So what now? The answer: Assume that all data has been breached, and act accordingly. Such a statement sounds a bit trivial, but it’s a significant paradigm shift. It’s a clear-headed recognition of the implications of the ongoing, escalating covert war between cybercriminals and fraudsters, on one side, and organizations and consumers on the other. For individuals, we need to internalize this fact: our data has likely been breached, and we need to become vigilant and defend ourselves. Sign up for a credit monitoring service that covers all three credit bureaus to be alerted if your data or ID is being used in ways that indicate fraud. Include your children, as well. A child’s identity is far more valuable to a fraudster as they know it can be several years before their stolen identity is detected. Many parents do not check their child’s credit regularly, if at all. For organizations, it’s a war on two fronts: data protection and fraud prevention. And the stakes are huge, bigger than many of us recognize. We’re not just fighting to prevent financial theft, we’re fighting to preserve trust — trust between organizations and consumers, at the first level, and ultimately widespread consumer trust in the institutions of finance, commerce, and government. We must collectively strive to win the war on data protection, no doubt, and prevent future data breaches. But what breaches illustrate is that, when fundamental identity data is breached, a terrible burden is placed on the second line of defense — fraud prevention. Simply put, organizations must continually evolve their fraud prevention control and skills, and minimize the damage caused by stolen identity data. And we must do it in ways that reinforce the trust between consumers and organizations, enhance the customer experience, and frustrate the criminals. At 41st Parameter, we are at the front lines of fraud prevention every day, and what we see are risks throughout the ecosystem. Account opening is a particular vulnerability, as consumer identity data obtained in the underground will undoubtedly be used to open lines of credit, submit fraudulent tax returns, etc. unbeknownst to the consumer. Since so much data has been breached, many of these new accounts will look “clean,” presenting a major challenge for traditional identity-based fraud and compliance solutions. But it’s more than new accounts — account takeover, transactions, loyalty, every stage is in jeopardy now that so much identity data is on the loose. Even the call center is vulnerable, as the very basis for caller authentication often relies on components of identity. At 41st Parameter and Experian Fraud & Identity solutions, we advocate a comprehensive layered approach that leverages multiple solutions such as FraudNet, Precise ID, KIQ, and credit data to protect all aspects of the customer journey while ensuring a seamless, positive user experience across channels and lines of business. Read our fraud perspective paper to learn more. Now is the time to take action. http://www.reuters.com/article/2014/09/24/us-cybersecurity-hospitals-idUSKCN0HJ21I20140924

By: Scott Rhode This is the second of a three-part blog series focused on the residential solar market looking at; 1) the history of solar technology, 2) current trends and financing mechanisms, and finally 3) overcoming market and regulatory challenges with Experian’s help. Lets discuss the current trends in solar and, more importantly, the mechanisms used to finance solar in the US residential market. As I discussed in the last blog, the growth in this space has been astronomical. To illustrate this growth, there was a recent article in The Washington Post by Matt McFarland, highlighting that solar-related jobs are significantly outpacing the rest of labor market in terms of year over year growth. The article states that since 2010 the number of solar-related jobs has doubled in the US, bring the total number of jobs in this industry to 173,807. While this is still smaller in comparison to other sectors of our economy, it underscores how much growth has occurred in a short amount of time. So what is driving this explosive growth? There are a few factors that should be considered; however, in the residential solar market, financing, is the main catalyst. As you might expect, there are a variety of financial products in the market giving the consumer lots of choices. First, there are traditional loans like home improvement loans, home equity loans, or energy efficiency loans offered by a bank, credit union, or specialty finance company. For homeowners that do not choose to secure their loan against their property, there are a variety of specialty lenders that will offer long-term, unsecured loans that only file a UCC against the panels themselves. For these types of offerings, some specialty lenders will even have special credit plans for the 30% Solar Investment Tax Credit so that the homeowner can have a deferred interest plan with the expectation that once they get the tax credit from the federal government, they will pay off the special plan and all of the deferred interest will be waived. If the customer does not pay in full, the plan rolls to their regular loan plan and the customer has a higher cost of financing. Second, there is a lease product which offers zero to little down and a monthly payment that is less than the savings that the homeowner will experience on their utility bill. Of all the financing options, the lease has been the biggest driver of growth since it offers an inexpensive, no-hassle way to get all the benefits of going solar without breaking the bank. What is unusual to most people that are unfamiliar with this concept is the term of the lease, which is typically 20 years. However, when you consider that most manufacturers warrant their panels for 25 and many have a usable life of 40 years, this term does not seem all that unusual. The benefits of this program look something like this: The homeowner has an average electric utility bill of $350 / month A solar company quotes a customer a savings of $200 / month in the form of a net metering energy credit, so their bill after solar is now $150 / month The lease payment for the installed solar array, metering equipment, and monitoring software is $150 / month The homeowner’s net saving is an average of $50 / month with nothing out of pocket Over the life of the lease, energy prices will increase which will mean more savings over time so long as there are not escalators in the contract that exceed the increase in energy prices The lessor “owns” the equipment and is responsible for maintenance, performance, and insurance With this product comes complexity. Many companies offering this program do not have the cash or the appetite to take on massive debt, so they partner with Tax Equity investors to make this transaction possible. Because of the 30% ITC and accelerated depreciation, this transaction is very favorable for a Tax Equity investor like Google, US Bank, or Bank of America Merrill Lynch. There are a number of structures they can use; however, the Sale-Leaseback structure is the easiest and most efficient way to fund the transaction. While this is not “known” to the end customer, it is important because the Tax Equity Investor effectively owns the asset and has the final say in setting credit policy. This transaction does require that the developer have a stake as well; however, many of the developers go to the debt market for “back leverage” on their stake so that they can reduce the impact to their balance sheet. This complexity carries a cost, as the cost of capital is higher than most traditional loan products from established financial services firms. That said, the fact that the lease allows the customer to monetize the tax credit and accelerated depreciation in the amount financed, balances out the higher costs of capital. In the next blog we will touch more on the challenges this product, in particular, has in the market. Last, but not least, there is another mechanism gaining popularity in the market. This concept is known as community solar. One of the obstacles of the lease and Tax Equity arrangement is that the lease is only available to single family residence homeowners and, if they have multiple homes, only the homeowner’s primary residence. That means that people who rent, own a condo, own a vacation home, or own a small business do not qualify for this type of lease. As a result, community solar has become a great option. With community solar, the panels are put in an ideal location for maximum exposure to the sun and they often produce 10-15% more power than panels on a rooftop. Portions of this solar farm can be sold, rented, or sublet to consumers regardless of their living situation. As the panels produce electricity, that power gets sold to the local utility and the customer gets money from that utility that shows up as a credit on their next bill. In this structure, the customer is not required to put money down in most cases and they are signing up for a specific term. Like a rooftop lease, this structure often has a Tax Equity investor that funds the project. Again, this allows them to take the 30% ITC and accelerated depreciation which, in turn, gets monetized and lowers the costs of construction. In the final installment of this blog series, I will discuss some of the challenges that this market faces as the ITC expiration date approaches and the market becomes more mature. Leasing is driving the market, so if the ITC does not get renewed, the market will need to have a plan in place to find other innovative ways to keep solar affordable so more consumers can realize the benefits of going solar. Solar Financing — The current and future catalyst behind the booming residential solar market (Part 1)

Did you know that privacy policies do not guarantee that your information will be kept private? Most companies use privacy policies to inform customers about how their personal information may be used, i.e. sold, shared, exchanged, not necessarily guaranteeing absolute confidentiality. In today’s increasingly digital world where exchanging personal information – your name, email address, home address, etc. – for access to websites, coupons and the like has become the norm. And, it can be difficult for consumers to understand the value of their personal information. Today is the eighth annual Data Privacy Day, an international awareness effort spearheaded by the National Cyber Security Alliance (NCSA) that encourages all Internet users to consider the privacy implications of their online actions and motivate all companies to make privacy and data protection a greater priority. Since most consumers aren’t fully aware of the implications of sharing personal information, we’re taking a deeper look at what can happen when personal information is shared online. Companies that collect don’t always protect When you share personal information with a company online, that company is responsible for protecting your information. Even data that is seemingly harmless is extremely valuable to cyber criminals, like your email address or your mother’s maiden name for a password reset. When you share this valuable, personal information with a company online be sure to read the company’s privacy policy fine print in order to be certain that your information is not being shared publicly or with outside companies. In some instances, even reading the company’s fine print cannot keep your information safe. Millions were affected last year due to retail and medical data breaches, proving it difficult for companies to protect your data no matter how secure it may seem. Once cyber criminals have their hands on your personal information, you may be surprised at what they can do with it. Cyber criminals patch together your digital profile Bits and pieces of personal information stolen from companies can help cyber criminals patch together a complete picture of your digital identity. They can then use your digital identity to access more important information like your financial records from retail sites that have your credit card information stored. Many consumers leave a trail of personal information on the Internet, leading cyber criminals to steal your identity and your financial information. How to make a difference during Data Privacy Day Here are some tips on how you can increase your privacy online from the NCSA: Think of your personal information like money – value it and protect it. You are often paying for “free” services with your personal information. Before you willingly provide your information to a service, make sure it is a business you trust to handle your information with care. Manage your browser cookies to maximize your privacy and prevent unwanted tracking. Demand that businesses be honest about how they collect, use and share personal information. Be cautious about who you “friend” and communicate with online. Visit our website for more information on identity protection products you can offer your customers.
In this article…
typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


