At A Glance
It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.Paragraph Block- is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


Heading 2
Heading 3
Heading 4
Heading 5
- This is a list
- Item 1
- Item 2
- Sub list
- Sub list 2
- Sub list 3
- More list
- More list 2
- More list 3
- More more
- More more
This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation

This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation
| Table element | Table element | Table element |
| my table | my table | my table |
| Table element | Table element | Table element |

Media Text Block
of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum
My Small H5 Title


TRMA’s Spring Conference scheduled for February 22-23, 2011 As you probably already know, the mission of the Telecommunications Risk Management Association (TRMA) is to “drive positive change in order to reduce fraud and optimize risk for the benefit of the industry, individual members and paying customers.” As part of that mission, TRMA is committed to bringing together risk management professionals several times a year for information-sharing forums. The organization’s 2011 Spring Conference is scheduled for February 22-23, 2011 at the Treasure Island Hotel & Casino in Las Vegas. Experian representation at the TRMA Conference At Experian, we’re committed to investing in new technologies in order to offer our communications customers the most advanced fraud prevention and risk management tools. Being a part of TRMA helps us better understand how we can best respond to existing and emerging requirements to one of the key industries we serve. And it allows us to share what we see as up-and-coming trends as well as new developments in risk management. Experian Decision Analytics personnel are scheduled to present at TRMA’s 2011 Spring Conference, as follows: Jim Nowell, Business Consultant TRMA Learning Lab – The SimTel Business Game Tuesday, February 22, 8:00 a.m. – 12:00 p.m. Jim’s lively Learning Lab will have several small teams of risk managers working together to solve problems for a fictitious Telco portfolio. The results of the game will be delivered on Wednesday morning at 10:45 AM. Linda Haran, Senior Director, Strategy and Marketing Economic Update Wednesday, February 23, 9:30 – 10:30 a.m. Linda serves as one-half of this panel, reviewing the historical linkages between credit conditions and the economy with an emphasis on how they relate to telecommunications. Greg Carmean, Program Manager, Small Business Credit Share Small Business Panel Wednesday, February 23, 11:15 a.m. – 12:15 p.m. Greg serves as one-half of this panel, discussing best practices for small business risk assessment, such as employing a blend of consumer and commercial data to combat fraud. Jeff Bernstein, Executive Strategic Consultant Leveraging Technology to Maximize Returns on Outsourced Collections Wednesday, February 23, 2:00 – 2:45 p.m. Jeff serves as one-half of this panel, discussing ways to avoid the “perfect storm” of rising delinquency rates, lower liquidation and staff drowning in the tidal wave of bad debt. We hope to see you there More details on each of these presentations will follow this post in the coming week. We look forward to seeing you at TRMA’s Spring Conference. If you can’t attend (or even if you can), be sure to follow us on Twitter for live conference updates, and check back here for post-conference blog posts.

For companies that regularly extend credit, the need to establish an identity theft protection program is finally here. After almost two years of delay, the Red Flags Rule is now in force. For readers of the Experian Decision Analytics blog, the Rule has been a familiar topic since passage. If you want to skip ahead to find out what you need to know, we’ve made it easy by boiling it down to three main things. (You’ll find the “3 Things Telcos Should Know About the Rule” towards the end.) However, some background might be helpful to better understand the issues behind the delay. Discussion about Red Flags requirements first began when Congress passed the Fair and Accurate Credit Transactions Act in 2003, requiring the Federal Trade Commission to write and enforce the Rule as the nation’s consumer protection agency. The Red Flags Rule was actually enacted on Jan 1, 2008, but enforcement was delayed until December 31, 2010 to better clarify the terms of compliance and who had to follow them. Why the Red Flags Rule matters A “red flag” is something that signals possible identity theft, including any suspicious activity suggesting crooks might be using stolen information to establish service. The regulation now requires companies to develop a written “red flags program” to detect, prevent and minimize damage that could result from a security breach. Establishing a Red Flags program Companies that regularly extend credit or use consumer reports in connection with a credit transaction need to have a risk-based security program in place. The program must detail the process for detecting red flags, describe how to respond to prevent and mitigate identity theft, and spell out how to keep the program current. Decision to delay: the definition of “creditor” At the center of the FTC’s decision to delay enforcement was a broad definition Congress gave to the term “creditor.” The Rule broadly captured a number of non-financial companies (many of them small businesses) that didn’t know whether it applied to them, and if they did, didn’t have time or expertise to establish proper procedures to comply. And failure to comply could lead to costly fines or civil actions. New Red Flags exemptions To resolve the issue, Congress approved legislation providing exemptions for businesses that provide goods or services and then accept payment later. The bill redefines the term “creditor” to apply only to businesses that advance funds to, or on behalf of a customer, based upon an obligation to repay. 3 things telcos should know about the Red Flags Rule: 1. Telcos are covered by the Rule For companies, like telcos, that obtain consumer reports, directly or indirectly, in connection with a credit transaction the requirement to comply hasn’t changed. In fact, under regulatory guidance, the FTC specifically lists telecommunications companies among those who need to comply. 2. Your company needs a written Red Flags program The FTC Rule requires that organizations identify and address the “red flags” that could indicate identity theft and update the program periodically. The program must address certain “covered accounts,” which includes a consumer account with frequent transactions or those that have a risk of identity theft. An annual report must also be created for senior management or the board of directors. 3. How to comply is up to you The good news is that the Rule doesn't require any specific practice or procedures. Companies have the flexibility to tailor compliance programs to the nature of their business and the risks they face. The FTC will assess compliance based upon whether a company is taking “reasonable policies and procedures” to prevent identity theft.

Let’s face it – not all knowledge based authentication (KBA) is created equal. I, too, have read horror stories of consumers forced to answer questions about a deceased relative or ex-spouse, or KBA sessions that went on far too long for anyone’s benefit. I have to attribute this to vendor inexperience and a lack of consulting with clients. An experienced vendor will use a fraud best practice such as a fraud analytics model to determine that some consumers do not even need questions and then a “Progressive Question” feature, which uses consumer performance on an initial question set to determine if it is necessary for the consumer to answer additional questions. This way, the true consumer completes the process quickly, improving the customer experience. The product of choice should also use a question mix that balances three factors: · how easily the true consumer can answer the question; · the fraud separation of the question (effectively the measured delta over time between how well true consumers answer the question vs. how well fraudsters do); · how many consumers overall the question can be generated. A list of hundreds of possible questions doesn’t mean much if the questions can only be generated for one quarter of one percent of the population, as is the case for something like airplane ownership or pilot’s license. Ultimately, out of wallet questions should be generated for a large part of the population, easily answered by the true consumer but difficult for a fraudster; and not offensive or what a consumer would consider “creepy” (such as their child’s birthday or name). Well designed questions will be personal but not intrusive and mindful of personal relationships that may have changed. The purpose of a knowledge based authentication session is risk management and/or consumer authentication for fraud prevention and compliance purposes – not to cause the loss of business because the fraud tool crossed the line in the mind of your customer.
In this article…
typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


