At A Glance
It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.Paragraph Block- is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.
New Text!


Heading 2
Heading 3
Heading 4
Heading 5
- This is a list
- Item 1
- Item 2
- Sub list
- Sub list 2
- Sub list 3
- More list
- More list 2
- More list 3
- More more
- More more
This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation

This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation
| Table element | Table element | Table element |
| my table | my table | my table |
| Table element | Table element | Table element |

Media Text Block
of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum
My Small H5 Title


For all you folks who, like me, waited until the last minute to knock out a term paper or class project in school, here is a friendly reminder…Yes, the Federal Trade Commission (FTC) pushed out the enforcement deadline of the Red Flags Rule to May 1, 2009. Yes, a sigh of relief was heard across compliance officers and operations managers nationwide. However, you should still keep a few things in mind as we approach May 1. First, per the FTC, "many entities also noted that because they generally are not required to comply with FTC rules in other contexts, they had not followed or even been aware of the rulemaking, and therefore learned of the requirements of the rule too late to be able to come into compliance by November 1, 2008." Those of you, who have not been subject to FTC enforcement in the past are quite possibly still subject to the Red Flags Rule based on your institution maintaining 'covered accounts' per the definition in the Red Flags Rule itself. Double check if you think otherwise. Second, the FTC was clear in stating that "this delay in enforcement is limited to the Identity Theft Red Flags Rule (16 CFR 681.2), and does not extend to the rule regarding address discrepancies applicable to users of consumer reports (16 CFR 681.1), or to the rule regarding changes of address applicable to card issuers (16 CFR 681.3)." So, while May 1 is still a few weeks away, if you are accessing consumer credit reports, for example, you should already have a formal written and operational process to detect and respond to address discrepancies on those credit reports.

Red Flags Rule I've heard more than one institution claim that they may limit and even reduce the identity elements (perhaps down to just name and address) that are captured during consumer applications or other transactions. Their rationale is that the fewer identity elements they request or require during these processes, the less information they will need to authenticate as part of their Red Flags Identity Theft Prevention Program. While this argument seems logical on the surface, I would suggest that if securely gathered/stored and appropriate to the nature of your business, additional data elements such as Social Security Number (SSN), date of birth and phone number can actually allow you to accomplish a few things to your benefit. 1. Analysis of our consumer authentication products shows that contributing SSN, date of birth, and phone (in addition to name and address) to an authentication process, will actually improve your ability to positively authenticate a consumer via an overall risk-based strategy. 2. The use of additional data elements, such as the phone number, can unlock additional data sources for use in verifying not only that phone number, but the inquiry name and address as well. 3. Just because you don't capture certain identity elements, doesn't mean the risk goes away. In providing additional identity elements for authentication, you can gain a more holistic view of a consumer – be that good, bad or ugly. It’s better to figure this out up front versus down the road when bills go unpaid and the bad guys scatter.

By: Prince Varma Hello. My name is Prince Varma and I’ve spent the better part of the last 16 years helping financial institutions (FI) successfully improve their in business development, portfolio growth and client relationship management practices. So, since the focus of this blog is to speak to readers about risk management, many of you are probably wondering what a “sales and business development” guy is doing writing a piece related to mitigating and managing risk? Great question! The simple fact is that the traditional or prevailing sentiment or definition related to risk management – mitigating credit risk — is incomplete. A more accurate and comprehensive approach would be to recognize, acknowledge and address that “risk” cuts across the entire client relationship spectrum of: client penetration/growth; client retention; and client credit risk mitigation. How do penetration and retention count as “risk factors”? (this is where the sales guy stuff comes in) From a penetration perspective, the failure to recognize potential opportunities either within the existing client base or in the operating market, introduces revenue growth risk (meaning we aren’t keeping our eye on the top line). Ultimately it impacts the FI’s ability to add assets (either deposits or loans) and also has a direct affect on efficiency and deposit to loan ratios. From a retention perspective, the risk is even more obvious. Our most valued clients are the ones that we must continuously engage in a proactive manner. Let’s face it. In even the smallest markets, there are no less than four to six other institutions waiting to jump on your client in the event that you grow complacent. There is a huge difference between selection and satisfaction. And, if we aren’t focused on keeping a client after securing them, our net portfolio growth targets will be impossible to achieve. Considering the current market environment, now more than ever, effectively managing these three elements of “risk/exposure to the FI” is crucial to an institutions success both practically and pragmatically. Everyone internally at the bank is focused on the “credit risk mitigation” piece. The conversations that are occurring outside of the bank’s walls however are focused on the “L” word or liquidity and getting credit flowing again. How many times have we read or more frankly been beaten with this comment from business owners “…there’s no one making loans anymore…” or “…its impossible to get credit…?” That should be read as … penetration and retention Striking a balance between effective and appropriate credit risk exposure and deepening or growing the portfolio has been a challenge facing those of us in the front office for as long as I can remember. The “sales revolution” is effectively over. We’ve learned the critical lesson that we need to evolve beyond being strictly a credit officer (you did learn that right??!!). And, you didn’t/shouldn’t become a “banking products generalist” with no analytical depth. Knowing all this, it is important that we return to the guiding principles of effective lending which include: – evaluating the scope of the opportunity; – isolating the risk and identifying a reasonable and realistic recovery/mitigation remedy; – determining what other alternatives the borrower might be considering; and – being willing to let the “bad deals” walk. In subsequent blogs, I’ll provide you with specific tactics aimed at optimizing penetration and retention efforts and implementing effective and practical client management strategies. After all what would you expect from a business development guy…
In this article…
typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


