
In this article…
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus at nisl nunc. Sed et nunc a erat vestibulum faucibus. Sed fermentum placerat mi aliquet vulputate. In hac habitasse platea dictumst. Maecenas ante dolor, venenatis vitae neque pulvinar, gravida gravida quam. Phasellus tempor rhoncus ante, ac viverra justo scelerisque at. Sed sollicitudin elit vitae est lobortis luctus. Mauris vel ex at metus cursus vestibulum lobortis cursus quam. Donec egestas cursus ex quis molestie. Mauris vel porttitor sapien. Curabitur tempor velit nulla, in tempor enim lacinia vitae. Sed cursus nunc nec auctor aliquam. Morbi fermentum, nisl nec pulvinar dapibus, lectus justo commodo lectus, eu interdum dolor metus et risus. Vivamus bibendum dolor tellus, ut efficitur nibh porttitor nec.
Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Maecenas facilisis pellentesque urna, et porta risus ornare id. Morbi augue sem, finibus quis turpis vitae, lobortis malesuada erat. Nullam vehicula rutrum urna et rutrum. Mauris convallis ac quam eget ornare. Nunc pellentesque risus dapibus nibh auctor tempor. Nulla neque tortor, feugiat in aliquet eget, tempus eget justo. Praesent vehicula aliquet tellus, ac bibendum tortor ullamcorper sit amet. Pellentesque tempus lacus eget aliquet euismod. Nam quis sapien metus. Nam eu interdum orci. Sed consequat, lectus quis interdum placerat, purus leo venenatis mi, ut ullamcorper dui lorem sit amet nunc. Donec semper suscipit quam eu blandit. Sed quis maximus metus. Nullam efficitur efficitur viverra. Curabitur egestas eu arcu in cursus.
H1
H2
H3
H4
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum dapibus ullamcorper ex, sed congue massa. Duis at fringilla nisi. Aenean eu nibh vitae quam auctor ultrices. Donec consequat mattis viverra. Morbi sed egestas ante. Vivamus ornare nulla sapien. Integer mollis semper egestas. Cras vehicula erat eu ligula commodo vestibulum. Fusce at pulvinar urna, ut iaculis eros. Pellentesque volutpat leo non dui aliquet, sagittis auctor tellus accumsan. Curabitur nibh mauris, placerat sed pulvinar in, ullamcorper non nunc. Praesent id imperdiet lorem.
H5
Curabitur id purus est. Fusce porttitor tortor ut ante volutpat egestas. Quisque imperdiet lobortis justo, ac vulputate eros imperdiet ut. Phasellus erat urna, pulvinar id turpis sit amet, aliquet dictum metus. Fusce et dapibus ipsum, at lacinia purus. Vestibulum euismod lectus quis ex porta, eget elementum elit fermentum. Sed semper convallis urna, at ultrices nibh euismod eu. Cras ultrices sem quis arcu fermentum viverra. Nullam hendrerit venenatis orci, id dictum leo elementum et. Sed mattis facilisis lectus ac laoreet. Nam a turpis mattis, egestas augue eu, faucibus ex. Integer pulvinar ut risus id auctor. Sed in mauris convallis, interdum mi non, sodales lorem. Praesent dignissim libero ligula, eu mattis nibh convallis a. Nunc pulvinar venenatis leo, ac rhoncus eros euismod sed. Quisque vulputate faucibus elit, vitae varius arcu congue et.
Ut convallis cursus dictum. In hac habitasse platea dictumst. Ut eleifend eget erat vitae tempor. Nam tempus pulvinar dui, ac auctor augue pharetra nec. Sed magna augue, interdum a gravida ac, lacinia quis erat. Pellentesque fermentum in enim at tempor. Proin suscipit, odio ut lobortis semper, est dolor maximus elit, ac fringilla lorem ex eu mauris.
- Phasellus vitae elit et dui fermentum ornare. Vestibulum non odio nec nulla accumsan feugiat nec eu nibh. Cras tincidunt sem sed lacinia mollis. Vivamus augue justo, placerat vel euismod vitae, feugiat at sapien. Maecenas sed blandit dolor. Maecenas vel mauris arcu. Morbi id ligula congue, feugiat nisl nec, vulputate purus. Nunc nec aliquet tortor. Maecenas interdum lectus a hendrerit tristique. Ut sit amet feugiat velit.
- Test
- Yes

I've previously posted content around an overall risk-based approach to Red Flags compliance. I also want to keep current in mentioning the use of Knowledge Based Authentication (KBA) as an effective component in an Identity Theft Prevention Program. I get this question often: "Is KBA a fraud detection tool or a verification tool?" Short answer: "It's both."Beyond fraud detection and prevention, KBA implementation can provide your program real returns in a few key areas:Reconciliation of initially detected "Red Flag" conditionsKBA allows you to positively pass consumers who may have some level of initial authentication challenge or high-risk condition. The reality of identity verification is that regardless of all the data assets potentially leveraged, there are still those cases in which a good consumer identity continues to pose challenges to basic verification checks.Cost reduction in referral / reconciliation processesKBA can replace more subjective decision making and process invocation, turning instead to objective question presentation and performance to drive overall decisioning.Customer experienceConsumers are more willing today than ever before to participate in a KBA session, and most would prefer this activity over provision of documentary evidence, for example.KBA, when used in combination with strong analytics and comprehensive authentication results, can be valued tool in your overall Red Flags Identity Theft Prevention program.

Behavioral scoring is one of the most important tools that allow collections management and account management groups to evaluate accounts in an efficient and cost-effective manner. Although behavioral models are developed in a similar manner as new applicant models, there are several key differences that make behavioral models a better choice for many account management applications and collections workflow systems:By using only internal master file data as opposed to external credit bureau data, for example, accounts can be regularly evaluated without incremental cost. The most common practices are to score accounts on a weekly or monthly basis, which allows for quick strategic responses to a customer’s change in behavior. Frequent evaluations can result in automated or manual actions such as the acceleration or deceleration of collections efforts, adjusting credit limits and changing terms and conditions.The performance definitions of behavioral scores are very specific to each strategy and task, and it is typically not advised to use models in applications for which they were not designed. For example, a new applicant model definition of “bad” may be a high probability of charge off during the initial term of a line of credit. For collections strategy, a more appropriate bad definition might be the likelihood of an account rolling to the next delinquency bucket, regardless of the age of the account. Behavioral models also have a much shorter outcome period of three to four months versus new applicant models that forecast over one to two years. Since behaviors with one creditor can typically be recognized more quickly than with all lending institutions associated with a particular debtor, behavioral models provide a unique and timely evaluation of the ongoing risk once the account is already on the books.

Regardless of the specific checks and overall processes incorporated into your Red Flags Identity Theft Prevention Program, the use of an automated decisioning strategy or strategies will allow you to: Deliver consistent responses based on objective authentication results, while eliminating subjectivity often found in more manual review processes. Save time and money associated with a manual review process currently attributed to Red Flag Rule referrals. Provide examiners a detailed process flow including decision elements. Create champion / challenger flows to test, compare and alter new strategies over time. Revise, over time, the specific elements used in your decisioning to appropriately weight each from a fraud detection and/or compliance perspective. Experian's consumer authentication products provide hosted decisioning strategies that alleviate the burden on our clients associated with maintenance and development of those processes. Whether you facilitate your own strategies or use a service provider's hosted strategies, it is important to ensure you are maximizing their ability to balance pass rates, fraud detection and compliance requirements.


