Identity score

Identity score

An identity score is a system for tagging and verifying the legitimacy of an individual’s public identity. Identity scores are increasingly being adopted as a means to prevent fraud in business and as a tool to verify and correct public records.

Identity scores incorporate a broad set of consumer data that gauges a person’s legitimacy. Identity score components can include (but are not limited to) personal Identifiers, public records, Internet data, government records, corporate data, predicted behavior patterns based on empiric data, self-assessed behavior patterns, and credit records.

Business and consumer identity scores

Identity scoring was originally developed for use by financial services firms, to measure the fraud risk for new customers opening accounts. Typical external credit and fraud checks often fail to detect erroneous background information.

Identity scoring is also being tested as a means for financial institutions to comply with criminal investigations and antiterrorism measures such as the Bank Secrecy Act (BSA) and the USA PATRIOT Act. Usage of fraud verification tools and third-party authentication systems to verify identities and “red flag” suspicious activity is greatly enhanced by identity scoring.

As of this writing, there are no identity scoring products available directly to the consumer, mostly due to the newness of the concept.

Public records, private records, and credit records in identity scores

Identity scores are built from collecting information from a variety of sources and analyzing discernible patterns from the total information. These records can generally be broken down into three categories: Public records, private records, and credit records.

Public records can include (but are not limited to) any of the following sources:
*Federal, state and local government records
*Financial records like bankruptcies, liens and judgments
*Property ownership records
* [http://www.e-merges.com Registered Voter Records]
*Law enforcement records for felony and misdemeanor convictions
*Private (non-credit) records can include (but are not limited to) any of the following sources:
*Bill and utility payments
*Collected personal information from marketers or affiliates
*Information provided to subscription-based Internet services
*Billing information from medical services
*Private background checks conducted by human resource departments
*Private (credit) records can include (but are not limited to) any of the following sources:
*Information submitted to any or all credit bureaus or credit reporting agencies (Equifax, Experian, Trans Union, Innovis, etc.)
*“Auto insurance” underwriting scores generated from credit records

Identity score components

Each identity scoring system uses individual data components to generate their score, meaning that results can vary wildly even for the same individual.

Typical identity score components can include (but are not limited to):

Name components: Personally identifying information such as name, address, etc.

Behavioral use pattern components: Analyzed patterns of behavior from information.

Internet components: Personally identifying information found on the Internet, such as Web sites, blogs, chat rooms, etc.

Hacker and fraud components: Personally identifying information that has been stolen in data breaches and may be used in recognizable patterns of fraud, such as unexplained credit card purchases

Synthetic identity components: Personally identifying information that is being used to create a new false (“synthetic”) identity.

"'Predictive analytics in identity scores"'

Identity scores are sometimes calculated using predictive analytics, the science of taking behavioral data and comparing it against historical patterns to identify potentially risky or fraudulent activity.

By compiling publicly available information and using predictive analytics to gauge the patterns of how the information is used, identity scoring systems can measure the authenticity of a particular identity.

Usage of identity scores

Identity scoring can be used in a variety of ways, from identity verification and measuring fraud risk on the enterprise level, to preventing fraudulent use of identities and synthetic identity theft on the consumer level. Identity scoring can theoretically provide much more definitive proof of an identity’s legitimacy, because of the amount of identifying data it utilizes. Virtually all public information about an individual can be used as data in their identity score.

Identity scores vs. credit scores

Credit scores are compiled from information sources relating to credit, such as number of credit accounts held, balances on each account, dates of collection activity, and so on. Credit scores do not measure any financial or personal activity that is not related to credit, and identity fraud that does not involve credit will not appear on your credit report or affect your credit score. Credit scores and the credit scoring system are also very predictable—there are specific steps you follow to improve your credit score, dispute errors in credit reports, etc.

Identity scores are compiled from much larger sources of information, including criminal records, property records, and so on. Identity scoring enables “grading” of patterns of behavior via predictive analytics, from which an identity monitoring service can track an individual’s or criminal group’s activity across several enterprises, instead of being confined to monitoring just one area.

Identity scores are also much more mutable and “fuzzy” than credit scores, because the source information—public records and personally identifying information—is constantly changing. Every time an individual changes a job, buys or sells property, or has an encounter with law enforcement, their public records are altered. Coordinating the information across so many different sources makes it very difficult to fix errors in one’s information once they occur.

Where credit scores have a generally accepted model of a three-digit-number (used for the FICO score, the new VantageScore, and credit bureaus' proprietary scores), identity scoring models vary wildly from product to product.

Identity scores and identity theft

Identity scoring works by matching the information the user provides against billions of records in public databases, ranging from property and tax records to Internet search engines, and calculating it against patterns designed to recognize fraud or identity theft.

"Example: Wendy's name and Social Security number were stolen by identity thieves who hacked a stolen laptop. They take her Social Security number and combine it with another stolen name, and use it to open a series of new accounts, including credit cards and retail gift cards. An identity protection system that used identity scoring would alert Wendy that her Social Security number had been compromised."

Because identity scores include much more accurate information and can predict behavior patterns more definitively than credit scores, the Gartner research firm predicted that identity scoring will surpass credit monitoring as the leading identity theft prevention measure by 2009. However, Gartner research analyst Avivah Litan warned that identity scoring was not a foolproof system, as it still relied on the underlying accuracy of the information used.

Identity scores and breeder documents

Reliance on “breeder documents” (documents designed to verify other documents) to verify identities is flawed, as there is no standardized means to verify that information contained in breeder documents is legitimate. Identity scoring can be used as a tool to authenticate identities on an independent level in cases of employment hiring and information verification.

Currently there is no standard means to verify that information provided on an I-9 work document is legitimate, for example. The desire for industries to quickly hire cheap labor trumps any incentive a business has to check the credentials of their new hires, leading to a “gray market” for stolen identities and contributing to continuing surges in illegal immigration. Tools that employ identity scoring to verify that a person’s name and Social Security number match, or that their I-9 data is correct, could cut down on the sale and misuse of personal information while enabling better enforcement of immigration law.

Identity scores in business

The following companies make use of identity scoring products or systems in their businesses:

*Experian: Experian’s Fraud Shield product cross-references from their 215-million-entry consumer credit database, and provides risk management and identity verification services from subscriber businesses, as well as an additional score product that combines information from both credit and fraud-related sources.
*e-Merges.com: [http://www.e-merges.com e-Merges.com] e-Merges fraud prevention product, "Electorate" is an authentication of self reported data with implicit authorization to access and validate it through public records.
*Fair Isaac: Fair Isaac introduced the Falcon ID scoring solution in August 2004. Falcon ID uses predictive analytics in its fraud verification process, and enables cross-business information sharing, a benefit Fair Isaac touted as “very good news for businesses in many industries that are working to protect their customers from identity fraud, and very bad news for their common enemy, the perpetrators of ID fraud.”

*ID Analytics: ID Analytics, the leader in on-demand identity intelligence, provides unprecedented real-time visibility into the risk of individuals, protecting both organizations and consumers. ID Analytics pioneered identity scoring technology. ID Analytics combines three unique capabilities to assess risk and improve the customer experience across all consumer touch points: the ID Network®-the nation's only real-time, cross-industry compilation of identity information; Personal Topology™ - an individual's particular identity characteristics and their connectedness to each other; and ID Analytics' proprietary Advanced AnalyticsSM. Leading communications and financial services companies, as well as major retailers, government agencies and healthcare insurers, all trust ID Analytics to provide solutions that drive new revenue opportunities, reduce financial losses, and facilitate compliance with federal regulations. ID Analytics is based in San Diego, CA.

*MyPublicInfo: An identity protection company based in Arlington, VA, MyPublicInfo uses identity scoring as a base for several of its products. The company has announced plans for other consumer identity scoring products in 2007, but has not provided details.

References

Fischetti, Mark. "Scoring Your Identity: New Tactics Root Out The False Use Of Personal Data," "Scientific American", March 2007. http://www.sciam.com/article.cfm?chanID=sa006&colID=5&articleID=C77C581B-E7F2-99DF-349A29510AE8D333

Hargreaves, Steve. “Mistaken identity can lead to embarrassment, job loss, or worse—how to avoid it,” "CNNMoney.com", 2/6/07. http://money.cnn.com/2006/02/07/pf/mistaken_ID

Kraft, Harold. "Identity Scoring: The Better Defense Against Data Breaches," "E-Commerce Times", 2/15/07. http://www.ecommercetimes.com/story/55770.html

Litan, Avivah. “Limit ID Fraud: Use ID Scoring, Not Credit Monitoring.” Gartner Research, July 13, 2006

Pero, Jennifer. Who Are You ?, "Government Security", 7/1/02. http://govtsecurity.com/mag/article_2/

Sullivan, Bob. “Her ATM card, but her impostor's picture,” From "The Red Tape Chronicles", 2/6/06. http://redtape.msnbc.com/2006/02/her_atm_card_bu.html

Experian Fraud Shield : http://www.experian.com/products/pdf/fraud_shield_ps.pdf

"Thwarting Fraud Before It Happens," http://www.creditcollectionsworld.com/article.html?id=20061016CK18V3P1

“Fair Isaac's Falcon ID Delivers New Level of Identity Theft Protection Across Industries,” "Minneapolis Business Wire", August 3, 2004. http://investors.fairisaac.com/phoenix.zhtml?c=67528&p=irol-newsArticle&t=Regular&id=599964&


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Identity theft — is a form of stealing another person s identity in which someone pretends to be someone else by assuming that person s identity, typically in order to access resources or obtain credit and other benefits in that person s name. The victim of… …   Wikipedia

  • The Bourne Identity (2002 film) — Bourne 1 redirects here. For the novel, see The Bourne Identity (novel). The Bourne Identity Theatrical release poster Directed by Doug Liman …   Wikipedia

  • Film score — A film score (also sometimes called background music or incidental music) is original music written specifically to accompany a film, forming part of the film s soundtrack, which also usually includes dialogue and sound effects. The score… …   Wikipedia

  • Credit score — A credit score is a numerical expression based on a statistical analysis of a person s credit files, to represent the creditworthiness of that person. A credit score is primarily based on credit report information typically sourced from credit… …   Wikipedia

  • Mistaken Identity (Delta Goodrem album) — Mistaken Identity Studio album by Delta Goodrem Released 8 November 20 …   Wikipedia

  • Mr. & Mrs. Smith (score) — Infobox Album Name = Mr. Mrs. Smith Type = Film score Longtype = Artist = John Powell |200px Cover size = Caption = Mr. Mrs. Smith original score album cover art Released = June 28, 2005 Recorded = Genre = Film Score Length = Language = Label =… …   Wikipedia

  • performing arts — arts or skills that require public performance, as acting, singing, or dancing. [1945 50] * * * ▪ 2009 Introduction Music Classical.       The last vestiges of the Cold War seemed to thaw for a moment on Feb. 26, 2008, when the unfamiliar strains …   Universalium

  • Scream (film series) — Scream DVD box set containing the first three films Directed by Wes Craven Produced by …   Wikipedia

  • Mulholland Drive (film) — Mulholland Drive Theatrical release poster …   Wikipedia

  • List of psychology topics — This page aims to list all topics related to psychology. This is so that those interested in the subject can monitor changes to the pages by clicking on Related changes in the sidebar. It is also to see the gaps in Wikipedia s coverage of the… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”