SlideShare ist ein Scribd-Unternehmen logo
1 von 49
Downloaden Sie, um offline zu lesen
Mortgage Industry Overview
      July 10, 2009




                             1
Our goals today




                  2
Our goals today
 ‣ To give you the WHAT…




                           2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules




                                2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…




                                2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
   ‣ demo the idBUSINESS Red Flag Compliance
     Module




                                               2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
   ‣ demo the idBUSINESS Red Flag Compliance
      Module
 ‣ but also give you the WHY




                                               2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
   ‣ demo the idBUSINESS Red Flag Compliance
      Module
 ‣ but also give you the WHY
   ‣ Why information security is an
      OPPORTUNITY, not a burden



                                               2
FILE CABINETS???




                   3
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The PII Lifecycle -
MORTGAGE




                      4
The Opportunity
‣ There is a unique opportunity to grow a
  mortgage business by leveraging strong
  information security policy and sharing it with
  borrowers
  ‣ Build trust with borrowers
  ‣ Strengthen employee relationships
  ‣ Tighten lender/broker operations




                                                    5
The Risk
‣ The mortgage industry has a unique burden to
  protect borrower information
  ‣ Government mandate for regulation
  ‣ Financial industry scrutiny
  ‣ The Consumer’s Age of Transparency




                                                 6
The facts

                                                30%
     40%

                     60%
                                                             70%



     Business has suffered breach         Thief is employee or knows employee
     Business has yet to incur a breach   Thief is unknown


 •   Since 2/15/05, over 251,000,000 Americans have had
     identities or other personal information compromised




                                                                                7
The facts
The average breach and its impact on customer confidence is growing.


                                            58% of customers will
                                            lose confidence in your
                                            business after a breach.




                                            31% of your customers
                                            will immediately cease
                                            doing business with
                                            you following a breach.




Source: Ponemon Institute, 2008.



                                                                       8
The Red Flag Rules




                     9
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act




                                                9
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:




                                                9
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:
  ‣ you hold “covered accounts”




                                                9
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:
  ‣ you hold “covered accounts”
  ‣ your customer records present a “reasonably
     foreseeable risk of identity theft”




                                                  9
Why are mortgage cos.
COVERED ENTITIES?
‣ Deferring payment
      ‣ The mortgage process is by definition a
            deferred payment and credit-granting
            process
‣ Reasonably foreseeable risk
      ‣ Borrower files are a treasure trove
      ‣ Each record worth between $80-300 each*


 * Source: Black Market Identity Auction attended by Net Reaction mole, 2008.

                                                                                10
Red Flag
REQUIREMENTS




               11
Red Flag
REQUIREMENTS
1. A Written Information Security Program




                                            11
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft




                                                                11
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management




                                                                11
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis




                                                                11
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees




                                                                11
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees
6. Must contain an incident response capability




                                                                11
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees
6. Must contain an incident response capability
7. Must ensure that vendors and suppliers are also compliant



                                                                11
“What happens
if I don’t comply?”
• Legal liability
  – Civil lawsuits, class-action litigation
• Government penalties
  – FTC & State enforcement
• Damage to brand reputation and borrower trust




                                                  12
The solution
‣ The idBUSINESS Red Flag Compliance Module
  ‣ Built on real-world forensic fieldwork
  ‣ Includes tools & benefits that actively involve
    employees in your compliance efforts
  ‣ Transitions information security from a
    compliance issue into a competitive advantage




                                                      13
The Red Flag
Compliance Module




‣ Secure online interface

                            14
The Red Flag
Compliance Module




‣ Learning tools available as text or video webinar
                                                      15
The Red Flag
Compliance Module




‣ Risk Assessment tool provides ranking of your
   company in 12 key focus areas
                                                  16
The Red Flag
Compliance Module




‣ Customizable checklist of 26 Red Flags to meet
   requirements of FACT Act
                                                   17
The Red Flag
Compliance Module




‣ Employee training automated & easy, integrates
   automatically with your compliance report
                                                   18
The Red Flag
Compliance Module




‣ Ability to evaluate supplier compliance practices using
   our proprietary Vendor Integrity Assessment
                                                        19
The Red Flag
Compliance Module



‣ Access individual identity recovery protection using
   FraudStop and Restore from ID Experts
  ‣   Available as employee benefit, cafeteria-style add-on,
      customer blanket, or new revenue stream
‣ In the event of a breach, one-click access to best-in-
   breed data breach services and forensic services


                                                           20
Mortgage Industry
BENEFITS
‣ NAMB Preferred Provider
  ‣ www.majesticsecurityidsafe.com
‣ Because We Care
  ‣ www.mortgagedashboard.com
‣ Mortgage Insurance Agency
  ‣ www.mtgins.com



                                     21
“Can’t I do this myself?”

• A self-written policy meets the letter of the law, but
  leaves gaps:
  – No vendor integrity assessment
  – No employee training, just signature line
  – No mitigation of damages in the event of an incident
    • Who will you call when you have a question?
• No context of how Red Flag Policy fits into your business
  – What’s worth doing is worth doing right.
  – Missing an opportunity to GROW your business


                                                              22
So I’m compliant...
  ‣ NOW WHAT?
    ‣ Don’t let it sit on a shelf
    ‣ Talk to your employees
    ‣ Talk to your borrowers
  ‣ Use your policy as a business-building tool




                                                  23
The file cabinets?




                     24
Thank you!




             25

Weitere ähnliche Inhalte

Kürzlich hochgeladen

B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 

Kürzlich hochgeladen (20)

B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 

Empfohlen

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Empfohlen (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

idBUSINESS for Mortgage Professionals

  • 1. Mortgage Industry Overview July 10, 2009 1
  • 3. Our goals today ‣ To give you the WHAT… 2
  • 4. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules 2
  • 5. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… 2
  • 6. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… ‣ demo the idBUSINESS Red Flag Compliance Module 2
  • 7. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… ‣ demo the idBUSINESS Red Flag Compliance Module ‣ but also give you the WHY 2
  • 8. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… ‣ demo the idBUSINESS Red Flag Compliance Module ‣ but also give you the WHY ‣ Why information security is an OPPORTUNITY, not a burden 2
  • 10. The PII Lifecycle - MORTGAGE 4
  • 11. The PII Lifecycle - MORTGAGE 4
  • 12. The PII Lifecycle - MORTGAGE 4
  • 13. The PII Lifecycle - MORTGAGE 4
  • 14. The PII Lifecycle - MORTGAGE 4
  • 15. The PII Lifecycle - MORTGAGE 4
  • 16. The PII Lifecycle - MORTGAGE 4
  • 17. The PII Lifecycle - MORTGAGE 4
  • 18. The Opportunity ‣ There is a unique opportunity to grow a mortgage business by leveraging strong information security policy and sharing it with borrowers ‣ Build trust with borrowers ‣ Strengthen employee relationships ‣ Tighten lender/broker operations 5
  • 19. The Risk ‣ The mortgage industry has a unique burden to protect borrower information ‣ Government mandate for regulation ‣ Financial industry scrutiny ‣ The Consumer’s Age of Transparency 6
  • 20. The facts 30% 40% 60% 70% Business has suffered breach Thief is employee or knows employee Business has yet to incur a breach Thief is unknown • Since 2/15/05, over 251,000,000 Americans have had identities or other personal information compromised 7
  • 21. The facts The average breach and its impact on customer confidence is growing. 58% of customers will lose confidence in your business after a breach. 31% of your customers will immediately cease doing business with you following a breach. Source: Ponemon Institute, 2008. 8
  • 22. The Red Flag Rules 9
  • 23. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act 9
  • 24. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: 9
  • 25. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: ‣ you hold “covered accounts” 9
  • 26. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: ‣ you hold “covered accounts” ‣ your customer records present a “reasonably foreseeable risk of identity theft” 9
  • 27. Why are mortgage cos. COVERED ENTITIES? ‣ Deferring payment ‣ The mortgage process is by definition a deferred payment and credit-granting process ‣ Reasonably foreseeable risk ‣ Borrower files are a treasure trove ‣ Each record worth between $80-300 each* * Source: Black Market Identity Auction attended by Net Reaction mole, 2008. 10
  • 29. Red Flag REQUIREMENTS 1. A Written Information Security Program 11
  • 30. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 11
  • 31. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 11
  • 32. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 11
  • 33. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 11
  • 34. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 6. Must contain an incident response capability 11
  • 35. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 6. Must contain an incident response capability 7. Must ensure that vendors and suppliers are also compliant 11
  • 36. “What happens if I don’t comply?” • Legal liability – Civil lawsuits, class-action litigation • Government penalties – FTC & State enforcement • Damage to brand reputation and borrower trust 12
  • 37. The solution ‣ The idBUSINESS Red Flag Compliance Module ‣ Built on real-world forensic fieldwork ‣ Includes tools & benefits that actively involve employees in your compliance efforts ‣ Transitions information security from a compliance issue into a competitive advantage 13
  • 38. The Red Flag Compliance Module ‣ Secure online interface 14
  • 39. The Red Flag Compliance Module ‣ Learning tools available as text or video webinar 15
  • 40. The Red Flag Compliance Module ‣ Risk Assessment tool provides ranking of your company in 12 key focus areas 16
  • 41. The Red Flag Compliance Module ‣ Customizable checklist of 26 Red Flags to meet requirements of FACT Act 17
  • 42. The Red Flag Compliance Module ‣ Employee training automated & easy, integrates automatically with your compliance report 18
  • 43. The Red Flag Compliance Module ‣ Ability to evaluate supplier compliance practices using our proprietary Vendor Integrity Assessment 19
  • 44. The Red Flag Compliance Module ‣ Access individual identity recovery protection using FraudStop and Restore from ID Experts ‣ Available as employee benefit, cafeteria-style add-on, customer blanket, or new revenue stream ‣ In the event of a breach, one-click access to best-in- breed data breach services and forensic services 20
  • 45. Mortgage Industry BENEFITS ‣ NAMB Preferred Provider ‣ www.majesticsecurityidsafe.com ‣ Because We Care ‣ www.mortgagedashboard.com ‣ Mortgage Insurance Agency ‣ www.mtgins.com 21
  • 46. “Can’t I do this myself?” • A self-written policy meets the letter of the law, but leaves gaps: – No vendor integrity assessment – No employee training, just signature line – No mitigation of damages in the event of an incident • Who will you call when you have a question? • No context of how Red Flag Policy fits into your business – What’s worth doing is worth doing right. – Missing an opportunity to GROW your business 22
  • 47. So I’m compliant... ‣ NOW WHAT? ‣ Don’t let it sit on a shelf ‣ Talk to your employees ‣ Talk to your borrowers ‣ Use your policy as a business-building tool 23