Face-to-face ID verification – easy, accurate, accepted

  1. Clients have a need to conduct financial or benefit related business with the government as well as financial institutions.
  2. Without question, the best way to verify someone’s identity to protect against ID theft is through a face-to-face meeting.
  3. Face-to-face meetings are conducted by Fraud Shield certified , Trusted Source Officers (TSOs) who validate customer’s identities by reviewing personal identification documents.
  4. After a positive assertion by the TSO, the documents, NEVER leave the sight of the client, are imaged through a Fraud Shield encrypted scanner and returned to the client.
  5. The documents are stored off-site in a highly encrypted facility.
  6. Only authorized government agencies have access to our Fraud Shield certified customers.

Face to Face meetings
Face to Face meetings

Protection Today, Security for the Future

  • Once an identity is validated through Fraud Shield, a customer has protection against future fraud transactions, such as tax fraud or benefit fraud, with multiple government agencies and commercial subscribers.
  • Fraud Shield’s process utilizing the federally accepted standard enables will mean that our customer indicators are substantive to the government,
  • Fraud Shield’s process adheres to Best in Class federally accepted standards to ensure that our TSO accepted customers are recognized by the appropriate government agencies.

Tax Fraud Protection

Unbreachable Data

 

World-class Encryption Technology
Process involves securing the data, not the cloud
  • Data are never decrypted at rest, only after access policies are satisfied
Management of key management is critical
  • Policies are attributed to the data
High fidelity real-time monitoring and reporting
  • Totally autonomous, fully automated key management
  • Data are tagged in the wild
  • Real-time revocation of access privileges, when needed
All encryption happens at the endpoint
  • Central management platform
  • No gateway access needed
Only requires IP connection
  • Customizable incremental off-line access