HOME

TheInfoList



OR:

An identity score is a system for detecting
identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was co ...
. Identity scores are increasingly being adopted as a means to prevent
fraud In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compens ...
in business and as a tool to verify and correct
public records Public records are documents or pieces of information that are not considered confidential and generally pertain to the conduct of government. For example, in California, when a couple fills out a marriage license application, they have the optio ...
. Identity scores incorporate a broad set of
consumer A consumer is a person or a group who intends to order, or uses purchased goods, products, or services primarily for personal, social, family, household and similar needs, who is not directly related to entrepreneurial or business activities. T ...
data that gauges a person's legitimacy. Identity score components can include (but are not limited to)
personal identifier Personal Identifiers (PID) are a subset of personally identifiable information (PII) data elements, which identify an individual and can permit another person to “assume” that individual's identity without their knowledge or consent. Identi ...
s,
public records Public records are documents or pieces of information that are not considered confidential and generally pertain to the conduct of government. For example, in California, when a couple fills out a marriage license application, they have the optio ...
,
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
data In the pursuit of knowledge, data (; ) is a collection of discrete values that convey information, describing quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted ...
,
government A government is the system or group of people governing an organized community, generally a state. In the case of its broad associative definition, government normally consists of legislature, executive, and judiciary. Government is a ...
records,
corporate A corporation is an organization—usually a group of people or a company—authorized by the state to act as a single entity (a legal entity recognized by private and public law "born out of statute"; a legal person in legal context) and re ...
data, predicted behavior patterns based on empirical data, self-assessed behavior patterns, and credit records.


Business and consumer identity scores

Identity scoring was originally developed for use by financial services firms to measure the fraud risk for new customers opening accounts. Typical external credit and fraud checks often fail to detect erroneous background information. Identity scoring is also being tested as a means for financial institutions to comply with criminal investigations and antiterrorism measures, such as the Bank Secrecy Act (BSA) and the
USA PATRIOT Act The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of Congress, Act of the United States Congress, signed into law by President of the United States, President George W. Bush. The formal name of the statute is the Uniti ...
. Usage of fraud
verification Verify or verification may refer to: General * Verification and validation, in engineering or quality management systems, is the act of reviewing, inspecting or testing, in order to establish and document that a product, service or system meets ...
tools and third-party
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicati ...
systems to verify identities and “red flag” suspicious activity is greatly enhanced by identity scoring.


Public records, private records, and credit records

Identity scores are built from collecting information from a variety of sources and analyzing discernible patterns from the total information. These records can generally be broken down into three categories:
Public records Public records are documents or pieces of information that are not considered confidential and generally pertain to the conduct of government. For example, in California, when a couple fills out a marriage license application, they have the optio ...
, private records, and credit records. Public records can include (but are not limited to) any of the following sources: *Federal, state and local government records *Financial records like
bankruptcies Bankruptcy is a legal process through which people or other entities who cannot repay debts to creditors may seek relief from some or all of their debts. In most jurisdictions, bankruptcy is imposed by a court order, often initiated by the debtor ...
,
liens A lien ( or ) is a form of security interest granted over an item of property to secure the payment of a debt or performance of some other obligation. The owner of the property, who grants the lien, is referred to as the ''lienee'' and the pers ...
and judgments *Property ownership records *Registered Voter Records *Law enforcement records for
felony A felony is traditionally considered a crime of high seriousness, whereas a misdemeanor is regarded as less serious. The term "felony" originated from English common law (from the French medieval word "félonie") to describe an offense that resu ...
and
misdemeanor A misdemeanor (American English, spelled misdemeanour elsewhere) is any "lesser" criminal act in some common law legal systems. Misdemeanors are generally punished less severely than more serious felonies, but theoretically more so than adm ...
convictions Private (non-credit) records can include (but are not limited to) any of the following sources: *
Bill Bill(s) may refer to: Common meanings * Banknote, paper cash (especially in the United States) * Bill (law), a proposed law put before a legislature * Invoice, commercial document issued by a seller to a buyer * Bill, a bird or animal's beak Plac ...
and
utility As a topic of economics, utility is used to model worth or value. Its usage has evolved significantly over time. The term was introduced initially as a measure of pleasure or happiness as part of the theory of utilitarianism by moral philosopher ...
payments *Collected personal information from
marketers Marketing is the process of exploring, creating, and delivering value to meet the needs of a target market in terms of goods and services; potentially including selection of a target audience; selection of certain attributes or themes to empha ...
or affiliates *Information provided to subscription-based Internet services *Billing information from medical services *Private
background checks A background check is a process a person or company uses to verify that an individual is who they claim to be, and this provides an opportunity to check and confirm the validity of someone's criminal record, education, employment history, and oth ...
conducted by
human resource Human resources (HR) is the set of people who make up the workforce of an organization, business sector, industry, or economy. A narrower concept is human capital, the knowledge and skills which the individuals command. Similar terms include m ...
departments Private (credit) records can include (but are not limited to) any of the following sources: *Information submitted to any or all
credit bureaus A credit bureau is a data collection agency that gathers account information from various creditors and provides that information to a consumer reporting agency in the United States, a credit reference agency in the United Kingdom, a credit report ...
or credit reporting agencies (
Equifax Equifax Inc. is an American multinational consumer credit reporting agency headquartered in Atlanta, Georgia and is one of the three largest consumer credit reporting agencies, along with Experian and TransUnion (together known as the "Big Thr ...
,
Experian Experian is an American–Irish multinational data analytics and consumer credit reporting company. Experian collects and aggregates information on over 1 billion people and businesses including 235 million individual U.S. consumers and more t ...
,
Trans Union TransUnion is an American consumer credit reporting agency. TransUnion collects and aggregates information on over one billion individual consumers in over thirty countries including "200 million files profiling nearly every credit-active consum ...
,
Innovis Innovis is the credit reporting division of CBC Companies and is considered the fourth largest consumer credit reporting agency in the United States, behind the “big three” Experian, TransUnion, and Equifax. Based in Columbus, Ohio, the c ...
, etc.) *“
Auto insurance Vehicle insurance (also known as car insurance, motor insurance, or auto insurance) is insurance for automobile, cars, trucks, motorcycles, and other road vehicles. Its primary use is to provide financial protection against physical damage or bod ...
” underwriting scores generated from credit records


Components

Each identity scoring system uses individual data components to generate their score, meaning that results can vary wildly even for the same individual. Typical identity score components can include (but are not limited to): * Name components :
Personally identifying information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
such as name, address, etc. * Behavioral use pattern components : Analyzed patterns of behavior from information. * Internet components : Personally identifying information found on the Internet, such as
Web sites A website (also written as a web site) is a collection of web pages and related content that is identified by a common domain name and published on at least one web server. Examples of notable websites are Google, Facebook, Amazon, and Wikipe ...
,
blogs A blog (a truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order ...
,
chat rooms The term chat room, or chatroom (and sometimes group chat; abbreviated as GC), is primarily used to describe any form of synchronous conferencing, occasionally even asynchronous conferencing. The term can thus mean any technology, ranging from ...
, etc. * Hacker and fraud components : Personally identifying information that has been stolen in
data breach A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, info ...
es and may be used in recognizable patterns of fraud, such as unexplained
credit card A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's accrued debt (i.e., promise to the card issuer to pay them for the amounts plus the o ...
purchases * Synthetic identity components : Personally identifying information that is being used to create a new false (“synthetic”) identity.


Predictive analytics

Identity scores are sometimes calculated using
predictive analytics Predictive analytics encompasses a variety of statistical techniques from data mining, predictive modeling, and machine learning that analyze current and historical facts to make predictions about future or otherwise unknown events. In business ...
, the science of taking behavioral data and comparing it against historical patterns to identify potentially risky or fraudulent activity. By compiling publicly available information and using predictive analytics to gauge the patterns of how the information is used, identity scoring systems can measure the
authenticity Authenticity or authentic may refer to: * Authentication, the act of confirming the truth of an attribute Arts and entertainment * Authenticity in art, ways in which a work of art or an artistic performance may be considered authentic Music * A ...
of a particular identity.


Usage

Identity scoring can be used in a variety of ways, from identity verification and measuring fraud risk on the
enterprise Enterprise (or the archaic spelling Enterprize) may refer to: Business and economics Brands and enterprises * Enterprise GP Holdings, an energy holding company * Enterprise plc, a UK civil engineering and maintenance company * Enterprise ...
level, to preventing fraudulent use of identities and synthetic
identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was co ...
on the consumer level. Identity scoring can theoretically provide much more definitive proof of an identity's legitimacy, because of the amount of identifying data it utilizes. Virtually all public information about an individual can be used as data in their identity score.


Credit scores

Credit scores A credit score is a numerical expression based on a level analysis of a person's credit files, to represent the creditworthiness of an individual. A credit score is primarily based on a credit report, information typically sourced from credit bu ...
are compiled from information sources relating to credit, such as number of credit accounts held, balances on each account, dates of collection activity, and so on. Credit scores do not measure any financial or personal activity that is not related to credit, and identity fraud that does not involve credit will not appear on your
credit report :''This article deals with the general concept of the term credit history. For detailed information about the same topic in the United States, see Credit score in the United States.'' A credit history is a record of a borrower's responsible repay ...
or affect your credit score. Credit scores and the credit scoring system are also very predictable—there are specific steps you follow to improve your credit score, dispute errors in credit reports, etc. Identity scores are compiled from much larger sources of information, including criminal records, property records, and so on. Identity scoring enables “grading” of patterns of behavior via predictive analytics, from which an identity monitoring service can track an individual's or criminal group's activity across several enterprises, instead of being confined to monitoring just one area. Identity scores are also much more mutable and “fuzzy” than credit scores, because the source information—public records and personally identifying information—is constantly changing. Every time an individual changes a job, buys or sells property, or has an encounter with law enforcement, this person's public records are altered. Coordinating the information across so many different sources makes it very difficult to fix errors in one's information once they occur. Where credit scores have a generally accepted model of a three-digit-number (used for the
FICO score A credit score is a number that provides a comparative estimate of an individual's creditworthiness based on an analysis of their credit report. It is an inexpensive and main alternative to other forms of consumer loan underwriting. Lenders, s ...
, the new
VantageScore VantageScore is a consumer credit-scoring system in the United States, created through a joint venture of the three major credit bureaus ( Equifax, Experian, and TransUnion). The model is managed and maintained by an independent company, Vantage ...
, and credit bureaus' proprietary scores), identity scoring models vary wildly from product to product.


Identity theft

Identity scoring works by matching the information the user provides against billions of records in public
databases In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases spa ...
, ranging from property and tax records to Internet
search engines A search engine is a software system designed to carry out web searches. They search the World Wide Web in a systematic way for particular information specified in a textual web search query. The search results are generally presented in a ...
, and calculating it against patterns designed to recognize fraud or identity theft. ''Example: Wendy's name and
Social Security number In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as . The number is issued to ...
were stolen by identity thieves who hacked a stolen
laptop A laptop, laptop computer, or notebook computer is a small, portable personal computer (PC) with a screen and alphanumeric keyboard. Laptops typically have a clam shell form factor with the screen mounted on the inside of the upper li ...
. They take her Social Security number and combine it with another stolen name, and use it to open a series of new accounts, including credit cards and retail
gift cards A gift card also known as gift certificate in North America, or gift voucher or gift token in the UK is a prepaid stored-value money card, usually issued by a retailer or bank, to be used as an alternative to cash for purchases within a parti ...
. An identity protection system that used identity scoring would alert Wendy that her Social Security number had been compromised.'' Because identity scores include much more accurate information and can predict behavior patterns more definitively than credit scores, the
Gartner Gartner, Inc is a technological research and consulting firm based in Stamford, Connecticut that conducts research on technology and shares this research both through private consulting as well as executive programs and conferences. Its clients ...
research firm predicted that identity scoring will surpass credit monitoring as the leading identity theft prevention measure by 2009. However, Gartner research analyst Avivah Litan warned that identity scoring was not a foolproof system, as it still relied on the underlying accuracy of the information used.


Breeder documents

There are three types of breeder documents, which are documents designed to verify other identification documents. * Civil : Birth, death, marriage certificates, and registered partnership certificates * Business: Legal status of a company * Other: Real estate, residence, etc. Reliance on these documents to verify identities is flawed, as there is no standardized means to verify that information contained in breeder documents is legitimate. Identity scoring can be used as a tool to authenticate identities on an independent level in cases of employment hiring and information verification. Currently there is no standard means to verify that information provided on an I-9 work document is legitimate, for example. The desire for industries to quickly hire cheap labor trumps any incentive a business has to check the credentials of their new hires, leading to a “gray market” for stolen identities and contributing to continuing surges in
illegal immigration Illegal immigration is the migration of people into a country in violation of the immigration laws of that country or the continued residence without the legal right to live in that country. Illegal immigration tends to be financially upwar ...
. Tools that employ identity scoring to verify that a person's name and Social Security number match, or that their I-9 data is correct, could cut down on the sale and misuse of personal information while enabling better enforcement of immigration law.


Business

The following companies make use of identity scoring products or systems in their businesses: *
Experian Experian is an American–Irish multinational data analytics and consumer credit reporting company. Experian collects and aggregates information on over 1 billion people and businesses including 235 million individual U.S. consumers and more t ...
: Experian’s Fraud Shield product cross-references from their 215-million-entry consumer credit database, and provides risk management and identity verification services from subscriber businesses, as well as an additional score product that combines information from both credit and fraud-related sources.
e-Merges.com
: e-Merges fraud prevention product, "Electorate" is an authentication of self reported data with implicit authorization to access and validate it through public records. *
Fair Isaac FICO (legal name: Fair Isaac Corporation), originally Fair, Isaac and Company, is a data analytics company based in Bozeman, Montana, focused on credit scoring services. It was founded by Bill Fair and Earl Isaac in 1956. Its FICO score, a me ...
: Fair Isaac introduced the Falcon ID scoring solution in August 2004. Falcon ID uses predictive analytics in its fraud verification process, and enables cross-business information sharing, a benefit Fair Isaac touted as “very good news for businesses in many industries that are working to protect their customers from identity fraud, and very bad news for their common enemy, the perpetrators of ID fraud.”
ID Analytics
: The company's industry standard ID Score(r) is trusted by leading organizations to identify and prevent identity fraud. MyIDScore.com is a free service that gives consumers immediate insight into their risk of identity fraud. *MyPublicInfo : An identity protection company based in Arlington, VA, MyPublicInfo uses identity scoring as a base for several of its products. The company has announced plans for other consumer identity scoring products in 2007, but has not provided details.


References

*Fischetti, Mark. "Scoring Your Identity: New Tactics Root Out The False Use Of Personal Data," ''Scientific American'', March 2007. https://web.archive.org/web/20071015191230/http://www.sciam.com/article.cfm?chanID=sa006&colID=5&articleID=C77C581B-E7F2-99DF-349A29510AE8D333 *Hargreaves, Steve. “Mistaken identity can lead to embarrassment, job loss, or worse—how to avoid it,” ''CNNMoney.com'', 2/6/07. http://money.cnn.com/2006/02/07/pf/mistaken_ID *Kraft, Harold. "Identity Scoring: The Better Defense Against Data Breaches," ''E-Commerce Times'', 2/15/07. http://www.ecommercetimes.com/story/55770.html *Litan, Avivah. “Limit ID Fraud: Use ID Scoring, Not Credit Monitoring.” Gartner Research, July 13, 2006 *Pero, Jennifer. Who Are You ?, ''Government Security'', 7/1/02. http://govtsecurity.com/mag/article_2/ *Sullivan, Bob. “Her ATM card, but her impostor's picture,” From ''The Red Tape Chronicles'', 2/6/06. https://web.archive.org/web/20070314072132/http://redtape.msnbc.com/2006/02/her_atm_card_bu.html *Experian Fraud Shield : http://www.experian.com/products/pdf/fraud_shield_ps.pdf *"Thwarting Fraud Before It Happens," http://www.creditcollectionsworld.com/article.html?id=20061016CK18V3P1 *“Fair Isaac's Falcon ID Delivers New Level of Identity Theft Protection Across Industries,” ''Minneapolis Business Wire'', August 3, 2004. http://investors.fairisaac.com/phoenix.zhtml?c=67528&p=irol-newsArticle&t=Regular&id=599964& {{DEFAULTSORT:Identity Score Credit Identity management Internet privacy