Monday, November 19, 2018

Identity Theft Prevention: How to Catch a Thief


Chairman & Managing Director

Here are four scenarios involving identity theft that mortgage originators encounter from time to time. Read them and then keep them in mind as I discuss how to ask for additional information in order to prevent identity theft.
1.       A law enforcement report containing detailed information about the identity theft and the signature, badge number, or other identification information of the individual law enforcement official taking the report should be sufficient on face value to support a victim’s request.
Question: Without an identifiable concern, such as an indication that the report was fraudulent, would it be reasonable for an information furnisher or Consumer Reporting Agency (CRA) to request additional information or documentation?
Answer: It would not be reasonable.
2.       A consumer might provide a law enforcement report similar to the above report, but certain important information such as the consumer’s date of birth or Social Security number may be missing because the consumer chose not to provide it.
Question: The information furnisher or CRA could accept this report, but would it be reasonable to require that the consumer provide the missing information?
Answer: It would be reasonable.
3.       A consumer might provide a law enforcement report generated by an automated system with a simple allegation that an identity theft occurred to support a request for a tradeline block or cessation of information furnishing.
Question: Would it be reasonable for an information furnisher or CRA to ask that the consumer fill out and have notarized the Commission’s ID Theft Affidavit or a similar form and provide some form of identification documentation?
Answer: It would be reasonable.
4.       A consumer might provide a law enforcement report generated by an automated system with a simple allegation that an identity theft occurred to support a request for an extended fraud alert.
Question: Would it be reasonable for a consumer reporting agency to require additional documentation or information, such as a notarized affidavit?
Answer: It would not be reasonable.
In these scenarios, a financial institution should be responsive in accordance with certain guidelines. Specificity of action must be appropriate, reasonable and proportional to the challenge. However, total reliance on the CRA is inappropriate.
Undertaking Evaluative Actions
In avoiding identity theft schemes, I suggest that four basic evaluative actions be undertaken, where a decision is needed to ask for additional information from the consumer.
1)       Specific dates relating to the identity theft such as when the loss or theft of personal information occurred or when the fraud(s) using the personal information occurred, and how the consumer discovered or otherwise learned of the theft.
2)       Identifying information or any other information about the perpetrator, if known.
3)       Name(s) of information furnisher(s), account numbers, or other relevant account information related to the identity theft.
4)       Any other information known to the consumer about the identity theft.
When a financial institution is faced with declining a loan for identity theft, a report should be drafted with relevant information to support the decision. Simply declining a loan and issuing an Adverse Action disclosure or alleging identity theft by reporting it to Financial Crimes Enforcement Network (FinCEN) by filing a Suspicious Activity Report (SAR) is not sufficient. Regulators and internal auditors routinely ask for an identity theft report in order to determine the extent to which an investigation was conducted. Furthermore, such an investigation demonstrates the institution’s “good faith” commitment to its Anti-Money Laundering Program, “good faith” being a key demonstrative element in a regulator’s assessment of the institution’s compliance. Other regulations are triggered, too, such as those promulgated by the Federal Trade Commission in its Identity Theft Protection Program as well as the regulations of the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transactions Act (FACTA), which is an amendment to the FCRA, primarily to protect consumers against identity theft.
Identity Theft Report
The identity theft report should consist of the following components:
·       The allegation of identity theft with as much specificity as the consumer can provide.
·       A copy of an official, valid report filed by the consumer with a federal, state, or local law enforcement agency, and even the United States Postal Inspection Service.[i]
·       Additional information or documentation that an information furnisher or consumer reporting agency reasonably requests for the purpose of determining the validity of the alleged identity theft, provided that the information furnisher or consumer reporting agency:
o   Makes the request not later than 15 days after the date of receipt of the copy of the identity theft report form or the request by the consumer for the particular service, whichever will be the later.
o   Makes any supplemental requests for information or documentation and final determination on the acceptance of the identity theft report within another 15 days after its initial request for information or documentation.
o   Has 5 days to make a final determination on the acceptance of the identity theft report, in the event that the consumer reporting agency or information furnisher receives any such additional information or documentation on the 11th day or later within the 15-day period.
Understanding Identity Theft
But what is identity theft? Over time, this concept has gone through ever wider definitions.
I propose a simple outline, helpfully provided by the FACTA.[ii]
Identity theft means a fraud committed or attempted using the identifying information of another person without authority.
This seems straight-forward and unambiguous.
However, the term “identifying information” leads to a more nuanced definition, because that terms means any name or number that may be used, alone or in conjunction with any other information, to identify a specific person, including any:
·       Name, Social Security number, date of birth, official state or government issued driver’s license or identification number, alien registration number, government passport number, employer or taxpayer identification number;
·       Unique biometric data, such as fingerprint, voice print, retina or iris image, or other unique physical representation;
·       Unique electronic identification number, address, or routing code; and,
·       Telecommunication identifying information or access device.
Naturally, the process of determining what constitutes appropriate proof of identity is pivotal in making a decision about the presence or absence of identity theft. Consumer reporting agencies are usually at the forefront of finding ways to establish identity, in that they are required to develop and implement reasonable factors involving the information that consumers must provide to constitute proof of identity.[iii]
These factors must:
·       Ensure that the information is sufficient to enable the CRA to match consumers with their files; and,
·       Adjust the information to be commensurate with an identifiable risk of harm arising from misidentifying the consumer.
Identity Theft Alerts
When Lenders Compliance Group conducts a due diligence review, my firm’s auditors evaluate the choice of information that our client considers to be reasonable information for proof of identity.
One factor is what we call the “consumer file match,” which is the identification information of the consumer, including his or her full name (first, middle initial, last, suffix), any other or previously used names, current and/or recent full address (street number and name, apt. no., city, state, and zip code), full nine digits of Social Security number, and/or date of birth.
Another factor we call “additional proof of identity,” which usually consists of copies of government-issued identification documents, utility bills, and/or other methods of authentication of a person’s identity (which may include, but would not be limited to, answering questions to which only the consumer might be expected to know the answer).
Additionally, it is critical to determine if the consumer has placed a fraud alert on the consumer report. The two alerts that are required by CRAs to place on consumer reports are fraud alerts and the active duty alerts.[iv]
A fraud alert is a notice that the consumer may have been a victim of identity theft or other fraud.
An active duty alert is a notice that the consumer is on active duty in the military.
There are timing requirements.[v] An initial fraud alert must be placed in a consumer’s report for ninety (90) days at the consumer’s request. If the consumer files an identity theft report, an extended fraud alert can remain in the consumer’s report for seven (7) years. An active duty alert will remain in the consumer’s report for twelve (12) months.
The initial fraud alert and active duty alert notify all prospective users of the consumer report that the consumer does not authorize the establishment of any new credit plan, increase in credit limit on an existing credit account, or other extension of credit (other than under an existing open-end credit plan), in the name of the consumer, or issuance of an additional card on an existing credit account requested by a consumer unless the lender follows the required procedures.
If an initial fraud alert or active duty alert appears on a consumer report, a lender cannot extend credit unless the user utilizes reasonable policies and procedures to form a reasonable belief that the user knows the identity of the person making the request. These policies and procedures can be a heavy lift and often need competent compliance guidance to navigate.
If a consumer requesting the alert has specified a telephone number to be used for identity verification purposes, before authorizing any new credit plan or extension in the name of the consumer, the lender must contact the consumer using that telephone number or take reasonable steps to verify the consumer’s identity and confirm that the application for a new credit plan is not the result of identity theft.
Additionally, there is the “extended fraud alert,” where the consumer’s report must include information that provides all prospective users of the consumer report with:
·       Notification that the consumer does not authorize the establishment of any new credit plan or extension of credit (other than under an existing limit of an open-end credit plan) in the name of the consumer, or issuance of an additional card on an existing credit account requested by a consumer, or any increase in credit limit on an existing credit account requested by a consumer, unless the lender first contacts the consumer as specified in the report, and
·       A telephone number or other reasonable contact method designated by the consumer for lenders to contact the consumer to verify their identity.
Extended fraud alerts prohibit lenders from establishing a new credit plan or extension of credit (other than under an existing limit of an open-end credit plan) in the name of the consumer. A financial institution may not issue an additional card on an existing credit account requested by a consumer, or increase credit limit on an existing credit account requested by a consumer, unless the company contacts the consumer in person or uses the contact method described in the consumer report to confirm that the application for a new credit plan or increase in credit limit, or request for an additional card is not the result of identity theft.
Scammers will be Scammers
But scammers always scam and conmen always con. Conman is the short form for “Confidence Man,” because such an individual has a knack for gaining a mark’s confidence and then pulling the scam which, in this case, is stealing the mark’s identity. A financial institution or other business entity that provides credit to an identity thief (or other person who allegedly has made unauthorized use of a victim’s identification) must provide a copy of the application and other records it has (or are maintained by another on the business entity’s behalf) regarding the transaction (i.e., copies of checks or card sales slips).[vi] The victim’s request must be in writing, contain certain information, and be mailed to an address specified by the business entity for this purpose.
Intent is important in identifying and nailing the scammer, because the victim is a consumer whose means of identification or financial information has been used or transferred (or has been alleged to have been used or transferred) without the authority of that consumer, with the intent to commit, or to aid or abet, an identity theft or a similar crime.
Where such identity theft has been determined, the financial institution – and any other business entity that has provided credit based on allegedly unauthorized use of the means of identification of the victim – must provide a copy of the application and business transaction records in its control,[vii] evidencing any transaction alleged to be a result of identity theft to:
·       The victim;
·       Any federal, state, or local government law enforcement agency or officer specified by the victim in such a request; and,
·       Any law enforcement agency investigating the identity theft and authorized by the victim to take receipt of identity theft records under this provision.
There is an important caveat: the applicable rule does not permit a company to disclose information, including information to law enforcement, that it is otherwise prohibited from disclosing under any other provision of federal or state law. That being said, the law also specifically states that the privacy provisions of the Gramm-Leach-Bliley Act (GLBA) prohibiting the disclosure of financial information by the company to third parties cannot be used to deny disclosure of the required information to the victim.
Victim Requests
There are three parts involved in a financial institution’s handling of a victim’s request for a report. These are basic features of identity theft prevention compliance. The three parts are the rules involving the victim’s request requirements, the response provided to the victim, and the action(s) taken by the financial institution.
Firstly, telephonic requests must be avoided. The request of a victim for copies of identity-theft-related records must be in writing and be mailed to an address specified by the financial institution, if any. During this phase, the financial institution can ask for additional information from the consumer as part of the request. If asked, the consumer can be required to include relevant information about any transaction alleged to be a result of identity theft to facilitate providing the records including, if known by the victim (or if readily obtainable by the victim), such information as the date of the application or transaction and any other identifying information such as an account or transaction number.
Secondly, when the institution does receive such a request from the consumer, it must provide the information within thirty (30) days of receiving the request. The information must be provided free to the consumer, with no charges. However, before providing the information, the company must first verify the identity of the consumer making the request. If there is a high degree of confidence that it has satisfactorily established the identity of the victim making the request, it may then respond by providing the information.
Caution in this phrase is critical! As a matter of the institution’s review process, and prior to releasing the requested information, the victim should be expected to provide proof of identity with:
·       The presentation of a government-issued identification card;
·       Personally identifying information of the same type that was provided to the company by the unauthorized person; or
·       Personally identifying information that the institution typically requests from new applicants or for new transactions, at the time of the victim’s request for information, including any of the above documentation.
For establishing the claim of identity theft, the victim should provide:
·       A copy of a police report evidencing the claim of the victim of identity theft; and
·       A properly completed copy of a standardized affidavit of identity theft developed and made available by the Commission or an affidavit of fact that is acceptable to the business entity for that purpose.
Thirdly, the action(s) taken are the next hurdle. The institution may decide to decline providing the requested information if, in good faith, it determines that:
·       The FCRA does not require disclosure of the information;
·       After reviewing the information provided by the consumer to verify their identity, the company does not have a high degree of confidence in knowing the true identity of the individual requesting the information;
·       The request for the information is based on a misrepresentation of fact by the individual requesting the information relevant to the request for information; or
·       The information requested is Internet navigational data or similar information about a person’s visit to a web site or online service.
Blocking Information
There are rules involving the blocking of information involving identity theft.[viii] For instance, CRAs must block the reporting of any information in the file of a consumer that the consumer identifies as information which resulted from an alleged identity theft, not later than four (4) business days after the date of receipt by the CRA of:
·       Appropriate proof of the identity of the consumer,
·       A copy of an identity theft report,
·       The identification of such information by the consumer, and
·       A statement by the consumer that the information is not information relating to any transaction by the consumer.
In our audit reviews, Lenders Compliance Group determines if the CRAs comply with applicable regulations by their prompt furnishing of appropriate information related to findings of identity theft, proper filing of an identity theft report, and whether a block has been requested and, if so, the effective dates of the block.
Consumer Rights
Finally, I would like to call attention to the summary of rights of identity theft victims.[ix] The FTC, in consultation with the federal banking agencies and the National Credit Union Administration (NCUA), created a model summary of the rights of consumers that is to be provided to consumers by CRAs for remedying the effects of fraud or identity theft involving credit, an electronic fund transfer, or an account or transaction at or with a financial institution or other creditor. In addition, the FTC revised its General Summary of Consumer Rights under the FCRA because of the numerous changes to consumer rights made by the FACT Act.[x]
The Summary of Consumer Identity Theft Rights[xi] essentially highlights consumers’ rights in the FACT Act and other FCRA provisions and must be provided by CRAs to consumers who contact them claiming to be the victims of identity theft. The revised General Summary of Consumer Rights[xii] is required to be provided by CRAs to all consumers when they receive various disclosures from CRAs.




[i] Such a filing often subjects the person filing the report to criminal penalties relating to the filing of false information, if, in fact, the information in the report is false.
[ii] 12 CFR 1022.3. The Federal Trade Commission (FTC) adopted several definitions of terms that are used in a number of provisions of the FACT Act.
[iii] 12 CFR 1022.123. See also 605A, 605B, and 609(a)(1) of the Fair Credit Report Act (FCRA)
[iv] Under section 605A of the FCRA, as added by section 112 of the FACT Act
[v] Idem
[vi] Under section 609(e) of the FCRA, added by section 151 of the FACT Act
[vii] Whether maintained by the business entity or by another person on behalf of the business entity. The basis of the allegation involves the culpability provided in inducing a financial institution or other business entity the consideration of products, goods, or services to, accepting payment from, or otherwise entering into a commercial transaction with a person who has allegedly made an unauthorized use of the victim’s identity.
[viii] Under section 605B of the FCRA, added by section 154 of the FACT Act
[ix] Section 609(d) of the FCRA sets forth requirements for the model summary.
[x] Required by section 609(c) of the FCRA
[xi]See Appendix I to 12 CFR Part 1022
[xii] Under the FCRA appears in Appendix K to 12 CFR Part 1022

________________________________________________



The first mortgage risk management firms in the United States that provides professional guidance and support
to financial institutions, banks and nonbanks, in virtually all areas of mortgage banking.

Pioneer in residential mortgage compliance, mortgage risk management, and regulatory guidance.

Contact

Media

Phone
866-602-6660