{"id":10892,"date":"2025-10-04T13:10:50","date_gmt":"2025-10-04T10:10:50","guid":{"rendered":"https:\/\/amani.ai\/?page_id=10892"},"modified":"2025-11-06T11:28:54","modified_gmt":"2025-11-06T08:28:54","slug":"identity-glossary-new","status":"publish","type":"page","link":"https:\/\/amani.ai\/identity-glossary-new\/","title":{"rendered":"Identity Glossary"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 1092px + 24px );margin-left: calc(-24px \/ 2 );margin-right: calc(-24px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:25px;--awb-spacing-right-large:12px;--awb-margin-bottom-large:25px;--awb-spacing-left-large:12px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:12px;--awb-spacing-left-medium:12px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:12px;--awb-spacing-left-small:12px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><h2 class=\"lg:p-heading-xl sm:p-heading-md p-heading-sm-mobile\">Identity glossary<\/h2>\n<\/div><div class=\"fusion-text fusion-text-2\"><p>The world of regulatory technology is filled with complex terms and acronyms, making it easy to get lost in the details. Here, we\u2019ve defined the most common RegTech and compliance terms to help you understand the language that powers the industry.<\/p>\n<\/div><div class=\"fusion-tabs fusion-tabs-1 classic nav-not-justified horizontal-tabs icon-position-top mobile-mode-carousel\" style=\"--icon-color:var(--awb-color5);--icon-active-color:var(--awb-color1);--awb-title-border-radius-top-left:0px;--awb-title-border-radius-top-right:0px;--awb-title-border-radius-bottom-right:0px;--awb-title-border-radius-bottom-left:0px;--awb-content-padding-top:20px;--awb-content-padding-right:0px;--awb-content-padding-bottom:20px;--awb-content-padding-left:0px;--awb-title-padding-top:60px;--awb-title-padding-right:10px;--awb-title-padding-bottom:10px;--awb-title-padding-left:10px;--awb-alignment:start;--awb-inactive-color:transparent;--awb-title-text-color:var(--awb-color5);--awb-title-active-text-color:var(--awb-color1);--awb-background-color:transparent;--awb-border-color:#ffffff;--awb-active-border-color:var(--awb-color1);\"><div class=\"nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-4ec651e30669af12bdd\" aria-selected=\"true\" id=\"fusion-tab-a\" href=\"#tab-4ec651e30669af12bdd\"><h4 class=\"fusion-tab-heading\">A<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-cc2e9d2497b38cd1fc7\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-b\" href=\"#tab-cc2e9d2497b38cd1fc7\"><h4 class=\"fusion-tab-heading\">B<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-33c46b87bee25e237bf\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-c\" href=\"#tab-33c46b87bee25e237bf\"><h4 class=\"fusion-tab-heading\">C<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-f7ca96749c8f380a78d\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-d\" href=\"#tab-f7ca96749c8f380a78d\"><h4 class=\"fusion-tab-heading\">D<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-71f435cf240b937feff\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-e\" href=\"#tab-71f435cf240b937feff\"><h4 class=\"fusion-tab-heading\">E<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-d8250cf1d561c6605c5\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-f\" href=\"#tab-d8250cf1d561c6605c5\"><h4 class=\"fusion-tab-heading\">F<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-941fc43d69d8624d6bd\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-g\" href=\"#tab-941fc43d69d8624d6bd\"><h4 class=\"fusion-tab-heading\">G<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-39c14a3c6e12116a830\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-h\" href=\"#tab-39c14a3c6e12116a830\"><h4 class=\"fusion-tab-heading\">H<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-6c8c7abb51fe8181131\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-i\" href=\"#tab-6c8c7abb51fe8181131\"><h4 class=\"fusion-tab-heading\">I<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-68759b2ac257286d40d\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-j\" href=\"#tab-68759b2ac257286d40d\"><h4 class=\"fusion-tab-heading\">J<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-331de2668f867c86a66\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-k\" href=\"#tab-331de2668f867c86a66\"><h4 class=\"fusion-tab-heading\">K<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-93cff5c9f1c4f600c92\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-l\" href=\"#tab-93cff5c9f1c4f600c92\"><h4 class=\"fusion-tab-heading\">L<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-6a0ec56b715d3573e73\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-m\" href=\"#tab-6a0ec56b715d3573e73\"><h4 class=\"fusion-tab-heading\">M<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-0c9501744388a4e0ea0\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-n\" href=\"#tab-0c9501744388a4e0ea0\"><h4 class=\"fusion-tab-heading\">N<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-57f69fcc80e7fed54a2\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-o\" href=\"#tab-57f69fcc80e7fed54a2\"><h4 class=\"fusion-tab-heading\">O<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-8b0bf546d7f48c80542\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-p\" href=\"#tab-8b0bf546d7f48c80542\"><h4 class=\"fusion-tab-heading\">P<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-ea95c66f15b7a271793\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-q\" href=\"#tab-ea95c66f15b7a271793\"><h4 class=\"fusion-tab-heading\">Q<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-a1600fdc09fdc121486\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-r\" href=\"#tab-a1600fdc09fdc121486\"><h4 class=\"fusion-tab-heading\">R<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-00367658d4fe716e883\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-s\" href=\"#tab-00367658d4fe716e883\"><h4 class=\"fusion-tab-heading\">S<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-4ba37912c0ecb4f28a2\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-t\" href=\"#tab-4ba37912c0ecb4f28a2\"><h4 class=\"fusion-tab-heading\">T<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-e30c7e91f8eb5fc8e32\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-u\" href=\"#tab-e30c7e91f8eb5fc8e32\"><h4 class=\"fusion-tab-heading\">U<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-9949c802e9e4fe6e081\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-v\" href=\"#tab-9949c802e9e4fe6e081\"><h4 class=\"fusion-tab-heading\">V<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-49c7811dffbe23ce1c1\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-w\" href=\"#tab-49c7811dffbe23ce1c1\"><h4 class=\"fusion-tab-heading\">W<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-9e0c2b665c8a21d0584\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-x\" href=\"#tab-9e0c2b665c8a21d0584\"><h4 class=\"fusion-tab-heading\">X<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-0ca128c422e0200fe60\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-y\" href=\"#tab-0ca128c422e0200fe60\"><h4 class=\"fusion-tab-heading\">Y<\/h4><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-575c13ef53c9fe0f8d9\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-z\" href=\"#tab-575c13ef53c9fe0f8d9\"><h4 class=\"fusion-tab-heading\">Z<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-content\"><div class=\"tab-pane fade fusion-clearfix in active\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-a\" id=\"tab-4ec651e30669af12bdd\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-1\"><div class=\"fusion-panel panel-default panel-90217557651d8ac97 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_90217557651d8ac97\"><a aria-expanded=\"false\" aria-controls=\"90217557651d8ac97\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-1\" data-target=\"#90217557651d8ac97\" href=\"#90217557651d8ac97\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Account takeover (ATO) fraud<\/span><\/a><\/h4><\/div><div id=\"90217557651d8ac97\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_90217557651d8ac97\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Account takeover (ATO) fraud is a form of identity theft where fraudsters obtain a legitimate user\u2019s credentials and take over their online accounts and make unauthorized transactions and\/or changes.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-365df78f498983e37 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_365df78f498983e37\"><a aria-expanded=\"false\" aria-controls=\"365df78f498983e37\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-1\" data-target=\"#365df78f498983e37\" href=\"#365df78f498983e37\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">AMLID<\/span><\/a><\/h4><\/div><div id=\"365df78f498983e37\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_365df78f498983e37\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The\u00a0<b>Anti-Money Laundering International Database<\/b>, or\u00a0<b>AMLID<\/b>, is a database containing an analysis of AML laws and regulations around the world. The database also contains the contact information for countries\u2019 anti-money laundering authorities. It was designed to be a reference tool for law enforcement officials, investigators, and other individuals working on money laundering cases involving multiple jurisdictions.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-e3090b303103cc12a fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_e3090b303103cc12a\"><a aria-expanded=\"false\" aria-controls=\"e3090b303103cc12a\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-1\" data-target=\"#e3090b303103cc12a\" href=\"#e3090b303103cc12a\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Anti-money laundering (AML)<\/span><\/a><\/h4><\/div><div id=\"e3090b303103cc12a\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_e3090b303103cc12a\"><div class=\"panel-body toggle-content fusion-clearfix\">Anti-money laundering (AML) is a set of procedures, laws, and regulations in place to stop criminals from disguising illegally obtained funds as legitimate income.<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-b\" id=\"tab-cc2e9d2497b38cd1fc7\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-2\"><div class=\"fusion-panel panel-default panel-57de1dd78e6be6760 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_57de1dd78e6be6760\"><a aria-expanded=\"false\" aria-controls=\"57de1dd78e6be6760\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-2\" data-target=\"#57de1dd78e6be6760\" href=\"#57de1dd78e6be6760\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Bank Account Validation Service<\/span><\/a><\/h4><\/div><div id=\"57de1dd78e6be6760\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_57de1dd78e6be6760\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Like the relationship between an area code and a phone number, every bank has an assigned routing number and every bank account has its own assigned account number. The combination of the two number sets creates a coding system that uniquely identifies every single bank account and allows monetary transactions to be easily directed to and from accounts.<\/p>\n<p>The speed of electronic transactions not only allows for seamless commerce but also lightning-fast fraud.\u00a0<b>Bank Account Validation Services<\/b>\u00a0(or AVS) is a fraud protection tool that offers financial institutions and other related entities the ability to verify information such as the status or ownership or beneficiaries of an account in near-real time. This can be used in cases including prior to the issuing of a payment or a disbursement in order to prevent payment fraud or other losses, such as payment delays.<\/p>\n<h2><b>Who uses Bank Account Validation Services?<\/b><\/h2>\n<p>The most common AVS methods are those involved with Automated Clearing House (ACH) transactions. Top industries using AVS include payroll companies and direct sales, especially those with large funds transfers or high fraud risk.<\/p>\n<p><b>ACH micro-transactions<\/b>\u00a0might be sent by a person-to-person sales app, such as an\u00a0<a href=\"https:\/\/withpersona.com\/industry\/marketplace\" data-analytics=\"Button Clicked\" data-property-pagelocation=\"container\" data-property-buttoncopy=\"online marketplace\">online marketplace<\/a>, to verify that the recipient is a legitimate person and that the account is active and correct. After the recipient confirms receiving the test deposits, typically a few cents each,\u00a0the originator will typically then debit the same transfer amounts.<\/p>\n<p><b>ACH pre-notifications<\/b>, or pre-notes, are $0 transfers that verify account details. They are similar to micro-transactions except that the recipient does not need to confirm receiving them nor do they need to share personal or financial information to do so. The verification is considered complete if there are no errors or change notifications. Pre-notes are commonly used for direct deposits, such as payroll.<\/p>\n<p>Validation via wire would involve sending a test wire and requesting manual confirmation. Validating via ACH would accomplish the same end result for less cost but is a slower overall process.<\/p>\n<h2><b>Why are Bank Account Validation Services important?<\/b><\/h2>\n<p>Bank Account Validation Services play a crucial role in minimizing fraud, internal errors, payment delays, and other costly business disruptions. By validating an account prior to a significant transaction, the chances of errors or missed payments are significantly reduced. This provides both the sender and recipient with peace of mind in knowing that the involved parties are legitimate and having a higher level of assurance that unexpected complications won&#8217;t arise.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-52bcc31c21b5797fc fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_52bcc31c21b5797fc\"><a aria-expanded=\"false\" aria-controls=\"52bcc31c21b5797fc\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-2\" data-target=\"#52bcc31c21b5797fc\" href=\"#52bcc31c21b5797fc\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Bank Secrecy Act (BSA)<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"52bcc31c21b5797fc\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_52bcc31c21b5797fc\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The Bank Secrecy Act (BSA) is a law that requires US financial institutions to collaborate with the US government in cases of suspected money laundering and fraud.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-04156c60787a1039b fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_04156c60787a1039b\"><a aria-expanded=\"false\" aria-controls=\"04156c60787a1039b\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-2\" data-target=\"#04156c60787a1039b\" href=\"#04156c60787a1039b\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Bot protection<\/span><\/a><\/h4><\/div><div id=\"04156c60787a1039b\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_04156c60787a1039b\"><div class=\"panel-body toggle-content fusion-clearfix\"><b>Bot protection<\/b> refers to the methods and strategies an online company uses to manage its exposure to bots \u2014 both good and bad \u2014 that might affect its business. While any business operating online may have a bot protection strategy, they are very important to the broader anti-fraud strategies employed by financial institutions, social media companies, and online marketplaces.<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-0bfa5a03447808119 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_0bfa5a03447808119\"><a aria-expanded=\"false\" aria-controls=\"0bfa5a03447808119\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-2\" data-target=\"#0bfa5a03447808119\" href=\"#0bfa5a03447808119\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Business lien<\/span><\/a><\/h4><\/div><div id=\"0bfa5a03447808119\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_0bfa5a03447808119\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>A\u00a0<b>business lien<\/b>, also called a\u00a0<b>corporate lien<\/b>, is a legal claim against a company\u2019s assets \u2014 typically financial assets, real estate, vehicles, or other equipment \u2014 filed by an entity to which the company owes money. Liens show that the filing entity has an interest in these assets and that the assets can potentially be seized and sold to pay back the debt.<\/p>\n<p>Liens are often filed by:<\/p>\n<ul>\n<li>Lenders who are owed repayment on a business loan<\/li>\n<li>Governments (federal, state, local) for unpaid income and property taxes<\/li>\n<li>Contractors who are owed payment for services provided<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-c\" id=\"tab-33c46b87bee25e237bf\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-3\"><div class=\"fusion-panel panel-default panel-1b92c90c4ca701db7 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_1b92c90c4ca701db7\"><a aria-expanded=\"false\" aria-controls=\"1b92c90c4ca701db7\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-3\" data-target=\"#1b92c90c4ca701db7\" href=\"#1b92c90c4ca701db7\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">California Consumer Privacy Act (CCPA)<\/span><\/a><\/h4><\/div><div id=\"1b92c90c4ca701db7\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_1b92c90c4ca701db7\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The California Consumer Privacy Act (CCPA) is the California equivalent of\u00a0<a href=\"https:\/\/withpersona.com\/blog\/top-gdpr-statistics-businesses-must-know\" data-analytics=\"Button Clicked\" data-property-pagelocation=\"container\" data-property-buttoncopy=\"GDPR\">GDPR<\/a>\u00a0and went into effect on January 1, 2020. It specifies that consumers have a right to request what information is being collected, for what purpose, and with whom it&#8217;s being shared. Consumers can also request to opt out of their data being shared or for their data to be deleted (which businesses must comply with unless that data impairs their ability to provide core services). Individuals also have the right to equal service and price, even if they exercise their privacy rights. Under CCPA, businesses are not allowed to sell the PII of anyone under 16 years of age, unless these individuals have specifically opted in.<\/p>\n<p>A more comprehensive version of CCPA, the\u00a0<a href=\"https:\/\/withpersona.com\/blog\/consumer-privacy-rights-act-cpra\" data-analytics=\"Button Clicked\" data-property-pagelocation=\"container\" data-property-buttoncopy=\"Consumer Privacy Rights Act (CPRA)\">Consumer Privacy Rights Act (CPRA)<\/a>, went into effect on January 1, 2023 and gives consumers control over whether companies can share their personal information as well as whether they can sell it.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-184a1d0a55e54a7b8 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_184a1d0a55e54a7b8\"><a aria-expanded=\"false\" aria-controls=\"184a1d0a55e54a7b8\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-3\" data-target=\"#184a1d0a55e54a7b8\" href=\"#184a1d0a55e54a7b8\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Children\u2019s Online Privacy Protection Act (COPPA)<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"184a1d0a55e54a7b8\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_184a1d0a55e54a7b8\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The Children&#8217;s Online Privacy Protection Act of 1998 (COPPA) is a US federal law created to protect the privacy of children under 13.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-b273233791ad6e18d fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_b273233791ad6e18d\"><a aria-expanded=\"false\" aria-controls=\"b273233791ad6e18d\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-3\" data-target=\"#b273233791ad6e18d\" href=\"#b273233791ad6e18d\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Combating the Financing of Terrorism (CFT)<\/span><\/a><\/h4><\/div><div id=\"b273233791ad6e18d\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_b273233791ad6e18d\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Combating the Financing of Terrorism, or Counter Terrorist Financing (CFT) refers to a multitude of laws and regulations enacted to reign in the financing of terrorist activity. Under these policies, most financial institutions are required to fulfill strict requirements, including monitoring customers\u2019 transactions and behavior, conducting proper\u00a0due diligence, and maintaining appropriate records.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-0ce36d4292c21388d fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_0ce36d4292c21388d\"><a aria-expanded=\"false\" aria-controls=\"0ce36d4292c21388d\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-3\" data-target=\"#0ce36d4292c21388d\" href=\"#0ce36d4292c21388d\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Compliance as a Service (CaaS)<\/span><\/a><\/h4><\/div><div id=\"0ce36d4292c21388d\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_0ce36d4292c21388d\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Compliance as a Service (CaaS)<\/b>\u00a0is a business model in which one business hires another business to design, implement, consult on, and\/or manage their compliance needs. It often involves purchasing licenses for compliance-focused software and tools. The CaaS business model makes it possible for a business to become and remain compliant with the regulations affecting them without needing to build and oversee their own in-house compliance solutions.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-d0376f09f869af5d1 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_d0376f09f869af5d1\"><a aria-expanded=\"false\" aria-controls=\"d0376f09f869af5d1\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-3\" data-target=\"#d0376f09f869af5d1\" href=\"#d0376f09f869af5d1\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Customer Due Diligence (CDD)<\/span><\/a><\/h4><\/div><div id=\"d0376f09f869af5d1\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_d0376f09f869af5d1\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The Customer Due Diligence (CDD) Rule is a regulation issued by the\u00a0Financial Crimes Enforcement Network (FinCEN)\u00a0aimed at improving financial transparency and preventing financial crimes and money laundering.<\/p>\n<p>According to\u00a0FinCEN, the CDD rule requires covered financial institutions to \u201cidentify and verify the identity the natural persons (known as beneficial owners) of legal entity customers who own, control, and profit from companies when those companies open accounts.\u201d Beneficial owners include any individual who owns 25 percent or more of a legal entity.<\/p>\n<p>To do this, organizations must \u201cestablish and maintain written policies and procedures that are reasonably designed to (1) identify and verify the identity of customers; (2) identify and verify the identity of the beneficial owners of companies opening accounts; (3) understand the nature and purpose of customer relationships to develop customer risk profiles; and (4) conduct ongoing monitoring to identify and report suspicious transactions and, on a risk basis, to maintain and update customer information.\u201d<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-f9a7ba2fef0464866 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_f9a7ba2fef0464866\"><a aria-expanded=\"false\" aria-controls=\"f9a7ba2fef0464866\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-3\" data-target=\"#f9a7ba2fef0464866\" href=\"#f9a7ba2fef0464866\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Customer Identification Program (CIP)<\/span><\/a><\/h4><\/div><div id=\"f9a7ba2fef0464866\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_f9a7ba2fef0464866\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>A\u00a0Customer Identification Program (CIP)\u00a0is a requirement of the USA Patriot Act that prescribes the minimum financial institutions must do to \u201cform a reasonable belief that it knows the true identity of each customer.\u201d<\/p>\n<p>According to the Federal Deposit Insurance Corporation (FDIC), the CIP Rule has six general requirements:<\/p>\n<ol>\n<li>A written program<\/li>\n<li>Four pieces of identifying information: customer name, date of birth, address, and identification number<\/li>\n<li>Identity verification procedures<\/li>\n<li>Recordkeeping<\/li>\n<li>Comparison with government lists<\/li>\n<li>Customer notice<\/li>\n<\/ol>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-d\" id=\"tab-f7ca96749c8f380a78d\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-4\"><div class=\"fusion-panel panel-default panel-c22a99c6bb13daef9 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_c22a99c6bb13daef9\"><a aria-expanded=\"false\" aria-controls=\"c22a99c6bb13daef9\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-4\" data-target=\"#c22a99c6bb13daef9\" href=\"#c22a99c6bb13daef9\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Data breach<\/span><\/a><\/h4><\/div><div id=\"c22a99c6bb13daef9\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_c22a99c6bb13daef9\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>A data breach is a security incident where unauthorized users take sensitive, protected, or confidential information from a system without permission from the system owner.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-f6065d0506f3c56fd fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_f6065d0506f3c56fd\"><a aria-expanded=\"false\" aria-controls=\"f6065d0506f3c56fd\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-4\" data-target=\"#f6065d0506f3c56fd\" href=\"#f6065d0506f3c56fd\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Deepfake<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"f6065d0506f3c56fd\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_f6065d0506f3c56fd\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>A\u00a0<b>deepfake<\/b>\u00a0is any image, video, or audio that shows a person doing something they never actually did. The name is a portmanteau of the word \u201cdeep learning,\u201d which is the machine-learning technique used to generate the images and the word \u201cfake.\u201d Deepfakes are also broadly called\u00a0<b>synthetic media<\/b>.<\/p>\n<p>Fraudsters use deepfakes to bypass verification and authentication systems so they can:<\/p>\n<ul>\n<li>Create fake accounts<\/li>\n<li>Access accounts that aren\u2019t theirs<\/li>\n<li>Access sensitive data (personal, financial, health, etc.)<\/li>\n<li>Complete or authorize fraudulent transactions<\/li>\n<li>Create a\u00a0synthetic ID<\/li>\n<li>and more<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-bde280be7d10021ad fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_bde280be7d10021ad\"><a aria-expanded=\"false\" aria-controls=\"bde280be7d10021ad\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-4\" data-target=\"#bde280be7d10021ad\" href=\"#bde280be7d10021ad\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Document check<\/span><\/a><\/h4><\/div><div id=\"bde280be7d10021ad\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_bde280be7d10021ad\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>In the context of\u00a0identity verification, a document check involves checking ID documents such as driver\u2019s licenses, passports, residence permits, and visas to confirm that the document is valid. This can be done manually or through automated technology.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-e\" id=\"tab-71f435cf240b937feff\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-5\"><div class=\"fusion-panel panel-default panel-6468b0081773642fb fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_6468b0081773642fb\"><a aria-expanded=\"false\" aria-controls=\"6468b0081773642fb\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-5\" data-target=\"#6468b0081773642fb\" href=\"#6468b0081773642fb\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Enhanced due diligence (EDD)<\/span><\/a><\/h4><\/div><div id=\"6468b0081773642fb\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_6468b0081773642fb\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Enhanced due diligence (EDD)<\/b>\u00a0refers to the due diligence process that a business applies to an individual (or other entity) deemed to carry a potentially high risk of money laundering. The goal is to achieve a deeper understanding of the risks posed by the individual, as well as a greater level of\u00a0assurance\u00a0in their identity.<\/p>\n<p>Having a process in place for EDD is key to implementing a\u00a0risk-based approach to money laundering. This typically includes some combination of more stringent\u00a0identity verification, additional\u00a0anti-money laundering (AML) screenings,\u00a0source of funds (SoF) verification, and heightened\u00a0transaction monitoring\u00a0compared to the standard\u00a0Customer Due Diligence (CDD)\u00a0process.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-f\" id=\"tab-d8250cf1d561c6605c5\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-6\"><div class=\"fusion-panel panel-default panel-227541248f3e19440 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_227541248f3e19440\"><a aria-expanded=\"false\" aria-controls=\"227541248f3e19440\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#227541248f3e19440\" href=\"#227541248f3e19440\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">False negative<\/span><\/a><\/h4><\/div><div id=\"227541248f3e19440\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_227541248f3e19440\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>In the context of\u00a0identity verification, a false negative refers to a situation in which an individual isn\u2019t able to get verified even though they\u2019re actually who they say they are. In other words, keeping a legitimate user out.<\/p>\n<p>In the context of fraud prevention, a false negative refers to incorrectly approving a bad actor or fraudulent transaction. In other words, allowing fraud through.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-b3e8e749485b59cfd fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_b3e8e749485b59cfd\"><a aria-expanded=\"false\" aria-controls=\"b3e8e749485b59cfd\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#b3e8e749485b59cfd\" href=\"#b3e8e749485b59cfd\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">False positive<\/span><\/a><\/h4><\/div><div id=\"b3e8e749485b59cfd\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_b3e8e749485b59cfd\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>In the context of\u00a0identity verification, a false positive refers to an individual passing the identity check even though they\u2019re not who they say they are. In other words, letting a bad actor through.<\/p>\n<p>In the context of fraud prevention, a false positive refers to incorrectly flagging a good account or transaction as fraudulent. In other words, blocking a legitimate user or transaction.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-bdaac2003c57c8f17 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_bdaac2003c57c8f17\"><a aria-expanded=\"false\" aria-controls=\"bdaac2003c57c8f17\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#bdaac2003c57c8f17\" href=\"#bdaac2003c57c8f17\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Federal Trade Commission (FTC)<\/span><\/a><\/h4><\/div><div id=\"bdaac2003c57c8f17\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_bdaac2003c57c8f17\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The Federal Trade Commission (FTC) is a U.S. federal agency that protects consumer rights by working to prevent fraudulent, deceptive, and unfair business practices and teaching consumers how to detect, deter, and deny scams and fraud.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-8fcea36bdcd443ee7 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_8fcea36bdcd443ee7\"><a aria-expanded=\"false\" aria-controls=\"8fcea36bdcd443ee7\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#8fcea36bdcd443ee7\" href=\"#8fcea36bdcd443ee7\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Federated identity management (FIM)<\/span><\/a><\/h4><\/div><div id=\"8fcea36bdcd443ee7\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_8fcea36bdcd443ee7\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Federated identity management (FIM) is an identity federation that links a user&#8217;s identity across multiple security domains \u2014 each supporting or using its own identity management system. When two domains are federated, the user can authenticate to one domain and then access resources in the other domain without having to perform a separate login process.\u00a0Single sign-on (SSO)\u00a0is a subset of federated identity, as it relates only to authentication and would not be possible without some sort of federation. FIM is a subset of\u00a0Identity and Access Management (IAM).<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-9f8ee799a8d0df428 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_9f8ee799a8d0df428\"><a aria-expanded=\"false\" aria-controls=\"9f8ee799a8d0df428\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#9f8ee799a8d0df428\" href=\"#9f8ee799a8d0df428\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">FedNow Service<\/span><\/a><\/h4><\/div><div id=\"9f8ee799a8d0df428\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_9f8ee799a8d0df428\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The\u00a0<b>FedNow Service<\/b>\u00a0is a new payment infrastructure designed by the U.S. Federal Reserve to facilitate the instant transfer of funds. The service allows users to send and receive money in real time, typically within seconds of a transaction being initiated. Payments and transfers can be completed any time of day, and any day of the year \u2014 including weekends and holidays.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-c637c5b3440e86490 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_c637c5b3440e86490\"><a aria-expanded=\"false\" aria-controls=\"c637c5b3440e86490\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#c637c5b3440e86490\" href=\"#c637c5b3440e86490\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Financial Crimes Enforcement Network (FinCEN)<\/span><\/a><\/h4><\/div><div id=\"c637c5b3440e86490\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_c637c5b3440e86490\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The Financial Crimes Enforcement Network is a bureau of the US Department of the Treasury that aims to safeguard the financial system from illicit use, prevent and punish domestic and international\u00a0money laundering, and promote national security by collecting and analyzing information about financial transactions required under the\u00a0Bank Secrecy Act (BSA). It consists of law-enforcement agencies, the regulatory community, and the financial services community.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-2788b95d9996e85c2 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_2788b95d9996e85c2\"><a aria-expanded=\"false\" aria-controls=\"2788b95d9996e85c2\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#2788b95d9996e85c2\" href=\"#2788b95d9996e85c2\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Financial Industry Regulatory Authority (FINRA)<\/span><\/a><\/h4><\/div><div id=\"2788b95d9996e85c2\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_2788b95d9996e85c2\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The Financial Industry Regulatory Authority (FINRA) is a private non-profit dedicated to \u201csafeguarding the investing public against fraud and bad practices\u201d through the regulation of broker-dealers.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-090fa83406a67105d fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_090fa83406a67105d\"><a aria-expanded=\"false\" aria-controls=\"090fa83406a67105d\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#090fa83406a67105d\" href=\"#090fa83406a67105d\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">First-party fraud<\/span><\/a><\/h4><\/div><div id=\"090fa83406a67105d\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_090fa83406a67105d\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>First-party fraud<\/b>\u00a0refers to instances where a bad actor misrepresents themselves \u2014 providing false information about their identity or financial situation, for example \u2014 in order to realize some kind of gain. In cases of first-party fraud, the primary victim could be a financial institution or business the bad actor is lying to, or even an individual. This differs from second- and third-party fraud in that it doesn\u2019t involve the bad actor taking advantage of another person\u2019s information.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-08a9b2feb21a87de8 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_08a9b2feb21a87de8\"><a aria-expanded=\"false\" aria-controls=\"08a9b2feb21a87de8\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#08a9b2feb21a87de8\" href=\"#08a9b2feb21a87de8\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Form W-9<\/span><\/a><\/h4><\/div><div id=\"08a9b2feb21a87de8\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_08a9b2feb21a87de8\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Form W-9<\/b>\u00a0is a tax form that employers use to confirm the name, address, and taxpayer identification number (TIN) of an individual that they will pay, but who is not classified as an \u201cemployee\u201d at the company. It is also known as the\u00a0<b>Request for Taxpayer Identification Number and Certification<\/b>\u00a0form. An individual must typically complete the form prior to receiving their first payment from the company. The employing company then submits the form to the IRS. Later, the information contained within a Form W-9 will be used to generate the individual\u2019s 1099 tax form, which will be used in filing individual income taxes.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-b4911e06ca8f48e9e fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_b4911e06ca8f48e9e\"><a aria-expanded=\"false\" aria-controls=\"b4911e06ca8f48e9e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#b4911e06ca8f48e9e\" href=\"#b4911e06ca8f48e9e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Fraud as a Service (FaaS)<\/span><\/a><\/h4><\/div><div id=\"b4911e06ca8f48e9e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_b4911e06ca8f48e9e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Fraud as a Service (FaaS)<\/b>\u00a0refers to situations in which a bad actor or larger fraud ring allows others to hire them to commit fraudulent activity for the purpose of making money or causing harm. The term can also be used when an individual purchases tools, code, or software from a bad actor to carry out fraud themselves. It is, in essence, a third-party business model where the product is the fraud itself.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-e2dea30dac2876560 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_e2dea30dac2876560\"><a aria-expanded=\"false\" aria-controls=\"e2dea30dac2876560\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#e2dea30dac2876560\" href=\"#e2dea30dac2876560\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Fraud investigations<\/span><\/a><\/h4><\/div><div id=\"e2dea30dac2876560\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_e2dea30dac2876560\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>A\u00a0<b>fraud investigation<\/b>\u00a0is the process by which a business determines whether or not fraud has occurred, the extent of that\u00a0fraud, the perpetrators of that fraud, any victims of that fraud, and any damages that resulted from the event. Fraud investigations are commonly initiated in response to suspected money laundering, tax evasion, identity theft, marketplace fraud, and other suspicious activities indicating possible crimes.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-8073eb81a43a6da71 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_8073eb81a43a6da71\"><a aria-expanded=\"false\" aria-controls=\"8073eb81a43a6da71\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#8073eb81a43a6da71\" href=\"#8073eb81a43a6da71\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Fraud ring<\/span><\/a><\/h4><\/div><div id=\"8073eb81a43a6da71\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_8073eb81a43a6da71\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>A\u00a0<b>fraud ring<\/b>\u00a0is a group consisting of multiple bad actors who work together to perpetrate fraud, such as money laundering, identity theft, or marketplace fraud. Fraud rings can be small or large, consisting of as few as two or three bad actors, or spanning into the dozens or even hundreds. Often, the members of a fraud ring will share resources (for example, identity information needed to skirt\u00a0identity verification\u00a0measures) and work in tandem to realize their goals.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-e6b000ddcfaa7bbcd fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_e6b000ddcfaa7bbcd\"><a aria-expanded=\"false\" aria-controls=\"e6b000ddcfaa7bbcd\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-6\" data-target=\"#e6b000ddcfaa7bbcd\" href=\"#e6b000ddcfaa7bbcd\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Fullz<\/span><\/a><\/h4><\/div><div id=\"e6b000ddcfaa7bbcd\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_e6b000ddcfaa7bbcd\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Fullz is a slang term used by credit card hackers, data resellers, and other criminals that refers to packages of individuals&#8217; identifying information \u2014 in other words, their \u201cfull information.\u201d Fullz usually contains an individual&#8217;s name, Social Security number, birth date, and account numbers. Criminals buy and sell fullz on the black market to commit\u00a0fraud.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-g\" id=\"tab-941fc43d69d8624d6bd\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-7\"><div class=\"fusion-panel panel-default panel-16f278b689feb0fc0 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_16f278b689feb0fc0\"><a aria-expanded=\"false\" aria-controls=\"16f278b689feb0fc0\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-7\" data-target=\"#16f278b689feb0fc0\" href=\"#16f278b689feb0fc0\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">General Data Protection Regulation (GDPR)<\/span><\/a><\/h4><\/div><div id=\"16f278b689feb0fc0\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_16f278b689feb0fc0\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The\u00a0General Data Protection Regulation (GDPR)\u00a0is a strict set of data privacy laws for businesses that collect data on EU citizens. Under GDPR, businesses are responsible for safeguarding numerous types of personal information, including the customer&#8217;s IP address, cookie data, home address, and Social Security number.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-dc825ec762970a237 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_dc825ec762970a237\"><a aria-expanded=\"false\" aria-controls=\"dc825ec762970a237\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-7\" data-target=\"#dc825ec762970a237\" href=\"#dc825ec762970a237\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Generative AI fraud<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"dc825ec762970a237\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_dc825ec762970a237\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Generative AI fraud<\/b>\u00a0is an umbrella term used to refer to any type of fraud carried out using fake (i.e., generated) content created by neural networks.<\/p>\n<p>Bad actors can use generative AI to create fake selfies, videos, and audio recordings of people who don\u2019t exist, which are then used to bypass verification systems and open fraudulent accounts.\u00a0Deepfakes, which are fake images, videos, or audio of\u00a0<i>real<\/i>\u00a0people, are a form of generative AI fraud.<\/p>\n<p>Fraudsters can also use large language models (LLMs) to generate fake text, which can be leveraged in spam and other forms of phishing en masse.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-19cb75719dae72b98 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_19cb75719dae72b98\"><a aria-expanded=\"false\" aria-controls=\"19cb75719dae72b98\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-7\" data-target=\"#19cb75719dae72b98\" href=\"#19cb75719dae72b98\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Governance, risk, and compliance (GRC)<\/span><\/a><\/h4><\/div><div id=\"19cb75719dae72b98\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_19cb75719dae72b98\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Governance, risk, and compliance (GRC) is a term that refers to an organization&#8217;s approach across these three practices: governance, risk management, and compliance with regulations. Governance is the system of rules that guides a business, risk management is the process of identifying and reducing potential dangers, and compliance is the processes an organization has in place to ensure it is following relevant regulations.<\/p>\n<p>GRC is sometimes used to describe legal roles and can encompass security and internal controls.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-56a1edd5c58bb70de fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_56a1edd5c58bb70de\"><a aria-expanded=\"false\" aria-controls=\"56a1edd5c58bb70de\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-7\" data-target=\"#56a1edd5c58bb70de\" href=\"#56a1edd5c58bb70de\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Gramm-Leach-Bliley Act (GLBA)<\/span><\/a><\/h4><\/div><div id=\"56a1edd5c58bb70de\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_56a1edd5c58bb70de\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The Gramm-Leach-Bliley Act, also known as the Financial Services Modernization Act, is a US federal law that requires financial institutions (i.e. companies that offer consumers financial products or services such as loans, financial or investment advice, or insurance) to safeguard nonpublic personal information and explain their information-sharing practices with customers.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-cd7bf81f703053008 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_cd7bf81f703053008\"><a aria-expanded=\"false\" aria-controls=\"cd7bf81f703053008\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-7\" data-target=\"#cd7bf81f703053008\" href=\"#cd7bf81f703053008\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Graph database<\/span><\/a><\/h4><\/div><div id=\"cd7bf81f703053008\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_cd7bf81f703053008\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>A\u00a0<b>graph database<\/b>, also called a\u00a0<b>graph network<\/b>\u00a0or a\u00a0<b>semantic database<\/b>, is specifically designed to help the user identify and understand relationships (or links) that exist between different points of data.<\/p>\n<p>Graph databases are often designed to be visual in nature. When a user runs a query, the output will be in the form of a graph that makes it easy to visualize how the different pieces of data are related to one another. With this in mind, graph databases typically look something like this:<\/p>\n<p>By comparison, a traditional database stores data in tables. These tables are highly effective at storing and retrieving large quantities of information but are not easily used to determine relationships between pieces of data.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-h\" id=\"tab-39c14a3c6e12116a830\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-8\"><div class=\"fusion-panel panel-default panel-8dae9be79a27cc266 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_8dae9be79a27cc266\"><a aria-expanded=\"false\" aria-controls=\"8dae9be79a27cc266\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-8\" data-target=\"#8dae9be79a27cc266\" href=\"#8dae9be79a27cc266\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Health Insurance Portability &amp; Accountability Act (HIPAA)<\/span><\/a><\/h4><\/div><div id=\"8dae9be79a27cc266\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_8dae9be79a27cc266\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The Health Insurance Portability &amp; Accountability Act of 1996 (HIPAA) is a US federal law that sets privacy and confidentiality standards for handling and sending healthcare information. Data protected under HIPAA includes any healthcare-related data of any size that\u2019s written, spoken, electronic, or transmitted within and outside a healthcare facility.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-i\" id=\"tab-6c8c7abb51fe8181131\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-9\"><div class=\"fusion-panel panel-default panel-a431659ebf17cf461 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_a431659ebf17cf461\"><a aria-expanded=\"false\" aria-controls=\"a431659ebf17cf461\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-9\" data-target=\"#a431659ebf17cf461\" href=\"#a431659ebf17cf461\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Identity and access management (IAM)<\/span><\/a><\/h4><\/div><div id=\"a431659ebf17cf461\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_a431659ebf17cf461\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Identity and access management (IAM) is a process used in businesses and organizations to grant or deny employees, users, or third parties access to secure systems.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-7321b875cbaa8646a fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_7321b875cbaa8646a\"><a aria-expanded=\"false\" aria-controls=\"7321b875cbaa8646a\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-9\" data-target=\"#7321b875cbaa8646a\" href=\"#7321b875cbaa8646a\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Identity Assurance Levels (IAL)<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"7321b875cbaa8646a\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_7321b875cbaa8646a\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Identity Assurance Levels (IALs) are a set of standards defined by the National Institute of Standards and Technology (NIST) that convey the degree of confidence that someone\u2019s claimed identity is their real identity (i.e. how likely an individual is actually who they say they are).<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-1cad19ebb71766ec8 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_1cad19ebb71766ec8\"><a aria-expanded=\"false\" aria-controls=\"1cad19ebb71766ec8\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-9\" data-target=\"#1cad19ebb71766ec8\" href=\"#1cad19ebb71766ec8\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Identity authentication<\/span><\/a><\/h4><\/div><div id=\"1cad19ebb71766ec8\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_1cad19ebb71766ec8\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Identity authentication is the process of determining if users should have access to specific actions or services.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-f0b1bb4994659480b fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_f0b1bb4994659480b\"><a aria-expanded=\"false\" aria-controls=\"f0b1bb4994659480b\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-9\" data-target=\"#f0b1bb4994659480b\" href=\"#f0b1bb4994659480b\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Identity graph<\/span><\/a><\/h4><\/div><div id=\"f0b1bb4994659480b\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_f0b1bb4994659480b\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>An identity graph is a database that shows how user accounts are connected by common properties. These properties can include anything from names and email addresses to device fingerprints, IP addresses, or birthdates.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-b857db0aa987b7dc8 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_b857db0aa987b7dc8\"><a aria-expanded=\"false\" aria-controls=\"b857db0aa987b7dc8\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-9\" data-target=\"#b857db0aa987b7dc8\" href=\"#b857db0aa987b7dc8\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Identity proofing<\/span><\/a><\/h4><\/div><div id=\"b857db0aa987b7dc8\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_b857db0aa987b7dc8\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Identity proofing refers to the processes a business undertakes to establish that a customer is who they say they are. It involves the collection of information and evidence from an individual, which is then used to consider whether or not the person is who they claim to be. While any business can engage in identity proofing, it is common in regulated industries subject to\u00a0Know Your Customer (KYC)\u00a0requirements, such as the\u00a0financial industry,\u00a0online marketplaces, and, increasingly,\u00a0social media.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-88d6678de8592ca6a fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_88d6678de8592ca6a\"><a aria-expanded=\"false\" aria-controls=\"88d6678de8592ca6a\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-9\" data-target=\"#88d6678de8592ca6a\" href=\"#88d6678de8592ca6a\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Identity verification (IDV)<\/span><\/a><\/h4><\/div><div id=\"88d6678de8592ca6a\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_88d6678de8592ca6a\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Identity verification\u00a0(IDV) is the process of confirming that an individual or business is who they say they are \u2014 usually before doing business with them.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-1421b51b2b4faaecb fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_1421b51b2b4faaecb\"><a aria-expanded=\"false\" aria-controls=\"1421b51b2b4faaecb\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-9\" data-target=\"#1421b51b2b4faaecb\" href=\"#1421b51b2b4faaecb\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">INFORM Consumers Act<\/span><\/a><\/h4><\/div><div id=\"1421b51b2b4faaecb\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_1421b51b2b4faaecb\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The\u00a0<b>INFORM Consumers Act<\/b>\u00a0is a law that requires online marketplaces operating in the United States to implement specific measures designed to reduce the sale of stolen and counterfeit goods. These measures may also be effective at mitigating other types of\u00a0marketplace fraud.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-94e1a254deb62524d fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_94e1a254deb62524d\"><a aria-expanded=\"false\" aria-controls=\"94e1a254deb62524d\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-9\" data-target=\"#94e1a254deb62524d\" href=\"#94e1a254deb62524d\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Inherent risk<\/span><\/a><\/h4><\/div><div id=\"94e1a254deb62524d\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_94e1a254deb62524d\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Inherent risk<\/b>\u00a0refers to any risk present before risk mitigation or controls have been put in place. It can be thought of as the pure risk of any business or endeavor. The inherent risk that a business is exposed to is ultimately determined by many factors, including the business\u2019s industry, maturity, target market, products and services, and any regulations it is subject to.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-j\" id=\"tab-68759b2ac257286d40d\"><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-k\" id=\"tab-331de2668f867c86a66\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-10\"><div class=\"fusion-panel panel-default panel-80dad5f18f1522335 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_80dad5f18f1522335\"><a aria-expanded=\"false\" aria-controls=\"80dad5f18f1522335\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-10\" data-target=\"#80dad5f18f1522335\" href=\"#80dad5f18f1522335\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Know Your Business (KYB)<\/span><\/a><\/h4><\/div><div id=\"80dad5f18f1522335\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_80dad5f18f1522335\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Know Your Business (KYB), sometimes called corporate KYC, is the process of verifying that another business is legitimate and safe to do business with. This usually involves verifying key details about the business and identifying the\u00a0Ultimate Beneficial Owners (UBOs), or the key people behind the business, to understand who benefits from the business\u2019s financial transactions \u2014 along with continuous\u00a0AML\u00a0monitoring throughout the business relationship.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-c38079bbf1d5d751c fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_c38079bbf1d5d751c\"><a aria-expanded=\"false\" aria-controls=\"c38079bbf1d5d751c\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-10\" data-target=\"#c38079bbf1d5d751c\" href=\"#c38079bbf1d5d751c\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Know Your Customer (KYC)<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"c38079bbf1d5d751c\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_c38079bbf1d5d751c\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Know Your Customer (KYC), also known as\u00a0customer due diligence\u00a0or know your client, is the process of \u200b\u200bverifying current or prospective customers\u2019 identities and assessing the potential risks of doing business with them.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-2b65cf16b9102617c fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_2b65cf16b9102617c\"><a aria-expanded=\"false\" aria-controls=\"2b65cf16b9102617c\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-10\" data-target=\"#2b65cf16b9102617c\" href=\"#2b65cf16b9102617c\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Know Your Employee (KYE)<\/span><\/a><\/h4><\/div><div id=\"2b65cf16b9102617c\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_2b65cf16b9102617c\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Know Your Employee (KYE)<\/b>\u00a0refers to the steps a business takes to verify an employee\u2019s identity, background, and credentials in order to assess the individual\u2019s fraud risk to the workplace. It often occurs just prior to an employment offer being made or immediately after an offer has been accepted \u2014 but typically prior to onboarding. It should also occur periodically over the course of an employee\u2019s employment since relevant details could change.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-7c27d8e6be05d03de fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_7c27d8e6be05d03de\"><a aria-expanded=\"false\" aria-controls=\"7c27d8e6be05d03de\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-10\" data-target=\"#7c27d8e6be05d03de\" href=\"#7c27d8e6be05d03de\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Know Your Patient (KYP)<\/span><\/a><\/h4><\/div><div id=\"7c27d8e6be05d03de\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_7c27d8e6be05d03de\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Know Your Patient (KYP)<\/b>\u00a0refers to various processes that a healthcare company uses to verify and reverify a patient\u2019s identity.<\/p>\n<p>KYP verification typically involves the collection of a patient\u2019s name, date of birth, Social Security number, and health insurance information during patient onboarding. This information is then verified via some combination of\u00a0document verification,\u00a0database verification,\u00a0government ID verification,\u00a0selfie verification, or other methods. The patient\u2019s identity is then reverified through similar means during future interactions.<\/p>\n<p>KYP plays an important role in preventing health insurance fraud, Medicare\/Medicaid fraud, and medical identity theft. It\u2019s also instrumental in protecting sensitive patient data and ensuring that your company remains HIPAA compliant.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-783b45d56a89b442e fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_783b45d56a89b442e\"><a aria-expanded=\"false\" aria-controls=\"783b45d56a89b442e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-10\" data-target=\"#783b45d56a89b442e\" href=\"#783b45d56a89b442e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Know Your Seller (KYS)<\/span><\/a><\/h4><\/div><div id=\"783b45d56a89b442e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_783b45d56a89b442e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Know Your Seller (KYS)<\/b>\u00a0refers to the steps that an online marketplace or auction site takes to verify the identity of the sellers using their platform.<\/p>\n<p>In the United States, online marketplaces are required under the\u00a0INFORM Consumers Act\u00a0to verify a seller\u2019s name, contact information, bank account details, and tax identification number (SSN, TIN) if that seller:<\/p>\n<ul>\n<li>Brings in at least $5,000 in gross revenue in a 365-day period<\/li>\n<li>Completes at least 200 transactions<\/li>\n<\/ul>\n<p>Per the law, accepted forms of verification include ID verification, tax document verification, and email\/phone verification. Other verification methods can also be leveraged to gain a more comprehensive view of who your sellers are. Although seller verification is only required for high-volume sellers, many online marketplaces have chosen to implement blanket verification of all sellers during onboarding in order to reduce regulatory risk.<\/p>\n<p>The goal of most KYS programs is to reduce the risk of\u00a0marketplace fraud\u00a0by preventing fraudsters from opening an account. Verification also provides investigators with an auditable trail to follow when fraud is detected.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-4104f96aefde61572 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_4104f96aefde61572\"><a aria-expanded=\"false\" aria-controls=\"4104f96aefde61572\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-10\" data-target=\"#4104f96aefde61572\" href=\"#4104f96aefde61572\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Knowledge-based authentication (KBA)<\/span><\/a><\/h4><\/div><div id=\"4104f96aefde61572\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_4104f96aefde61572\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Knowledge-based authentication (KBA) is an\u00a0authentication\u00a0method where users are asked a personal question before they can proceed with their login or action. There are two types: static (e.g. security questions) and dynamic (using credit history or public records).<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-l\" id=\"tab-93cff5c9f1c4f600c92\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-11\"><div class=\"fusion-panel panel-default panel-8d224449ccb2095bb fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_8d224449ccb2095bb\"><a aria-expanded=\"false\" aria-controls=\"8d224449ccb2095bb\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-11\" data-target=\"#8d224449ccb2095bb\" href=\"#8d224449ccb2095bb\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Link analysis<\/span><\/a><\/h4><\/div><div id=\"8d224449ccb2095bb\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_8d224449ccb2095bb\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Link analysis<\/b>\u00a0is a data science technique in which the different nodes of a network are analyzed to identify similarities and relationships. These links are often portrayed visually.<\/p>\n<p>Through link analysis, it\u2019s possible to understand how different accounts on a platform are related to one another based on the information or account details they share, as well as the actions each account takes. It\u2019s also possible to look for patterns and anomalies in a given network, which may be indicative of fraud.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-m\" id=\"tab-6a0ec56b715d3573e73\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-12\"><div class=\"fusion-panel panel-default panel-5d769076430b865af fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_5d769076430b865af\"><a aria-expanded=\"false\" aria-controls=\"5d769076430b865af\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-12\" data-target=\"#5d769076430b865af\" href=\"#5d769076430b865af\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Marketplace account suspension<\/span><\/a><\/h4><\/div><div id=\"5d769076430b865af\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_5d769076430b865af\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Marketplace account suspension<\/b>\u00a0is exactly what it sounds like: a situation in which a user\u2019s account with an online marketplace is suspended, typically because the account was used to engage in fraud or other prohibited activities. Account suspension is a means for the online marketplace to discipline users who have broken the platform\u2019s rules for maintaining trust and safety, while also protecting other users who may have been impacted by the suspended account\u2019s behavior.<\/p>\n<p>Once the account has been suspended, the user will typically be unable to access it or, if access is still permitted, the user will be unable to leverage its functions. For buyers, this may include completing purchases, leaving reviews, and communicating with sellers. For sellers, this may include listing products or services, receiving payments, completing sales, and communicating with buyers.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-79d40d58f8e32f371 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_79d40d58f8e32f371\"><a aria-expanded=\"false\" aria-controls=\"79d40d58f8e32f371\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-12\" data-target=\"#79d40d58f8e32f371\" href=\"#79d40d58f8e32f371\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Marketplace risk<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"79d40d58f8e32f371\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_79d40d58f8e32f371\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Marketplace risk<\/b>\u00a0is a term used to describe the various threats an online marketplace may encounter in its operations. Left unchecked, these threats may hurt a marketplace\u2019s ability to attract and retain users, provide a safe and reliable user experience, and operate as it was designed to do.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-093f162e89e75a6d6 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_093f162e89e75a6d6\"><a aria-expanded=\"false\" aria-controls=\"093f162e89e75a6d6\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-12\" data-target=\"#093f162e89e75a6d6\" href=\"#093f162e89e75a6d6\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Money services businesses (MSB)<\/span><\/a><\/h4><\/div><div id=\"093f162e89e75a6d6\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_093f162e89e75a6d6\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Money services businesses (MSBs) are people or businesses that transmit or convert money. MSBs are regulated under the\u00a0Bank Secrecy Act (BSA)\u00a0and other\u00a0anti-money laundering (AML)\u00a0regulations and must register with\u00a0FinCEN.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-aa1731d82d6df6a20 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_aa1731d82d6df6a20\"><a aria-expanded=\"false\" aria-controls=\"aa1731d82d6df6a20\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-12\" data-target=\"#aa1731d82d6df6a20\" href=\"#aa1731d82d6df6a20\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Multi-factor authentication<\/span><\/a><\/h4><\/div><div id=\"aa1731d82d6df6a20\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_aa1731d82d6df6a20\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Multi-factor authentication (MFA) is an\u00a0authentication\u00a0method that combines two or more independent credentials: what the user knows (password), what the user has (security token), and who the user is (biometric) to authenticate the user&#8217;s identity for login or another purpose.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-n\" id=\"tab-0c9501744388a4e0ea0\"><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-o\" id=\"tab-57f69fcc80e7fed54a2\"><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-p\" id=\"tab-8b0bf546d7f48c80542\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-13\"><div class=\"fusion-panel panel-default panel-93df093dde2ad82b3 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_93df093dde2ad82b3\"><a aria-expanded=\"false\" aria-controls=\"93df093dde2ad82b3\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-13\" data-target=\"#93df093dde2ad82b3\" href=\"#93df093dde2ad82b3\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Personally identifiable information (PII)<\/span><\/a><\/h4><\/div><div id=\"93df093dde2ad82b3\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_93df093dde2ad82b3\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>PII stands for personally identifiable information and refers to information that can be used to identify someone. This includes both information that directly identifies an individual, such as their name, address, Social Security number, and contact information, and indirect information used in conjunction with other data elements, such as their gender, race, and birth date.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-bcad6261ab3c04fc2 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_bcad6261ab3c04fc2\"><a aria-expanded=\"false\" aria-controls=\"bcad6261ab3c04fc2\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-13\" data-target=\"#bcad6261ab3c04fc2\" href=\"#bcad6261ab3c04fc2\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Placement money laundering<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"bcad6261ab3c04fc2\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_bcad6261ab3c04fc2\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Placement<\/b>\u00a0refers to the act of introducing dirty money (e.g., the proceeds from criminal activities) into the financial system without arousing suspicion from regulators and investigators. It is the first stage of the money laundering process.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-bf315af920c4aa6ff fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_bf315af920c4aa6ff\"><a aria-expanded=\"false\" aria-controls=\"bf315af920c4aa6ff\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-13\" data-target=\"#bf315af920c4aa6ff\" href=\"#bf315af920c4aa6ff\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Politically exposed person (PEP)<\/span><\/a><\/h4><\/div><div id=\"bf315af920c4aa6ff\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_bf315af920c4aa6ff\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>A\u00a0politically exposed person (PEP)\u00a0is someone in a public, high-ranking position of power and influence. This status puts them at a higher risk of being involved in or linked to financial crimes like corruption, bribery, or\u00a0money laundering.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-7a202ae426c31c5f8 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_7a202ae426c31c5f8\"><a aria-expanded=\"false\" aria-controls=\"7a202ae426c31c5f8\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-13\" data-target=\"#7a202ae426c31c5f8\" href=\"#7a202ae426c31c5f8\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Progressive risk segmentation<\/span><\/a><\/h4><\/div><div id=\"7a202ae426c31c5f8\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_7a202ae426c31c5f8\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Progressive risk segmentation<\/b>\u00a0is a\u00a0risk assessment strategy\u00a0that empowers businesses to dynamically adjust in real time the level of friction a user encounters during identity verification. It does this by coordinating with the collection and analysis of risk signals. This allows a user to automatically move between multiple verification flows \u2014 for example, standard\u00a0Customer Due Diligence (CDD),\u00a0simplified due diligence (SDD), and\u00a0enhanced due diligence (EDD)\u00a0\u2014 as the system learns more about the individual. In this way, progressive risk segmentation helps a business balance their fraud prevention and compliance needs against the need to provide a positive user experience.<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-q\" id=\"tab-ea95c66f15b7a271793\"><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-r\" id=\"tab-a1600fdc09fdc121486\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-14\"><div class=\"fusion-panel panel-default panel-2a9fea8800c17312f fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_2a9fea8800c17312f\"><a aria-expanded=\"false\" aria-controls=\"2a9fea8800c17312f\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-14\" data-target=\"#2a9fea8800c17312f\" href=\"#2a9fea8800c17312f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Red Flags Rule<\/span><\/a><\/h4><\/div><div id=\"2a9fea8800c17312f\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_2a9fea8800c17312f\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The Red Flags Rule is an FTC rule that requires financial institutions to implement a written program designed to detect, prevent, and mitigate identity theft.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-4dfa5db37ce603c39 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_4dfa5db37ce603c39\"><a aria-expanded=\"false\" aria-controls=\"4dfa5db37ce603c39\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-14\" data-target=\"#4dfa5db37ce603c39\" href=\"#4dfa5db37ce603c39\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Regtech<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"4dfa5db37ce603c39\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_4dfa5db37ce603c39\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Regtech<\/b>\u00a0is a term used to refer to technologies designed to help companies comply with regulatory requirements. It is a portmanteau of the words \u201cregulatory\u201d and \u201ctechnology.\u201d In the financial space, it\u2019s often used to refer to technologies that aid in\u00a0anti-money laundering\u00a0(AML),\u00a0Know Your Customer\u00a0(KYC), and\u00a0customer due diligence\u00a0(CDD) compliance, but it may take on a different meaning in other industries that are subject to their own regulations.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-s\" id=\"tab-00367658d4fe716e883\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-15\"><div class=\"fusion-panel panel-default panel-39b5a5eb3bb6c3baa fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_39b5a5eb3bb6c3baa\"><a aria-expanded=\"false\" aria-controls=\"39b5a5eb3bb6c3baa\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#39b5a5eb3bb6c3baa\" href=\"#39b5a5eb3bb6c3baa\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Sanctions<\/span><\/a><\/h4><\/div><div id=\"39b5a5eb3bb6c3baa\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_39b5a5eb3bb6c3baa\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Sanctions are threatened penalties or punishments for disobeying a law, rule, or order. Many countries impose economic sanctions such as travel bans or trade embargoes on other countries or specific citizens as punishment or to alter strategic decisions.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-bd8e3eb8b5e374012 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_bd8e3eb8b5e374012\"><a aria-expanded=\"false\" aria-controls=\"bd8e3eb8b5e374012\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#bd8e3eb8b5e374012\" href=\"#bd8e3eb8b5e374012\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Second-party fraud<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"bd8e3eb8b5e374012\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_bd8e3eb8b5e374012\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Second-party fraud<\/b>\u00a0refers to instances where an individual gives their credentials, identity information, or other sensitive data to another person so that the second person can engage in fraud. It is essentially permission to engage in \u201clight identity theft.\u201d This is often done in exchange for payment; other times it stems from a desire to help a friend or family member in financial need.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-f31c5f1dfbb85ecdf fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_f31c5f1dfbb85ecdf\"><a aria-expanded=\"false\" aria-controls=\"f31c5f1dfbb85ecdf\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#f31c5f1dfbb85ecdf\" href=\"#f31c5f1dfbb85ecdf\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Secretary of State (SOS) filing<\/span><\/a><\/h4><\/div><div id=\"f31c5f1dfbb85ecdf\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_f31c5f1dfbb85ecdf\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>When a company does business in a state, it\u2019s required to register with state agencies \u2014 typically the state\u2019s Secretary of State. The process through which a company files information and documents to register as a business in that state is known as a\u00a0<b>Secretary of State (SOS) filing<\/b>.<\/p>\n<p>Importantly, a company may be required to register in a state even if it\u2019s headquartered in a different jurisdiction. This is the case if:<\/p>\n<ul>\n<li>Any of the company\u2019s employees work in the state<\/li>\n<li>A significant amount of the company\u2019s revenue originates in the state<\/li>\n<li>The company has many in-person business meetings in the state<\/li>\n<li>The company has a physical presence (office, satellite office) in the state<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-989f1362ac364a7ca fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_989f1362ac364a7ca\"><a aria-expanded=\"false\" aria-controls=\"989f1362ac364a7ca\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#989f1362ac364a7ca\" href=\"#989f1362ac364a7ca\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Securities and Exchange Commission (SEC)<\/span><\/a><\/h4><\/div><div id=\"989f1362ac364a7ca\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_989f1362ac364a7ca\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The US Securities and Exchange Commission (SEC) is an independent US government agency in charge of overseeing securities exchanges, protecting investors, and facilitating capital formation.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-87db656f661b40bb6 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_87db656f661b40bb6\"><a aria-expanded=\"false\" aria-controls=\"87db656f661b40bb6\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#87db656f661b40bb6\" href=\"#87db656f661b40bb6\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Self-sovereign identity (SSI)<\/span><\/a><\/h4><\/div><div id=\"87db656f661b40bb6\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_87db656f661b40bb6\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Self-sovereign identity (SSI) is an approach to digital identity that gives individuals ownership and control of their digital identities and how their personal information is shared and used. Current implementations of the concept typically involve blockchain.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-8e6b1b43c8fd7a5f4 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_8e6b1b43c8fd7a5f4\"><a aria-expanded=\"false\" aria-controls=\"8e6b1b43c8fd7a5f4\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#8e6b1b43c8fd7a5f4\" href=\"#8e6b1b43c8fd7a5f4\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Selfie check<\/span><\/a><\/h4><\/div><div id=\"8e6b1b43c8fd7a5f4\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_8e6b1b43c8fd7a5f4\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Selfie checks are an\u00a0identity verification\u00a0method that ask a user to take a photo of themselves that can then be used to confirm that they are a real person and\/or compare against other photos, such as the photo on a government-issued ID, to confirm it&#8217;s the same person.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-ae8b3b10886e380ed fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_ae8b3b10886e380ed\"><a aria-expanded=\"false\" aria-controls=\"ae8b3b10886e380ed\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#ae8b3b10886e380ed\" href=\"#ae8b3b10886e380ed\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Single sign-on (SSO)<\/span><\/a><\/h4><\/div><div id=\"ae8b3b10886e380ed\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ae8b3b10886e380ed\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Single sign-on (SSO) is an\u00a0authentication\u00a0method that allows an individual to use one set of login credentials to access multiple applications. This streamlines the login process, making it easier for the user to access accounts or conduct transactions without compromising security.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-8d8d6356ada9ad786 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_8d8d6356ada9ad786\"><a aria-expanded=\"false\" aria-controls=\"8d8d6356ada9ad786\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#8d8d6356ada9ad786\" href=\"#8d8d6356ada9ad786\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Social media profiling<\/span><\/a><\/h4><\/div><div id=\"8d8d6356ada9ad786\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_8d8d6356ada9ad786\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Social media profiling<\/b>, or\u00a0<b>social profiling<\/b>, refers to the process of building a non-public profile of an individual using publicly available information from one or more social media platforms. This can include, but is not limited to, information about:<\/p>\n<ul>\n<li>Who a person is (their name, address, contact information, date of birth, work and education history, etc.)<\/li>\n<li>Who a person knows (their friends, family members, neighbors, coworkers, etc.)<\/li>\n<li>A person\u2019s routine (their work or class schedule, when they attend certain events or activities)<\/li>\n<li>A person\u2019s interests (favorite movies, music, books, etc.)<\/li>\n<li>A person\u2019s appearance (through photos and videos)<\/li>\n<\/ul>\n<p>These profiles can then be used for a variety of purposes, including both fraud and fraud prevention.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-c51e752723e7a5205 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_c51e752723e7a5205\"><a aria-expanded=\"false\" aria-controls=\"c51e752723e7a5205\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#c51e752723e7a5205\" href=\"#c51e752723e7a5205\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Spear phishing<\/span><\/a><\/h4><\/div><div id=\"c51e752723e7a5205\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_c51e752723e7a5205\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Spear phishing is an email-spoofing attack that targets a specific organization or individual by posing as someone they know and trust to gain access to confidential information.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-81347e50fcc3397ca fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_81347e50fcc3397ca\"><a aria-expanded=\"false\" aria-controls=\"81347e50fcc3397ca\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#81347e50fcc3397ca\" href=\"#81347e50fcc3397ca\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Strong Customer Authentication (SCA)<\/span><\/a><\/h4><\/div><div id=\"81347e50fcc3397ca\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_81347e50fcc3397ca\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Starting on September 14, 2019, Strong Customer Authentication (SCA) requires that businesses use two independent\u00a0authentication\u00a0elements (something a customer knows, has, or is) to verify payments. 3D Secure 2 \u2014 the new version of 3D Secure rolling out in 2019 \u2014 will be the primary authentication method used to meet SCA requirements for card payments.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-933515a8d61a80861 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_933515a8d61a80861\"><a aria-expanded=\"false\" aria-controls=\"933515a8d61a80861\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#933515a8d61a80861\" href=\"#933515a8d61a80861\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Subject access request (SAR)<\/span><\/a><\/h4><\/div><div id=\"933515a8d61a80861\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_933515a8d61a80861\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Also known as a data subject request (DSR) or data subject access request (DSAR), a subject access request (SAR) is a formal request by an individual (data subject) to a controller (company) to disclose what personal data the organization has collected about the individual and how they use or intend to use it. Consumers are granted the right to request this information under data privacy laws such as\u00a0GDPR\u00a0and\u00a0CCPA\/CPRA.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-0ae16c9d5878c2393 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_0ae16c9d5878c2393\"><a aria-expanded=\"false\" aria-controls=\"0ae16c9d5878c2393\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#0ae16c9d5878c2393\" href=\"#0ae16c9d5878c2393\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Suspicious transaction report (STR)<\/span><\/a><\/h4><\/div><div id=\"0ae16c9d5878c2393\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_0ae16c9d5878c2393\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>A suspicious transaction report (STR) is generally considered an interchangeable term with\u00a0suspicious activity report (SAR), as both terms refer to the mandatory form that financial institutions must file with the\u00a0Financial Crimes Enforcement Network (FinCEN)\u00a0whenever there is a suspected case of money laundering or fraud. These reports wave a figurative red flag for regulators and law enforcement, alerting them to client activity deemed out of the ordinary and which could be a sign of illegal activity that potentially threatens public safety or the integrity of the U.S. financial system.<\/p>\n<p>Since 2012, all suspicious transaction reporting filings have been required to be submitted via\u00a0FinCEN&#8217;s Bank Secrecy Act (BSA) e-filing system.<\/p>\n<p>As part of the process of reporting suspicious transactions, financial institutions identify who is conducting the suspicious activity, what instruments\/mechanisms they are using, when and where the activity took place, and why they think the activity is suspicious.<\/p>\n<p>The suspicious transaction report may have derived its name from the similarly named currency transaction report (CTR). The CTR is a BSA reporting mandate that banks must follow whenever one or more cash transactions through or to the bank exceeds $10,000 in a 24-hour period by or on behalf of one person. CTRs can also concurrently trigger STRs if there is a related cause for concern. For example, a customer, upon realizing that a $10,000 deposit will prompt additional questions from the teller, decides to intentionally remove $100 from the deposit in order to skirt the threshold. This is known as \u201cstructuring\u201d and is illegal. In addition to a CTR, the bank witnessing this crime would also need to submit a SAR or, as many instead call it, an STR.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-27610c41957ce7b0f fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_27610c41957ce7b0f\"><a aria-expanded=\"false\" aria-controls=\"27610c41957ce7b0f\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#27610c41957ce7b0f\" href=\"#27610c41957ce7b0f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Synthetic fraud<\/span><\/a><\/h4><\/div><div id=\"27610c41957ce7b0f\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_27610c41957ce7b0f\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Synthetic fraud\u00a0is a type of fraud that occurs when someone creates a fake identity by combining real information (such as a Social Security number, or SSN) with fake\u00a0personal identifiable information (PII)\u00a0such as birth dates, addresses, or phone numbers. The criminal then uses this synthetic identity to open fraudulent accounts, access credit, and make purchases with no intention of repayment.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-152afa5126fdc6c98 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_152afa5126fdc6c98\"><a aria-expanded=\"false\" aria-controls=\"152afa5126fdc6c98\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-15\" data-target=\"#152afa5126fdc6c98\" href=\"#152afa5126fdc6c98\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Synthetic ID<\/span><\/a><\/h4><\/div><div id=\"152afa5126fdc6c98\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_152afa5126fdc6c98\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>A\u00a0<b>synthetic identity (ID)<\/b>\u00a0is a fake identity that a fraudster creates by combining real information with false data.<\/p>\n<p>Synthetic identities often start with a stolen Social Security number, date of birth, and\/or name, which are then paired with a fake address, phone number, email address, and other PII. Because synthetic IDs contain some information that is real, they can be harder to detect than IDs that are purely fabricated.<\/p>\n<p>Synthetic IDs are an integral part of\u00a0synthetic fraud\u00a0whereby bad actors attempt to open fraudulent accounts or lines of credit; make fraudulent purchases; and commit healthcare fraud, employment fraud, and more. Synthetic IDs can even be leveraged for terrorist financing.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-t\" id=\"tab-4ba37912c0ecb4f28a2\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-16\"><div class=\"fusion-panel panel-default panel-39e1ebc7e00ef2865 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_39e1ebc7e00ef2865\"><a aria-expanded=\"false\" aria-controls=\"39e1ebc7e00ef2865\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-16\" data-target=\"#39e1ebc7e00ef2865\" href=\"#39e1ebc7e00ef2865\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Tax Identification Number (TIN)<\/span><\/a><\/h4><\/div><div id=\"39e1ebc7e00ef2865\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_39e1ebc7e00ef2865\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>A\u00a0<b>taxpayer identification number (TIN)<\/b>\u00a0is a number that is assigned to an individual, business, or other entity in order to identify them for tax purposes. By nature, TINs are designed to be unique, so that no two individuals will have the same number. This distinction makes it possible for TINs to be used to file tax returns, claim tax refunds and benefits, enforce tax compliance, and more.<\/p>\n<p>In addition to tax purposes, taxpayer identification numbers can also be used for identity verification purposes.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-239b0d2da5a5b533d fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_239b0d2da5a5b533d\"><a aria-expanded=\"false\" aria-controls=\"239b0d2da5a5b533d\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-16\" data-target=\"#239b0d2da5a5b533d\" href=\"#239b0d2da5a5b533d\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">The National Institute of Standards and Technology (NIST)<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"239b0d2da5a5b533d\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_239b0d2da5a5b533d\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The National Institute of Standards and Technology (NIST) is a physical sciences laboratory and a non-regulatory agency of the United States Department of Commerce whose mission is to promote US innovation and industrial competitiveness in fields such as nanoscale science and technology, engineering, information technology, neutron research, material measurement, and physical measurement.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-6c96b017f6f2b6501 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_6c96b017f6f2b6501\"><a aria-expanded=\"false\" aria-controls=\"6c96b017f6f2b6501\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-16\" data-target=\"#6c96b017f6f2b6501\" href=\"#6c96b017f6f2b6501\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Third-party fraud<\/span><\/a><\/h4><\/div><div id=\"6c96b017f6f2b6501\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_6c96b017f6f2b6501\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Third-party fraud<\/b>\u00a0is essentially another term for identity theft. It refers to situations where an individual\u2019s\u00a0personally identifiable information (PII)\u00a0is stolen and then used to open or take over an account. Bad actors often engage in third-party fraud to gain access to credit, financial products, or services that would otherwise be unavailable to them \u2014 harming both the business and the person whose information they have stolen.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-u\" id=\"tab-e30c7e91f8eb5fc8e32\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-17\"><div class=\"fusion-panel panel-default panel-fd2e5f79a1403913e fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_fd2e5f79a1403913e\"><a aria-expanded=\"false\" aria-controls=\"fd2e5f79a1403913e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-17\" data-target=\"#fd2e5f79a1403913e\" href=\"#fd2e5f79a1403913e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Ultimate beneficial owner (UBO)<\/span><\/a><\/h4><\/div><div id=\"fd2e5f79a1403913e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_fd2e5f79a1403913e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>An ultimate beneficial owner (UBO) is the (or one of the) persons or entities that are the ultimate beneficiaries of a company. Certain financial and other organizations, including banks, currency exchange offices, and insurers, are subject to mandatory disclosures of UBOs if doing business with any party. When companies conduct due diligence on businesses they\u2019re interested in working with (called\u00a0Know Your Business\u00a0or KYB), they also need to verify the people behind the business, or the UBOs.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-716ae742eb086ded7 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_716ae742eb086ded7\"><a aria-expanded=\"false\" aria-controls=\"716ae742eb086ded7\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-17\" data-target=\"#716ae742eb086ded7\" href=\"#716ae742eb086ded7\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">USA PATRIOT Act<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"716ae742eb086ded7\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_716ae742eb086ded7\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The\u00a0<b>USA PATRIOT Act<\/b>\u00a0is a U.S. law designed to deter terrorism passed in the wake of the September 11, 2001 terrorist attacks. It contains provisions related to money laundering and the financing of terrorism. Title III of the law is specifically known as the International Money Laundering Abatement and Financial Anti-Terrorism Act of 2001, which expands on the\u00a0Bank Secrecy Act (BSA)\u00a0and related AML laws.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-v\" id=\"tab-9949c802e9e4fe6e081\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-18\"><div class=\"fusion-panel panel-default panel-542b36dff7ad23d5a fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_542b36dff7ad23d5a\"><a aria-expanded=\"false\" aria-controls=\"542b36dff7ad23d5a\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-18\" data-target=\"#542b36dff7ad23d5a\" href=\"#542b36dff7ad23d5a\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">VAT validation<\/span><\/a><\/h4><\/div><div id=\"542b36dff7ad23d5a\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_542b36dff7ad23d5a\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>All European Union member nations impose a value-added tax (VAT) on items sold in the EU. In these countries, businesses are assigned a VAT number, which is similar to the Employer Identification Number (EIN) issued to businesses in the US.\u00a0<b>VAT validation<\/b>\u00a0is the process of verifying that a business has a valid VAT number. It can also be used to confirm whether a VAT number is associated with a particular name and address.<\/p>\n<p>It\u2019s important to note that while more than 160 countries around the world impose a VAT tax and therefore issue VAT numbers, VAT validation typically refers only to countries in the EU.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-78dcdc51b3ddba1b1 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_78dcdc51b3ddba1b1\"><a aria-expanded=\"false\" aria-controls=\"78dcdc51b3ddba1b1\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-18\" data-target=\"#78dcdc51b3ddba1b1\" href=\"#78dcdc51b3ddba1b1\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Vishing<br \/>\n<\/span><\/a><\/h4><\/div><div id=\"78dcdc51b3ddba1b1\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_78dcdc51b3ddba1b1\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Vishing<\/b>, or\u00a0<b>voice phishing<\/b>, is a type of phishing attack that takes place over the telephone. Bad actors use vishing attacks to steal sensitive information, which can then be used to carry out fraud or sold to other bad actors.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-w\" id=\"tab-49c7811dffbe23ce1c1\">\n<div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color4);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-10892-19\"><div class=\"fusion-panel panel-default panel-e2f981cb6327990ed fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_e2f981cb6327990ed\"><a aria-expanded=\"false\" aria-controls=\"e2f981cb6327990ed\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-19\" data-target=\"#e2f981cb6327990ed\" href=\"#e2f981cb6327990ed\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Watchlists<\/span><\/a><\/h4><\/div><div id=\"e2f981cb6327990ed\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_e2f981cb6327990ed\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Watchlists are lists of people and entities (such as organizations, states, and countries) companies may want to monitor and screen against, such as Office of Foreign Assets Control (OFAC)\u00a0sanctions\u00a0lists, Specially Designated Nationals and Blocked Persons (SDN) lists,\u00a0Politically Exposed Person (PEP)\u00a0lists, and more. Monitoring these watchlists can help businesses enrich their understanding of users, deter, detect, and deny fraud, and perform ongoing KYC\/AML monitoring without going through additional integration or procurement.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-013e7c285ba2e9c85 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_013e7c285ba2e9c85\"><a aria-expanded=\"false\" aria-controls=\"013e7c285ba2e9c85\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-19\" data-target=\"#013e7c285ba2e9c85\" href=\"#013e7c285ba2e9c85\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What is digital identity?<\/p>\n<p><\/span><\/a><\/h4><\/div><div id=\"013e7c285ba2e9c85\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_013e7c285ba2e9c85\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Digital identity is a group of data points \u2014 information, attributes, credentials, behaviors, and more \u2014 that together represent an individual, business, device, or other entity in a digital space.<\/p>\n<p>A digital identity is like a file that contains everything you know about a person\u2019s digital footprint. If a person needs to prove digitally that they are who they say they are, they can present you with a piece of information or evidence (or usually multiple pieces of evidence), which you can then compare against what\u2019s contained in the file.<\/p>\n<p>As more and more products and services move online, digital identities are a crucial part of interacting with the web, for example, when:<\/p>\n<ul>\n<li>A student logs into an online learning platform to complete an exam<\/li>\n<li>An individual wants to open an individual retirement account (IRA) or other retirement account with an investment firm<\/li>\n<li>An employee needs to log into their company email<\/li>\n<li>A user takes the plunge and signs up for online dating<\/li>\n<\/ul>\n<h3>Digital identity vs. digital ID<\/h3>\n<p>While the terms digital identity and digital IDs sound similar and are sometimes used interchangeably, they\u2019re actually different concepts.<\/p>\n<p>A digital identity is a set of identifying data points that can be used to represent or verify a person\u2019s identity online. A\u00a0<b>digital ID<\/b>, on the other hand, is an electronic identification document (ID) meant to replace a physical ID. A\u00a0<u>mobile driver\u2019s license (mDL)<\/u>, digital driver\u2019s license (dDL), electronic IDs (eIDs), and\u00a0<u>e-passports<\/u>\u00a0can all be considered examples of digital IDs.<\/p>\n<p>Importantly, digital IDs can be used to establish and verify a person\u2019s digital identity.<\/p>\n<h3>Digital identity vs. user<\/h3>\n<p>While users and digital identities are related, they are not the same.<\/p>\n<p>A user is somebody that opens an account in order to access and interact with a specific platform or system \u2014 for example, a social media platform or an online marketplace. Another way to think about it is that a user is somebody who opens an account and establishes a digital identity, while a digital identity contains all of the data you know about a specific person.<\/p>\n<h3>Digital identity vs. account<\/h3>\n<p>Likewise, it can be easy to conflate a digital identity with an account \u2014 but again, they are not the same.<\/p>\n<p>An account is essentially a portal through which a user is allowed to interact with a platform or system. They are typically secured via login credentials: a username, password, and potentially security questions or multi-factor authentication settings which are used to gain access to the account. An account can be tied to a digital identity, but it does not make up the entirety of that identity.<\/p>\n<h2>Why is digital identity important?<\/h2>\n<p>Ultimately, the importance of digital identities is that they allow a business or organization to know who somebody is and whether or not they should have access to a particular platform, service, or account. They\u2019re essential not just for authentication purposes, but for a variety of other purposes as well:<\/p>\n<ul>\n<li><b>Compliance:<\/b>\u00a0Businesses operating in a number of industries \u2014 like banking, financial services, and online marketplaces \u2014 are required to verify the identities of all or some of their users. Digital identities make this verification possible in a remote setting.<\/li>\n<li><b>Anti-fraud measures:\u00a0<\/b>Once a digital identity has been established, it can be used to evaluate accounts and transactions for fraud, empowering you to spot and eliminate potential account takeovers and other fraud vectors.<\/li>\n<li><b>Friction control:<\/b>\u00a0The more attributes a digital identity contains, the more flexibility you have in controlling friction around logins. For example, imagine that you have established a particular device as a trusted device for login purposes for your user. When a user logs in again in the future, if you detect this device, you may choose to offer an easier, lower-friction means of authentication.<\/li>\n<\/ul>\n<h2>What\u2019s included in a digital identification?<\/h2>\n<p>The data points, attributes, and other characteristics that are included in a digital identity will vary depending on use case as well as the type of identity that is being established.<\/p>\n<p><b>For individuals, a digital identity will often include things like:<\/b><\/p>\n<ul>\n<li>Name<\/li>\n<li>Date of birth<\/li>\n<li>Social Security number<\/li>\n<li>ID numbers (driver\u2019s license, passport)<\/li>\n<li>Fingerprints<\/li>\n<li>Selfies<\/li>\n<li>Voiceprints<\/li>\n<li>Login credentials<\/li>\n<li>Answers to security questions<\/li>\n<li>Email addresses<\/li>\n<li>Social media profiles<\/li>\n<li>Bank account numbers<\/li>\n<li>Debit and credit card numbers<\/li>\n<li>PINs<\/li>\n<li>IP addresses<\/li>\n<li>Geolocation data<\/li>\n<li>Other\u00a0<u>personally identifiable information (PII)<\/u><\/li>\n<\/ul>\n<p>Depending on the setting, it can also include things like an individual\u2019s browsing history, transaction data, and more.<\/p>\n<p><b>For businesses and other entities, it may include:<\/b><\/p>\n<ul>\n<li>Business registration numbers<\/li>\n<li>Taxpayer identification number (TIN)<\/li>\n<li>Employer identification number (EIN)<\/li>\n<li>Value-Added Tax (VAT) number<\/li>\n<li>Corporate email addresses<\/li>\n<li>Corporate social media handles and profiles<\/li>\n<li>Corporate domain names<\/li>\n<li>Bank account numbers<\/li>\n<li>Debit and credit card numbers<\/li>\n<li>Geolocation data<\/li>\n<\/ul>\n<p>Other identifying information, such as customer account numbers and vendor codes \u2014 as well as fingerprints, selfies, and login credentials tied to an organization\u2019s executives \u2014 can also form part of an entity\u2019s digital identity.<\/p>\n<p><b>Finally, for devices, it can include attributes like:<\/b><\/p>\n<ul>\n<li>IP addresses<\/li>\n<li><u>Device fingerprints<\/u><\/li>\n<li><u>Browser fingerprints<\/u><\/li>\n<li>Security certificates<\/li>\n<li>Geolocation<\/li>\n<li>API keys<\/li>\n<li>Serial numbers<\/li>\n<li>International Mobile Equipment Identity (IMEI) numbers<\/li>\n<li>Mobile Equipment Identifier (MEID)<\/li>\n<li>NFC or RFID tags<\/li>\n<\/ul>\n<h2>Types of digital identity<\/h2>\n<p>We can segment digital identities in a number of different ways. For example, based on how they are established. Under this framework, we have the following types of digital identity:<\/p>\n<ul>\n<li><b>Account-based digital identities,\u00a0<\/b>which are established when an individual creates an account and uses that account to access a platform, content, or services<\/li>\n<li><b>Document-based digital identities,<\/b>\u00a0which are established by and linked to a government-issued ID, like a driver\u2019s license, passport, or digital ID<\/li>\n<li><b>Biometric digital identities,\u00a0<\/b>which are tied to an individual\u2019s biometric information, such as their fingerprint, voiceprint, or selfie<\/li>\n<li><b>Credential-backed digital identities,<\/b>\u00a0which are tied to a person\u2019s login information, including their username, passport, and answers to security questions<\/li>\n<li><b>Email-backed digital identities,<\/b>\u00a0which are tied to a person\u2019s email or single sign-on (SSO) to access a variety of accounts around the web<\/li>\n<li><b>Device-based digital identities,\u00a0<\/b>which are tied to a person\u2019s device (smartphone, computer, security keyfob, etc.)<\/li>\n<li><b>Social media-based digital identities,<\/b>\u00a0which are linked to a person\u2019s social media presence across a variety of different platforms and profiles<\/li>\n<li><b>Payment-based digital identities,<\/b>\u00a0which are established by a person\u2019s payment information, such as their debit card, credit card, or digital payment information<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-89100b61d55cc8686 fusion-toggle-has-divider\" style=\"--awb-content-font-size:16px;--awb-title-font-size:20px;--awb-title-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_89100b61d55cc8686\"><a aria-expanded=\"false\" aria-controls=\"89100b61d55cc8686\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10892-19\" data-target=\"#89100b61d55cc8686\" href=\"#89100b61d55cc8686\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What is NFC?<\/span><\/a><\/h4><\/div><div id=\"89100b61d55cc8686\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_89100b61d55cc8686\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><b>Near-field communication (NFC)<\/b>, is a set of digital protocols and processes that makes it possible for two or more devices or NFC chips to communicate with each other when they are close by \u2013 without needing to establish a physical connection. Once this connection has been established, it can be used to quickly transfer data, initiate a transaction, kick off a software application, or initiate other actions.<\/p>\n<p>To work, a device must be NFC enabled. All this means is that the device is capable of interacting with an NFC chip or other NFC-enabled device. All iPhones produced since 2014 and most Samsung devices since 2015 have built-in NFC readers.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-x\" id=\"tab-9e0c2b665c8a21d0584\"><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-y\" id=\"tab-0ca128c422e0200fe60\"><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-z\" id=\"tab-575c13ef53c9fe0f8d9\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-custom-z-index\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-z-index:19;--awb-padding-top-small:48px;--awb-padding-bottom-small:48px;--awb-background-color:var(--awb-color8);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 1092px + 24px );margin-left: calc(-24px \/ 2 );margin-right: calc(-24px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-right:2vw;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:25px;--awb-spacing-right-large:12px;--awb-margin-bottom-large:25px;--awb-spacing-left-large:12px;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:12px;--awb-spacing-left-medium:12px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:12px;--awb-spacing-left-small:12px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color4);\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">Ready to get started?<\/h3><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-font-size:var(--awb-custom_typography_8-font-size);--awb-line-height:var(--awb-custom_typography_8-line-height);--awb-letter-spacing:var(--awb-custom_typography_8-letter-spacing);--awb-text-transform:var(--awb-custom_typography_8-text-transform);--awb-text-font-family:var(--awb-custom_typography_8-font-family);--awb-text-font-weight:var(--awb-custom_typography_8-font-weight);--awb-text-font-style:var(--awb-custom_typography_8-font-style);\"><p>Explore <span style=\"color: #ea3365;\">Amani Ai<\/span>, or create an account instantly and start verifying. You can also contact us to design a custom package for your business.<\/p>\n<\/div><div>\n<a href=\"\/plans\/\" class=\"btn btn-regular-red\">Start Now<\/a>\n<a href=\"\/contact-us\/\" class=\"btn btn-regular-clear color-red\">\nContact Sales <svg width=\"7\" height=\"13\" viewBox=\"0 0 7 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1.40836 0.260191L6.65863 5.51046C6.98081 5.83264 6.98081 6.355 6.65863 6.67719L1.40836 11.9275C1.08618 12.2496 0.563819 12.2496 0.241637 11.9275C-0.0805455 11.6053 -0.0805455 11.0829 0.241637 10.7607L4.90854 6.09382L0.241637 1.42692C-0.0805455 1.10474 -0.0805455 0.582374 0.241637 0.260191C0.563819 -0.0619909 1.08618 -0.0619909 1.40836 0.260191Z\" fill=\"#EA3365\"><\/path><\/svg>\n<\/a>\n<\/div>\n<\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_4 1_4 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:80px;--awb-spacing-right-large:12px;--awb-margin-bottom-large:25px;--awb-spacing-left-large:12px;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-right-medium:12px;--awb-spacing-left-medium:12px;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0;--awb-spacing-right-small:12px;--awb-spacing-left-small:12px;\" data-motion-effects=\"[{&quot;type&quot;:&quot;&quot;,&quot;scroll_type&quot;:&quot;transition&quot;,&quot;scroll_direction&quot;:&quot;up&quot;,&quot;transition_speed&quot;:&quot;1&quot;,&quot;fade_type&quot;:&quot;in&quot;,&quot;scale_type&quot;:&quot;up&quot;,&quot;initial_scale&quot;:&quot;1&quot;,&quot;max_scale&quot;:&quot;1.5&quot;,&quot;min_scale&quot;:&quot;0.5&quot;,&quot;initial_rotate&quot;:&quot;0&quot;,&quot;end_rotate&quot;:&quot;30&quot;,&quot;initial_blur&quot;:&quot;0&quot;,&quot;end_blur&quot;:&quot;3&quot;,&quot;start_element&quot;:&quot;top&quot;,&quot;start_viewport&quot;:&quot;bottom&quot;,&quot;end_element&quot;:&quot;bottom&quot;,&quot;end_viewport&quot;:&quot;top&quot;,&quot;mouse_effect&quot;:&quot;track&quot;,&quot;mouse_effect_direction&quot;:&quot;opposite&quot;,&quot;mouse_effect_speed&quot;:&quot;2&quot;,&quot;infinite_animation&quot;:&quot;float&quot;,&quot;infinite_animation_speed&quot;:&quot;2&quot;}]\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon circle-no fusion-text-flow ph-duotone ph-tag\" style=\"--awb-font-size:40px;--awb-margin-left:18px;\"><\/i><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;margin-bottom:15px;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-four box_title_amani\"><h4 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">Always know what you pay<\/h4><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-font-size:var(--awb-custom_typography_9-font-size);--awb-line-height:var(--awb-custom_typography_9-line-height);--awb-letter-spacing:var(--awb-custom_typography_9-letter-spacing);--awb-text-transform:var(--awb-custom_typography_9-text-transform);--awb-text-font-family:var(--awb-custom_typography_9-font-family);--awb-text-font-weight:var(--awb-custom_typography_9-font-weight);--awb-text-font-style:var(--awb-custom_typography_9-font-style);\"><p>Integrated per-transaction pricing with no hidden fees.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_4 1_4 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:80px;--awb-spacing-right-large:12px;--awb-margin-bottom-large:25px;--awb-spacing-left-large:12px;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-right-medium:12px;--awb-spacing-left-medium:12px;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0;--awb-spacing-right-small:12px;--awb-spacing-left-small:12px;\" data-motion-effects=\"[{&quot;type&quot;:&quot;&quot;,&quot;scroll_type&quot;:&quot;transition&quot;,&quot;scroll_direction&quot;:&quot;up&quot;,&quot;transition_speed&quot;:&quot;1&quot;,&quot;fade_type&quot;:&quot;in&quot;,&quot;scale_type&quot;:&quot;up&quot;,&quot;initial_scale&quot;:&quot;1&quot;,&quot;max_scale&quot;:&quot;1.5&quot;,&quot;min_scale&quot;:&quot;0.5&quot;,&quot;initial_rotate&quot;:&quot;0&quot;,&quot;end_rotate&quot;:&quot;30&quot;,&quot;initial_blur&quot;:&quot;0&quot;,&quot;end_blur&quot;:&quot;3&quot;,&quot;start_element&quot;:&quot;top&quot;,&quot;start_viewport&quot;:&quot;bottom&quot;,&quot;end_element&quot;:&quot;bottom&quot;,&quot;end_viewport&quot;:&quot;top&quot;,&quot;mouse_effect&quot;:&quot;track&quot;,&quot;mouse_effect_direction&quot;:&quot;opposite&quot;,&quot;mouse_effect_speed&quot;:&quot;2&quot;,&quot;infinite_animation&quot;:&quot;float&quot;,&quot;infinite_animation_speed&quot;:&quot;2&quot;}]\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-2 fb-icon-element fontawesome-icon circle-no fa-flip-horizontal ph-duotone ph-plugs\" style=\"--awb-font-size:40px;--awb-align-self:flex-start;--awb-margin-top:0px;--awb-margin-right:0px;--awb-margin-bottom:0px;--awb-margin-left:18px;\"><\/i><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;margin-bottom:15px;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-four box_title_amani\"><h4 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">Start your integration<\/h4><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-font-size:var(--awb-custom_typography_9-font-size);--awb-line-height:var(--awb-custom_typography_9-line-height);--awb-letter-spacing:var(--awb-custom_typography_9-letter-spacing);--awb-text-transform:var(--awb-custom_typography_9-text-transform);--awb-text-font-family:var(--awb-custom_typography_9-font-family);--awb-text-font-weight:var(--awb-custom_typography_9-font-weight);--awb-text-font-style:var(--awb-custom_typography_9-font-style);\"><p>Get up and running with Amani in as little as 1 hour.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-10892","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/amani.ai\/api\/wp\/v2\/pages\/10892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amani.ai\/api\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/amani.ai\/api\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/amani.ai\/api\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/amani.ai\/api\/wp\/v2\/comments?post=10892"}],"version-history":[{"count":5,"href":"https:\/\/amani.ai\/api\/wp\/v2\/pages\/10892\/revisions"}],"predecessor-version":[{"id":11033,"href":"https:\/\/amani.ai\/api\/wp\/v2\/pages\/10892\/revisions\/11033"}],"wp:attachment":[{"href":"https:\/\/amani.ai\/api\/wp\/v2\/media?parent=10892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}