Across
- 2. SSN, DL number, passwords, authorized user names are considered as...
- 3. A feature that allows calls made to one number to be forwarded to another specified number.
- 4. Call detail, type of calling plans, number of voice lines on account are types of...
- 7. Content and knowledge system used by fraud to retrieve all fraud policies, procedures, and processes.
- 9. Using someone's personal data such as, address, dob, ssn to open accounts in their name.
- 10. Section in Enforce that lists all cases in progress or in wait that is assigned to the investigator.
- 11. Detailed notes to provide information needed to take proper action on the account.
Down
- 1. An identity search engine that provides risk indicators, as well as an instant ID verification.
- 2. Term to define the impersonation of others to try to obtain information that would be inaccessible.
- 5. Information portal for the most up to date Verizon Wireless Policies and Procedures.
- 6. ____+ Empathy = trust
- 8. Case management system that prioritize the cases worked by fraud; Fraud's Brain.
- 12. The removable device that stores the programmable device settings and other information such as contact list.
