Fraud Response Protocol
Matthew avatar
Written by Matthew
Updated over a week ago

Veriff follows the best practice guidance relating to fraud management. Our dedicated counter Fraud team monitors all incoming traffic and proactively detects suspicious patterns and exploits by individuals and groups. Feedback circuits are established between the Fraud team and internal stakeholders with the customer’s point of contact to ensure timely communication of findings and preventive measures taken.

Fraud monitoring

Veriff’s Fraud team uses a combination of derived network and device fingerprinting data points provided by our in-house DeviceCheck (formerly Browser ID) service, Risk Insights (formerly Fraud Risk Labels), and in-house Data Science driven business intelligence solutions to continuously monitor all possible areas of threats or exploits. On top of regular Policy-related quality audits, the Fraud team maintains a dedicated Fraud Quality Assurance program - performing daily fraud and internal audits to ensure check decision efficacy and constantly reviewing the checks’ performance and the effectiveness of fraud detection layers.

In relation to the protection of your end-users, our Fraud Engine can identify when the identity document has been compromised and is being used in fraudulent activities e.g. by multiple individuals, and uses this knowledge to process future traffic from this document. That ensures that both parties involved - the company and its customers are protected from identity fraud.

For more info on all Fraud Detection solutions please see: Fraud Protect or Fraud Intelligence


Fraud detection and reporting

Our Fraud team brings together expert knowledge about various aspects of fraud detection within the identity space with great expertise in identification and tackling of fraud cases, both for individuals as well as organised groups.

Veriff’s Fraud detection capabilities incorporate various alerting systems based on our business intelligence system with in-house tools that allow us to detect and filter out “high-risk” trends and patterns as and when they become visible.

Any fraudulent schemes and patterns which are being detected as part of Veriff’s regular monitoring of suspicious activity are being communicated to the customers. The Fraud team has daily, weekly, and monthly reporting in place to ensure timely and systematic communications of key matrices, trends, and patterns with all internal and external stakeholders.

Veriff processes and checks every submitted verification session for suspicious, fraudulent, and/or harmful behaviour in real time. In its reports, Veriff uses Risk Insights (formerly risk labels) which are essentially separate fraud checks that exist independently from standard verification checks.

​Risk Insights help highlight information from sessions that could indicate fraudulent behaviour and are updated in real-time - that means new risks can be found for a session after it has already been submitted.

The potential risks flagged under risk Insights are explained here: Risk Insights Descriptions. Risk Insights can be seen in Veriff Station and received over webhooks if the feature is enabled for a given integration.

For more info on sending the risk insights results over the webhook please contact your dedicated Account Manager or Customer Support support@veriff.com.

(NB! Sessions that are submitted through API can benefit from enhanced fraud checks by sending Additional Data via API)


Sharing intelligence

Veriff shares information about verification decisions, fraud patterns, and incidents with its customers. Veriff does not currently share Veriff-specific fraud information with parties outside Veriff unless requested to do so by Veriff’s customers.

All fraud incidents are reported to the respective customer with supporting documentation and the customer can choose to report this to the relevant authorities. We would require further detail of what is meant under breach of external sources.

Did this answer your question?