EXHIBIT A by leader6

VIEWS: 11 PAGES: 6

									                                                 EXHIBIT A
                                                   Services


I. EZShield Identity Theft Restoration
     0 BU




            1. Customer has initial consultation to determine the nature of the Identity Theft.
               Once the occurrence of Identity Theft has been determined, a Restoration
               Specialist is personally assigned to that victim and will work on their behalf to
               restore their credit and good name.

            2. Restoration Specialist will assist and advise member on steps that need to be
               taken immediately. This includes explaining to them that completing a LPOA
               (Limited Power of Attorney) form is necessary for the Restoration Specialist to
               perform the work on the victim’s behalf. They will also be advised to file a police
               report as it is needed for the resolution process.

            3. A Claim Transmit Packet is then sent to victim via email, fax, or mail depending
               on the victim’s preference –This Claim Packet includes a Cover Letter, LPOA
               and Affidavits. A prepaid, pre-addressed overnight envelope is included for
               prompt and convenient return to EZShield.

            4. Upon receiving completed claims packet form victim, the Restoration Specialist
               will contact victim and explain the proper course of action that will be taken to
               correct Identity Theft Event.

            5. The Restoration Specialist, on behalf of the customer will request a credit report
               from each of the three credit bureaus. Once the reports are received, the
               Restoration Specialist will contact and review them with the customer to identify
               any incorrect data and potential areas of fraud.

            6. The Restoration Specialist will review the credit report and discuss the following
               with the victim:

                   − Accounts opened fraudulently
                   − Unexplainable debts or charges
                   − Credit bureau inquiries from unrecognized companies

            7. The Restoration Specialist will research Credit Reports to determine if the Identity
               Theft Event includes items such as:

                   −   Public Records – liens, judgments, bankruptcies
                   −   Credit Accounts – New and/or Derogatory
                   −   Fraudulent Addresses
                   −   Prior Employment
                                   EXHIBIT A
                                     Services
                                     Continued

   If there is an invalid creditor or incorrect data on the report, the Restoration
   Specialist will contact the creditor listed on the report to submit a dispute and
   request for investigation. The Restoration Specialist will notify the credit
   bureau(s) whose report had the incorrect data and request the change.

8. The Restoration Specialist will complete and transmit all necessary fraud alerts
   and notifications to appropriate agencies such as:

       −   The three major credit bureaus
       −   The Social Security Administration (SSA)
       −   The Federal Trade Commission (FTC)
       −   The US Postal Service (USPS)
       −   The Attorney General’s Office in the victim’s State of Residence
       −   The Department of Motor Vehicles
       −   The Internal Revenue Service
       −   Creditors
       −   Financial Institutions

9. The Restoration Specialist will then interface with the entities affecting the
   Customer’s credit reports, including the three credit reporting agencies, namely
   Equifax, TransUnion and Experian (collectively, the “Credit Bureaus”) and any
   applicable banks, credit card companies, government agencies, and/or merchants,
   to eliminate from the records of these entities all references to the fraudulent
   transactions or activity associated with the Identity Theft Event.

10. The Restoration Specialist will compile information regarding misuse of the
    member’s accounts and information in order to document the case file, prepare
    correspondence, deliver required documentation to all involved parties (Credit
    Bureaus, Financial Institutions, Utilities, etc.), and provide to       member
    documentation that the fraudulent transaction or activity has been cleared from
    the member’s records.

11. The Restoration Specialist will build and maintain a case file to document the
    Identity Theft Event. This case file is essential to establish the facts surrounding
    the Identity Theft Event, and to establish and secure the member’s rights as a
    victim. This case file may include details of the case, expenses, descriptive notes
    from contacts made on behalf of the member, responses from involved entities,
    and relevant documentation, including an Identity Theft Affidavit, Declaration of
    Fraud, Limited Power of Attorney Authorization, Police Report and other
    applicable documents.
                                   EXHIBIT A
                                     Services
                                     Continued

12. To ensure the victim’s identity is restored completely and to reduce the burden of
    the Identity Theft Event, EZShield provides the following for one year after the
    Identity Theft Event:
   Identity Monitoring
   Comprehensive scans of national data bases covering both credit and non-credit
   activity
       − Continuous monitoring of customer’s credit files, Social Security
         number, credit and other payment card numbers, phone numbers, email
         addresses and residential addresses for suspicious activity
       − Ongoing scans of Internet directories, online databases, chat rooms,
         public records and more
       − Access to identity theft protection monitoring dashboards (explained
         below)
       − Immediate notification via email if suspicious activity is detected
       − Comprehensive consultation available from identity restoration
         specialists

   EZShield Vault offers secure, password-protected Web-based storage of your
   important digital files. Store, organize and retrieve invoices, records, warranties,
   photo files, certificates and more from any Internet connection, anywhere in the
   world, 24/7.

       − Web-based for convenient remote access from any Internet connection
       − Your personal "virtual safe"
       − Password-protected and encrypted data storage
       − 24/7 secure access
       − Store documents, images and digital files
       − Electronically archives financial and medical records and home
         inventories
       − Retrieve your assets easily
       − Set reminders to manage important dates
       − Secured by an SAS 70 Type II-compliant Data Center
                                    EXHIBIT A
                                      Services
                                     Continued

     EZShield Emergency Card Services (registration, cancelation and emergency
     funds in event of lost or stolen cards)
        − Permits registration of your credit cards to facilitate cancelation and/or
             replacement in the event they are lost or stolen
        − EZShield will cancel credit cards and requests new ones if customer
             desires
        − Wires emergency funds if card loss/theft occurs more than 50 miles from
             home


      Additional Included Benefits of EZShield Identity Theft
Restoration
     Free Credit Reports Notification and Assistance

     Customer can enroll at no cost in EZShields Credit Report Notification service.
     Upon enrollment, EZShield will notify customers via email with detailed
     instruction on when and how to obtain their federally mandated free credit reports
     from each of the three credit bureaus. Customer will also have access to a
     Resolution Specialist who will provide assistance in reviewing, interpreting and
     answering questions about customer’s credit reports.

     Document Replacement Service (for lost wallets/purses, documents lost in fire,
     flood, natural disasters, and theft)

     EZShield will assist the customer in replacing lost or stolen government issued
     documents including paying costs incurred by EZShield to replace Customer’s
     passport, driver’s license, birth certificate, social security card or other
     government issued identity cards.

     EZShield’s Dashboards (Online Information Portal)

        − Real-time access to review status of customer’s identity theft restoration
          process.
        − Real-time Utilization Reports for companies providing or selling
               EZShield’s Identity Theft Restoration to its customers
             − View identity monitoring alerts that are issued to warn customer of
               possible fraud
             − Access to useful information regarding identity theft as well as
               recommended practices and measures to reduce or prevent the likelihood
               of becoming a victim.




                                        EXHIBIT A
                                          Services
                                          Continued

 II. EZShield Vault

 Offers secure, password-protected Web-based storage of important digital files. Store,
 organize and retrieve invoices, records, warranties, photo files, certificates and more from
 any Internet connection, anywhere in the world, 24/7.

             − Web-based for convenient remote access from any Internet connection
             − Password-protected and encrypted data storage
             − 24/7 secure access
             − Store documents, images and digital files
             − Electronically archives financial and medical records and home
               inventories
             − Set reminders to manage important dates
             − Secured by an SAS 70 Type II-compliant Data Center

III. Identity Monitoring
Comprehensive scans of national data bases covering both credit and non-credit activity.
             − Continuous monitoring of customer’s credit files, Social Security
               number, credit and other payment card numbers, phone numbers, email
               addresses and residential addresses for suspicious activity
             − Access to identity theft protection monitoring dashboards
             − Immediate notification via email if suspicious activity is detected
             − Comprehensive consultation available from identity restoration
               specialists
IV. Internet Monitoring
           − Ongoing scans of Internet directories, online databases, chat rooms,
             public records and more
           − Access to identity theft protection monitoring dashboards
           − Immediate notification via email if suspicious activity is detected
           − Comprehensive consultation available from identity restoration
             specialists




                                      EXHIBIT A
                                        Services
                                       Continued
 V.Credit Monitoring
           − Continuous monitoring of customer’s credit reports for suspicious
             activity. Includes monitoring credit reports from Experian, Trans Union
             and Equifax
           − Access to identity theft protection monitoring dashboards
           − Immediate notification via email if suspicious activity is detected
           − Comprehensive consultation available from identity restoration
             specialists

								
To top