Authored on: Jan 10, 2012
Download A key element to any compliance initiative is the ability to identify and flag customers or transactions that violate government regulations. This white paper provides a how-to guide for organizations that want to use data quality and identity management technology to meet their compliance goals. This paper offers a complete approach to watchlist compliance. There are other approaches, of course, approaches that leverage matching to the exclusion of other technologies and preparations.