Professional Documents
Culture Documents
On
At
Submitted to
(Assistant Professor)
Sarvajanik University
Surat
Submitted by:
MBA (Semester – 3)
August, 2022
Acknowledgement
I have put effort into this project. However, it would not have been possible without
the cooperation and help of many individuals and organizations. I would like to
express my heartfelt thanks to all of them.
I am also highly indebted to Mr. Krunal Sir (Simran MGT Services Pvt Ltd -
Ahmedabad Office Head) and Mr. Manish Panchal Sir (Simran MGT Services Pvt
Ltd - Surat Office Head) for their guidance. Ms. Varsha Ma'am (Simran MGT
Services Pvt Ltd - Guide for my entire training program at Surat) for her continuous
supervision and also providing necessary information regarding the project and good
training program.
I also thank and appreciate my colleagues and those who have volunteered their
abilities to help me in developing the project.
Executive Summary
I did my SIP work as part of MBA program. My project work is a study on “Role of
IT in Loan Verification Process and Fraud Prevention”.
The purpose of the study is to know about the loan verification process and various
types of fraud in loans and how to prevent it and also the main purpose of the study is
to know about how IT helps and facilitates the loan verification process and prevents
fraud.
This study includes introduction of loan and its verification process, introduction of
fraud and its types and how to prevent fraud and last part how IT helps and what is the
role of IT in loan verification process and fraud prevention.
This study concludes that automation has increased the efficiency of various lending
platforms. The landscape of lending is changing with more technology-enabled
competition and the emergence of better cloud-integrated platforms. Lenders need to
recognize the importance of automating their process in terms of cost-efficiency,
time-saving, better data integrity and powerful analytical tool. While automation may
pose some challenges initially, doing so gradually can increase the brand value of an
organization. And same in prevention of fraud.
Table of Contents
Chapter: - 1...............................................................................................................................1
Chapter: - 2...............................................................................................................................4
Figure: 2.2 Geographical spread of the major Managed Service Providers in India...............10
Chapter: - 3.............................................................................................................................13
3.2 Different services that provide by Simran Management Services Pvt. Ltd.:-................16
Chapter: - 4.............................................................................................................................19
Chapter: - 5.............................................................................................................................22
In-depth study of “A study on Role of IT in Loan Verification Process & Prevention of
Fraud”.....................................................................................................................................22
5.6 Conclusion:-..................................................................................................................76
Chapter: - 6.............................................................................................................................78
Practical learning from the depth study of “A study on Role of IT in Loan verification process
& Prevention of fraud”...........................................................................................................78
6.1 Experiential learning from in-depth study at Simran Management Pvt. Ltd.:-..............79
6.2 Complete loan verification process understandable at Simran Management Pvt. Ltd.:-79
6.3 The excel sheet contains all the case verification websites used by 'Simran Management
Pvt. Ltd.':............................................................................................................................80
Table: 6.1 All the case verification websites used by 'Simran Management Pvt. Ltd.'............84
Bibliography...........................................................................................................................85
Chapter: - 1
1
1.1 Introduction to Loan verification process:-
Source: WWW.CIBIL.COM
Loans have made our lives easier, providing us with financial benefits that go
beyond our earnings. Be it credit card, home loan, personal loan or auto loan
etc. A loan is a credit extended to us by lenders upon fulfilling certain key
parameters. However, getting a loan in India can often be a boring process for
the uninitiated, but not for individuals with good credit scores.
Whenever you apply for a loan, banks check your CIBIL score and report to
assess your credit history and creditworthiness. The higher your score, the
more likely your loan application will be approved.
2
1.2 Introduction to Prevention of fraud:-
3
Chapter: - 2
4
2.1 Definition of Managed Services:-
Managed services is the practice of outsourcing the responsibility for
maintaining need , a range of processes and functions, or the purpose of
improved operations and reduced budgetary expenditures through the
reduction of directly-employed staff.
2.2.1 Advantages:-
2. Business & Financial benefits of Managed Services are Predictable Low Cost,
Minimized Downtime, Proven Experts, Reliable Relationships, 24/7 Support,
New Technology, Reduced Risk, Focused Energy.
2.2.2 Challenges:-
5
2. A recent survey claims that a lack of knowledge and expertise in cloud
computing rather than offers' unwillingness, this to be the main barrier to this
transition.
Their functions:-
1. Software – Production support and Maintenance
2. Authentication
3. Systems management
4. Data backup and Recovery
5. Data storage, Warehouse and Management
6. Cloud transformation
7. Network monitoring, Management and Security
8. Human Resources and Payroll
Their functions:-
1. Supply chain management
2. Communications services (mail, phone, VoIP)
3. Internet
4. Videoconferencing
6
2.3.3 Supply chain managed services:-
Their functions:-
1. Supply chain planning, monitoring and control
2. Sourcing and procurement
3. Logistics and distribution
2.3.4 Transportation:-
Their functions:-
1. Daily transportation planning
2. Freight audit/Accounting & Payment
And other types of services are: - Marketing, Media, Power, Water & their
different functions.
These trends are expected to create huge growth opportunities for managed
service providers in the short and long term.
7
Figure: 2.1 Chart of Global Forecast over next 2021-2030 years
Source: WWW.PRECEDENCERESEARCH.COM
Growth factors: -
Managed services provide optimum resource distribution utilization and they
help in augmenting the overall profit for the businesses to operate. It is always
helps in cutting down the company's operating expenses by improving the
operational efficiency. There is an increase in outsourcing the management
functions to manage service providers and to cloud service providers.
8
The use of cloud management are solving the various functional business
requirements, managed services, helping effective functioning of the
organization with minimum cost and it does not compromise on the quality of
the work done. The major market players are investing in the development of
the new products and expansion of the products portfolio. They are also
engaging in research and development activities in order to offer reliable
services and cost-effective services.
9
2.6 Indian State wise Scenario:-
Ta
ble: 2.1 Headquarters of major MSPs
Source: WWW.SLIDESHARE.NET
10
2.7 Covid-19 Impact & Opportunity:-
2.7.1 Covid-19 impact:-
The need to maintain employee’s safety during COVID-19 has forced many
corporations to change their regulations and policies. The foremost cause of
the business disruption was the inability to move the workforce and coordinate
HR as earlier. The inability to travel and cross borders and social distancing
has forced businesses to change their current ways of functioning and
reconsider operational choices. Governments are working closely with cloud
providers to fight the COVID-19 pandemic.
The White House has announced the launch of the COVID-19 High-
Performance Computing Consortium to provide worldwide COVID-19
researchers with access to the world’s most powerful high-performance
computing resources that can significantly advance the pace of scientific
discovery to stop the virus. COVID-19 has forced many organizations to
reduce costs and increase operational efficiency in order to sustain. Recently,
organizations are looking to outsource their IT requirements more than ever.
The pandemic has given a boom to work from home culture creating various
new opportunities for managed services as demand for cyber-security, less
delays, and high band width has increased.
2.7.2 Opportunities:-
11
2.8 Key players of Managed Services Industry:-
The managed services market is dominated by companies are IBM (US),
Fujitsu (Japan), Accenture (Ireland), Atos (France), Cisco (US), DXC (US),
TCS (India), Rackspace (US), AT&T (US), Verizon (US), Dimension Data
(South Africa), Infosys (India), HCL (India), Ericssion (Sweden), GTT
Communications (US), NTT Data (Japan), Happiest Minds (India), Huawei
(China), Nokia Networks (Finland), CenturyLink (US), Wipro (India),
Cognizant (US), Capgemini (France), BT (UK), Deloitte (UK), Secureworks
(US), Alert Logic(US), BAE Systems (UK), Trustwave (US), Hughes (US),
MeTtel (US), Microland (India), Optanix (US), Essintial (US), Intact Tech
(US), 1-Net (Singapore), Ascend technologies (US), SecureKloud (India),
Aunalytics (US), AC3 (Australia), Cloud Specialists (Australia), Corsica
Technologies (US), and Empist (US). These vendors have a large customer
base and strong geographic footprint along with organized distribution
channels, which helps them to increase revenues.
12
Chapter: - 3
13
3.1 Overview of Simran Management Services Pvt. Ltd.:-
Simran Management Services Pvt. Ltd. is a Gujarat-based firm established in
1996. Since its beginning, the company has assisted leading public and private
sector organizations to implement effective internal and external fraud control
strategies and ethics programs. It is classified as Non-government Company
and is registered at Registrar of Companies, Ahmedabad.
With more than two decades of experience in the field of verification and
fraud control, the firm has been able to create the perfect coordinate with the
biggest brands of industries like Banking, Telecom, and Insurance. Being the
leaders in the field of Risk Prevention and Fraud Control in all around India,
our expertise and domain knowledge is peerless. In today’s dynamic corporate
environment, it becomes necessary to partner with an agency that best in
accuracy and timely delivery. This is where the Simran Group of Companies
best in their work.
The Founder & Managing Director of Simran Management Services Pvt. Ltd.
Is Mr. Ravi Singh Mand. The Corporate Identification Number (CIN) of
Simran Management Services Pvt. Ltd. is U74910GJ2011PTC066301. The
registered office of Simran Management Services Pvt. Ltd. is at 172/2,
Premchand house behind Poplar house, Near old High court, Ashram road,
Ahmedabad, Gujarat.
14
The approach of company's Fraud Prevention Services is proactive, aiming to
help in break fraud and corruption rather than react to a fraud that may be
discovered. The company's approach for their clients and for the environment
within which their clients operate rather than only applying American Fraud
Control Practices and Off-The-Shelf Techniques.
The three pillars of excellent infrastructure. The first, Skilled Team are what
help us deliver beyond expectations. Second, it is the Security with which any
information is handled and passed between peer groups and stakeholders. And
third, it is the Extensive Training and Expertise of their employees that has
helped the Company gain the trust of India’s leading organizations.
15
3.2 Different services that provide by Simran Management Services
Pvt. Ltd.:-
There are different types of services provided by Simran Agency are as
follows:
They offers in this service are 1. Infrastructure Space, 2. Qualified & Expert
Samplers, 3. Customize Workstations, 4. Centralized Processing.
3. Field verification:-
Get full information on existing project conditions with Field Verification
Services.
16
4. Document collection:-
Save time in paperwork with their Document Collection Services.
5. Investigation services:-
Respond quickly to suspected fraud or misconduct with their Investigation
Services.
They offers in this service are 1. Digital banking fraud, 2. Card fraud,
3. Payment fraud, 4. Accounting fraud, 5. Asset misappropriation, 6. Fraud
recovery.
7. HR verification:-
Know the Candidates Background Better with their HR Verification Services.
They offers in this service are 1. Personal identification check, 2. Education &
qualification check, 3. Previous employment verification, 4. Address
verification, 5. Neighbor check, 6. Database check, 7. Professional reference
check, 8. Integrity check, 9. Social media profiling, 10. License check,
11. Pre-employment medical check, 12. Criminal verification,
13. Employment reference check (work history, salary, etc. check), 14. Skill
test report, 15. Driving records, 16. Credit reports.
17
8. Physical data warehousing services:-
Convert data from diverse sources into valuable information with their
Physical Data Warehousing Services.
They offers in this service are 1. Enterprise data management services, 2. Data
warehouse migration services, 3. Data integration services, 4. Data
governance, 5. Performance services, 6. Managed services.
18
Chapter: - 4
19
There are mainly two departments in Simran Management Services Pvt. Ltd.
1. Back office Department
2. Field Department
The above all services explain in detail with their functions in Company
profile of Simran Management Services Pvt. Ltd. that what services they offer.
20
4.2 Field department:-
The field department consists of field staff. They work to go to different
destination areas as per applicant details. It has different staff in different
areas. This network is big around PAN India. They do a Field work like
Employee profile check, employee business profile check, etc.
Eventually, field department are the backbone of any large field team,
ensuring the team has the skills, resources, and support to successfully operate
its strategy.
The above all services explain in detail with their functions in Company
profile of Simran Management Services Pvt. Ltd. that what services they offer.
21
Chapter: - 5
22
5.1 Introduction to Loan:-
A loan is when money is given to another party in return for repayment of the
principal amount of the loan along with interest. The terms of the loan are
agreed upon by each party before any money is exchanged. The loan can be
secured by collateral such as a mortgage or it can be unsecured such as a credit
card. Shifting loans can be spent, repaid and replenished, while term loans are
fixed-rate, fixed-payment loans.
An unsecured loan is one that does not require any collateral for loan
distribution. The bank analyzes the past relationship with the borrower, credit
score and other factors to determine whether the loan should be given. The
interest rate for such a loan may be higher as there is no way to recover the
loan amount if the borrower defaults.
23
2. Open-end & Closed-end Loan:
Loans can also be described as close-end or open-end. With an open-ended
loan, the individual has the freedom to borrow frequently. Credit cards and
credit lines are perfect examples of open-ended loans, although both have
credit restrictions. A credit limit is the highest amount you can borrow at any
time. Depending on the individual's financial needs, he may choose to use all
or only a portion of his credit limit. Each time this person pays for an item
with their credit card, the remaining available credit decreases.
With closed-end loans, individuals are not allowed to borrow again until they
make their payments. As one makes repayments on a closed-end loan, the loan
balances decreases. However, if the borrower wants more money, he needs to
apply for another loan from scratch. The process requires submission of
documentation that they are credit-eligible and awaiting approval. Examples
of closed-end loans are mortgages, auto loans, and student loans.
3. Conventional Loan:
This term is often used when applying for a mortgage. It refers to loans that
are not insured by government agencies such as the Rural Housing Service
(RHS).
4. Based on purpose:
Education loan: Education loans are financing tools that help the borrower get
an education. This course can be either an undergraduate degree, postgraduate
degree or any other diploma / certification course from a reputed institute /
university. You must have an entry pass provided by the organization to get a
loan. Lending is available for local and international courses.
Personal loan: You can go for a personal loan whenever there is a liquidity
problem. The purpose of taking a personal loan can be anything from paying
off old debt, going on vacation, funding for home / car down payments and
medical emergencies to buying big ticket furniture or gadgets. Personal loans
are granted based on the applicant's past relationship with the lender and the
credit score.
24
Vehicle loan: Vehicle loans provide money for the purchase of two-wheeler
and four-wheeler vehicles. In addition, a four-wheeled vehicle can be a new or
used vehicle. Based on the on-road price of the vehicle, the loan amount will
be determined by the lender. You have to be prepared with a down payment to
get a vehicle as the loan rarely offers 100% credit. The vehicle will remain
owned by the lender until full payment is made.
Loan against asset: Just like promising gold, individuals and businesses
promise assets, insurance policies, FD certificates, mutual funds, shares, bonds
and other assets to borrow money. Depending on the value of the promised
assets, the lender will offer a loan with some margin on hand.
25
5.1.3 Important factors lenders look for in approving your application:-
1. Credit score:
Credit score plays an important role in deciding whether a lender wants to
proceed with your application or leave it at an early stage. This is especially
the case when it comes to unsecured loans. The credit score represents the
borrower's credit history, so the lender analyzes the borrower's repayment
history and concludes that the borrower can make the payment on time or he
will default on the payment. Approval of the loan is based on the decision of
the lender after the necessary analysis.
3. Debt-to-income ratio:
Not only sound income but his debt-to-income ratio is also important. If you
have Rs. 1 lakh income and if your debt repayment commitments are already
exceeds Rs. 75,000, you will not be given a new loan as you will need the
remaining income to take care of your household expenses. So, regardless of
your income, you must have a low debt-to-income ratio so that lenders think
you have enough cash to cover monthly repayments as well as household
expenses.
26
4. Collateral:
Based on the current market value of the collateral you provide.
And the lender can determine the interest rate applicable to your loan.
Providing collateral will make the deal more secure from the lender's
perspective, which can result in greater trust and lower interest rates.
Unsecured loans are notorious because they involve comparatively high
interest rates.
5. Down payment:
The money you have saved and the effective execution of your savings plan
towards the down payment will increase the lender's confidence in you. The
higher the down payment, the lower the loan amount required.
27
5.1.5 Eligibility for Loan:-
The eligibility criteria for getting a loan varies depending on the type of loan
you are looking for. Generally speaking, you can consider the following
simple criteria to check your eligibility.
28
5.1.7 Loan EMI Calculator:-
Loan EMI Calculator is a simple tool to calculate the monthly amount payable
to the lender as well as the total interest. To calculate the EMI applicable on
your loan amount, you just need to enter the values for principal amount (P),
time period (N) and interest rate (R).
Applying for a bank loan is easier than you think. But before you apply for
one, you should be aware of your financial situation, as you may have to repay
the loan amount later.
You should first understand your requirements and if you think it is an ideal
route for you, you can either go to the bank and speak to the loan manager or
skip all that and apply online.
Step 1: Choose the lender you want to borrow from based on your research
and check your eligibility.
Step 2: Visit the bank branch or their official website to apply for the loan.
Step 4: The bank will process your application and contact you to inform them
of their stand within the stipulated time frame.
A loan cycle is defined as the period from which a borrower applies for a loan
and it is repaid to the lender with interest. The average loan cycle consists of
five stages and here is how borrowers can manage the processes at each of
these stages.
29
1. Pre Loan Calculations:
Even before a borrower begins the process of applying for a loan, there are
several prerequisite financial calculations to be made. The first step is to
decide what type of loan they want to get; this will help in reducing the loan
amount. The next step is to create a monthly income and expense chart to
understand how much you can allocate to monthly loan payments. These
calculations are necessary because any bank/digital lender has the ability to
instantly measure the borrower's ability to repay. Scores of online tools like
the Simple EMI Calculator can help with this task.
2. Research:
Digital lending has increased its footprint in the market, now borrowers can
get information about various financial products. They also have online tools
readily available that help in comparing different financial products. Hence,
borrowers should do their due diligence to find the best offer in the market. It's
important to be fiercely strategic when it comes to choosing low interest rates
and being aware of hidden charges like processing fees and other pre-payment
charges. Borrowers should be smart and up-to-date on financial information to
choose best-in-class loans and not get drowned by extremely attractive offers.
The goal is to find a loan that fits your needs and financial situation.
3. Application:
Although this step seems pretty self-explanatory, filling wrong information on
the documents can cause your loan application to be bounced within days or
weeks. It is important to keep all supporting documents in order while
applying for a loan as banks and digital lenders will use them to determine the
borrower's creditworthiness.
4. Verification of documents:
Each financial institution has its own multi-level verification process and the
timeline can vary from a week to 15 working days, however, some digital
players may take a few minutes. Only when the lender is fully satisfied with
the documents and paperwork do they proceed to verify the borrower and
approve their loan request.
30
5. Loan approval & disbursement:
Once the lender verifies the borrower based on their credit score and other
paperwork, they proceed to the disbursement process and the loan amount is
transferred to the borrower's bank account as per the determined terms.
5.1.10 Points of caution for borrowers to keep in mind while taking loans:-
31
5.2 Introduction to Fraud:-
5.2.1 Definition of Fraud:-
Fraud involves deception with the intent to gain illegally or immorally at the
expense of another. In finance, fraud can take many forms including false
insurance claims, fake books, pump and dump schemes and identity theft
leading to unauthorized purchases. Fraud costs the economy billions of dollars
each year and those caught are subject to fines and jail time.
32
1. Fraud trend:
Senior Management Fraud and Overrides - Fraud at its core, it's all
about leadership and rule
Lender Fraud - Fund Diversion and Siphoning
Fraud of investors – Diversion and siphoning of funds
Fraud of investors - between business partners
Abuse and misuse
Related party fraud – between business partners
Procurement fraud and turnkey project fraud
3. Responses:
Fraud Risk Reference: The Forensic Eye in IA - A Fraudster's Mindset
and Detection Techniques
Whistleblower engagement: Anonymous calling, written complaints
and interactions & Protection of WB in all conditions
Abuse and misuse: Business, Market and Business Intelligence
Reversing the forensic cycle: From - reactive > detective > preventive
& to - preventive > detective > reactive.
Anti-fraud regime: Integrating anti-fraud controls into the IFC
framework and the internal audit framework-fraud risk grading of
internal audit missions; fraud risk integration into an enterprise risk
management framework; Integrating fraud risk into corporate
governance policy frameworks and cyber-security framework.
33
Technology support: Digital forensics; Forensic Data Analytics.
4. Root Causes of Fraud:
Inadequate and ineffective internal audit: ineffectiveness of
technology, attention to detail, forensic eye.
Inadequate and ineffective internal controls: ineffectiveness of
technology, attention to detail, forensic eye.
Organizational culture health
The third and fourth eyes are missing
Size, scale and complexity of growth
Tone of leadership and governance
Conflict of interest and lack of independence
“Fraud &deceit are anxious for your money. Be informed & prudent.”
A forensic accountant may be asked check for different types of fraud. There
are three categories of fraud: 1. Corruption, 2. Misappropriation of assets, 3.
financial statement fraud.
1. Corruption:
Corruption is a form of dishonesty or criminal offense carried out by a person
or organization entrusted with a position of power, to obtain illegal benefits or
abuse power for their own personal gain.
34
Challenges in fighting bribery and corruption:
Unwillingness amongst stakeholders in complaining about people in
power
Lack of appropriate cyber-security and data protection measures
Lack of awareness amongst employees
Complex regulatory landscape
Lack of adequate and efficient internal financial controls &
documentation process
Inappropriate selection of business partners
35
Solutions:
- Do due diligence / background checks When on-boarding the seller.
- Periodically verify the range of commission/charges paid is par with
the industry standard.
- Digitalize the process of storing documents
- Link the account team's bonus to the document maintenance
- Records must be maintained for each visit Government office to
obtain purpose of visit (with permission) and minutes of discussion.
- There should be periodic rotations of employees dealing with the officials.
2. Misappropriation of assets:
By far the most common fraud involves misappropriation of assets, and there
are many different types of fraud that fall into this category.
36
Assets misappropriation – some examples of fixes:
Unauthorized Use of Equipment: Set strict policies and limits for
employees and enforce them. Physically secure valuable equipment.
Trust . . . but verify!
37
Companies use this type of fraud to try to show the company's finances a
better performance than what it actually is.
In the past, credit card fraud was the only thing people were wary of.
However, with technological advances and all the personal information people
willingly input online, hackers are becoming more "resourceful" and
"creative" in their means of deceiving people. Here are some types of e-
commerce fraud that we can all fall victim to:
1. Identity theft:
No matter the era, identity theft will always be a major concern for everyone,
especially online merchants, credit companies and banks. What hackers do is
impersonate the account owner and make purchases, for example, using stolen
credit card information.
38
As long as they are in possession of a person's personal details such as name,
address, phone number and credit card details, they can actually successfully
buy what they want online at the credit card owner's expense.
2. Friendly fraud:
Merchants are often victims of this type of fraud. Fraudsters make purchases
using their debit or credit cards and then demand a chargeback, claiming their
credit card details have been stolen. The merchant offers a refund while the
fraudster keeps the goods.
3. Clean fraud:
Not calling it clean cheating also makes it clean or decent. Clean fraud
involves stealing credit cards and using the cards to make purchases while
ensuring that criminals can avoid detection of the theft by payment processors.
Using the card owner's personal details, thieves can successfully make
purchases using stolen cards.
4. Merchant fraud:
Merchant fraud is very common, especially online. This is why many people
are suspicious about purchases that don't do cash-on-delivery transactions. In
merchant fraud, the order is received and confirmed by the e-commerce store
but then no product or service is delivered and no chargebacks are allowed.
Merchant fraud is also called internet fraud.
5. Check fraud:
Issuing a check even knowing that the account does not have sufficient
balance is considered fraudulent. Check fraud also occurs when someone
steals another person's check and forges their signature to make a purchase or
payment.
6. Pyramid schemes:
Pyramiding involves a company encouraging people to invest with the
promise that they will be compensated if they are able to recruit down lines
and when their down lines are also able to recruit their own down lines.
39
7. Charities fraud:
People should be wary of groups claiming to support or run charities and
asking for donations. Before doing so, people should make sure that the group
is really legitimate - that the charity actually exists before falling into the trap
of charity fraud.
Fraud can happen to anyone who is not careful or selective in the offers they
accept. Everyone should be aware of the warning signs to avoid falling prey to
such fraudulent activities.
2. Random emails:
Random emails that ask the recipient to input their login details into a link as
this can be a form of phishing. Once they click on the link and they enter their
details, fraudsters can now use the login information to steal their account.
40
5. Unverified wire transfer requests:
People asking their victims to give them money are definitely another sign of
fraud. Wiring money cannot be undone, and the criminal can get the money
almost immediately, making reversal impossible.
41
5.2.9 Fraud Prevention vs. Fraud detection solutions:-
Fraud prevention:
Fraud is prevented before fraud is attempted.
The goal of fraud prevention is to reduce the risk of future fraud.
Fraud detection:
Fraud is detected during a fraud attempt.
The goal of fraud detection is to reduce fraud.
Sophisticated fraud detection solutions also reduce false positives
which improve user experience and increase the productivity of fraud
teams.
Denial of Service:
A denial of service (DoS) attack attempts to overwhelm a website's computing
resources so that it crashes. By running hundreds or thousands of zombie
computers, a fraudster can command their botnet to, for example, complete a
contact us form thousands of times until a website stalls trying to process a
stream of requests.
Malware:
Short for "malicious software," malware is a broad term to describe various
types of harmful software, including viruses, ransom ware, spyware, and
more. Creeper viruses have been a threat to individuals and organizations
since the 1970s when they were first discovered.
42
Phishing:
Phishing attempts to exploit people in an organization to obtain valuable
information. With an email, SMS message, phone call, or other form of
communication, a phishing message will attempt to trick the user into
revealing information or downloading malware onto their device.
Ransom ware:
Ransom ware is a form of malware that encrypts your local files on an infected
device. In order to get the encryption key to access your files one more time,
the fraudster will demand payment. Effectively, the fraudster holds your data
ransom. Worse still, paying the ransom is no guarantee that the fraudster will
provide the encryption key. It is not uncommon for a fraudster to simply
receive payment and cease all contact.
Many applicants default for legitimate reasons, but some criminals apply for
loans and lines of credit with the intention of maxing out their payments.
Some criminals use their own identities to apply for loans, and then go off the
grid to avoid paying them back. However, stolen or artificial identities—also
known as third-party fraud—remain the method of choice. With third-party
fraud, scammers use multiple identities to open different lines of credit. In
2020, identity theft accounted for over 29% of all fraud reports received by the
FTC. Their data showed a sharp increase in loan application fraud between
2018 and 2019, with a 105% increase in auto-loan and lease fraud. Similarly,
business and personal-loan fraud increased 116% during the same period.
Federal student loan fraud increased 188% between 2018 and 2019,
representing the fastest growing type of identity fraud. Additionally, it is
estimated that more than 10% of accounts considered bad debts by banks are
actually fraudulent accounts.
43
1. ID verification and facial recognition:
A simple step like asking for two or more forms of ID helps prevent
application fraud by introducing an additional barrier for fraudsters. For online
applications, you can implement a real-time automated ID verification solution
that requires the user to take a picture of the ID along with a selfie. Liveliness
technology verifies that a selfie is an image of a person and not a snapshot of a
photograph. After that, facial recognition technology verifies that the selfie
and the ID match. A simple video call offers another possible option. Loan
officers ask a few questions during the call to verify the applicant's identity
and make sure they look like their ID photo.
5. Knowledge-based authentication:
Knowledge-based authentication helps prevent application fraud by going
beyond data points that criminals can steal or defraud. Use the applicant's
credit report to generate multiple-choice questions only they know the answers
to. For example, include questions about previous addresses, other lines of
credit, or past vehicle purchases.
44
6. Phone & social media verification:
You can send a push notification through your app to perform out-of-band
verification. This step verifies that the phone is a physical device registered to
the mobile network and not a VoIP number. Additionally, social media
verification helps confirm the legitimacy of an identity based on social media
activity and connections with other users. If an applicant uses a fake identity,
their social media presence may not exist. Or, they lack a common pattern for
profile associations in the same geographical area.
45
5.3.2 Take-Away skills:-
The IT department ensures that the organization's systems, networks, data and
applications are all connected and functioning properly. The IT team handles
three main areas:
Most IT staff teams have different responsibilities that fall into a few key areas
including:
46
3. Applications: Businesses depend on software to function. Some applications
are obtained and deployed from third parties, such as email server
applications. But many organizations maintain a staff of skilled developers
who build the applications and interfaces such as APIs necessary to deliver
critical business capabilities and services. Applications can be coded in a wide
range of popular languages and can be integrated with other applications to
create simple and seamless interactions between different applications.
Developers may also be tasked with creating interactive business websites and
mobile applications. The trend toward clever or continuous development
examples requires developers to be increasingly involved in IT operations
such as application deployment and monitoring.
Source: WWW.TECHTARGET.COM
47
5.3.5 Why is information technology important?
It is said that data powers industries worldwide. It may be too much, but few
businesses – large or small – can remain competitive without the ability to
collect data and turn it into useful information. IT provides the means to
develop process, analyze exchange, store and secure information.
Computing has permeated practically every part of business and our personal
lives. The ubiquity of computing also known as pervasive computing is
another reason why IT is important. Computing devices have evolved well
beyond personal computers and servers. Today, all businesses and most
individuals own and use multiple computing devices, including phones,
tablets, laptops, game consoles, and doorbells, thermostats, vacuums, and
many kitchen appliances.
Virtually all of these devices, many of which are part of the Internet of Things,
tap into the Internet, which interconnects billions of devices worldwide. It is a
complex and potentially dangerous environment that requires IT expertise for
management, security, maintenance and reliability.
48
5.3.6 Issues and challenges in Information Technology:-
System and network security issues are a primary concern for many business
executives, as any security incident can potentially damage a company's
reputation and cost a large sum of money.
1. Network capacity and performance: The popularity of online video has greatly
increased the demand for network bandwidth on both the Internet and IT
networks. New types of software applications that support richer graphics and
deeper interaction with the computer also generate large amounts of data and
therefore network traffic. Information technology teams must plan not only for
their company's current needs but also for this future growth.
49
2. Mobile and wireless uses: IT network administrators must now support a wide
range of smartphones and tablets in addition to traditional PCs and
workstations. IT environments require high-performance wireless hotspots
with roaming capability. In large office buildings, deployments are carefully
planned and tested to eliminate dead spots and signal interference.
3. Cloud services: Where in the past IT shops maintained their own server farms
to host email and business databases, some have migrated to cloud computing
environments where third-party hosting providers maintain the data. This
change in computing model dramatically changes the traffic patterns on a
company's network, but it also requires significant effort to train employees on
this new breed of application.
There are many types of roles in the field for IT such as:
Data scientist
Network Administrator
System Administrator
System Analyst
Technology expert
Database Administrator
IT Manager
Support Analyst
Database Developer
Software Tester, Engineer, Architect
Software Development Manager
Network Engineer
Software / Application Developer
Technical Advisor
50
5.4 An introduction to how IT helps in the loan verification process:-
Here once the customer fills the basic inquiry form, he reaches the bank server
and gets the login id and password. The server administrator can now check it
and choose whether to proceed or reject the candidate. The banker can choose
to send the customer to the next stage if he needs to go further. Now the
customer gets Stage 1 approval and needs to upload his scanned documents to
the site through his login.
Once the documents are submitted they are cross verified on the server and a
response is sent to the server. The system server also secretly captures the
person's location and his image, through which he submits the documents to
the bank server required for bank verification.
Banks can now cross-verify customer details and also request additional
documents by sending online alerts to customer emails. The customer just
needs to upload the required documents online and can also track the loan
status. Once his loan is approved, he receives an SMS to confirm the process.
Advantages:
This system removes all the difficulty required to get a loan.
This system removes all the difficulty required to get a loan.
Work done in a week under the old system can be done in days.
51
Disadvantages:-
The authorized person shall check any forged documents or other
similar material.
The user needs to have an internet connection to use this system.
52
Figure: 5.3 Loan process
Source: WWW.MOODYSANALYTICS.COM
The above figure shows a typical business lending process. Every banker
reading this article can immediately recognize the stages and visualize each
step in their own organization. Think about each key step in terms of the
number of employees involved, where bottlenecks appear in the process,
which steps are the most challenging, and how long a loan application
typically takes to move between steps.
1. Customer management:
The first step in any loan decision or new relationship is to gather financial
and other necessary information from the prospect or customer. Today, this
task can be labor-intensive and difficult to accomplish. Often it is dominated
by form filling, electronic or printed documents and the physical customer file.
The more often the information contained in these electronic and paper
documents is entered and re-keyed into the lender's system, the greater the
chance of inaccurate data being recorded.
53
loan applications that are decision-ready and loan applications that require
more documentation.
2. Credit analysis:
One of the most important stages of the commercial risk assessment process is
broadcasting the financial data you obtain from your prospect or customer,
usually another manual and repetitive task.
The process can be almost immediately and can also allow the lender to pre-
screen, score the borrower and provide a theoretical credit decision in a matter
of minutes.
54
3. Credit presentation and decision making:
Automation in the commercial loan approval process is all about mining the
right data and information and presenting it clearly for credit decision making.
Being able to automate your lending process from start to finish, benefits from
accuracy, near real-time data, increased efficiency and reduced decision-
making time.
4. Monitoring:
After the loan origination process, assets still have to be managed and risk
monitored annually, quarterly or even monthly. One of the main challenges
banks face is identifying a standardized process for collecting financial data to
satisfy ticklers, contracts and policy exceptions. Tracking can be inefficient,
not to mention dangerous, when processes are not clearly defined and rely on
manual tools.
55
Automated contract solutions can exist outside of the origination system, but
for data accuracy, efficiency and effectiveness, they are better as part of an
overall solution. Recording required agreements as part of the loan application
process saves rekeying and anchors agreement details in approval records for
audit purposes.
The automated contract/tickler feature provides peace of mind that the correct
information can be collected in a timely manner via in-built calendar alerts.
Automatic notifications go out if proper documents are not collected or if
various agreements are not fulfilled. Automated testing can also be
implemented so that immediate or impending breaches are red-flagged via
dashboard alerts when data enters the system.
5. Portfolio risk management:
With traditional manual, paper-based loan underwriting methods, lenders often
struggle to see what exposures a portfolio has and how these exposures change
over time. All lenders have specified risk appetite tolerances and set the most
appropriate risk-based portfolio limits to guide their loan officers. However,
devising these rules is an academic exercise, unless the lender has a specific
portfolio reporting tool at their fingertips.
A powerful logic for automating the loan origination process lies with the
improved data integrity, data lineage and overall governance that comes with a
best-in-class origination platform. We have already discussed how data
integrity is compromised when multiple systems are used to store the same
data. The keying and rekeying sums are multiplied and the data is stored in a
sub-optimal system.
When such situations exist, lenders spend significant time and resources
reconciling their portfolio data before they can perform useful analysis of their
portfolio data. Several weeks pass before a definitive picture emerges, by
which time it may be too late and expensive to address a particular issue or
problem.
56
5.4.3 How has technology changed the loan approval process?
Technology has definitely brought many changes in the ways of working and
processes in every industry. Be it corporate, schools, hospitals, banks or any
other sector, now most things are automated. Every industry is trying to take
advantage of technology as much as possible. This is the reason why the
procedures in banks also vary greatly.
Talking about personal loans, they are no more long and boring processes
where the applicant has to apply for the loan with a hundred different files and
then wait for approval for months and months. With the introduction of
technology, the personal loan process has become extremely fast and easy.
Now, one can borrow from banks 24X7 and get instant financial help. Let's
take a look at how technology has changed the entire personal loan approval
process.
Therefore, banks do not need to submit many documents for approval. Just a
photo ID and PAN is enough for banks to get an idea of all your background
and credit history. Therefore, if the borrower seeks an immediate loan, he does
not need to worry about collecting the documents. You can just submit the
mentioned two documents for your KYC and you are done.
2. Quick approval:
57
Nowadays, there is no delay in approvals when it comes to loans. Banks
understand that a person applies for a loan only when he has an urgent need.
Seeing the need for time, banks are promoting faster approvals. And that's
why instant loan is the term that came into limelight. Getting an instant loan is
a real thing today; in fact, there are banks that give you a loan of up to a
certain amount within an hour.
You just need to submit the required documents online, with which the banks
will analyze your credit background and if you are found eligible, you will be
approved. This process is really simple. And the best part is, anyone can do
this at home using their mobile phone.
3. Borrow anytime:
With the advancement of technology, now everything is present online. As
mentioned above, banks have also started providing online loans. You can find
many banks or small money lenders online, where they offer instant loans. As
there is a lot of competition in the market, everyone tries to provide the best
services.
Also, since the entire process is now online, you don't need to physically wait
for banks to open. The online loan site is operational 24x7. This means you
can borrow anytime. This makes it a perfect solution, especially for those who
need it at odd hours.
Additionally, customizing the payback ensures that the borrower does not feel
that paying back is a burden on the shoulders. For the ease of borrowers,
customizing EMIs really work wonders. Thanks to technology, everything can
58
now be done online. And when you mention, when you pay back, you will get
approval soon.
5. To sum up:
All the above updates in technology have made the entire banking process
really fast and efficient. And especially, the loan approval process has become
easier than ever. People are starting to trust banks more. And, many people
find these instant loans and approvals to be their savior as they need them
from time to time.
The stage for the growth of the lending software market is set by the ongoing
digitization of businesses and strict regulatory requirements that push financial
firms to build loantech software to handle increasing workloads and meet
regulatory challenges. Lontech's market is expected to reach and is currently
growing at a steady CAGR of 12.19%.
59
Figure: 5.4 Loantech market capacities by 2028
Source: WWW.VISARTECH.COM
1. Eliminate human errors: It's no secret, that calculations are something that
algorithms handle better than humans. In the credit system, there are many
variables, which is why it is error-prone. The best loan servicing software,
however, is designed to completely rule out any errors, which is undoubtedly,
beneficial from every point of view.
3. Saving time: Loan management requires a high level of caution and attention
to detail. As a rule, an entire team is needed to handle every aspect of the loan
process. Needless to say, loan management is time-consuming and manual and
paper-based. A digital credit system, on the other hand, automates routines and
enables your team to devote time to other important tasks.
60
invoices are frequently requested by regulatory bodies, borrowers and
investors. These high urgency reports should be provided on demand, and
should contain information, which is 100% accurate. Loan tracking software
enables lenders to generate various types of reports quickly and submit them
instantly in the required format.
2. Retail loan software: This loantech software is aimed at helping customers get
loans for all types of purchases, from consumer electronics to cars and real
61
estate. Credit cards and loans against property also fall under this category.
Retail lending is, in essence, an umbrella term for all personal loan types.
4. Business loans: Business loans are used for loantech investment in a startup
company or for business development of an existing company. Companies and
entrepreneurs can avail business loans from banks, non-bank financial
companies and online lenders. There is also a segment of loan servicing
software for private lenders dedicated to peer-to-peer lending.
62
2. Servicing different loan types: The more types of loans your money lending
software is able to service, the better. Lending apps that have a wide range of
use cases will attract more users than apps that target only one type of loan.
LoanTech software for creating loan application estimates, for example, can
have a wide range of applications, from student loan tech calculations to
estimating business loans and mortgages.
3. Centralized data storage: Every stage of the lending process involves working
with customer data. The best loan servicing software stores this data in a
central storage accessible during each loan processing stage. Legacy loan
management systems, on the other hand, use a slide approach to data storage,
which makes the loan process more burdensome and lengthy.
6. In-built analytic modules: Leveraging artificial intelligence (AI) and big data
is another hallmark of excellent loan servicing software for lenders. It not only
helps in generating reports but enables companies to assess market trends, find
patterns in customer behavior and come up with new products and offerings.
63
7. Third-party integration: Another feature that most organizations find
particularly attractive in a loan processing system is its ability to integrate with
other enterprise software. ERP and CRM solutions are able to enrich the credit
system with data and insights. Systems that integrate lending modules with
software for remote sales personnel are also enjoying high popularity among
lenders.
8. Security: Finance company software deals with classified and highly sensitive
data and security is of utmost importance to both lenders and customers. An
excellent lending system should have advanced security capabilities and
ensure the highest level of customer, data and network security.
2. User requirements: Next, you will strike a balance between the company's
strategy and the needs of your users. It is especially important to consider the
needs of each group of users and stakeholders within your company. This will
give you solid information to fall back on when choosing software for loan
management.
3. Accessibility and Availability: Knowing the needs of your customers will help
you decide on the way you want your loantech software to be deployed and
delivered. The SaaS model is currently the most frequent choice since it
enables companies to use cloud infrastructure resources to power application
64
backend and ensure optimal performance. Also, think about making your
loantech app accessible from a wide range of mobile devices and operating
systems.
Source: WWW.VISARTECH.COM
65
What is the structure of the application development teams involved?
The backend part of app development is like building the brain of the loan
application. So he needs a particularly solid technique for this responsible
task.
Source: WWW.VISARTECH.COM
5.5.1 How technology can help to prevent fraud and corruption during the rise
crisis?
66
Data analytics tools benefits:
The entire (100%) population analysis
Early detection of fraud indicators decrease financial loss
Internal controls are also improved low cost
Save time through automation tests
Whistleblowing channels:
SAIUAE website
Hotline number
E-mail
Mobile app
These crimes take different forms and are committed all over the world. So,
you all can think what can be the examples of such crimes. Some of the most
common crimes that the financial sector is facing are money laundering,
terrorist financing, financial fraud, tax theft, fake currency, identity theft and
67
many more. These types of crimes happen every day and governments across
the country are constantly working to stop them.
They are proceedings financial criminals while looking for new ones. The two
most prevalent types of financial crimes in India today are money laundering
and terrorist financing.
Criminals who commit these types of crimes usually use very ultra-modern
technologies which mean that those technologies are difficult to separate and
catch.
Technologies:
The main method by which authorities are currently fighting financial crimes
is widespread surveillance through the use of technology. The arrival of
technology has helped mankind in many different ways, be it connectivity,
communication and so on. Technology can be found in every sphere of life,
although it has made our life easier but it has also made crime a convention.
68
Technology helps prevent financial crimes around the world, as artificial
intelligence (AI), machine learning (ML) and data analytics are seen as the
evolutionary stages of technology. These technologies can also be applied to
safety infrastructure.
When we talk about India, the first thing that comes to everyone's mind would
be the intentionally defaulters. Considering the case of Nirav Modi scams, it
exposed a major flaw in the banking system. If these things had been done
earlier, this scam would not have happened and money could have been saved.
A block chain can create a ledger where you will record every entry –
liabilities, contingent liabilities and all kinds of defined risks. Ledger
positions can be copy across multiple nodes across the bank, so it's
impossible to manipulation with them without getting caught.
However, where there is an exception someone will still need to sign
off.
One may take over the duties for intermittent periods from one
manager to another from a different region to report any exception.
This is quite common in the private sector, where one manager fills in
for another during vacation. It helps senior management get an
alternative view of the unit's health and performance.
69
Better reporting of exceptions
Makes finding hacks easy
Preventing liabilities outside the system
Though of late, Indians have now become aware of using more and more
technology to control financial crimes. By linking Aadhaar with bank
accounts, online form filling and payments, government services have brought
transparency to the financial sector.
Artificial Intelligence:
Artificial intelligence has the ability to recognize patterns of transactions and
allow professionals to quickly comply to better spend their time. AI (artificial
intelligence) also has the ability to analyze results, investigate root causes and
collaborate findings with other financial institutions or authorities. Through
the use of big data, financial institutions gain a clear understanding of
individuals and supply chains to establish the path of illegal profits from
activities such as drugs, arms, human trafficking, slavery, corruption, fraud
and many other crimes. This makes it easier to share information with other
organizations and authorities to reduce the flow of criminal money laundering
through these accounts.
70
Preventing money laundering is something that is on the priority list and on
the regular agenda that can be done with the use of technology in
collaboration.
When an event is organized for it, there are many countries that come to attend
those events and share their views and ideas regarding it. The following ideas
emerged:
71
Financial Institution:
Financial institutions play a very important role as they are the ones who
collect all the data. They identify and verify customers and can trace
customers involved in crime. An effective process is very important as
organizations are the first to collect data from customers and regulations
change daily and apply to more and more collections. There are ways that
banks in India should approach to protect themselves from financial crimes:
Organizations know their customers and collect data accordingly. They face
many problems and at the same time they have to work to solve those
problems because they have to create linkages between every single
department (financial crime, transaction monitoring, suspicious activity
reporting, etc.) because many of them do not have. There is good coordination
for it but they are working to develop it further.
72
Customer Principle:
A crucial element in the fulfillment of our obligations is known as the
customer-principle. It takes a lot of time to establish long-term business
relationships with their customers, a factor that greatly facilitates the detection
and prevention of financial crimes in banks. All credit banks also ensure that
they identify the beneficial owners behind each business terms. These are real
individuals who profit significantly from business relationships. This approach
is applied in many countries where banking supervision legislation does not
yet provide this level of discretion.
With regular training and other measures, one can ensure their staff can
recognize the risk of financial crimes at all times as well as understand and
implement existing regulations on customer responsibilities and prevention
against money laundering.
73
account appropriation by validating identities using two-step authentication
and identifying malicious logins and bot activity.
74
4. Provide alerts and analysis tools for administrators:
Internal fraud monitoring, where software can review internal actions to
determine the need for investigation. It reduces the cost of fraud operations by
reducing chargeback and manual inspection rates.
Dashboard alerts and the fraud detection process in FMS is a key tool for fraud
managers. This tool allows fraud analysts to view critical performance
indicators, analyze whether fraud detection targets are being used, and review
performance metrics to ensure cases are being managed and solutions are
being implemented appropriately.
5.6 Conclusion:-
For loan verification process:
The traditional paper based loan application by the customer is replaced by an
online loan application and verification system which helps user to apply loan
through registration, uploading documents, and loan approval or rejection
status done online by admin such as bank employee with the help of CIBIL
score.
The PAN number of customer is used for getting CIBIL report where it gives
details of one’s debt accounts and their payments in other banks. The
76
customers get loan approval or reject status when he logins, if approved
uploading of documents to admin and then rest process will be done manually.
From the whole concept of financial crimes, you will now know that what
financial crimes are? And how many countries are dealing with them with the
advent of technology? Because the criminals who commit such acts are always
ahead of the workers. But many countries are working on it with different
77
manual or technological variations and have created different ways to fight
financial crimes.
Because there are ways in which technology can help reduce financial crime.
But the key issue is activation of the financial sector as well as successful
implementation of technology. If we talk about our country India is on the
right track but the process and implementation needs to be speeded up.
The best computer technology application for fraud detection and prevention
is an expert system because its characteristics are user-friendly. Expert
systems can combine rules and rule extraction into fraud detection
frameworks. This is a great advantage for auditors as they can enter their own
limits to detect fraud. It is also a reliable system that can work on real-time or
historical data. This option enables auditors to compare the latest results with
previous results, thus they can maintain their performance at the top.
78
Chapter: - 6
79
6.2 Complete loan verification process understandable at Simran
Management Pvt. Ltd.:-
The loan verification process is as follows:
1. First of all loan applicant cases come from bank only through mail in pdf,
word, image etc. format.
2. And then the whole process is done by computer technology. Coming cases
are allotted to verifiers (field executive) according to area and items which can
be verified. All details & address shared through whatsapp communication
medium.
3. All cases are then entered into the trigger.
4. And after that all case negative record check from negative record which
provide by all connect member bank in excel sheet format. And if found any
case in this record then immediately is marked as negative.
5. Finally the cases are positive so far which will verify the cases in further
process. All the case details are checked like Income Tax Return, Residential
Profile, Office Profile, Aadhaar Card, PAN Card, Business Profile, GST
Number, Bank Statement etc. through online website and based on providing
original documents by bank is verified.
6. After that a banking statement check issued by the bank.
7. Then when the verifier (field executive) sends the report of business profile,
residential profile, office profile etc. through whatsapp then make final
remarks of verifier report and after end make final report of all verified cases
from field verifier in word or pdf format and send by mail to relevant Bank to
give status like Positive/Negative.
6.3 The excel sheet contains all the case verification websites used by
'Simran Management Pvt. Ltd.':
Sr. Link Search Name
No.
1 http://dnh.nlrmp.in/avanika/ 7/12 Dadra and
Silvassa
2 https://anyror.gujarat.gov.in/ 7/12 Details
Gujarat/CITY
80
SURVEY
3 https://resident.uidai.gov.in/verify Aadhar Card number
check
4 https://portal2.bsnl.in/myportal/viewbills.do BSNL Bill
5 http://112.133.194.254/locm.asp CA Member
6 https://e-milkat.gujarat.gov.in/Default.aspx City Survey Check
7 https://commercialtax.gujarat.gov.in/ Commercial Tax
vatwebsite/home/home.jsp
8 https://www.zaubacorp.com/ Company Details
Search
9 https://www.dnhpdcl.in/Consumer/ Dadra Nagar Haveli
QuickPay/DuplicateReceipt.aspx Bill Check
10 http://dgbill.dgvcl.co.in/CheckBillDetails/ DGVCL
index.php
11 https://www.nmc.org.in/information-desk/ Doctor Registration
indian-medical-register/ check
12 https://www.domainsearch.com/oldindex.htm Domain Search
13 https://www.whois.net/ Domain Search
14 https://parivahan.gov.in/rcdlstatus/? DRIVING LICENCE
pur_cd=101 CHECK
15 https://enagar.gujarat.gov.in/DIGIGOV/ E Nagar (Gujarat All
digigov.htm? SMC site)
actionFlag=loadQuickPayPage&pagedisp=sta
tic&isCertVerification=1
16 https://www.shcilestamp.com/eStampIndia/ E Stamping
VerifyCertificate.es?rDoAction=VerifyCert
17 https://unifiedportal-epfo.epfindia.gov.in/ EPFO CHECK
publicPortal/no-auth/misReport/home/
loadEstSearchHome
18 https://xln.gujarat.gov.in/ FOOD & DURGS
XLN_Citizen_Menu.aspx LICENSE (NEW)
19 https://foscos.fssai.gov.in/ Food License Search
20 https://www.tdscpc.gov.in/app/tapn/ Form No 16 (TDS
81
tdstcscredit.xhtml CHECK)
21 https://www.mylpg.in/ Gas Book
22 http://agguj.cag.gov.in/gpf_status_new.aspx GPF Search
23 https://services.gst.gov.in/services/searchtp GST Search with GST
number
24 https://services.gst.gov.in/services/ GST Search with pan
searchtpbypan number
25 https://www.nmc.org.in/information-desk/ GUJARAT MEDICAL
indian-medical-register/ LICENCE
26 https://customerservice.hdbfssupport.com/ HDB Finance
BillDesk/Billdesk/Transactions/
Billdesk_Payment.aspx?intro_chk=on
27 https://nli.icicibank.com/NewRetailWeb/ ICICI Home Finance
homeLoanStmtLoginPage.htm
28 https://www.icicilombard.com/tag-your-policy ICICI Lombard
29 https://www.icegate.gov.in/EnqMod/ IEC CHECK
30 https://smartapps.iifl.com/ IIFL Repayment
PaymentsCollectionUI/IIFLQuickPay.aspx
31 https://garvi.gujarat.gov.in/frmIndex2.aspx Index 2
32 https://indiankanoon.org/ Indian Kanoon
33 https://tin.tin.nsdl.com/oltas/servlet/ IT Tax Challan
QueryTaxpayer
34 e-Filing Home Page, Income Tax Department, ITR V Status
Government of India
35 https://kmplcustomerportal.kotak.com/kmpl- KOTAK CAR LOAN
customer/customer/login.htm
36 https://payments.billdesk.com/MercOnline/ Kotak Prime
kotakemi/
kotakEMITermsAndConditions.jsp?
type=bank
37 https://vehicleloan.mahindrafinance.com/UI/ Mahindra Finance
UnRegisterUser.aspx SOA check
38 https://mpay.guvnl.in/paytm/QuickPay.php? MGVCL
82
&company=MGVCL
39 https://nationalinsuranceindia.nic.co.in/ National Insurance
portal/page/portal/Corporate/Home/ Policy
RenewPolicyPage
40 https://portal1.passportindia.gov.in/ New Passport
AppOnlineProject/statusTracker/
trackStatusInpNew
41 https://onlineservices.tin.egov-nsdl.com/ Pan Name Details
etaxnew/tdsnontds.jsp
42 http://pgvcl.com/consumer/ PGVCL
consumer_details.php
43 https://gujrera.gujarat.gov.in/ PROPERTY
PROJECT DETAILS
CHECK
44 https://dcs-dof.gujarat.gov.in/live-info.htm Ration Card
45 http://mca.gov.in/mcafoportal/ Register Company
viewCompanyMasterData.do Search
46 https://www.reliancegeneral.co.in/Insurance/ Reliance Policy
Self-Help/Print-Policy-Online.aspx?
Source=Hm
47 https://onlinepayment.nrfsi.com/paymentgw/ Renault Finance loan
renault/PaymentDetails.php statement check
48 https://eshramseva.gujarat.gov.in/FW/ SAFETY AND
FWMaster/frmFWUploadCertSearch.aspx? HEALTH LABOUR
MI=D435800000 CERTY
49 https://saras.cbse.gov.in/cbse_aff/ School Affiliation
schdir_Report/userview.aspx
50 https://rte.orpgujarat.com/Common/ School List
SchoolList?district_master_id=6abb41b5-
bd67-4598-8ea5-
4c7edd6d47b8&block_master_id=60cde24a-
278c-4768-a81e-
b1c6272f0844&ward_master_id=&keyword=
83
&page=3
51 https://www.shriramgi.com/ Shriram General
Motor_Policy_Pdf.html Policy
52 https://www.suratmunicipal.gov.in/ SMC Employee Details
Information/EmployeeDetails
53 https://udhyog.gujarat.gov.in/ SSI CHECK
54 https://www.suratmunicipal.gov.in/ Surat SMC
OnlineServices/ (PROPERTY TAX,
PROFESSIONAL
TAX, DEATH AND
BIRTH CERTY,
SHOP
ESTABLISHMENT)
55 https://www.tmf.co.in/tmfuniverse/ Tata Motors
tatamotorfinance/quick_pay.jsp
56 https://connect.torrentpower.com/tplcp/ Torrent Power
index.php/CrCustmast/quickpay
57 https://udyamregistration.gov.in/ Udyam Certy
Udyam_Verify.aspx
58 https://udyamregistration.gov.in/UA/ Udyog Aadhar
UA_VerifyUAM.aspx
59 http://ugvcl.info/UGBILL/index.php UGVCL
60 https://dnhctdonline.gov.in/dadraereg/ Vat Certy Dadra &
DealerSearch.aspx/ silvassa
61 https://www.tinxsys.com/ Vat Licence search
TinxsysInternetWeb/searchByTin_Inter.jsp
62 http://ceodnh.nic.in/Search.aspx Voter ID Dadra and
Silvassa
63 https://erms.gujarat.gov.in/ceo-gujarat/ VOTER ID
master/Elector-Search-Dist-AC-Serial.aspx GUJARAT
64 https://electoralsearch.in/ Voter ID Search
84
Table: 6.1 All the case verification websites used by 'Simran Management Pvt.
Ltd.'
Appendix
85
List of Online websites for documents verification at Simran
Managed Services Pvt. Ltd. in Excel sheet:-
Bibliography
86
1.1 Wikimedia Foundation. (2022, August 4). Managed services. Wikipedia.
Retrieved August 12, 2022, from
https://en.wikipedia.org/wiki/Managed_services
1.2 Managed services market size report, 2022-2030. Managed Services Market Size
Report, 2022-2030. (n.d.). Retrieved August 12, 2022, from
https://www.grandviewresearch.com/industry-analysis/managed-services-
market
1.3 Managed services market (by solution: Managed data center, managed network,
managed mobility, managed infrastructure, managed backup and recovery,
managed communication, managed information, managed security; by
deployment, on-premise, hosted; by Enterprise Size: Small & Medium
Enterprises (smes), large enterprises; by end-use: Financial Services,
government, healthcare, IT & Telecom, manufacturing, Media & Entertainment,
retail others; by Managed Information Service)- Global Forecasts 2022-2030.
Precedence Research. (n.d.). Retrieved August 12, 2022, from
https://www.precedenceresearch.com/managed-services-market
1.5 Managed services market. Market Research Firm. (n.d.). Retrieved August 12,
2022, from https://www.marketsandmarkets.com/Market-Reports/managed-
services-market-1141.html#:~:text=The%20managed%20services%20market
%20is, %2C%20NTT%20Data%20(Japan) %2C
1.7 Www.tofler.in. (2022, May 17). Simran Management Services Private Limited -
company profile, directors, Revenue & More. Tofler. Retrieved August 12,
2022, from
87
https://www.tofler.in/simran-management-services-private-limited/company/
U74910GJ2011PTC066301
1.8 What is back office work? (with 6 examples of back office jobs). Indeed Career
Guide. (n.d.). Retrieved August 12, 2022, from https://in.indeed.com/career-
advice/finding-a-job/what-is-back-office-work
1.9 Brogie, F. (n.d.). Field operations manager: Definition, job description, salary, and
more. Repsly. Retrieved August 12, 2022, from
https://www.repsly.com/blog/field-team-management/field-operations-manager-
definition-description-salary
1.10 Kagan, J. (2022, August 3). Loan. Investopedia. Retrieved August 12, 2022,
from https://www.investopedia.com/terms/l/loan.asp
1.11 Loan. Corporate Finance Institute. (2022, May 7). Retrieved August 12, 2022,
from https://corporatefinanceinstitute.com/resources/knowledge/finance/loan/
1.12 ClearTax. (2022, February 17). Loans - types of loans, eligibility, documents,
features and benefits. Loans - Types of Loans, Eligibility, Documents, Features
and Benefits. Retrieved August 12, 2022, from https://cleartax.in/s/loans
1.13 An easy guide for managing your loan cycle. Moneycontrol. (n.d.). Retrieved
August 12, 2022, from https://www.moneycontrol.com/news/business/personal-
finance/an-easy-guide-for-managing-your-loan-cycle-7916841.html
1.14 Chen, J. (2022, August 8). Fraud definition. Investopedia. Retrieved August 12,
2022, from https://www.investopedia.com/terms/f/fraud.asp
1.15 Types of fraud and indicators - WIRC-ICAI. (n.d.). Retrieved August 12, 2022,
from https://www.wirc-icai.org/images/material/Types-Fraud-Recognizing-
Fraud-Indicators-KR.pdf
1.16 Fraud. Corporate Finance Institute. (2022, February 26). Retrieved August 12,
2022, from
https://corporatefinanceinstitute.com/resources/knowledge/other/fraud/
88
1.17 What is fraud prevention? OneSpan. (n.d.). Retrieved August 12, 2022, from
https://www.onespan.com/topics/fraud-prevention
1.18 Top 7 steps for preventing loan application fraud. Fraud.net. (2021, May 3).
Retrieved August 12, 2022, from https://fraud.net/n/top-7-steps-for-preventing-
loan-application-fraud/
1.19 Codecademy. (n.d.). Introduction to it. Codecademy. Retrieved August 12, 2022,
from https://www.codecademy.com/learn/introduction-to-it
1.20 Castagna, R., & Bigelow, S. J. (2021, August 5). What is information
technology? definition and examples. SearchDataCenter. Retrieved August 12,
2022, from https://www.techtarget.com/searchdatacenter/definition/IT
1.21 Mitchell, B. (2020, June 15). What information technology professionals do for
their work and career. Lifewire. Retrieved August 12, 2022, from
https://www.lifewire.com/introduction-information-technology-817815
1.22 20 jobs in it to explore (with salary information). Indeed Career Guide. (n.d.).
Retrieved August 12, 2022, from https://in.indeed.com/career-advice/finding-a-
job/jobs-in-it
1.23 Online loan application & verification project. Nevon Projects. (2018, November
26). Retrieved August 12, 2022, from https://nevonprojects.com/online-loan-
application-verification-system/
1.24 Maximize efficiency. How Automation Can Improve Your Loan Origination
Process. (n.d.). Retrieved August 12, 2022, from
https://www.moodysanalytics.com/articles/2018/maximize-efficiency-how-
automation-can-improve-your-loan-origination-process
89
1.26 How has technology changed the Personal Loan Approval Process? Get Low
Interest Rate Loans in Hyderabad, Bangalore, Amaravathi. (n.d.). Retrieved
August 12, 2022, from https://www.loansparadise.com/blog/how-has-
technology-changed-the-personal-loan-approval-process
1.27 D. R., By, -, Rai, D., & here, P. enter your name. (2020, May 30). How can
technology help in the prevention of financial crimes. iPleaders. Retrieved
August 12, 2022, from https://blog.ipleaders.in/how-can-technology-help-in-
the-prevention-of-financial-crimes/
1.28 Top 7 benefits of using fraud management system and how to choose one. Subex
Limited. (2022, July 10). Retrieved August 12, 2022, from
https://www.subex.com/article/what-are-the-benefits-of-using-a-fraud-
management system/#:~:text=A%20fraud%20Management%20system
%20is,transactions%2C%20events%2C%20and%20databases
90