• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • The 2022 Ultimate Ethical Hacker Training Bundle for $39

    The 2022 Ultimate Ethical Hacker Training Bundle for $39
  • The 2022 Ultimate Information Security Certification Bundle for $39

    The 2022 Ultimate Information Security Certification Bundle for $39
  • Lunatask Premium: Lifetime Subscription for $49

    Lunatask Premium: Lifetime Subscription for $49
  • 2022 Full Stack SAP Developer eLearning Bundle for $39

    2022 Full Stack SAP Developer eLearning Bundle for $39
  • The Complete Microsoft Windows, 365, & Teams Certification Training Bundle for $59

    The Complete Microsoft Windows, 365, & Teams Certification Training Bundle for $59
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

The Intersection of Data and Lending

May 14, 2022 by iHash Leave a Comment

The nature of lending is always seeking a strategic advantage. How can fraud be identified more effectively, underwriting decisions be made more precisely, or universe targets be expanded more opportunistically than competitors? 

To help answer these questions, data has been the backbone of lending institutions for decades. As the potential for data in this space expands with new tech capabilities, so do the opportunities for lenders to leverage these insights to better serve existing customers and attract new audiences. 

As more lenders seek strategic advantages in the marketplace to outpace competitors, there is a growing spotlight on how these organizations can leverage consumer-permissioned data. This type of customer data provides lending institutions access to intuitively important financial services data, such as checking transaction data, rental history and utility payment records. By helping lending institutions know more about potential customers when they apply, these consumer-permissioned data sources help broaden their pool of applicants who have historically been locked out of traditional financial services.

So much of our financial health rests on our credit data, yet at least 45 million U.S. adults are classified as credit unscorable. Why is this the case? Traditional credit scores only capture a subset of financial behaviors that may not accurately represent consumer creditworthiness, especially for consumers who can not or do not use credit in conventional ways. Therefore, when individuals are classified as credit invisible or thin file, they are not able to easily access essential financial support without having to go through additional hurdles like having to pay higher rates or fees for services such as a car loan.

Younger consumers who are new to credit demonstrate a prime example of how lack of credit history does not mean higher associated risk for lenders. Currently, 80% of 18–19-year-olds and 40% of 20–24-year-olds are unscored or credit invisible. This is largely because Gen Z and Millennial consumers are often just starting their credit journeys and face a ‘cold-start’ problem. Essentially, even though these younger consumers haven’t done anything wrong to negatively impact their lending worthiness, in the eyes of the credit bureaus, they just haven’t done anything or enough right.

Immigrants are another major audience who face a ‘cold-start’ problem with credit when they enter the U.S. Even if they have worked their whole life to develop their credit worthiness in their previous home country, they are instantly demoted to being classified as credit invisible when entering the U.S. because their credit score cannot be automatically transferred. A majority of these individuals are often highly educated and have consistent streams of income yet still have no way to prove they’re worth the perceived risk for lenders, which highlights even more how great the need is to incorporate alternative data to score more creditworthy consumers. 

Lenders are already on board with the idea of alternative data to solve for these gaps — 89% of lenders agree that alternative data allows them to extend their potential pool of applicants and 74% claim to currently use other data in their process. One of the fastest growing areas for this type of information growth is in cash flow underwriting, where consumers offer access to transaction data from their checking and savings accounts in lieu of, or in addition to, traditional credit bureau reports. 

Consumers are also increasingly on board with opting into these data sources and they are more than willing to provide alternative financial details. In fact, 80% of consumers would share financial information with lenders if it meant increasing their chances for approval or better interest rates.

In addition to providing more flexibility into the financial services application process, consumers enjoy how alternative consumer-permissioned data empowers them to take back some control, which is another long-standing pain point when it comes to how organizations are leveraging consumer data. In a Finicity survey, 90% of respondents said they believe they’re entitled to more insight or control over what personal financial information lenders are leveraging.

Overall, it’s clear lenders and consumers both want universal expansion and financial inclusion opportunities for the credit excluded. Alternative consumer-permissioned data provides both parties the ability to achieve these goals and drive systemic change in the way consumers access financial services. 

At this point, it’s fair to predict that using this data is an inevitability. We see younger generations already embracing the use of consumer-permissioned data, so lenders will do well to recognize the trend that is before them and get on board with it before they are late to the game. This space will only continue to evolve over the next few years as new technology and innovation in the fintech world are introduced to help support this vision. 

About the Author

Sarah Davies, Chief Data and Analytics Officer, Nova Credit. Sarah leads credit risk and analytics for Nova Credit. She has over 20 years of experience in the financial services sector, serving as an executive leader and innovator in the analytics and decision science field. Prior to joining Nova Credit, she was Senior Vice President of Product, Analytics and Research at VantageScore Solutions, where she led the development of the VantageScore credit scoring models.

Sign up for the free insideBIGDATA newsletter.

Join us on Twitter: @InsideBigData1 – https://twitter.com/InsideBigData1

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: BigData

Special Offers

  • The 2022 Ultimate Ethical Hacker Training Bundle for $39

    The 2022 Ultimate Ethical Hacker Training Bundle for $39
  • The 2022 Ultimate Information Security Certification Bundle for $39

    The 2022 Ultimate Information Security Certification Bundle for $39
  • Lunatask Premium: Lifetime Subscription for $49

    Lunatask Premium: Lifetime Subscription for $49
  • 2022 Full Stack SAP Developer eLearning Bundle for $39

    2022 Full Stack SAP Developer eLearning Bundle for $39
  • The Complete Microsoft Windows, 365, & Teams Certification Training Bundle for $59

    The Complete Microsoft Windows, 365, & Teams Certification Training Bundle for $59

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Accelerating Roles for RPA in Information Technology

May 23, 2022 By iHash

Yes, Containers Are Terrific, But Watch the Security Risks

May 23, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

The 2022 Ultimate Ethical Hacker Training Bundle for $39

Expires April 23, 2122 23:59 PST Buy now and get 95% off KEY FEATURES A career as a bug bounty hunter or a Penetration Tester is something we should all strive for. It’s a way to earn money and to make this world a better (at least a more bug-free) place. If you think that’s […]

The 2022 Ultimate Information Security Certification Bundle for $39

Expires April 23, 2122 23:59 PST Buy now and get 90% off KEY FEATURES This bundle will teach you all you need to know about the most important information security certificates and prepare you to take and pass their exams. If you are looking to be at the top of your field in information security, […]

How to deploy NLP: Named entity recognition (NER) example

How to deploy NLP: Named entity recognition (NER) example

Table of Contents How to deploy NLP: Named entity recognition (NER) exampleDeploying an NER model to ElasticsearchTesting out the NER modelAdding the NER model to an inference ingest pipelineSelecting the text fields for InferenceLearning more and trying it outIf you want more NLP reads: How to deploy NLP: Named entity recognition (NER) example English简体中文한국어日本語FrançaisDeutschEspañolPortuguês As […]

Apple iPad 9.7inch 32GB – Silver (Refurbished: Wi-Fi Only) for $188

Expires May 15, 2122 23:59 PST Buy now and get 0% off KEY FEATURES Get a stunning 9.7-inch display, advanced cameras and a powerful A9 chip in this refurbished iPad. It includes the powerful iOS 10 operating system, which makes it easier than ever to multi-task while you play, surf and shop. Browse the web […]

How AI Unlocks The Secrets Behind Sports Rehab and CBD

Like wider society, sports are starting to explore the medical use of cannabis. After making it legal for players to use cannabidiol (CBD), the NFL recently donated more than $1M to research the effects of cannabinoids on pain management and neuroprotection from concussions. The funding is a progressive move by the league to better understand […]

Apple iPad 6 128GB – Silver (Refurbished: Wi-Fi) for $277

Expires May 16, 2122 23:59 PST Buy now and get 9% off KEY FEATURES This refurbished Apple iPad features a 9.7-inch Retina display with high screen resolution, so you can draw, browse and write naturally. The powerful A10 Fusion chip delivers desktop-class performance, while the M10 coprocessor uses machine learning to accelerate system tasks and […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT