Ethical Issues PrepXl Flashcards
Which of the following would not be covered by the GLB Act?
A.Processor
B.Loan broker
C.Title company
D.Appraiser
The answer is Appraiser. The Gramm-Leach-Bliley Act requires financial institutions to give privacy notices to consumers, explaining their information-sharing policies. The GLB Act applies to financial institutions that offer financial products and services to individuals. Persons covered would include loan processors and loan brokers. Since title companies also handle consumers’ personal information, such entities would be covered as well. Appraisers are not covered under the GLB Act.
Under the Red Flags Rule, each affected business must:
A.Develop a written plan to reduce identity theft
B.Pull two credit reports on all borrowers
C.Request three forms of identification from all borrowers
D.Compare all customers to the fraud hotline list
The answer is develop a written plan to reduce identity theft. Under the Red Flags Rule, financial institutions that hold any consumer account or other account for which there is a reasonably-foreseeable risk of identity theft are required to develop and implement an identity theft program. The program must be established to identify patterns, practices, and specific forms of activity that are red flags signaling possible identity theft, detect and respond appropriately to red flags in order to prevent and mitigate identity theft, and be updated periodically to reflect changes in risks from identity theft.
Which of the following is true about the Do-Not-Call Implementation Act?
A.A business entity may never call a number listed on the Do-Not-Call Registry
B.The Do-Not-Call Registry only relates to telemarketers engaging in solicitation activities in the mortgage industry
C.An established business relationship between a business entity and a consumer does not fall under the scope of the Do-Not-Call Implementation Act
D.Once a phone number is listed on the Do-Not-Call Registry, it remains on the Registry until it is removed or service is discontinued
The answer is Once a phone number is listed on the Do-Not-Call Registry, it remains on the Registry until it is removed or service is discontinued.
As a result of the Do-Not-Call Implementation Act, a consumer may register his or her phone number on the national Do-Not Call Registry as a number that may not be called by telemarketers. Once registered, a phone number remains on the Registry until it is removed or service is discontinued. A company engaging in telemarketing activities may, however, call a number listed on the Registry if the company has an established business relationship with the consumer, unless the consumer specifically asks not to be contacted.
what is the “Do-Not-Call Implementation Act” ?
The “Do-Not-Call Implementation Act” is a U.S. law, enacted in 2003, that established the national Do-Not-Call Registry.
This registry allows individuals to limit the telemarketing calls they receive. The law was designed to give consumers a choice regarding whether they want to receive sales calls and to provide a way for them to avoid unsolicited calls.
Key Guidelines of the Do-Not-Call Implementation Act
- Do-Not-Call Registry: Consumers can register their telephone numbers on the Do-Not-Call Registry, which telemarketers are required to honor by not calling numbers listed on the registry. The registration does not expire, and a number stays on the registry until it is removed by the consumer or the number is disconnected and reassigned.
- Exemptions: Certain types of calls are exempt from the registry’s restrictions, including calls from:
- Charitable organizations
- Political organizations
- Polling surveys
- Companies with which a consumer has an existing business relationship (EBR), though this exemption lasts only for 18 months after the last purchase, delivery, or payment unless the consumer asks to receive calls.
- Enforcement and Penalties: The Federal Trade Commission (FTC), along with the Federal Communications Commission (FCC) and state authorities, are responsible for enforcing the rules of the Do-Not-Call Registry. Violations of the registry can result in substantial fines per incident.
- Telemarketer Requirements: Telemarketers are required to access the national registry database every 31 days and delete numbers on their call lists that are registered on the Do-Not-Call list.
- Calling Hours: Telemarketers are only allowed to call consumers between the hours of 8 a.m. and 9 p.m. local time.
- Caller ID: Telemarketers are required to transmit their phone number and, if possible, their name, through caller ID services.
The Do-Not-Call Implementation Act provides consumers with a mechanism to reduce the number of unwanted telemarketing calls, enhancing privacy and reducing the likelihood of scams and unwanted solicitations.
Which of the following best describes the Safeguards Rule?
A.A part of the FCRA which requires protection of customer information
B.A rule allowing financial institutions to escape liability arising from security breaches
C.A disclosure rule found in the Real Estate Settlement Procedures Act
D.A provision of the GLB Act which contains security plan requirements
The answer is :A provision of the GLB Act which contains security plan requirements.
The Safeguards Rule, found in the Gramm-Leach-Bliley Act, requires all financial institutions to design, implement, and maintain safeguards to ensure the security and confidentiality of its customers’ information.
what is the Safeguards Rule?
The Safeguards Rule is part of the regulations under the Gramm-Leach-Bliley Act (GLBA), which was enacted in 1999.
This rule specifically requires financial institutions to implement comprehensive security programs to protect the confidentiality and integrity of consumer personal information. The rule is enforced by the Federal Trade Commission (FTC) and aims to protect consumers by ensuring that financial institutions safeguard sensitive data.
Key Components of the Safeguards Rule:
- Written Security Plan: Financial institutions must develop, implement, and maintain a comprehensive written information security plan that describes their program to protect customer information.
- Designated Employees: The rule requires institutions to designate one or more employees to coordinate the information security program.
- Risk Assessment: Financial institutions must assess the risks to customer information in each relevant area of their operations, including how they collect, store, and process data. This assessment should consider potential threats to the security and integrity of customer information.
- Management and Control of Risk: Institutions must design and implement information safeguards to control the risks identified through their risk assessments, and regularly test or monitor the effectiveness of these safeguards.
- Service Provider Oversight: The Safeguards Rule also requires financial institutions to take steps to ensure that their service providers are capable of maintaining appropriate safeguards for customer information and actually do so. This involves contractual assurances from service providers.
- Evaluation and Adjustment: The security program must be evaluated and adjusted in light of the results of testing and monitoring, changes in operations or business arrangements, or due to any other circumstances that might impact the effectiveness of the security program.
- Employee Training and Management: Financial institutions are required to train staff appropriately to implement the information security program, and must manage them to ensure compliance with the security policies.
The Safeguards Rule covers a wide range of financial institutions, including not only banks, but also payday lenders, mortgage brokers, and others who offer financial products and services like loans, financial or investment advice, or insurance. The goal is to protect consumer privacy and prevent identity theft and fraud by ensuring proper handling and protection of personal information.
Flipping is:
A.Always illegal
B.Illegal depending on the amount of profit realized
C.The process of buying a property and then quickly selling it
D.Not allowed under conventional underwriting guidelines
The answer is the process of buying a property and then quickly selling it. Flipping is the process of buying a property and then quickly selling it. It can be a form of predatory lending if the primary objective of the mortgage broker and/or lender is to generate additional loan points, loan fees, prepayment penalties, and fees from financing the sale of credit-related products. To prevent mortgage fraud arising from flipping, the FHA has a property flipping prohibition that provides that, in general, only an owner of record may sell a property that will be financed using FHA-insured mortgages and a property resold within 90 days from the last sale is not eligible for FHA financing.
Which of the following situations is least likely to be fraudulent?
A.A borrower claims to make $250,000 per year, but owns almost no personal property
B.A borrower lists “CPA” as his job title, but has no schooling
C.A borrower claims to make $250,000 per year, but has very little debt
D.A borrower has six children but is buying a two-bedroom condominium
The answer is A borrower claims to make $250,000 per year, but has very little debt. It would not be unusual for a borrower making $250,000 to have little to no debt. As such, that situation would not be a red flag for mortgage fraud.
Each of the following may be associated with contract kiting, or double-contract fraud, except:
A.A silent second
B.An inflated purchase price
C.A cash-back transaction
D.An under-secured loan
The answer is a silent second. Contract kiting (also known as double contract or dual contract) occurs when a seller agrees to create a second, falsified sales agreement with an inflated purchase price so the buyer can obtain a larger loan from a lender. This would result in the buyer obtaining all the funds necessary to pay off the seller’s lower actual selling price from the loan proceeds, possibly getting cash back, and the lender being under-secured and subject to greater loss in the event of default.
What is Contract kiting” or “double-contract fraud” ?
Contract kiting” or “double-contract fraud” is a deceptive practice in the real estate and mortgage industries. This type of fraud involves the use of two different contracts for the same property transaction to deceive lenders and often other parties involved in the transaction.
How does Contract kiting” or “double-contract fraud” work ?
“Contract kiting” or “double-contract fraud” is a deceptive practice in the real estate and mortgage industries. This type of fraud involves the use of two different contracts for the same property transaction to deceive lenders and often other parties involved in the transaction. Here’s how it typically works:
Key Elements of Double-Contract Fraud:
- Two Contracts: The central element of this fraud is the existence of two contracts for the sale of the same property. The first contract is the genuine agreement between the buyer and seller at the true sale price. The second contract, however, is falsified and shows a higher purchase price than the actual amount agreed upon.
- Purpose of the Inflated Contract: The inflated contract is used to deceive a lender into providing a loan for more than the property is actually being sold for. The buyer then uses the extra funds for other purposes, which could range from covering the down payment to personal use or paying off other debts.
- Misrepresentation to the Lender: In this scheme, the lender is misled about the true value of the property and the actual price agreed upon by the buyer and seller. This misrepresentation can lead to the lender extending a mortgage that exceeds the property’s true market value, increasing the risk of loan default.
- Risks and Consequences: Double-contract fraud can lead to significant financial losses for lenders and can affect the integrity of the real estate market. Additionally, it exposes all parties involved in the fraud to legal actions, including criminal charges for fraud.
- Detection and Prevention: Detecting double-contract fraud can be challenging, but it often involves diligent checks by the lender, such as verifying the contract details with independent property valuations and closely examining the borrower’s financial history and the transaction documents for any inconsistencies.
This type of fraud is a serious criminal offense and part of broader mortgage fraud schemes that regulators and financial institutions continually work to detect and prevent. It undermines the trust in the financial and real estate markets and can have widespread negative effects, including contributing to financial crises, such as the one experienced in 2007-2008.
A borrower has obtained the down payment for a property by taking an undisclosed and unrecorded second mortgage from the seller. This is called a(n):
A.Second mortgage
B.Unsecured loan
C.Silent second
D.Dual contract
The answer is silent second.
A silent second is a form of mortgage fraud whereby a primary lender grants a mortgage loan to a borrower, believing that the borrower has invested his or her own money in the down payment and closing costs. However, the borrower has actually borrowed the needed funds from the seller via an undisclosed and unrecorded (i.e., silent) second mortgage.
An example of a red flag under the Red Flags Rule would include all of the following, except:
A.Missed payments occur when there is no history of missed payments by the borrower
B.The borrower has moved from another state
C.Mail sent to the borrower is returned as undeliverable
D.The credit report contains a different address for the borrower than the one supplied
The answer is the borrower has moved from another state.
Categories of red flags include alerts, notifications, or other warnings received from consumer reporting agencies, the presentation of suspicious documents, the presentation of suspicious personal identifying information, personal identifying information provided by the customer that is inconsistent with other personal identifying information provided by the customer, a covered account is used in a manner that is not consistent with established patterns of activity on the account, and notification is received that the customer is not receiving paper account statements or that there have been unauthorized transactions on a covered account. Moving from one state to another would not be considered to be a red flag
a red flag under the Red Flags Rule would include all of the following:
The Red Flags Rule, implemented by the Federal Trade Commission (FTC), requires certain businesses and organizations to implement a written Identity Theft Prevention Program designed to detect the warning signs — or “red flags” — of identity theft in their day-to-day operations. Red flags are suspicious patterns or practices, or specific activities that indicate the possibility of identity theft.
Here are examples of red flags under the Red Flags Rule:
-
Suspicious Documents:
- Documents provided for identification appear to have been altered or forged.
- The photograph or physical description on the identification is not consistent with the appearance of the customer presenting the identification.
- Other information on the ID is inconsistent with information provided by the person opening a new account or customer presenting the ID.
-
Suspicious Personal Identifying Information:
- Discrepancies in address, Social Security Number (SSN), phone number, or other personal information that do not match external information sources.
- An SSN that has not been issued or is listed on the Social Security Administration’s Death Master File.
- Inconsistencies between the SSN range and date of birth.
-
Unusual Use of, or Suspicious Activity Related to, the Account:
- Noticeably rapid increase in credit usage or large, unexplained withdrawals or transfers between accounts.
- The customer fails to make the first payment or makes an initial payment but no subsequent payments.
- A customer who reopens a previously closed account without a reasonable explanation.
-
Alerts from Others:
- Notice from customers, victims of identity theft, law enforcement authorities, or other businesses about possible identity theft in connection with covered accounts held by the financial institution or creditor.
-
Inconsistent Account Activity:
- Accounts that are used in a way that is not consistent with established patterns of activity, such as nonpayment when there is no history of late or missed payments.
- Unusual foreign transactions when the customer’s account history shows no such previous activity.
Organizations subject to the Red Flags Rule are expected to identify likely risks specific to their environment or business operations and update their programs accordingly. This proactive approach helps curb the risks associated with identity theft, protecting both the consumer and the institution.
Which of the following best describes the potential penalty for violators of Do-Not-Call rules?
A.Up to $51,744 per day in which calls were made
B.Up to $51,744 per customer actually contacted
C.Up to $51,744 per call made
D.Up to $51,744 per hour in which calls were made
The answer is up to $51,744 per call made. A person that violates the Do-Not-Call Implementation Act is subject to a penalty of $51,744 for each violation; each day a violation continues is considered to be a new violation. Where a violation is a call made in violation of Do-Not-Call rules, the penalty is imposed per call.