{"id":7965,"date":"2025-02-11T19:29:26","date_gmt":"2025-02-11T19:29:26","guid":{"rendered":"http:\/\/3.238.88.160\/fraud-control-impersonation\/"},"modified":"2025-03-06T21:37:38","modified_gmt":"2025-03-06T21:37:38","slug":"fraud-control-impersonation","status":"publish","type":"page","link":"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/","title":{"rendered":"Fraud control impersonation"},"content":{"rendered":"<h1>Fraud and impersonation control  <\/h1>\n<h3>Optimize your operation with inData&#8217;s automatic anti-fraud control<\/h3>\n<p>Ensure that rounds are conducted correctly and <strong>avoid complaints from your customers<\/strong><\/p>\n<figure>\n\t\t\t\t\t\t\t<\/figure>\n<h2>Location<\/h2>\n<p>Automatic verification of the round at the service location.<\/p>\n<figure>\n\t\t\t\t\t\t\t<\/figure>\n<h2>Displacement<\/h2>\n<p>Prevention of impersonation through motion control.<\/p>\n<figure>\n\t\t\t\t\t\t\t<\/figure>\n<h2>Registration of fraud attempts<\/h2>\n<p>Detect and centralize any attempt of impersonation or irregularity.<\/p>\n<figure>\n\t\t\t\t\t\t\t<\/figure>\n<h2>Identity authentication<\/h2>\n<p>With <strong>inData FaceID<\/strong>, ensure that the person performing the patrol is the authorized person.<\/p>\n<p>Easy and fast, integrated with <strong>inData FaceID<\/strong><\/p>\n<p>Take advantage of inData&#8217;s automatic login with facial recognition (inData FaceID) and allow your officers or operational staff to register their attendance from the same login in the inData mobile app. All easy and hassle-free, all in one action. <\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"576\" height=\"462\" src=\"http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/05\/faceID1.png\" alt=\"\" srcset=\"http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/05\/faceID1.png 576w, http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/05\/faceID1-300x241.png 300w, http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/05\/faceID1-94x75.png 94w, http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/05\/faceID1-480x385.png 480w\" sizes=\"(max-width:767px) 480px, 576px\" \/><br \/>\n\t\t\t\t\t<a role=\"button\"><br \/>\n\t\t\t\t<svg aria-hidden=\"true\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M424.4 214.7L72.4 6.6C43.8-10.3 0 6.1 0 47.9V464c0 37.5 40.7 60.1 72.4 41.3l352-208c31.4-18.5 31.5-64.1 0-82.6z\"><\/path><\/svg><br \/>\n\t\t\t\t\t<\/a><\/p>\n<p><strong>Ready to get started?<\/strong><\/p>\n<p>Request a free demo today and discover how inData can increase your company&#8217;s operational efficiency.<\/p>\n<p>\t\t\t<a href=\"http:\/\/3.238.88.160\/agendar\/\" rel=\"nofollow\">Schedule a demonstration<\/a><br \/>\n\t\t\t<a href=\"http:\/\/3.238.88.160\/contacto\/\" rel=\"nofollow\">Contact<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"355\" height=\"462\" src=\"http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/08\/indata_29-b.webp\" alt=\"\" srcset=\"http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/08\/indata_29-b.webp 355w, http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/08\/indata_29-b-231x300.webp 231w, http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/08\/indata_29-b-58x75.webp 58w\" sizes=\"(max-width:767px) 355px, 355px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fraud and impersonation control Optimize your operation with inData&#8217;s automatic anti-fraud control Ensure that rounds are conducted correctly and avoid complaints from your customers Location Automatic<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fraud control impersonation - inData-Security<\/title>\n<meta name=\"description\" content=\"Optimize your operation with inData, avoiding fraud and impersonation with FaceID. Control location and movements, and verify identity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fraud and impersonation control\" \/>\n<meta property=\"og:description\" content=\"Ensure secure rounds with real-time verification.\" \/>\n<meta property=\"og:url\" content=\"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/\" \/>\n<meta property=\"og:site_name\" content=\"inData-Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/indata3C\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-06T21:37:38+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/3.238.88.160\/wp-content\/uploads\/2025\/02\/indata-redes.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@IndataSecurity\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/\",\"url\":\"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/\",\"name\":\"Fraud control impersonation - inData-Security\",\"isPartOf\":{\"@id\":\"http:\/\/3.238.88.160\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/05\/faceID1.png\",\"datePublished\":\"2025-02-11T19:29:26+00:00\",\"dateModified\":\"2025-03-06T21:37:38+00:00\",\"description\":\"Optimize your operation with inData, avoiding fraud and impersonation with FaceID. Control location and movements, and verify identity.\",\"breadcrumb\":{\"@id\":\"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/#primaryimage\",\"url\":\"http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/05\/faceID1.png\",\"contentUrl\":\"http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/05\/faceID1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/3.238.88.160\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fraud control impersonation\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/3.238.88.160\/en\/#website\",\"url\":\"http:\/\/3.238.88.160\/en\/\",\"name\":\"inData\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\/\/3.238.88.160\/en\/#organization\"},\"alternateName\":\"inData\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/3.238.88.160\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/3.238.88.160\/en\/#organization\",\"name\":\"inData\",\"url\":\"http:\/\/3.238.88.160\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/3.238.88.160\/en\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/3.238.88.160\/wp-content\/uploads\/2023\/10\/logo_empresa_indata.png\",\"contentUrl\":\"http:\/\/3.238.88.160\/wp-content\/uploads\/2023\/10\/logo_empresa_indata.png\",\"width\":838,\"height\":586,\"caption\":\"inData\"},\"image\":{\"@id\":\"http:\/\/3.238.88.160\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/indata3C\",\"https:\/\/x.com\/IndataSecurity\",\"https:\/\/www.instagram.com\/indata_security\/\",\"https:\/\/www.linkedin.com\/company\/96220963\/admin\/feed\/posts\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fraud control impersonation - inData-Security","description":"Optimize your operation with inData, avoiding fraud and impersonation with FaceID. Control location and movements, and verify identity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/","og_locale":"en_US","og_type":"article","og_title":"Fraud and impersonation control","og_description":"Ensure secure rounds with real-time verification.","og_url":"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/","og_site_name":"inData-Security","article_publisher":"https:\/\/www.facebook.com\/indata3C","article_modified_time":"2025-03-06T21:37:38+00:00","og_image":[{"url":"http:\/\/3.238.88.160\/wp-content\/uploads\/2025\/02\/indata-redes.jpg"}],"twitter_card":"summary_large_image","twitter_site":"@IndataSecurity","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/","url":"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/","name":"Fraud control impersonation - inData-Security","isPartOf":{"@id":"http:\/\/3.238.88.160\/en\/#website"},"primaryImageOfPage":{"@id":"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/#primaryimage"},"image":{"@id":"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/#primaryimage"},"thumbnailUrl":"http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/05\/faceID1.png","datePublished":"2025-02-11T19:29:26+00:00","dateModified":"2025-03-06T21:37:38+00:00","description":"Optimize your operation with inData, avoiding fraud and impersonation with FaceID. Control location and movements, and verify identity.","breadcrumb":{"@id":"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/#primaryimage","url":"http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/05\/faceID1.png","contentUrl":"http:\/\/3.238.88.160\/wp-content\/uploads\/2024\/05\/faceID1.png"},{"@type":"BreadcrumbList","@id":"http:\/\/3.238.88.160\/en\/fraud-control-impersonation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/3.238.88.160\/en\/"},{"@type":"ListItem","position":2,"name":"Fraud control impersonation"}]},{"@type":"WebSite","@id":"http:\/\/3.238.88.160\/en\/#website","url":"http:\/\/3.238.88.160\/en\/","name":"inData","description":"","publisher":{"@id":"http:\/\/3.238.88.160\/en\/#organization"},"alternateName":"inData","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/3.238.88.160\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/3.238.88.160\/en\/#organization","name":"inData","url":"http:\/\/3.238.88.160\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/3.238.88.160\/en\/#\/schema\/logo\/image\/","url":"http:\/\/3.238.88.160\/wp-content\/uploads\/2023\/10\/logo_empresa_indata.png","contentUrl":"http:\/\/3.238.88.160\/wp-content\/uploads\/2023\/10\/logo_empresa_indata.png","width":838,"height":586,"caption":"inData"},"image":{"@id":"http:\/\/3.238.88.160\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/indata3C","https:\/\/x.com\/IndataSecurity","https:\/\/www.instagram.com\/indata_security\/","https:\/\/www.linkedin.com\/company\/96220963\/admin\/feed\/posts\/"]}]}},"_links":{"self":[{"href":"http:\/\/3.238.88.160\/en\/wp-json\/wp\/v2\/pages\/7965"}],"collection":[{"href":"http:\/\/3.238.88.160\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/3.238.88.160\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/3.238.88.160\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/3.238.88.160\/en\/wp-json\/wp\/v2\/comments?post=7965"}],"version-history":[{"count":13,"href":"http:\/\/3.238.88.160\/en\/wp-json\/wp\/v2\/pages\/7965\/revisions"}],"predecessor-version":[{"id":8028,"href":"http:\/\/3.238.88.160\/en\/wp-json\/wp\/v2\/pages\/7965\/revisions\/8028"}],"wp:attachment":[{"href":"http:\/\/3.238.88.160\/en\/wp-json\/wp\/v2\/media?parent=7965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}