Process Information and Data (deleted)

Header Image
Project:
Process Information and Data (deleted) : Public <<TMF_Process>> eTOM Process
Created: 6/28/2022 5:52:29 PM
Modified: 1/16/2025 11:26:33 AM
Project:
Advanced:
Fraud operations in general should be receiving data almost continuously, and analysis of the received data should take place without delay where possible.  Earlier processing and/or analysis of datasets enables not only more rapid detection of fraud, but also the subsequent ability to take meaningful action to stop fraudulent activities before (any) damage is incurred by the business.  There are 3 primary functional areas within this process to address and define:<br/><br/>1. Rule Processing:  During rule processing activities, information and data is passed through rules either through automated (technology-based) means or other manual processes.  Depending on the volume of data and the complexity of the rules (interdependencies, aggregated or weighted triggering, etc.), increasing levels of technology will be necessary to quickly implement rules against data and determine the results.<br/>2. Alert Generation:  Configuration of alerts.  Alerts may be generated when certain expected conditions are not met, including missing dataset delivery, failure to act on investigation requests (escalations), etc.  Alerts may also be issued when certain conditions are exceeded, including excessive alarm quantities resulting from “loose” rules producing false positive results.<br/>3. Alarm Generation:  Configuration of alarms.  Alarms are typically the result of detected events or activities that are suspicious and should be investigated as possible fraud.  Alarms may be the result of single rule violations, or of multiple rule violations that contribute to weighted levels of suspicion (more complex scenario) etc.<br/><br/>Other functions may also include the configuration of supplementary reports for scenarios not configured through rules and alarms as listed above.<br/><br/>The configuration of rules, alerts, and alarms should be governed by policies as described in the 1.1.x processes for Fraud Management.  Additionally, the procedures that should be followed as a result of the issuance of an alert or alarm should be governed by policies as described within the 1.1.x processes for Fraud Management.<br/>
  • Associations To
  • Tagged Values
  • Advanced
Element Source Role Target Role
«TMF_Process» Support Fraud Management Operations
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Domain» Enterprise Domain
Domain «TMF_DomainAggregatesProcess»
Name:  
 
Name:  
 
Details:
 
Tag Value
BriefDescription This process is the ongoing processing of information and data against rules designed to detect threats, and the subsequent alerts and alarms resulting from rule violations and other detection processes.
Details:  
HierarchyLevel 5
Details:
Description: the level of this object in the hierarchy (1-x integer)
isDeleted True
Details:
Values: True,False
Issue Business Process Framework 14.5 Addition
Business Process Framework 15.0 Modification
Business Process Framework 15.5 Modification
Business Process Framework 16.5 Modification
Business Process Framework 20.5 Modification
Details:  
Maturity 4
Details:
Description: the maturity level of this element  (1-x integer)
Original Process Identifier 1.3.2.3.2.1
Details:  
Process Identifier 1.7.9.2.2.1
Details:  
TMFStatus Released
Details:
Values: Released,Preliminary,Draft,Not Fully Developed,likelyToChange,likelyToBeDeprecated
Description: the TM Forum status
UID 01868
Details:
Description: Unique Process ID
Property Value
isFinalSpecialization: 0