Email Risk Assessment Report Search

LexisNexis® Email Risk Assessment is an email validation and confirmation tool that can identify whether a subject's email address is valid and how long it has existed, provide information about the domain of the email address, and provide a risk score that is related to the information that is associated with the email address. When you incorporate the results from Email Risk Assessment into a workflow, you can use the results to request additional identity verification steps.

Before you begin this task:
  • Depending on your product subscription, you may not have access to this search.
  • Your DPPA (Driver’s Privacy Protection Act), GLBA (Gramm‐Leach‐Bliley Act), and DMF (Death Master File) permissible use selections appear at the bottom of the form. Click the links if you need to change your permissible use selections before you run a new search.
  • Your FCRA (Fair Credit Reporting Act) permissible use selection appears at the bottom of the form. Click the link if you need to change your permissible use selection before you run a new search.
  • To view a sample report that is generated from this search, click Sample Report.
  • To view source information for this search, click Source.

You can search by an email address or you can search by an email address and PII (personally identifiable information) to verify identities that are associated with the email address. To search by email address and PII, you must provide information in the following fields:

  • Email
  • Last Name
  • First Name
Procedure:
  1. Select a search type.
    • Select Basic to search in-house LexisNexis® Risk Solutions and ThreatMetrix® content to find the best subjects who are associated with an email address and the email address metadata points. This option also provides additional metadata for the email address status using a real-time email gateway. The Basic option displays an email risk indicator that is based on configurable business rules and metadata points that are associated with the email address.
    • Select Basic – Risk Only to search in-house LexisNexis Risk Solutions and ThreatMetrix content to display an email risk indicator that is based on configurable business rules and metadata points that are associated with the email address. Subject and content data points that are associated with the email address are not displayed.
    • Select Premium to access all of the information that is included in the Basic search and also retrieve additional subjects and detailed information that is associated with the email address, which is available through an additional real-time email gateway, for a deeper analysis of the email address risk.
    • Select Premium – Risk Only to access all of the information that is included in the Basic – Risk Only search and also retrieve additional subjects and detailed information that is associated with the email address, which is available through an additional real-time email gateway, for a deeper analysis of the email address risk. Subject and content data points that are associated with the email address are not displayed.
  2. Enter the email address.
  3. To enter additional PII to verify identities that are associated with the email address, select Include Verification and complete the following steps:
    1. Enter the email address.
    2. Enter the last name.
    3. Enter the first name.
    4. Enter the street address with or without numbers.
      You can also include any other details such as Ave, St, Ct, or Blvd.
    5. Enter the city.
    6. Select the state.
    7. Enter the ZIP Code (for example, 12345).
  4. To associate your search with a customer or a topic, provide a label (for example, the customer's name or a topic name) in the Reference ID field.
    The History function lets you view the searches that are associated with a reference ID.
    Note Your organization may require a reference ID in a particular format. Additionally, the contents of this field may be automatically completed or the field may have restrictions that are configured by your administrator.
  5. Click Continue.