authentication identity verification 3-factor authentication internet security encryption credential verification background check ffiec compliance glba identity theft 2-factor authentication criminal background check 2-factor people search background checks security banking