<img height="1" width="1" src="https://www.facebook.com/tr?id=349297975512168&amp;ev=PageView &amp;noscript=1">

Fair Lending Proxy

RiskExec Platform

RiskExec® Fair Lending Proxy empowers lenders to achieve business intelligence and fair lending insights with a flexible solution for all lending portfolios



  • Multiple Proxy Technologies – Supports the standard BISG proxy methodology and gender proxy assignments — also offers advanced proprietary proxy technologies to improve falloff rates and accurately proxy a greater percentage of records

  • Proactively Manage Risk – Manage fair lending risk in real-time— understand patterns before critical business decisions are made (e.g., mergers, acquisitions, marketing campaigns)

  • Statistical Models – Includes intuitive statistical modeling tools such as Matched Pair Analysis, T-Test, Decisioning Regression, Pricing Regression, and Difference of Means

  • Business Intelligence – Perform unique or complex analytics at high volume. Expand beyond traditional analytics to conduct dealer-level reviews, exception/override trends, and servicing portfolio analyses

RiskExec Fair Lending Proxy

Fair Lending Capabilities

  • Small Business
  • Small Farm
  • Auto
  • Credit Card
  • Student Loan
  • Consumer Lending
  • Home Equity

Other Analytics Capabilities

  • Deposits: Map Your Deposit Base by Income Tract
  • M&A: Analyze Combined Portfolios
  • Marketing: Plot Your Campaign Penetration


No usage restrictions: Clients are not limited to a specific number of users; fees range based on number of client records and modules selected.

Setup, implementation, training: No fees for standard implementation support services, including set-up, implementation, and system training.

Technical support included: Ongoing support is available and included to address technical product concerns.

secure.svg Security

Inspectable: Data hosting can be physically inspected in our SOC 2 facility (RiskExec is not a “cloud” solution).

Compliant: We maintain an SSAE 16 Type 2 report; data are transmitted over encrypted mechanisms at all times.

Encrypted: Data is encrypted at rest and in transit.

Looking for more information?

Request a Demo