IDENTIFY — Are We Real? | Pillar 1 of 5 | IDEAL Framework by Jimmy Ng
I
Pillar 1 of 5 · Identity Verification · Canada-First Trust Infrastructure

IDENTIFY — Are We Real?

Before money changes hands, before keys are exchanged, before a lease is signed, before personal documents are uploaded — both sides must prove they are who they claim to be and have the authority to act. Identity is the first gate. If it fails, every later step becomes more risky, more costly, and harder to defend.

$111B
Estimated annual fraud losses reported by surveyed Canadian business leaders
7.2%
Equivalent share of revenues lost to fraud in the same survey
26%
Share of fraud losses tied to synthetic identity in the 2025 TransUnion study
35
People identified by police in one Kitchener rental scam, about $40K lost
Kitchener, Ontario — one listing, many victims
In 2024, police in Waterloo Region said at least 35 people were identified as victims of an online rental scam in Kitchener, with losses of about $40,000. People arrived expecting to move in, only to discover the unit was not actually available. Some had signed agreements. Some had paid first and last month’s rent. Many were newcomers or students trying to secure housing quickly.

This is the Identify problem in plain language. The issue was not simply that the listing looked convincing. The issue was that the system allowed money and trust to move faster than verification.

A person can copy photos. A person can copy wording. A person can sound polite, professional, even urgent. But if the person has not been verified — and if their authority over the property has not been verified — the relationship begins on an unproven foundation.

The first rule of the IDEAL Framework No verified identity → no sensitive documents, no deposit, no keys, no lease, no exception.

The First Question in Renting

Every rental transaction should begin with one simple question: Are we real?

For tenants, that means: Is this landlord, owner, or property manager real? Are they authorized to lease this unit? Is this listing legitimate?

For landlords and property managers, that means: Is this applicant the real person behind the documents? Is the ID genuine? Is the person signing the same person who was screened?

The rental market does not fail only when bad people appear. It fails when the system cannot distinguish a real person from a fabricated one before money, access, or legal obligation begins. — Jimmy Ng, IDEAL Framework
Identify is not a checkbox It is not “look at an ID and move on.” It is the operational decision that determines whether the rest of the process is safe enough to continue.

Why Canada, Why Now

Canada’s rental market now operates in a high-friction environment: more digital interaction, more platform dependency, more cross-border movement, and more document-based decision-making. That would already raise risk. But fraud tools are improving faster than the average landlord, tenant, or small operator can adapt.

TransUnion 2025: Fraud is now a structural business issue Canada
In TransUnion’s 2025 Canadian study, surveyed business leaders estimated fraud losses at $111 billion, equal to 7.2% of revenues. The same study said synthetic identity fraud accounted for 26% of total fraud losses, up from 18% the previous year.
This matters for renting because housing transactions depend heavily on identity claims, document trust, and remote interaction.
Rental scams exploit urgency and housing pressure Case Pattern
The Kitchener case shows the pattern clearly: a believable listing, a believable contact, pressure to secure the unit, payment before real control is confirmed. In a tight or confusing market, speed becomes the scammer’s advantage.
The faster people must act, the more valuable a verified identity layer becomes.

This is why the IDEAL Framework does not start with marketing, applications, screening scores, or digital signatures. It starts with identity. Because if the person is unverified, then the documents, the communication, and the lease all inherit that uncertainty.


The Triage Rule

In a hospital, triage starts by identifying the patient. Before treatment, before medication, before surgery, the staff must know who is in front of them. Are the records attached to the right person? Is the history accurate? Are there language barriers, missing records, or urgent risks that change how the next step should happen?

Renting now faces a similar problem. If you do not know who the person is, you cannot safely decide what data to collect, what level of access to give, what promises to rely on, or what risk you are actually carrying.

The hospital analogy applied to renting Identity is the intake desk. Data is the chart. Engage is the shift handoff. Assess is the diagnosis. Lease is the treatment plan that must work day after day.

That is why Identify must come first. Not because it solves everything. But because without it, nothing after it is stable.


Who This Protects

In other words, Identify is not only about stopping bad actors. It is about giving good actors a safer starting point. A real system must protect both sides before the relationship becomes expensive, emotional, or hard to unwind.


When Identity Fails

The failure patterns are repetitive. The names and cities change, but the underlying breakdown stays the same.

Failure PatternWhat It Looks LikeWhy It Matters
Ghost landlordSomeone advertises a unit they do not own or control.Tenant sends money or documents to a stranger.
Fabricated tenant identityA real-looking application is backed by altered or mismatched identity evidence.Landlord makes a legal and financial decision on false input.
Signing mismatchThe person who signs is not clearly the person who was screened.The lease becomes harder to enforce and defend.
Authority gapThe person communicating cannot prove they are authorized to lease the property.Trust is misplaced before the first step is even valid.
The hidden cost of identity failure It is not only deposit loss. It also creates privacy exposure, delayed move-ins, unsafe access, tribunal weakness, damaged relationships, and high downstream labour to clean up what should never have entered the process.

Mutual Verification, Not One-Sided Verification

One of the biggest problems in renting is that verification is often imagined as something only tenants must endure. That is too narrow for today’s risk environment. A modern rental process must verify both directions.

What tenants should verify

  • The person leasing the property is a real person or legitimate business.
  • The person has authority to lease the unit.
  • The property details match what is being offered.
  • The request for deposit or documents comes after legitimacy is established, not before.

What landlords and property managers should verify

  • The applicant is a real, live person connected to the identity being presented.
  • The application details are consistent with the identity record.
  • The person moving in is the person who was screened.
  • The verification event is stored, timestamped, and reviewable.
Trust works both ways A system that verifies only one side will still fail. The right design principle is simple: each party should be able to confirm that the other is real before risk moves forward.

The IDEAL 4-Layer Identity Model

Good identity verification is layered. One document check alone is no longer enough. A durable Identify process should answer four different questions.

Layer 1

Identity Proofing

Is the credential real enough to rely on? This is the document and record validation layer.

Layer 2

Liveness & Match

Is a real live person present, and do they match the credential being used?

Layer 3

Authority Proof

Even if the identity is real, does this person actually have the right to lease, manage, sign, or collect?

Layer 4

Recorded Verification Event

Was the verification stored with time, method, and outcome so the step can be proven later?

This is the difference between looking secure and being secure. The rental industry has too many visual checks and too few recorded verification events.

If you cannot show the proof, you do not have the step. — IDEAL Framework principle

For Software and App Builders

For product teams, Identify should not be treated as a login problem, a simple KYC widget, or a box to tick before the “real” workflow starts. In renting, Identify is the workflow gate that determines whether the platform is collecting, routing, and acting on trustworthy input.

If your tool helps landlords, tenants, property managers, marketplaces, payments, leasing, maintenance, or screening, then your product is already participating in trust delivery. The question is whether it does so explicitly and safely.

1
Create an identity event, not just a pass/fail result

Record who was checked, how they were checked, when they were checked, and whether the result can be reviewed later.

2
Separate identity from authority

A real person is not automatically an authorized landlord, manager, owner, or signer. The product should treat those as different proofs.

3
Gate downstream actions

Do not allow document upload, deposit requests, lease issuance, key handoff, or sensitive data collection until verification conditions are met.

4
Design for handoff into Data

The output of Identify should become the first trusted record in the file that the next pillar can inherit safely.

Builder principle If your software starts collecting documents before it can establish who the counterparty is, your product may be accelerating risk instead of reducing it.

Privacy and Fairness Still Matter

Strong identity verification does not mean careless data collection. It means collecting only what is necessary, at the right moment, for a clear purpose, with proper controls.

It also does not mean using identity as an excuse for arbitrary exclusion. A safer system must still be fair, proportionate, and understandable. The goal is not to create a harsher market. The goal is to create a more trustworthy one.

Good Identify practice should be:

  • Purpose-limited — only collect what the step actually needs.
  • Sequenced — verify before more data is requested.
  • Recorded — keep an auditable trail of what was done.
  • Access-controlled — not every staff member should see every detail.
  • Explainable — the workflow should be understandable to ordinary users.
Important distinction Verification is not the same as surveillance. The purpose of Pillar 1 is to establish legitimacy and authority so the rest of the rental relationship can proceed with less exposure and less guesswork.

Operational Checklist

If you manage property, build tools, or advise housing operations, this is the practical standard to aim for.

1
Verify before value moves

No deposit, no key, no code, no signed lease workflow until the identity gate is cleared.

2
Verify both person and authority

Do not stop at “this is a real person.” Ask whether they are authorized to act in this transaction.

3
Store the event

The verification step should leave a timestamped record that can be reviewed, exported, and defended later.

4
Use one standard across staff and tools

If one team member verifies one way and another member improvises, the process is already unstable.

5
Hand the result into Pillar 2

The verified identity event should become the first trusted record inside the unified applicant or tenancy file.

What most markets still do wrong They collect documents first, ask questions later, and only start verifying when something feels off. That is not a system. That is delayed reaction.

How Identify Connects to the Rest of IDEAL

The IDEAL Framework is a chain, not a menu. The output of Identify becomes the trusted input for everything else.

PillarWhat Identify Makes Possible
DataYou can now collect and store documents against a verified person instead of an unproven identity.
EngageCommunication can now be attributed to verified parties in one defendable timeline.
AssessDecisions can now be made on more trustworthy input and applied more consistently.
LeaseThe lease is now anchored to verified people and a more stable evidence chain.

This is why Pillar 2 comes next. Once the first gate is real, the file can become real too.

Jimmy Ng
Jimmy Ng — Research Founder, IDEAL Framework Lab
Jimmy Ng studies why rental relationships break down in real life — across cases, dispute patterns, fraud events, fragmented tools, and trust failures. The IDEAL Framework was built to turn those repeated failures into a clear operating standard.

References

Explore the Full IDEAL Chain