So it doesn't seem to be following a linear path but a circular path where the file is going from one person to another. Is there, at any step, an aggregating of the risk factors? Is there a systematic way of tracking? It's one thing to track an individual application; it's another thing to be recognizing where there is systematic risk.
On June 2nd, 2016. See this statement in context.