Inori
FeaturesToolsPricing
Learn
GuidesStep-by-step tutorials and walkthroughs
GlossaryInsurance and compliance terminology
CompareSee how Inori compares to alternatives
Support
Help CenterFind answers and get support
ChangelogLatest updates and improvements
DemoSee Inori in action
Legal
PrivacyHow we handle your data
TermsTerms of service and usage
Blog
Sign InStart Free

Product

  • Features
  • Pricing
  • Tools
  • Demo

Resources

  • Help Center
  • Guides
  • Glossary
  • Compare

Company

  • About
  • Blog
  • Changelog
  • Contact

Legal

  • Privacy
  • Terms
  • DPA
  • Security

© 2026 Inori Inc.

  1. Home
  2. /Guides
  3. /The COI Fraud Detection Playbook — How to Spot Fake Certificates

On this page

  • Why COI Fraud Is Accelerating in 2026
  • 1. Accessible Editing Tools
  • 2. Economic Pressure on Vendors
  • 3. Low Enforcement and Detection
  • The 10 Red Flags of a Fraudulent Certificate
  • 1. Certificate Received Directly from the Vendor
  • 2. Agent Email Domain Does Not Match Known Agencies
  • 3. Identical Expiration Dates Across All Coverage Lines
  • 4. Policy Numbers That Do Not Follow Carrier Formatting Conventions
  • 5. Coverage Limits That Exactly Match Your Minimum Requirements
  • 6. Certificate Issued Within Hours of Your Request
  • 7. ACORD Form Version Is Outdated
  • 8. Producer/Agent Information Is Incomplete or Generic
  • 9. No Signature or Electronic Verification
  • 10. Additional Insured Listed but No Endorsement Number Referenced
  • Verification Techniques
  • Direct Producer Verification
  • Carrier Verification via AM Best
  • NAIC Consumer Information Source
  • Policy Number Format Cross-Reference
  • Visual and Formatting Inspection
  • Metadata Analysis
  • Technology-Assisted Detection
  • AI-Powered Document Extraction
  • Carrier API Integration
  • Certificate Tracking Platforms
  • The Prevention Framework
  • 1. Accept Certificates Only from Licensed Producers
  • 2. Require Certificates in Advance — Not Day-Of
  • 3. Implement Periodic Re-Verification
  • 4. Verify a Random Sample Independently
  • 5. Use Technology That Flags Patterns Humans Miss
  • Case Examples
  • Case 1: The Modified Expiration Date
  • Case 2: The Fictitious Agency
  • Case 3: The Carrier Substitution
  • Quick-Reference Fraud Detection Checklist
  • Building a Culture of Verification

The COI Fraud Detection Playbook — How to Spot Fake Certificates

How to identify fraudulent Certificates of Insurance. Red flags, verification techniques, and prevention strategies for property managers and contractors.

A vendor hands you a certificate of insurance. The limits look right, the dates are current, the carrier name is familiar. You file it. Three months later, there is an accident on your property. You contact the carrier listed on the certificate. They have no record of the policy. The certificate was fabricated.

This is not a hypothetical. COI fraud is one of the most common and least prosecuted forms of insurance fraud in commercial real estate and construction. The consequences fall entirely on the party that accepted the fraudulent certificate — which means the consequences fall on you.

This playbook teaches you to identify fraudulent certificates before they create exposure, using a combination of pattern recognition, verification techniques, and systematic prevention.

Why COI Fraud Is Accelerating in 2026

Three forces have converged to make COI fraud more prevalent and more sophisticated than at any point in the past:

1. Accessible Editing Tools

Creating a convincing fake certificate no longer requires specialized skills. PDF editing software is ubiquitous. AI-powered document generation tools can produce forms that are visually indistinguishable from legitimate certificates. A vendor with moderate technical skill can modify an expired certificate — changing dates, limits, and carrier information — in under ten minutes.

2. Economic Pressure on Vendors

Insurance costs for small contractors and service providers have increased significantly since 2023, driven by inflation in claims costs, natural disaster losses, and tightening underwriting standards. Some vendors — particularly in construction trades like roofing, demolition, and excavation — face annual premiums that consume 5-15% of their revenue. When a vendor loses coverage due to nonpayment or claims history, the economic incentive to fabricate a certificate rather than lose the contract is substantial.

3. Low Enforcement and Detection

COI fraud occupies a peculiar enforcement gap. Insurance carriers rarely investigate certificate fraud because they have no contractual relationship with the certificate holder. State insurance fraud bureaus focus on larger-scale schemes — staged accidents, arson, medical billing fraud. And most certificate holders lack the tools, training, or time to detect sophisticated forgeries. The result is an environment where the perceived risk of getting caught is near zero.

The cost of accepting a fraudulent COI

When a vendor presents a fake certificate and an incident occurs, the certificate holder has no recourse against the carrier listed on the certificate (because no policy exists). The vendor likely has no assets to pursue. The certificate holder's own insurance — or their own balance sheet — absorbs the loss. A single undetected fraudulent certificate can result in six- or seven-figure uninsured losses.

The 10 Red Flags of a Fraudulent Certificate

Not every red flag indicates fraud. But each one warrants closer scrutiny. Multiple red flags on a single certificate should trigger formal verification before the certificate is accepted.

1. Certificate Received Directly from the Vendor

Legitimate certificates are issued by the insurance producer — the agent or broker — not by the insured. When a vendor emails you a certificate directly (rather than having their agent send it), this removes the producer from the chain of custody. The vendor could have modified the document after receiving it from their agent, or could have created it entirely.

What to do: Request that certificates be sent directly from the producer's email domain. If the vendor sends it, verify independently with the producer.

2. Agent Email Domain Does Not Match Known Agencies

The producer's email address should correspond to a real insurance agency. If the contact email is a generic Gmail, Yahoo, or Outlook address — or a domain that does not resolve to an actual insurance agency website — this is a significant red flag.

What to do: Search for the agency name independently. Verify the domain. Check the state Department of Insurance database for the agent's license. If the agency cannot be found through independent research, do not accept the certificate.

3. Identical Expiration Dates Across All Coverage Lines

It is unusual for every coverage line on a certificate — GL, auto, umbrella, WC — to share the exact same effective and expiration dates. Different coverage types are typically written by different carriers or renewed at different times. While it is possible for a vendor to consolidate all renewals to a single date, this pattern warrants verification.

What to do: Ask the vendor or producer to confirm. This alone is not conclusive, but combined with other flags, it increases suspicion.

4. Policy Numbers That Do Not Follow Carrier Formatting Conventions

Every insurance carrier has a distinct policy number format — specific prefixes, digit patterns, and structures. An experienced compliance professional familiar with major carriers can often spot a fabricated policy number because it does not match the carrier's known format.

For example:

  • Hartford commercial policies typically begin with specific prefix codes (e.g., "57" for GL).
  • Liberty Mutual uses alphanumeric patterns that differ from Travelers, which differ from CNA.
  • A policy number that is suspiciously round (e.g., "GL-1000000") or uses a format inconsistent with the listed carrier is a red flag.

What to do: If you process certificates from major carriers regularly, maintain a reference of known policy number formats. If a number looks unusual, verify it directly with the carrier.

5. Coverage Limits That Exactly Match Your Minimum Requirements

When a vendor's certificate shows limits that precisely match your stated requirements — not a dollar more — this is worth noting. While some vendors do carry exactly the minimum required, most policies have standard limit offerings that may not perfectly align with every contract requirement. A certificate showing $1,327,500 in coverage because that is your unusual stated requirement is suspicious.

What to do: Cross-reference the limits with standard market offerings. GL policies typically come in standard tiers ($1M/$2M, $2M/$4M). Unusual or non-standard limits should be verified.

6. Certificate Issued Within Hours of Your Request

Legitimate certificate issuance has a turnaround time. The vendor contacts their agent, the agent generates the certificate in their agency management system, and the agent sends it. This process typically takes one to three business days. A certificate that appears in your inbox within hours of the request — particularly outside business hours — may not have gone through legitimate channels.

What to do: Note the turnaround time. If unusually fast, verify the certificate directly with the producer using an independently obtained phone number.

7. ACORD Form Version Is Outdated

The current ACORD 25 revision is 2016/03. If the certificate uses an older revision (visible in small print at the bottom of the form — e.g., "ACORD 25 (2014/01)" or "ACORD 25 (2010/05)"), the producer may be using outdated software or the certificate may have been created from an old template. Legitimate agency management systems automatically use the current form revision.

What to do: Reject certificates on outdated form versions and request a current-revision certificate from the producer.

8. Producer/Agent Information Is Incomplete or Generic

A legitimate certificate includes the producer's full legal name, address, phone, fax, and email. If any of these fields are blank, vague ("Insurance Agency" with no specific name), or contain information that cannot be independently verified, the certificate may be fabricated.

What to do: Every field in the producer section should be populated and verifiable. Missing information is a reason to request a corrected certificate — and to verify the producer's identity independently.

9. No Signature or Electronic Verification

The Authorized Representative field at the bottom of the certificate should contain a signature — either wet ink (for physical certificates) or electronic. An unsigned certificate, or one with a typed name but no signature image, has reduced evidentiary value and may indicate the document was not generated through a legitimate agency management system.

What to do: Require signed certificates. If electronic, verify that the signature appears genuine (not a simple text insertion).

10. Additional Insured Listed but No Endorsement Number Referenced

The Description of Operations section states "Certificate Holder is named as Additional Insured" but does not reference a specific endorsement form (CG 20 10, CG 20 37, CG 20 26, etc.). While this alone does not prove fraud, it often indicates one of two things: the endorsement does not actually exist on the policy, or the producer is being imprecise. In either case, the certificate holder's AI status is unverified.

What to do: Require specific endorsement form numbers and edition dates. Request copies of the actual endorsement documents from the producer.

Verification Techniques

When red flags are present — or as part of routine quality assurance — these techniques can confirm or disprove a certificate's legitimacy.

Direct Producer Verification

The single most effective verification method. Contact the producer directly — but use a phone number you obtained independently, not the one printed on the certificate.

Process:

  1. Search for the agency by name through your state's Department of Insurance website.
  2. Find the agency's phone number through their official website or the state licensing database.
  3. Call and request verbal confirmation that the policy is active, the limits are as stated, and the endorsements referenced on the certificate are in force.
  4. Note the name of the person who confirmed and the date/time of the call.

This process takes five minutes and eliminates the most common forms of fraud. A fraudulent certificate cannot survive direct verification with the actual producer.

Carrier Verification via AM Best

Every carrier listed on a certificate should be verifiable through the AM Best directory (ambest.com). AM Best maintains financial strength ratings and company profiles for virtually every insurance carrier operating in the United States.

What to check:

  • Does the carrier exist in the AM Best database?
  • What is the carrier's financial strength rating? (A-VII or better is standard)
  • Is the carrier admitted in the state where coverage is needed?
  • Does the NAIC number on the certificate match the NAIC number in AM Best's records?

A carrier that does not appear in AM Best — or whose NAIC number does not match — is a critical red flag.

NAIC Consumer Information Source

The NAIC Consumer Information Source (https://content.naic.org/cis_consumer.htm) allows you to search for insurance companies by name or NAIC number. This free tool confirms:

  • The carrier is a real entity
  • The carrier's state of domicile
  • Regulatory actions or complaints against the carrier
  • Financial data filings

Policy Number Format Cross-Reference

For organizations that process high volumes of certificates, maintaining a database of known policy number formats by carrier is a powerful fraud detection tool. When a certificate arrives with a policy number that does not match the expected format for the listed carrier, it triggers review.

This technique requires institutional knowledge but becomes increasingly accurate over time. Some compliance platforms and AI-powered verification tools automate this pattern matching across thousands of certificates.

Visual and Formatting Inspection

Fraudulent certificates created by editing a PDF or recreating a form often have subtle visual inconsistencies:

  • Font mismatches: Different fields use slightly different fonts or sizes because they were edited separately.
  • Alignment irregularities: Text in modified fields does not align with surrounding text.
  • Resolution differences: Edited areas may appear at a different resolution than the original form.
  • Missing form elements: Borders, lines, or standard form elements are distorted or missing near edited areas.
  • Inconsistent print quality: If the certificate was printed, scanned, and re-digitized, overall quality may differ from a certificate generated directly from agency management software.

These visual indicators are difficult to detect at human speed when processing hundreds of certificates. Automated extraction tools that analyze document structure — not just OCR text — can flag formatting anomalies that suggest modification.

Metadata Analysis

PDF files contain metadata — creation date, modification date, authoring software, and sometimes edit history. A certificate that was "created" in Adobe Acrobat or Photoshop (rather than agency management software like Applied Epic, AMS360, or Vertafore) may have been fabricated or altered.

How to check: View the PDF properties (File > Properties in most PDF readers). Look at the "Application" and "PDF Producer" fields. Legitimate certificates are typically produced by agency management systems, document generation engines, or enterprise printing tools — not consumer PDF editors.

Metadata is not conclusive

Some legitimate agencies use basic tools to generate certificates, and metadata can be stripped or modified. Metadata analysis is one input among many — not a standalone determination of fraud.

Technology-Assisted Detection

Manual verification works for individual certificates but does not scale. Organizations processing hundreds or thousands of certificates annually need systematic, technology-assisted detection.

AI-Powered Document Extraction

Modern AI systems can extract data from certificates with high accuracy and simultaneously flag anomalies that suggest fraud or error:

  • Data consistency checks: Does the carrier name match the NAIC number? Does the policy number format match the carrier? Are the coverage dates internally consistent?
  • Cross-certificate patterns: Is this the third certificate this month from the same "agent" with the same formatting anomalies? Pattern detection across multiple submissions catches fraud rings that single-certificate review misses.
  • Historical comparison: Has this vendor's carrier, agent, or policy number changed unexpectedly from the previous certificate on file? Unexpected changes can indicate a lapse in coverage that the vendor is attempting to conceal.
  • Format anomaly detection: AI models trained on thousands of legitimate certificates can identify visual and structural anomalies that indicate PDF manipulation — font inconsistencies, alignment shifts, resolution mismatches — at a speed and accuracy beyond human capability.

Carrier API Integration

An emerging capability in 2026 is direct API integration with insurance carriers for real-time policy verification. Several carriers now offer APIs that allow authorized parties to confirm:

  • Policy existence and status (active, cancelled, expired)
  • Named insureds
  • Coverage types and limits
  • Endorsements in force

This is the most definitive verification method — but coverage across carriers is still limited. As adoption grows, real-time API verification will become the standard, making certificate fraud significantly harder to sustain.

Certificate Tracking Platforms

Dedicated COI tracking platforms provide workflow automation that reduces fraud exposure:

  • Automated expiration monitoring: Certificates are flagged before they expire, preventing reliance on outdated documents.
  • Requirement matching: Certificates are compared against contract requirements automatically, flagging gaps that a human reviewer might miss.
  • Audit trails: Every certificate received, reviewed, and accepted is logged with timestamps, creating defensible records.
  • Renewal requests: Automated outreach to vendors and their agents when certificates are approaching expiration.

The Prevention Framework

Detection is important, but prevention is more effective. These five practices systematically reduce your exposure to fraudulent certificates.

1. Accept Certificates Only from Licensed Producers

Establish a policy that certificates must be sent directly from the producer's business email — not forwarded by the vendor. This single practice eliminates the most common fraud vector: vendor modification of a legitimate certificate.

Implementation: Include this requirement in your vendor onboarding documentation. When a vendor sends a certificate directly, respond with a request for the producer to re-send from their agency email.

2. Require Certificates in Advance — Not Day-Of

When vendors are pressured to produce certificates immediately — "we need this by end of day or you cannot start tomorrow" — the incentive to fabricate is highest. Require certificates at least 48-72 hours before work begins. This provides time for legitimate issuance and your verification.

Implementation: Build certificate submission deadlines into your vendor onboarding timeline, separate from the work start date.

3. Implement Periodic Re-Verification

A certificate verified at onboarding is only valid as of that date. Policies can be cancelled, limits reduced, or endorsements removed during the contract term. Re-verify coverage at regular intervals — quarterly for high-risk vendors, semi-annually for standard vendors.

Implementation: Use calendar reminders, tracking software, or automated systems to trigger re-verification at defined intervals. Do not rely on cancellation notices — the current ACORD 25 form does not guarantee advance notice.

4. Verify a Random Sample Independently

Even with good processes, some fraudulent certificates will appear legitimate on their face. Randomly selecting 5-10% of certificates for full independent verification — calling the producer, checking AM Best, confirming the policy with the carrier — creates a deterrence effect and catches fraud that surface-level review misses.

Implementation: Assign a monthly random verification quota. Rotate which vendor types and risk tiers are selected. Document the results.

5. Use Technology That Flags Patterns Humans Miss

The human eye can detect obvious forgeries. It cannot detect subtle font mismatches across 500 certificates, policy number format anomalies across 50 carriers, or cross-vendor patterns suggesting a single source of fabricated documents. AI-powered verification tools provide a layer of pattern detection that manual review cannot replicate at scale.

Implementation: Evaluate whether your certificate volume justifies a dedicated compliance platform with AI-assisted fraud detection. For organizations processing more than 100 certificates annually, the ROI typically favors technology adoption.

Case Examples

The following scenarios are composites based on common fraud patterns. Names and details are anonymized.

Case 1: The Modified Expiration Date

A property management company received a certificate from a landscaping vendor showing GL coverage through December 2026. During a routine re-verification in August, the compliance team called the producer and learned the policy had been cancelled in March for nonpayment. The vendor had obtained a legitimate certificate in January, then used PDF editing software to change the expiration date from March to December. For five months, the property had no vendor GL coverage in place.

What would have caught it: Direct producer verification at any point after March. Automated re-verification at the quarterly interval.

Case 2: The Fictitious Agency

A general contractor required certificates from all subcontractors on a $40M commercial project. One subcontractor submitted a certificate listing a producer called "Premier Risk Advisors" with a professional-looking letterhead. The certificate appeared legitimate — correct ACORD 25 form revision, proper formatting, reasonable limits. During a random verification audit, the GC's compliance team searched for "Premier Risk Advisors" in the state DOI database. No such agency was licensed. The phone number on the certificate connected to the subcontractor's office manager. Every element of the certificate — carrier, policy numbers, endorsements — was fabricated.

What would have caught it: Verifying the producer's license through the state Department of Insurance. Calling the producer at an independently obtained number. Checking the carrier's NAIC number.

Case 3: The Carrier Substitution

A healthcare facility received a certificate from a medical staffing agency showing professional liability coverage through "Continental Medical Insurance Company" — a name similar to several legitimate carriers but not an actual company. The NAIC number listed on the certificate belonged to a different, unrelated carrier. The fabrication was sophisticated enough that a busy compliance coordinator accepted it. When a malpractice claim was filed, the facility discovered that no policy existed.

What would have caught it: NAIC number verification through the NAIC Consumer Information Source. AM Best lookup of the carrier name. Cross-referencing the carrier name against the NAIC number.

Quick-Reference Fraud Detection Checklist

Use this checklist for certificates that trigger any initial suspicion:

#Verification StepMethodResult
1Producer is licensed in the stateState DOI database lookup
2Producer phone number matches public listingIndependent web search
3Carrier exists in NAIC databaseNAIC Consumer Information Source
4NAIC number matches carrier nameNAIC lookup
5Carrier AM Best rating is A-VII or betterAM Best directory
6Policy confirmed active by producerDirect phone call to producer
7Policy number format consistent with carrierInternal reference or carrier confirmation
8ACORD form revision is current (2016/03)Visual inspection of form footer
9PDF metadata shows legitimate authoring softwareFile > Properties in PDF reader
10No visual anomalies (font, alignment, resolution)Visual inspection or AI analysis
11Endorsements confirmed with form numbersProducer confirmation or endorsement copies
12Certificate holder name matches exactlyVisual inspection

Building a Culture of Verification

Fraud detection is not a checklist you complete once. It is a practice embedded in your organization's culture. The most effective compliance teams share three characteristics:

Healthy skepticism: They treat every certificate as unverified until confirmed, regardless of the vendor's reputation or the contract's urgency.

Systematic processes: They have defined procedures for initial verification, periodic re-verification, and escalation when red flags are detected. These processes are documented, trained, and audited.

Appropriate technology: They use tools proportionate to their certificate volume and risk exposure — from simple spreadsheets for small portfolios to AI-powered platforms for enterprise-scale operations.

The goal is not to assume every vendor is committing fraud. The goal is to build processes that make fraud ineffective and detectable — so that the honest majority is processed efficiently while the dishonest minority is caught before exposure becomes loss.

Put this guide into practice

Try our free COI checker first, or start a free trial of the full platform.

Try COI CheckerStart Free Trial

Try Free Tools

No sign-up required. Verify a COI in as little as 30 seconds.

COI CheckerOr start free trial →