Occupational Fraud. Asset Misappropriation Fraudulent Statements Corruption 3/20/ ACFE Report to the Nations

Size: px
Start display at page:

Download "Occupational Fraud. Asset Misappropriation Fraudulent Statements Corruption 3/20/ ACFE Report to the Nations"

Transcription

1 Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Occupational Fraud Asset Misappropriation Fraudulent Statements Corruption 2012 ACFE Report to the Nations The typical organization loses 5% of its annual revenue to fraud. Frauds last a median of 18 months prior to detection. Asset misappropriation most common. Small organizations disproportionately victimized by occupational fraud. 85% fraudsters never charged or convicted previously. 1

2 Asset Misappropriations Cash Skimming Larceny Billing Disbursements Payroll SKIMMING Theft of cash BEFORE it enters the accounting system. (UNRECORDED SALES). Most difficult misappropriation to prove because usually there are no records of cash. Lapping Schemes Penn State kids cancer drive, local fire department BOOT drive, Salvation Army Red Kettle Campaign, kids sports team fundraisers. Middle School Secretary (Moon Township)~ $50,000 skimmed cash from kids fundraiser deposits. Convenience store manager(penn Hills) ~ $60,000 not ring up sales in register and pocketing money during register reconciliation. Inventory shortages Bookkeeper for medical practice pocketed customer co-pays and cash payments totaling $108, Church Volunteer(downtown) ~ $220,000 stole proceeds from gift card fundraisers. A/R Clerk (Downtown) ~ $51,000 stole incoming rental payments paid by cash. 2

3 LARCENY Theft of cash AFTER it is entered into the accounting system. Stealing money from the bank deposit. Reversing transactions (register voids). Usually requires journal entries to hide Car Dealer A/R Clerk ~ 80,000 stole cash from vehicle purchase and parts/service transactions and created false accounting entries to cover theft. Office Manager (Vet) ~ $425,000 stole cash receipts and used future check to cover shortage. Bank Teller ~ $93,500 cash withdrawals from elderly account holders. BILLING Perpetrator uses false documents (invoice, purchase order, credit card bill) to cause his employer/customer to issue a payment for what appears to be a fraudulent dl purpose. 3 types: Shell Company (usually provides service) Vendor Schemes Personal Purchases 3

4 EMS Secretary ~ $77,000 used EMS account debit card for her personal expenses. Meadows Purchasing Manager ~ $250,000 created 2 shell companies to provide cleaning to satellite locations. Office Manager ~ $57,000 personal expenses charged on company credit cards. Goodwill Controller ~ $50,000 Opened AMEX card in company name and used it for her personal expenses. PAYROLL 3 Types of schemes: Ghost Employee Commission Falsified Hours and Salary Schemes Medical Supply Company salesman ~ $79,000 created false invoices to obtain fraudulent commission. Shipped orders to UPS store and hid them in storage facilities. Payroll Clerk ~ $150,000 Extra and increased payroll. Trucking company payroll clerk ~ $200,000 extra payroll checks and stolen company checks. Office Manager/Payroll Clerk (vet multiple locations) ~$137,000 & $216,000 increased their payroll. Payroll billing company ~ $81,000 ghost employees. 4

5 DISBURSEMENTS Check Tampering Forged Maker Authorized Maker Altered Payee Forged Endorser Expense Reimbursements Borough Manager ~ $17, wrote checks to herself. Office Manager (Optometrist) ~ $200,000 wrote checks to herself and her creditors. Borough Manager ~ $180, wrote extra checks to herself and used borough credit cards/bank accounts for personal expenses. VP of Sales Manufacturing Company ~ $250,000 used same or fake receipts for monthly expense reimbursement request. Corruption Bribery Conflict of Interest Kickbacks Bid Rigging 5

6 Fictitious Revenues Fraudulent Statementst t Asset/Revenue Overstatement Concealed Liabilities or Expenses Timing Differences Fraudulent Statements Enron ~ Ken Lay, Jeff Skillings and Andy Fastow Adelphia ~ John and Timothy Rigas LeNature ~ Potlucky Family Crazy Eddies ~ Sam Anatar Fraud Triangle Pressure Opportunity Rationalization 6

7 Typical Offender Male Age years on the job College degree Accounting, Operations or Sales Department Initial Detection of Fraud Tip (50%) Management Review Internal Audit Accident Account Reconciliation Document Examination External Audit Monitoring Most Vulnerable Organizations Small Companies!!!! Banking/Financial Services Manufacturing Government and Public Administration Retail Healthcare Insurance Construction Technology 7

8 Organizational Red Flags Too much trust in key employees Lack of procedures for authorization No separation of duties Lack of independent checks on performance Department often skipped by auditors Lack of clear lines of authority Inadequate attention to details Individual Red Flags Employee living beyond his means (lifestyle) Overwhelming desire for personal gain Financial difficulties/high personal ldebt Control issues (unwilling to share duties) Refusal to take time off Unusual close association to vendor/customer Pay given not appropriate for responsibilities Undue family or peer pressure to achieve No recognition for job performance Addiction/Gambling Most Frauds Occur due to: Lack of internal controls Override of existing internal controls Lack of management oversight Poor corporate culture/tone at the top Lack of independent checks or audits Lack of employee education Lack of reporting mechanism 8

9 Internal Controls: Billing Install surveillance cameras Segregation of duties Review journal entries for write-off and force balancing entries Bank Reconciliations Review credit card bills Maintain and update an approved vendor list. Cross check employee SS numbers and addresses to vendor ID numbers and addresses. Review the back of all cancelled checks. Purchase authorization Payroll Employee must pick up his own paycheck Separate HR and payroll functions Review payroll checks and payroll summary sheets Segregation of duties Review 1099s at year end Track uncollected sales generated by salesman Randomly sample customers AR balances Check tampering Dual signature required No signature stamp Inspect cancelled checks Compare cancelled checks to accounting system entries Secure unused checks No checks to payable to Cash policy Require vendor checks to be mailed out Segregation of duties Positive Pay at bank 9

10 Expense Reimbursements Require detailed expense reports with original receipts Check receipts against employee vacation schedule and calendar Use travel agency for all travel expenses Require original ticket stubs for air and rail Look for: Amounts ending in 0 or 5 Reimbursements that fall just below the company approval limit Receipts that do not look professional Consecutively numbered receipts Better management oversight Fraud Prevention Tools On-going employee training Hotlines Increase perception of detection Segregation of duties Anti-fraud (Ethics) policies Rewards system Job rotation/cross training Mandatory vacations Surprise Audits Best Practices: Implement internal controls now ~ regardless of the size of the company. Separate staff duties immediately. A trusted employee is valuable but never let any one have the Keys to the Kingdom! Trust no one! Just because an employee has been a valuable employee does not mean that they would not steal from you. Trust your gut instinct. If something does not feel quite right, ask questions. Look at financial documents from 3 rd parties. 10

11 Identity Theft: World s Fastest Growing Crime!! Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person s personal data in some way that involves fraud or deception, typically for economic gain. -U.S. Department of Justice For the 13 th year in a row, identity theft was the #1 consumer complaint to the FTC. In 2012, identity theft reports increased by 32% to 12.6 million cases. Approximately 7% of adults in the United States were affected by identity theft. Florida, Georgia & California top 3 states. Florida double the reports than California. 70% of victims reported difficulty removing information stemming from ID theft from their credit report. Most at risk? Children 35% higher risk than adults. Smart phone owners 33% higher risk than general public. Persons with personal information on a social media site. Deceased people account for 25% of all identity theft. College students because they have good credit. Victims of data breaches have 9.5% higher risk 11

12 Discovery Is KEY!! 50% of victims discover their identity has been stolen within three months. 15% of victims do not discover their identity has been stolen for 4 or more years. Over 50 million Americans are utilizing a credit monitoring service. 44% of consumers view their credit reports using AnnualCreditReport.com or CreditKarma.com Personal Information is Everywhere! Billboard campaign in Western PA features deceased s name, address, date of birth, partial DL number and partial signature. On the Internet Public records on the Internet Free and easy access from home Information such as property ownership, tax assessments and civil court documents. 12

13 At Work Outgoing Mail Businesses and places of employment. Co-workers and visitors have easy access to information. Trash Cans Post it notes Most Common Theft Methods: Skim information from transactions inside a store. Paper mail theft. Hacking computer networks and databases. Redundant IT equipment (external memory sources). Shoulder surfing Dumpster diving Department of Veteran s Affairs, Blue Cross and Blue Shield SC Department of Revenue Hacked Sony Twitter Adobe Systems (October 3, 2013) Citibank Chase Apple I-Phone 13

14 Types of Identity Theft Medical identity theft Child identity theft Senior identity theft Government identity theft Financial identity theft Medical Identity Theft 25,000 Americans are victims of medical identity theft each year. The most difficult identity theft to detect. Thieves steal identities for the purpose of receiving free medical care and as a result create a false medical record for the victim. Consequences include: Incorrect treatment for victims; False health insurance claims filed; Denial of legitimate medical claims. Child Identity Theft 14

15 Minor s identifying information used by another person for imposter s benefit. Perpetrator may be family member or someone known to the family. Daycare workers, nannies, school employees, babysitter, relative, family friend. Targets children because of the length of time it takes to discover the theft. Children were targeted by scammers 35 times more often than adults, with 15% of the victims under the age of five. Senior Identity Theft In 2010, reports of identity theft targeting people 50 and older represented about 28 percent of the total 236,765 cases. More susceptible to acts of deception and manipulation. Worked diligently their whole life to achieve good credit. Seniors rarely check their credit reports. Government Identity Theft Also known as Documents/Benefits Theft Stealing personal information to obtain government assistance such as: Social Security retirement benefits; Social Security disability benefits; Medical insurance; Welfare benefits. Stealing personal information to obtain fraudulent income tax returns IRS identified 642,000 fraudulent tax returns. This is a 3 fold increase over SSA and IRS do not make initial contact using . 15

16 Financial Identity Theft Individuals or businesses can be affected. Personal information everywhere! Billion dollar business. Most common type of identity theft! Retail Merchants and Their Employees Restaurant Employees Bank Employees Drug Abusers Terrorist Groups Organized Crime Members Illegal Immigrants Your Family Members Your Co-Workers Your Employees Neighbors WHO?? WHERE?? Your mailbox Your trash Retailers Restaurants Grocery stores Hospital or health care facilities Discarded/stolen computers Internet Your motor vehicle ATM machines On the telephone Software sharing programs 16

17 HOW?? Phishing Theft of your trash ( Dumpster Diving ) Purse or wallet theft Dishonest employees Public Records Shoulder surfing Pharming Skimming devises Counterfeit documents EBay & Craigslist scams Wedge Identity Theft Schemes Database Hacking Social Engineering Dumpster Diving Skimming Spam - Spyware Dishonest Employee Radio Wave Credit Cards Counterfeit Cards Counterfeit Checks Counterfeit Docs CARD SKIMMING Suspect uses a wedge to store information. contained on credit card strip. Downloads info later to computer. Uses info to create counterfeit cards with your personal information. 17

18 ATM SKIMMING INSTALLING SKIMMER AT THE DRIVE UP ATM CREDIT CARDS Magnetic strip on back made up of tracks similar to an audio tape Information read by swiping card through a reader device Information includes: Your name Account number Issuing bank Standard ATM machine? 18

19 False front is attached to ATM with card reader to copy magnetic strip info on your card Look at the pamphlet holder Note the hole in the side 19

20 Camera/transmitter housed inside Camera can view keypad and monitor and send wireless picture up to 200 meters. Digital Robbery Thermal Imaging Allows ATM Theft From a Distance ATM pins can be stolen using a thermal imaging camera. When ATM users press keys to enter their PIN, they leave behind a residual heat from their fingers. 20

21 TOOLS OF THE TRADE Consumers Rights for Unauthorized Debit and Credit Card Use Fair Credit Reporting Act (FCRA) governs consumers right for fraudulent use of credit cards. Electronic Funds Transfer Act (EFTA) governs consumers right for fraudulent use of debit cards. Consumer protection is stronger for credit cards: Charge-back rights; Credit dispute rights; Credit line available now. 21

22 Debit and Credit Cards Not Equal Debit Cards: If you report within 2 days of discovery, loss is limited to $50; If you report between 3-60 days, loss limited to $500; After 60 days, no protection for fraudulent use of card! Credit Cards: Regardless of report date, loss is limited to $50. If credit card company has a zero liability policy, you still must report losses within 60 days of the fraudulent charges. Safeguarding Information Keep only what personal information is necessary. Properly dispose of sensitive material by shredding it. Utilize anti-virus software and firewalls. Limit access of sensitive information. Conduct background checks on all potential employees. Regularly educate and train employees on security issues. Require strong passwords that are not to be shared. Have a plan to respond to security incidents. Social-Media and Identity Theft Fraudsters are taking note of personal information such as your birth date on social-media sites. Use the highest privacy setting available. Do not accept friend invites from strangers. ANTIVIRUS SOFTWARE! 22

23 PREVENTING IDENTITY THEFT Promptly remove mail from mailbox and deposit outgoing mail in secure receptacles. Empty your purse/wallet of extra credit or ID cards including your social security card. Make a copy of all items in your wallet and keep in secure location. Examine all credit card and bank statements each month. Do not use birthdates, phone numbers or house numbers as PIN. Never write down your PIN. Report stolen credit cards or any transactions that you did not make immediately. Never respond to unknown or phishing s. Shred all solicitations, bills and document with any financial information using a cross cut shredder when discarding. Make inquiries on unexpected bills. If providing financial information over the Internet, ensure the information is encrypted and the site is secure ( Never give out information over the phone. Always shield your hand and the screen when using the ATM machine, even if no one is around. Consider placing a fraud alert on your account with all three major credit bureaus. Never leave transaction receipts behind. Order and review your credit report once a year at or 23

24 IMPORTANT CONTACTS Equifax Experian Transunion FTC FTC-HELP IFCC For victims of fraud on the Internet REMEMBER... When it comes to preventing white collar crime, internal controls are essential! Regardless how small your company is never allow one employee to control all of its vital functions! ~ ~ ~ Get good anti-virus software on your computer and smart phone. Monitor your credit report at least once a year. ~~~ Use common sense if something sounds too good to be true it s a scam! Detective Jackelyn Weibel Allegheny County District Attorney s Office 1444 Hillsdale Avenue Pittsburgh, PA (412) jweibel@da.allegheny.pa.us 24

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Identity theft and identity fraud are terms used to refer to all types

More information

Identity Theft: World s Fastest Growing Crime!!

Identity Theft: World s Fastest Growing Crime!! Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

Financial Transactions and Fraud Schemes

Financial Transactions and Fraud Schemes Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements 2016 Association of Certified Fraud Examiners, Inc. Fraudulent Disbursement Schemes Register disbursement schemes

More information

IDENTITY THEFT PROTECT YOUR MONEY

IDENTITY THEFT PROTECT YOUR MONEY IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that

More information

Asset Misappropriation. Peter N. Munachewa, CICA, CFIP, CFE

Asset Misappropriation. Peter N. Munachewa, CICA, CFIP, CFE Asset Misappropriation Peter N. Munachewa, CICA, CFIP, CFE CORPORATE FRAUD AND ABUSE CLASSIFICATION SYSTEM Corruption Asset Misappropriation Fraudulent Statements Conflicts of Interest Purchasing Schemes

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

1/3/2013. Months. Other $75,000. Government $81,000. Non-Profit $100,000. Dollars. Public Company $127,000. Private Company $200,000

1/3/2013. Months. Other $75,000. Government $81,000. Non-Profit $100,000. Dollars. Public Company $127,000. Private Company $200,000 In its 2008 Report to the Nation, Occupational Fraud and Abuse, the Association of Certified Fraud Examiners (ACFE) - reported losses of 7% of revenue or $994 billion of US Gross Domestic Product lost

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

Identity Protection 101: Protect your good name from identity theft.

Identity Protection 101: Protect your good name from identity theft. Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social

More information

Describe Fraud in the Context of Financial

Describe Fraud in the Context of Financial Misappropriation of Assets and Fraudulent Financial Reporting Loscalzo s September 24, 2014 2012 Template for PowerPoint Slides A SmartPros Ltd. Company www.loscalzo.com (732) 741 1600 1 CPE Instructions

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information

FRAUD AWARENESS & PREVENTION

FRAUD AWARENESS & PREVENTION FRAUD AWARENESS & PREVENTION Nancy Wonderlich Koonce, CPA/MBA/CVA/CFE nkoonce@idahocpa.com What is occupational fraud? The use of one s occupation for personal enrichment through the deliberate misuse

More information

UNIT 3-4 Preventing Identity Theft

UNIT 3-4 Preventing Identity Theft UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information

More information

GREENPATH FINANCIAL WELLNESS SERIES

GREENPATH FINANCIAL WELLNESS SERIES GREENPATH FINANCIAL WELLNESS SERIES IDENTITY THEFT Empowering people to lead financially healthy lives. TABLE OF CONTENTS What is Identity Theft?...2 How Identity Theft Occurs...3 How Identity Thieves

More information

Drexel and FMFCU. Presented By

Drexel and FMFCU.   Presented By Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission

More information

An Expensive Problem. Fraud in Government A Growing Problem

An Expensive Problem. Fraud in Government A Growing Problem Stuart T Stickel, CPA, CFE Deputy State Auditor West Virginia State Auditor s Office Charleston, WV An Expensive Problem Business fraud and abuse in the U.S. cost about $650 billion a year. Government

More information

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions Barry Altland Director, Partner Engagement Who/What is FPP? A Thank You to

More information

Chapter 2 Skimming. 2. To a fraudster, the principle advantage of skimming is the difficulty with which the scheme is detected. a. True b.

Chapter 2 Skimming. 2. To a fraudster, the principle advantage of skimming is the difficulty with which the scheme is detected. a. True b. Chapter 2 Skimming 1. is the theft of cash from a victim entity prior to its entry in an accounting system. a. A fictitious disbursement b. Skimming c. Larceny d. Conversion 2. To a fraudster, the principle

More information

2) The proper use and control of credit is the best way to build a good credit history. Answer: TRUE Diff: 1 Question Status: Previous edition

2) The proper use and control of credit is the best way to build a good credit history. Answer: TRUE Diff: 1 Question Status: Previous edition Personal Finance, 6e (Madura) Chapter 7 Assessing and Securing Your Credit 7.1 Background on Credit 1) If you refrain from using any credit, it will assure you the lowest possible interest rate when you

More information

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You. Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing

More information

FRAUD: A Web Of Deceit

FRAUD: A Web Of Deceit FRAUD: A Web Of Deceit Presented by: Tessa Filippazzo, CPA, CFE Curtis Blakely & Co., P.C. PO Box 5486 Longview, TX 75608 (903) 758 0734 tfilippazzo@cbandco.com DEFINITION Intentional perversion of truth

More information

Lecture notes for: Corporate Cons

Lecture notes for: Corporate Cons Lecture notes for: Corporate Cons This video covers internal fraud schemes (as opposed to management trying to defraud investors - like the other two videos) Cash Internal fraud schemes: Accounts receivable

More information

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing

More information

Lecture Notes for How to Steal $500 Million

Lecture Notes for How to Steal $500 Million Lecture Notes for How to Steal $500 Million These notes will be in the form of questions that you should try to answer while watching the video. The purpose is to make certain that you are paying attention

More information

Types of Fraud, Detection and Mitigation Presentation by: Isaac Mutembei Murugu CIA, CISA 23 rd November Uphold public interest

Types of Fraud, Detection and Mitigation Presentation by: Isaac Mutembei Murugu CIA, CISA 23 rd November Uphold public interest Types of Fraud, Detection and Mitigation Presentation by: Isaac Mutembei Murugu CIA, CISA 23 rd November 2017 Uphold public interest Contents Types of fraud, their modes of detection and mitigation Contract

More information

OCCUPATIONAL FRAUD 9/20/2018

OCCUPATIONAL FRAUD 9/20/2018 OCCUPATIONAL FRAUD Presented by Inv. Andrea Jacobson Alaska State Troopers Alaska Bureau of Investigation Financial Crimes Unit What does it look like? What do we do when we see it? How do we prevent it?

More information

GreenPath Financial Wellness Series

GreenPath Financial Wellness Series GreenPath Financial Wellness Series IDENTITY THEFT Through financial knowledge and expertise, we provide high-quality products and services that enable people to enjoy a better quality of life. Smart financial

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

Get the most out of your membership

Get the most out of your membership PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account

More information

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan Identity Theft & Identity Fraud By Kevin Sullivan Page 1 Table of Contents What is Identity Theft?... 3 What is Identity Fraud?... 4 How is Personal Information Stolen?... 5 How Your Personal Information

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

Fraud Detection in Public Schools

Fraud Detection in Public Schools Fraud Detection in Public Schools Goal: To learn how to prevent and detect fraud from actual evidence uncovered during fraud investigations Format: We will discuss three of the largest fraud cases over

More information

Fraud Prevention for Nonprofits

Fraud Prevention for Nonprofits Fraud Prevention for Nonprofits January 11, 2017 Fraud Myths It hardly ever happens to nonprofits. It won t happen in our organization. Jane is the most dedicated and honest person I ve ever met. Mary

More information

Fraud & Forensic Accounting Update for CPAs

Fraud & Forensic Accounting Update for CPAs Fraud & Forensic Accounting Update for CPAs Presented by: Brett A. Johnson CPA/CFF, CFE, CFI Forensic Accounting Manager Background Eide Bailly LLP Top 25 CPA firm in the nation (Est. 1917) More than 49,000

More information

WHAT DO MANY OF US HAVE IN COMMON WITH. Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise

WHAT DO MANY OF US HAVE IN COMMON WITH. Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise WHAT DO MANY OF US HAVE IN COMMON WITH Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise IDENTITY THEFT: protecting ourselves and our clients Presented by: Eric Albert, Rhonda Davis, Kevin

More information

Learn about identity theft. Investor education

Learn about identity theft. Investor education Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an

More information

Mitigating Fraud. June 22, Sept. 21, 2014

Mitigating Fraud. June 22, Sept. 21, 2014 Mitigating Fraud June 22, 2016 Sept. 21, 2014 Agenda Overview of the 2016 Report to the Nations on Occupational Fraud and Abuse Real Life Fraud Cases Mitigation Tools Lone Star College s Ethics Hotline

More information

Its Not About If, Its About When! Learning how to protect your organization.

Its Not About If, Its About When! Learning how to protect your organization. Learning how to protect your organization. Presentation Overview Summary off FFraud S d St Statistics ti ti Definitions of Fraud How and Why Fraud Happens Fraud Prevention and Deterrence Steps to Reducing

More information

Identity Theft.

Identity Theft. Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.

More information

Reduce Your Risk: Understanding Internal Controls and Fraud Risks and Prevention

Reduce Your Risk: Understanding Internal Controls and Fraud Risks and Prevention Reduce Your Risk: Understanding Internal Controls and Fraud Risks and Prevention Michigan Municipal Treasurers Association June 16, 2017 Scott Sternhagen, CPA Manager Ryan Ritchay, CPA, CFE Senior Accountant

More information

Managing Reputational Risk for Nonprofit Organizations. Best Practices for Fraud Prevention. July 14, Christopher W. Truman, CPA, Manager

Managing Reputational Risk for Nonprofit Organizations. Best Practices for Fraud Prevention. July 14, Christopher W. Truman, CPA, Manager Managing Reputational Risk for Nonprofit Organizations Best Practices for Fraud Prevention July 14, 2014 CLAconnect.com Presenters Christopher W. Truman, CPA, Manager 2 July 14, 2014 1 Things to Think

More information

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations 2017 BY: KAREN REDDICK NATIONAL CREDIT MANAGEMENT 888-692-3964 kreddick@ncmstl.com 1 WHAT DO THESE STARS HAVE

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

What do they investigate

What do they investigate What is Forensic Accounting & What do they investigate Presented by: Doug Cash MBA, CFE, CFI, CFCI Manager Forensic Accounting & Investigative Services Specialization i What is Forensic Accounting? What

More information

Table 1: Historical Summary of Revenue Lost to Fraud. Estimate of Revenue Lost to Fraud

Table 1: Historical Summary of Revenue Lost to Fraud. Estimate of Revenue Lost to Fraud Anchin Alert: ACFE Report to the Nations 2018 The Association of Certified Fraud Examiners ( ACFE ) recently published the Report to the Nations 2018 Global Study on Occupational Fraud and Abuse (the 2018

More information

AGA Risk and Fraud Webinar

AGA Risk and Fraud Webinar AGA Risk and Fraud Webinar February 22, 2017 Let s Begin with the Basics 5% of revenues lost to fraud every year Median fraud duration from start to detection is 18 months Small organizations tend to suffer

More information

COVERAGE FRAUD IN EMPLOYEE BENEFIT PLANS 5/15/2014. Where employee benefit fraud is likely. Internal controls that help prevent fraud

COVERAGE FRAUD IN EMPLOYEE BENEFIT PLANS 5/15/2014. Where employee benefit fraud is likely. Internal controls that help prevent fraud FRAUD IN EMPLOYEE BENEFIT PLANS COVERAGE Where employee benefit fraud is likely Internal controls that help prevent fraud What should management have done? Schemes and war stories 1 FRAUD TRIANGLE Incentive/pressure

More information

Everything You Didn t Want To Know About Employee Crime

Everything You Didn t Want To Know About Employee Crime Everything You Didn t Want To Know About Employee Crime It's something employers don't want to have to think about: employee crime. Finding out that trusted, long-term employees have been stealing from

More information

ID Theft Security. Michael G. Solomon. CISSP PMP CISM

ID Theft Security. Michael G. Solomon. CISSP PMP CISM ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible

More information

Unit 5 - Your Money: Keeping it Safe and Secure

Unit 5 - Your Money: Keeping it Safe and Secure Unit 5 - Your Money: Keeping it Safe and Secure Credit Unions and Banks Banks For-profit companies owned by shareholders Credit Unions Not-for for-profit institutions owned and controlled by its own customers,

More information

Fraudulent Check, Credit Card Fraud and ID Theft Guide

Fraudulent Check, Credit Card Fraud and ID Theft Guide Fraudulent Check, Credit Card Fraud and ID Theft Guide COLLECTING BAD CHECKS The police involvement in bad check cases is for the sole purpose of investigating the incident to determine whether or not

More information

Chapter 2 Skimming 1

Chapter 2 Skimming 1 Chapter 2 Skimming 1 Define skimming. Chapter Objectives List and understand the two principal categories of skimming schemes. Understand how sales skimming is committed and concealed. Understand schemes

More information

It s not going away. (c) 2014 huberis.net. Identity Theft

It s not going away. (c) 2014 huberis.net. Identity Theft It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity

More information

Fraud Prevention & Detection. Eric Conforti, CPA, CFE April 17, 2018

Fraud Prevention & Detection. Eric Conforti, CPA, CFE April 17, 2018 Fraud Prevention & Detection Eric Conforti, CPA, CFE April 17, 2018 1 Recent Trends Prevention and Detection Methods Common Schemes Case Studies Throughout 2 ACFE Report to the Nations 3 ACFE Report to

More information

Welcome to Money Essentials SM!

Welcome to Money Essentials SM! Money Essentials SM Welcome to Money Essentials SM! Money Essentials provides you with a valuable, easy to understand introduction to financial services and is designed to give you realistic choices in

More information

FRAUD EXAMINERS MANUAL INTERNATIONAL EDITION

FRAUD EXAMINERS MANUAL INTERNATIONAL EDITION TABLE OF CONTENTS VOLUME I SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 Generally Accepted Accounting Principles (GAAP)...

More information

OAPT June 9, Deterring Fraud and the Latest Fraud Schemes in Public Entities TAKE AWAY #1

OAPT June 9, Deterring Fraud and the Latest Fraud Schemes in Public Entities TAKE AWAY #1 OAPT June 9, 2015 Deterring Fraud and the Latest Fraud Schemes in Public Entities TAKE AWAY #1 Fraud can happen at any entity, at any time with the right circumstance Be Vigilant and Skeptical of what

More information

Three D s of safeguarding your personal data

Three D s of safeguarding your personal data Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D

More information

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal

More information

HOW TO SPOT AND MITIGATE FRAUDULENT ACTIVITIES

HOW TO SPOT AND MITIGATE FRAUDULENT ACTIVITIES HOW TO SPOT AND MITIGATE FRAUDULENT ACTIVITIES For Government Entities and Nonprofit Organizations November 15, 2017 Presenters Bruce V. Bush Bruce is a Senior Director in RSM s Financial Investigations

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

Tax-Related Identity Theft

Tax-Related Identity Theft Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman

More information

Jason B. Freeman, J.D., CPA

Jason B. Freeman, J.D., CPA Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman

More information

MMAAA Annual Meeting. Conducting an Investigative Audit June 13, Presented by: John J. Sullivan, CFE Melanson Heath

MMAAA Annual Meeting. Conducting an Investigative Audit June 13, Presented by: John J. Sullivan, CFE Melanson Heath MMAAA Annual Meeting Conducting an Investigative Audit June 13, 2017 Presented by: John J. Sullivan, CFE Melanson Heath Association of Certified Fraud Examiners 2016 Global Fraud Study Figure 1. Statistics

More information

Call for assistance with registration and activation. You will be asked for your Access Code if registering by phone.

Call for assistance with registration and activation. You will be asked for your Access Code if registering by phone. Your Community West Credit Union checking account is about to work for you. Now it s time to start taking advantage of the benefits and features your account offers: IDPROTECT identity theft monitoring

More information

REPAIR KIT. Identity theft. SUBJECT: Identity Theft. BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING:

REPAIR KIT. Identity theft. SUBJECT: Identity Theft. BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING: SUBJECT: Identity Theft Identity theft REPAIR KIT BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING: fastest growing white-collar crime in the US IDENTITY THEFT Message from your Attorney

More information

SCTEM. Preventing Fraud and Misuse in Your Card Program. Presented By: Gonca Latif-Schmitt, Managing Director Citi

SCTEM. Preventing Fraud and Misuse in Your Card Program. Presented By: Gonca Latif-Schmitt, Managing Director Citi SCTEM Preventing Fraud and Misuse in Your Card Program Presented By: Gonca Latif-Schmitt, Managing Director Citi Agenda Card Misuse vs. Card Fraud - Definition Card Misuse Card Program Risks Fraud Types

More information

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution

More information

Your Guide to. Credit Card Skimming: How to Spot and Avoid Fraudulent Charges

Your Guide to. Credit Card Skimming: How to Spot and Avoid Fraudulent Charges Your Guide to Credit Card Skimming: How to Spot and Avoid Fraudulent Charges The term skimming, as applied to credit cards, involves stealing card account data during a legitimate transaction. It is then

More information

Fraud in Government. Mike Nolan, CPA, CFE, CGMA. CCACC & CCA&RMC Conference Monterey, CA September 2014

Fraud in Government. Mike Nolan, CPA, CFE, CGMA. CCACC & CCA&RMC Conference Monterey, CA September 2014 Fraud in Government Mike Nolan, CPA, CFE, CGMA CCACC & CCA&RMC Conference Monterey, CA September 2014 Headlines Former New Orleans Mayor Ray Nagin convicted of corruption City of Bell California Public

More information

Resources for Victims of IDENTITY THEFT. HENNEPIN COUNTY CHIEFS OF POLICE and HENNEPIN COUNTY ATTORNEY S OFFICE

Resources for Victims of IDENTITY THEFT. HENNEPIN COUNTY CHIEFS OF POLICE and HENNEPIN COUNTY ATTORNEY S OFFICE Resources for Victims of IDENTITY THEFT HENNEPIN COUNTY CHIEFS OF POLICE and HENNEPIN COUNTY ATTORNEY S OFFICE Fraud and financial crimes are a form of theft that occur when a person or entity takes money

More information

11/9/15. Fraud in Non-profit Organizations: What You Need to Know NOW!

11/9/15. Fraud in Non-profit Organizations: What You Need to Know NOW! Fraud in Non-profit Organizations: What You Need to Know NOW! The CFE Credential The Certified Fraud Examiner (CFE) credential denotes proven expertise in fraud prevention, detection and deterrence. CFEs

More information

CREDIT: HELPFUL OR HURTFUL? Ch 13 Section 1

CREDIT: HELPFUL OR HURTFUL? Ch 13 Section 1 CREDIT: HELPFUL OR HURTFUL? Ch 13 Section 1 DO NOW: T/F? 1. Using credit can lead to serious problems. 2. When you charge a purchase with a credit card, you can withhold payment if the product is defective.

More information

Identity Fraud Endorsement

Identity Fraud Endorsement 220 Commercial Street P.O. Box 10 Berwick, NS B0P 1E0 www.kingsmutual.ns.ca TF: 1.800.565.7220 EO-0870-0612 Identity Fraud Endorsement Insuring Agreement If the Declaration Page shows that the Identity

More information

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft. PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity

More information

Good From The Inside Out. Saturday, April 8, 2017

Good From The Inside Out. Saturday, April 8, 2017 Good From The Inside Out Saturday, April 8, 2017 What s New? Just last week Ex-CFO Accused of Embezzling $20M From Credit Union -Detroit Free Press January 9, 2016 Headlines Recent headlines Engaged CU

More information

Ohio Conference of Payroll Professionals

Ohio Conference of Payroll Professionals Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number

More information

INTERNAL FRAUD PREVENTION:

INTERNAL FRAUD PREVENTION: INTERNAL FRAUD PREVENTION: COMMON FRAUDS AND THE ABSOLUTES OF INTERNAL CONTROL DESIGN Presented for the 2018 Telergee Alliance CFO & Controllers Conference Presented by STEVE DAWSON, CPA, CFE 1 The Not

More information

Charge It Right. FDIC Money Smart for Young Adults. Building: Knowledge, Security, Confidence

Charge It Right. FDIC Money Smart for Young Adults. Building: Knowledge, Security, Confidence Charge It Right FDIC Money Smart for Young Adults PNC is proud to work with the FDIC to offer their Money Smart program to our customers, to support lifelong learning in Financial Education. Building:

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Identity Theft: Help Your Students Avoid This Epidemic

Identity Theft: Help Your Students Avoid This Epidemic Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity

More information

SENIOR SAFETY PRESENTATION

SENIOR SAFETY PRESENTATION SENIOR SAFETY PRESENTATION Presentation Overview Elder Abuse Problem How the Calgary Police Service responds to this issue Most Prevalent Frauds/Scams Case Studies Contributing Societal Trends Elder Abuse

More information

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS

More information

Fraud prevention for credit unions

Fraud prevention for credit unions Fraud prevention for credit unions Deposit Insurance Corporation of Ontario November 12, 2013 2 Agenda The cost of fraud Internal fraud The risks of external fraud facing credit unions Fraud prevention

More information

University System of Georgia s 2016 Georgia Summit Fraud in Higher Education

University System of Georgia s 2016 Georgia Summit Fraud in Higher Education University System of Georgia s 2016 Georgia Summit Fraud in Higher Education How to Protect your Institutions! September 14 2016 Jeff Fucito, CPA Aleisa Howell, CPA Jon Schultz, CPA Augusta Marriott at

More information

11/14/ FNBT FACT ACT

11/14/ FNBT FACT ACT 1 FNBT FACT ACT This class addresses the Fair Credit Reporting Act which governs the collection and use of information considered in connection with granting credit, providing insurance or offering employment.

More information

Fraud in the Government Realm. Introduction. What is Fraud? My career began with a local government fraud in 1993

Fraud in the Government Realm. Introduction. What is Fraud? My career began with a local government fraud in 1993 Fraud in the Government Realm Introduction My career began with a local government fraud in 1993 2 What is Fraud? 3 1 Two Types of Fraud 4 Fraud Do not be think it is not happening 5 Your employees? 6

More information

FRAUD EXAMINERS MANUAL (INTERNATIONAL EDITION)

FRAUD EXAMINERS MANUAL (INTERNATIONAL EDITION) TABLE OF CONTENTS SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES OCCUPATIONAL FRAUDS ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 FINANCIAL STATEMENT FRAUD What Is Financial

More information

FINANCIAL FITNESS EDUCATION

FINANCIAL FITNESS EDUCATION (Agency s Name & Logo) FINANCIAL FITNESS EDUCATION Sponsored by BETTER FORTUNES Control Your Money Control Your Life Knowing the difference can make all the difference Chapter One ECONOMIC WAY OF THINKING

More information

The fastest growing white-collar crime in the US. Identity theft REPAIR KIT. brought to you by: Colorado Attorney General John Suthers

The fastest growing white-collar crime in the US. Identity theft REPAIR KIT. brought to you by: Colorado Attorney General John Suthers The fastest growing white-collar crime in the US. Identity theft REPAIR KIT brought to you by: Colorado Attorney General John Suthers Message from Attorney General John Suthers Dear Coloradoans: Identity

More information

Credit Cards. The Language of Credit. Student Loans. Installment Loans 12/14/2016

Credit Cards. The Language of Credit. Student Loans. Installment Loans 12/14/2016 Quick Response Explain how you think credit cards work. How much do you have to pay every month? What happens if you pay late? What kinds of fees are involved? Unit 4 - Good Debt, Bad Debt: Using Credit

More information

Fraud Prevention and Detection. Lisa dewit, Sr Project Manager (3-5631) Formation Review 20 Oct 17 Prepared for: IIA Annual Fraud Seminar

Fraud Prevention and Detection. Lisa dewit, Sr Project Manager (3-5631) Formation Review 20 Oct 17 Prepared for: IIA Annual Fraud Seminar Fraud Prevention and Detection Lisa dewit, Sr Project Manager (3-5631) Formation Review 20 Oct 17 Prepared for: IIA Annual Fraud Seminar Opening Remarks Fraud - what is it? Fraud Risk Management Fraud

More information

CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA

CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. CREDIT CARD FRAUD SCHEMES Introduction Consumers make purchases using credit every day. Credit card companies

More information

Fraud Examination. Prevention, Detection, and Investigation. Steven M. Bragg

Fraud Examination. Prevention, Detection, and Investigation. Steven M. Bragg Fraud Examination Prevention, Detection, and Investigation Steven M. Bragg Chapter 1 Introduction to Fraud... 1 Learning Objectives... 1 Introduction... 1 What is Fraud?... 1 Confidence... 1 The Effects

More information