Targeting businesses can be much more profitable for fraudsters than personal identity theft.
|
|
- Nelson Robinson
- 5 years ago
- Views:
Transcription
1 When You Aren t You: Corporate Identity Theft A New Snake in the Grass... (and Check Fraud Still #1.) CorporateIdentity Theft CorporateIdentity Theft is one of the newest financial threats facing businesses and organizations. Presented at 2015 Greg Litster, President SAFEChecks There are two major types of Corporate Identity Theft. In one major type, fraudsters target and imitate a legitimate business. Targeting businesses can be much more profitable for fraudsters than personal identity theft. Dun & Bradstreet has reported cases of corporate identity theft in at least 22 states, and predicts this crime will spread across the country. Corporateidentity theft is the unauthorized use of a company s name and information by criminals in order to illegally obtain money, goods, or services. The Internet has made it easy to create a non-existent business that looks legitimate no organization is immune from the threat of corporate identity theft. Some losses have reached a half-million dollars before the crime was discovered. 1 1
2 When banks or other commercial lenders evaluate a business, they look for evidencethat the company is what its officers say it is, and that it has the legal and financial capacity to conduct its business. Evidence = Proof of Right Proof of Right can include financial statements business addresses telephone numbers government licenses credit history etc. Each Proof of Right that can be verified increases the appearance of a company s legitimacy. Thieves can create fraudulent Proofs of Right by gaining access to state government records of legitimate businesses, and then altering company information, such as the registered agents names and addresses. Criminals open new bank accounts and obtain loans and credit cards in the name of the business, often using the compromised identity of business owners or officers. They use falsified financial statements to even lease offices, furniture and equipment, creating the illusion of a successful business. They use bank loans and retailer lines of credit to purchases items that can readily be sold for cash. Often, this leaves the unwitting victimized business awash in debt and legal fees defending itself against creditors. 2 2
3 Criminals tend to target smaller and midsize businesses with strong credit ratings that are easily identified through credit rating agencies. Business credit reports are intended to promote buying and selling, and help managers make risk assessment decisions, so business credit reports are readily available to virtually anyone. Family businesses, churches, and inactive companies have been targeted. Smaller businesses with strong credit ratings are tempting targets for criminals because they often have fewer legal and financial defenses than large corporations. Real Life Examples. In California: A seafood company received an order for $500,000 worth of goods. After completing a credit check, the company shipped the order and billed the customer. The customer responded that it had never placed nor received the order. It was discovered that the customer's credit information and a different address had been given by a fraudster. In California, identity thieves moved into the same building as a law firm under the firm's own name! and billed the firm for $70,000 worth of computers and furniture. When the products arrived, they hired a moving truck and disappeared. By that time, both the goods and the thief had already vanished. 3 3
4 In Oregon, identity thieves reinstated old mining companies to steal their corporate identity. (Oregon recently established limits on how long a company can be dormant before it is reinstated.) In Colorado: Criminals updated or altered the registration information on file with the state. After the registration information was changed, the criminals used the altered corporate identity to make online applications for credit from various retailers, including Home Depot, Office Depot, Apple and Dell. Colorado authorities became aware of the scam after one of the targeted companies was contacted by a major retailer regarding nearly $250,000 in purchases made in its name. In Colorado: A small business owner learned of his company s identity theft when he contacted Dun & Bradstreet to ensure an address change was recorded properly. That's when he learned of a new registered agent and address -an Aurora mail drop that was set up to forward everything to California. The thieves also had changed key information about his company on Dun & Bradstreet's database, such as increasing the number of his employees from 15 to 150 and his company's annual revenues by a factor of 10! In Florida: An aviation company had been dissolved by the owners. It was then reinstated by corporate identity thieves. Soon after, they applied for a $140,000 federal fuel tax credit, which was delivered as a check. The scammers and the money disappeared and the previous owners only learned about it when the IRS came knocking on their door." Solutions to this type of Corporate Identity Theft. Many state governments are actively working to help better protect government controlled and regulated business data. 4 4
5 The biggest challenge is alerting and educating organizations about this new type of crime, and motivating them actively self-monitor. Defensive strategies include using better passwords, dual-authentication controls, and checking business legal filings regularly. Organizations should protect their business EIN / TIN as they would a Social Security number. Businesses should verifyatypical large purchases and change of shipping address from current clients. Businesses should verifyunusual large purchases from new clients. Keep all documents containing business information or business identifiers in a secure place that is not accessible by unauthorized persons. Shred them when discarded. Use caution when completing a credit application. Criminals post fake credit applications, and after a legitimate company has filled it out, the criminals have all the information they need to defraud the business, or obtain loans or lines of credit in the business' name. Review your commercial and business banking agreements understand the time frames for reporting fraud, anomalies, etc. Monitor your business accounts daily. Many banks provide and text alerts regarding your account activity, which can help alert you to suspicious transactions. 5 5
6 If your business provides or maintains a list of trade or credit references, request each reference to notify you if they are contacted by a third party. If you are not applying or planning to apply for new credit, you can place a security freeze on your personal credit to prevent businesses with whom you do not already have an existing relationship from accessing your credit file. Training!! Protecting your business, and the sensitive information of your business, your customers, and employees is the responsibility of everyone in your organization. In the second major category of Corporate Identity Theft, criminals target an organization s clients or vendors through Corporate Hacking. Hackers target Accounts Receivable List Hackers target Accounts Receivable List Send bogus change-of-bank notifications to customers Hackers target Accounts Receivable List Send bogus change-of-bank notifications to customers New PO Box controlled by hackers Hackers target Accounts Receivable List Send bogus change-of-bank notifications to customers New PO Box controlled by hackers New Bank R/T and account controlled by hackers Solutions to this type of Corporate Identity Theft. 6 6
7 Banks: Monitor bank changes on outgoing repetitive wires Banks: Monitor bank changes on outgoing repetitive wires Companies: Confirm ALL bank change notifications from vendors Banks: Monitor bank changes on outgoing repetitive wires Companies: Confirm ALL bank change notifications from vendors Buy cyber crime and check fraud insurance Banks: Monitor bank changes on outgoing repetitive wires Companies: Confirm ALL bank change notifications from vendors Buy cyber crime and check fraud insurance Use payee positive pay and high security checks RESOURCES: businessidtheft.org Dun & Bradstreet Bloomberg BusinessWeek, The Council of State Governments Also, review information and resources offered by your state and local government. Check Fraud Why talk about Check Fraud? Check Fraud Produces more $ Losses than all other types of payment fraud! AFP 2015 Payments Fraud Survey 50%of organizations still issue checks. Check fraud is not going away! AFP 2015 Payments Fraud Survey Checks remain the most-often targeted payment method by those committing fraud attacks. Check fraud also accounts for the largest dollar amount of financial loss due to fraud. 7 7
8 Fraudulent Payments by Method (Respondents were hit multiple ways; total > 100%) Fraud Losses by Method How Dollars were actually lost CHECKS 77% Corporate Cards 34% Wire Tranfers 27% CHECKS 45% Corporate Credit Cards 25% Wire Transfers 20% ACH Debits 7% 40 ACH Debits 25% 40 Corporate 20 ACH Credits 10% 20 Debit Cards 2% The newest twists on Check Fraud. ACH Credits 1% 0 Percentage 0 Percentage Mobile Banking and Deposit Fraud: Double Debits Mobile Banking Deposit Fraud Scenario: A check is mailed to Dishonest Don Don deposits the check using smart phone app Digitized check is paid at drawer s bank 10 days later, Don cashes the same check at a check cashing store 2 nd check hits the drawer s bank account (check is presented for payment twice) Who Takes The Loss? The answer is found in the Rules governing Check 21 Under the Warranty Liability for the loss falls to the bankthat allowed its customer to use its smart phone app. Bank can charge the loss against its customer (assuming $$ is still there) Mobile Banking and Deposit Fraud: Holder in Due Course Scenario: A title insurance company gives John Doe a check at closing. John Doe deposits the check via a mobile app, then comes back to office and returns the check, asking that it be made payable to John Doe orjane Doe. 8 8
9 The company doesn t think to place a Stop Payment on the first check because they have the check in hand. 1. If a physical check is returned for a replacement, place a stop paymenton the returned check. It may have been deposited remotely. 2. Recipient MUST sign an affidavitstating the check was not deposited. 3. An Affidavit does not provide protection, only a right to sue and collect legal fees. Strategies to Prevent Check Fraud Don t Write Checks! Use Commercial Purchase Cards Pay electronically (ACH) But, if you are going to write checks #1. Positive Pay Positive Pay......a powerful tool! PositivePay.net #2. High Security Checks Effective check fraud prevention strategies begin with a high security check. 9 9
10 High Security Checks 1. Deter the forger(psychological warfare) 2.Thwart forgers attempts to replicateor alter the check 3.Provide legal protection from some Holder in Due Course claims (UCC 3-302) What makes a check secure? 10+ safety features Important Security Features Controlled Check Stock Dual-tone True Watermark Thermochromatic Ink (reacts to heat) Warning Bands worded correctly Toner Anchorage Copy Void Pantograph Chemical-reactive Ink + Paper Inventory Control Number on Back (laser) UV Ink + UV Fibers Microprinting Laid Lines Controlled Check Stock Is a critical security feature Checks should beunique in some wayto every other organization s check stock No two organizations should have the exact, identical check stock Uncontrolled Check Stock Checks ARE NOTuniquely designed or customized for every end-user It is sold entirely blankto countless entities, organizations, and fraudsters, by print brokers all over the USA How is Uncontrolled Check Stock a problem? Counterfeit Cashiers Checks Counterfeit Cashiers Checks Counterfeit Cashiers Checks 10 10
11 Counterfeit Cashiers Checks Counterfeit Cashiers Checks Holder in Due Course and Uncontrolled Check Stock Web: FraudTips.net HIDC & Uncontrolled Check Stock Robert Triffinv. Somerset Valley Bank and Hauser Contracting Company Obtaining Controlled Check Stock 1. Custom-manufacturechecks using an ORIGINAL design, true-watermarked paper, and at least 10 security features, OR 2. Buy from a supplierthat only sells controlled check stock that has never been replicated or used in a check fraud scam. SAFEChecks.com Other Important Security Features Dual-tone True Watermark Thermochromatic Ink (reacts to heat) Warning Bands worded correctly Toner Anchorage Copy Void Pantograph Chemical-reactive Ink + Paper Inventory Control Number on Back (laser) UV Ink + UV Fibers Microprinting Laid Lines HIDC & High Security Checks Robert Triffin v. Pomerantz Staffing Services AFP 2014 Payments Fraud Survey Check Fraud Methods Alterations: 1. Payee Name Alterations = 52% 2. Dollar Amount Alterations = 37% This is up from 49% and 22% respectively, in the 2013 Survey. AFP 2014 Payments Fraud Survey Most of these alterations could have been prevented with check security features! 1. Payee Name Alterations = 52% 2. Dollar Amount Alterations = 37% 11 11
12 Preventing Altered Payees High-security checks 14 point font for Payee Name High-quality toner Hot laser printer Payee Positive Pay Frank Abagnale s Fraud Bulletin on Laser Check Printing Positive Pay Provides NO PROTECTION Against Added Payee Names! #3. Secure Check Writing Software To Prevent Added Payees Typical Check Layout Fix it:use a Secure Name Font Secure Name Font printed above original payee name helps eliminate Added Payee Name Risk Leaves No Room for Adding Bogus Payee Secure Name Font printed above original payee name helps eliminate Added Payee Name Risk Open Areas Where Forgers Add A New Payee Name Secure Name Font No room for an Added Payee Identical data is printed on both checks. Which check would forgers prefer to attack? Greg Litster, President SAFEChecks (800) 949-BANK (818) cell greg@safechecks.com GLITSTER@aol.com # # # # 12 12
Mobile Banking Fraud the newest twist on check fraud.
mrdc Fraud Any Recourse Against Losses?? Mobile Banking and Deposit Fraud April 20, 2017 Greg Litster, President SAFEChecks Mobile Banking Fraud the newest twist on check fraud. Mobile remote check deposit
More informationHOLDER IN DUE COURSE and CHECK FRAUD: Summary and Detailed Explanation
HOLDER IN DUE COURSE and CHECK FRAUD: Summary and Detailed Explanation Holder in Due Course Summary Holder in Due Course (HIDC) is part of the Uniform Commercial Code (UCC) that significantly impacts an
More informationCheck 21, Remote Deposit Capture and Check Fraud A Summary
Check 21, Remote Deposit Capture and Check Fraud A Summary Check 21 s Final Rule includes an Indemnity provision that seriously affects an organization s liability for check fraud, under certain conditions.
More informationThe Future Treasury Officer
The Future Treasury Officer Presenters: QR Code William Underwood Kathryn Hewitt Greg Litster Date: Introduction o William Underwood II, Director of Financial and IT Services/ACM, Oakland Park, FL wunderwood@oaklandparkfl.gov
More informationRecognizing Credit Card Fraud
1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended
More informationIDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018
IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,
More informationFRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools
FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting
More informationFINANCIAL CRIMES INVESTIGATIONS
FINANCIAL CRIMES INVESTIGATIONS today s presenters... Brian Sallee Cuyahoga County Sheriff s Department Major Crimes Task Force Larry Henderhan FDA Special Agent Major Crimes Task Force Counterfeit Investigations
More informationFinancial Crime: Awareness & Prevention. Jon Jarosinski
Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit
More informationc» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:
Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security
More informationSAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
More informationIdentity thieves use a variety of ways to gain access to your personal information:
How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into
More informationProtecting against check fraud perspectives and best practices
Protecting against check fraud perspectives and best practices Presenter Name Corp Title, Functional Title Date of presentation 2016 Wells Fargo Bank, N.A. All rights reserved. For public use. Agenda Check
More informationIdentity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office
Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission
More informationmitigating Payments Fraud risk:
HigHer education banking mitigating Payments Fraud risk: Strategies and best Practices for Higher education institutions 2 Mitigating Payments Fraud Risk: Strategies and Best Practices for Higher Education
More informationIDENTITY THEFT PROTECT YOUR MONEY
IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that
More informationReceive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait!
Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait! By Tom Bassett, J.D., CPA Trending Upward Again in 2018 Taxpayer Identity Theft As head of Commerce Trust
More informationProtect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently
Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity
More informationPRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.
PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity
More informationThree D s of safeguarding your personal data
Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D
More informationDate Here. Welcome University of Michigan International Students
Date Here Welcome University of Michigan International Students U.S. Banking System Overview Banking is regulated by federal and state governments Privacy Disclosure Fraud protection Protection against
More informationWHEN BAD THINGS HAPPEN TO YOUR GOOD NAME
WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card
More informationProtecting Yourself from Fraud including Identity Theft Advanced Level
Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial
More informationHere is some more information on the Equifax Breach and how you may protect yourself in the aftermath...
UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal
More informationInsuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a
More informationElectronic Commerce and Cyber Risk
Electronic Commerce and Cyber Risk Fifth Third Bank All Rights Reserved Reality and Solutions Objectives for Today What I will cover How banks are changing How the public is changing How the laws are changing
More information2017 AFP. Payments Fraud and Control Survey. Underwritten by REPORT OF SURVEY RESULTS
2017 AFP Payments Fraud and Control Survey REPORT OF SURVEY RESULTS Underwritten by 2017 AFP Payments Fraud and Control Survey REPORT OF SURVEY RESULTS March 2017 Underwritten by Association for Financial
More informationJanuary to June 2016 fraud update: Payment cards, remote banking and cheque
January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.
More informationKeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud
KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud Inside: Fraud: A Problem That Won t Go Away How Criminals Exploit Vulnerabilities In Treasury Practices Fraud Prevention From An
More information2017 annual fraud update:
2017 annual update: Payment cards, remote banking, cheque and authorised push payment scams March 2018 The threat from is always changing, but the finance industry is continuously enhancing its response,
More informationYear-end 2016 fraud update: Payment cards, remote banking and cheque
Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments
More informationLegal Liabilities When Check Fraud Occurs
Legal Liabilities When Check Fraud Occurs by Terri D. Thomas, JD (tthomas@ksbankers.com) Presented on February 17, 2016 1 Definitions Page 3 Drawee the financial institution on which a check is drawn.
More informationLegal Liabilities When Check Fraud Occurs
Legal Liabilities When Check Fraud Occurs by Terri D. Thomas, JD (tthomas@ksbankers.com) Presented on September 24, 2015 1 Definitions Page 3 Drawee the financial institution on which a check is drawn.
More informationmy Identity Learning objectives
my Identity TM 2 my Identity Learning objectives In this overview, you will learn about: The four components of my Identity TM How the product can benefit customers in real-world scenarios The benefits
More informationFRAUD: MEMBER ACTION PACKET
FRAUD: MEMBER ACTION PACKET INDEX BASICS OF IDENTITY THEFT...1 SECURE YOUR ONLINE IDENTITY/PASSWORDS...1 ID THEFT...1 ATM/DEBIT/CREDIT... 1-2 COUTERFEIT AND FAKE CHECKS...2 KEEPING AN EYE ON YOUR CREDIT
More informationProtecting against and recovering from fraud and identity theft WHAT TO DO
Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls
More informationPAI Secure Program Guide
PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS
More informationIdentity Protection 101: Protect your good name from identity theft.
Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social
More informationOhio Conference of Payroll Professionals
Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number
More informationFrequently Asked Questions
Account to Account Transfers... 1 Bill Pay... 1 Branch Locations and Hours... 2 Credit Card Business... 2 Credit Card Personal... 3 Cybersecurity Information... 3 Debit Cards... 4 estatements/enotices...
More informationIdentity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation
Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an
More informationIdentity Theft: Protecting, Monitoring and Resolving
Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA
More informationUNIT 3-4 Preventing Identity Theft
UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information
More informationIdentity Theft Prevention Program Lake Forest College Revision 1.0
Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:
More informationCASHMERE VALLEY BANK ELECTRONIC BANKING AGREEMENT AND DISCLOSURE STATEMENT
CASHMERE VALLEY BANK ELECTRONIC BANKING AGREEMENT AND DISCLOSURE STATEMENT In this Electronic Banking Agreement and Disclosure, Agreement, "you", "your", and "yours" refers to each person that will be
More informationIt s not going away. (c) 2014 huberis.net. Identity Theft
It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity
More informationDrexel and FMFCU. Presented By
Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission
More informationID Theft Toolkit and Affidavit
ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information
More informationHacking Healthcare: Attacks on the Highest Value Asset
Hacking Healthcare: Attacks on the Highest Value Asset Paul Dant Chief Strategy Officer Independent Security Evaluators The Key Takeaway Who am I? Paul Dant Chief Strategist @ ISE 9: First digital product
More informationConsumer Federation of America Best Practices for Identity Theft Services. March 10, 2011
Consumer Federation of America Best Practices for Identity Theft Services March 10, 2011 Consumer Federation of America Best Practices for Identity Theft Services Table of Contents Introduction 3 About
More informationCredit Matters Credit Concept Workshop Presentation Script (Part II of II)
Credit Matters Credit Concept Workshop Presentation Script (Part II of II) (HAND OUT QUIZ PRIOR TO PRESENTATION) Opening Slide: WELCOME BACK TO THE SECOND PRESENTATION OF THE CREDIT CONCEPTS WORKSHOP SERIES.
More informationProvided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer Survey presented by RateWatch
Accurate Financial Data Since 1989 Security Breaches and Identity Theft Consumer Actions and Opinions Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer
More informationCoreLogic Credco First American Way Poway, CA (800)
Red Flag Regulation WHAT IT IS The Red Flag Regulation implements Sections 114 and 315 of the FACT Act. It finalizes three distinct requirements two of which are relevant to automotive, RV and marine dealers,
More information2. COVERAGE REQUESTED DESIRED COVERAGE: (PLEASE CHECK THE COVERAGE REQUESTED) LIMITS REQUESTED Employee Theft Forgery or Alteration Theft Inside Premi
PLEASE ENSURE THAT THE FOLLOWING ARE PROVIDED WITH THE APPLICATION: Latest audited annual report Auditor s letter to Management, if available 1. GENERAL INFORMATION 1. Name of Organization or Legal Entity
More informationUniversity of Illinois Community Credit Union Consumer Remote Deposit Anywhere Terms & Conditions
Description: University of Illinois Community Credit Union Consumer Remote Deposit Anywhere Terms & Conditions The remote deposit capture services ("Mobile Deposit" or "Services") are designed to allow
More informationCONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA
CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. CREDIT CARD FRAUD SCHEMES Introduction Consumers make purchases using credit every day. Credit card companies
More informationcard fraud business Helpful information for Merchants Avoiding card fraud
card fraud business Helpful information for Merchants Avoiding card fraud How to stop card fraud before it happens. It is an unfortunate fact that not everyone with a card, or card number, is the card
More informationFARMERS INSURANCE FEDERAL CREDIT UNION
FARMERS INSURANCE FEDERAL CREDIT UNION ELECTRONIC SERVICES DISCLOSURE AND AGREEMENT In this Disclosure and Agreement, the words I, me, mine, my, us, and our mean each and all of those (whether one or more
More informationEvaluating Your Company s Data Protection & Recovery Plan
Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart
More informationGet the most out of your membership
PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account
More informationIdentity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit
Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Identity theft and identity fraud are terms used to refer to all types
More informationIdentity Theft: World s Fastest Growing Crime!!
Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all
More informationOLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE
OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS
More informationA Losing Bet: Binary Options
A Losing Bet: Binary Options What are Binary Options? Binary options the latest investment scam that s costing victims everything. - CBC, March 2017 Binary Options are a sort of wager where investors bet
More informationPreventing Senior Scams. Welcome. MoneyWi$e is a joint financial education project of Consumer Action and Capital One
Preventing Senior Scams Welcome MoneyWi$e is a joint financial education project of Consumer Action and Capital One Overview of topics Recognizing scams Protecting yourself from fraud Steps to take if
More informationBY SUBSCRIBING TO THE SERVICE OR USING THE SERVICE, YOU AGREE TO THE TERMS OF THIS AGREEMENT
Bank of the Ozarks Online Banking Agreement This Online Banking Agreement (the Agreement ) governs your use of the Online Banking Service ( the Service ) with Bank of the Ozarks available at www.bankozarks.com
More informationIdentity Fraud Endorsement
220 Commercial Street P.O. Box 10 Berwick, NS B0P 1E0 www.kingsmutual.ns.ca TF: 1.800.565.7220 EO-0870-0612 Identity Fraud Endorsement Insuring Agreement If the Declaration Page shows that the Identity
More informationChart 1 How Fraudulently Used Consumer Information is Obtained M A Y
M A Y 2 0 0 6 Payments Fraud: Consumer Considerations by Terri Bradford, Payments System Research Specialist, Federal Reserve Bank of Kansas City, and Bruce Cundiff, Research Analyst, Javelin Strategy
More informationBanking Basics 101. How to Manage Your Finances and Still Have Money Left Over For a Night Out. Course objectives learn about:
Banking Basics 101 Course objectives learn about: Using a checking account Various types of payment vehicles Benefits of a savings account How to Manage Your Finances and Still Have Money Left Over For
More informationEQUIFAX DATA BREACH WHAT YOU NEED TO KNOW
EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW The Denver District Attorney's Office has been working closely with the Colorado Bureau of Investigations to provide you the most up-to-date information on the
More informationBusiness Member Service Agreement Part 2
Business Member Service Agreement Part 2 P.O. Box 1010 Moline, IL 61266-1010 (309) 793-6200 www.ihmvcu.org Contents AGREEMENT TERMS AND DISCLOSURES 1 1. This is an Agreement between You and Your Credit
More informationA Losing Bet: Binary Options
A Losing Bet: Binary Options What are Binary Options? Binary Options are a sort of wager where investors bet on the performance of an underlying asset, often a currency, stock index, or share, usually
More informationIdentity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.
Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should
More informationA Review of Actual Fraud Cases in 2017 FRAUD REVIEW
A Review of Actual Fraud Cases in 2017 FRAUD REVIEW Contents Introduction 3 Fraud Snapshot 4 Case Studies Credit Card Fraud 5 Business Email Compromise Fraud 6 Payroll Fraud 7 Supplier Fraud 8 Outlook
More informationELECTRONIC FUND TRANSFERS DISCLOSURE. and MOBILE BANKING AGREEMENT YOUR RIGHTS AND RESPONSIBILITIES IMPORTANT! IF YOU DISCOVER YOUR
ELECTRONIC FUND TRANSFERS DISCLOSURE and MOBILE BANKING AGREEMENT YOUR RIGHTS AND RESPONSIBILITIES IMPORTANT! IF YOU DISCOVER YOUR VISA DEBIT CARD OR MAC CARD IS LOST OR STOLEN, PLEASE REPORT IT IMMEDIATELY
More informationFinancial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements 2016 Association of Certified Fraud Examiners, Inc. Fraudulent Disbursement Schemes Register disbursement schemes
More informationIdentity Theft Victim s Packet
Revised April 2010 Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso County Sheriff s Office and obtained a police report number
More informationWhat is Identity Theft?
IDENTITY THEFT What is Identity Theft? Identity theft is a growing problem in today s information age. Criminals are becoming more sophisticated in their ability to use your personal information for their
More informationIdentity Theft Victim s Packet
Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Reno Police Department, complete a crime report and obtained a police report case number
More informationJust the facts about proving your identity.
July 2007 Our guides here to help you This guide is part of our Everyday money series. About the Financial Services Authority. Buying a home. Saving Pensions and andpensions andif things investing. retirement.
More informationGood From The Inside Out. Saturday, April 8, 2017
Good From The Inside Out Saturday, April 8, 2017 What s New? Just last week Ex-CFO Accused of Embezzling $20M From Credit Union -Detroit Free Press January 9, 2016 Headlines Recent headlines Engaged CU
More informationBetter Business Bureau
Better Business Bureau 1 Who We Are & Our Vision BBB is an unbiased non-profit organization that sets and upholds high standards for fair and honest business behavior. For more than 100 years, Better Business
More informationNAU Police Department s Identity Theft Victim s Packet
NAU Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted the NAU Police Department and obtained a police report number
More informationID Theft Protection Kit
ID Theft Protection Kit Congratulations. You ve taken a big step in protecting the power of your credit and your identity. Identity theft is a serious crime. Victims can spend a significant amount of time
More informationLearn about identity theft. Investor education
Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the
More informationSecuring Your Balance Sheet Fidelity/Crime Insurance. Presenter: Mary da Costa, Manager, Corporate Insurance
Securing Your Balance Sheet Fidelity/Crime Insurance Presenter: Mary da Costa, Manager, Corporate Insurance DISCLAIMER The following presentation is for general information. In all cases the terms of the
More informationEquifax Data Breach: Your Vital Next Steps
Equifax Data Breach: Your Vital Next Steps David A. Reed Partner, Ann Davidson Vice President Risk Consulting/ Bond Division Allied Solutions, LLC Do You Remember When this Was the Biggest Threat to Data
More informationSlide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?
Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is
More informationTo find out more about our accessible services please visit
Give me the facts Welcome This guide explains how your account works. It takes you through the ways you may be able to access your account, make payments and keep both your finances and information safe.
More informationDeluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities.
Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. deluxe growth services introduction Identity thieves are extending beyond credit relationships and are more
More informationDealing with Duplicates 3-Part Session Series -Session 1- Legal Aspects, Warranties & Recourse
Dealing with Duplicates 3-Part Session Series -Session 1- Legal Aspects, Warranties & Recourse Phyllis Meyerson, AAP, CCM, Executive Vice President, ECCHO Ellen Heffner, NCP, Director, Product Management,
More informationAdditional Information on the Dirty Dozen
Additional Information on the Dirty Dozen 1. Identity Theft Topping this year s list Dirty Dozen list is identity theft. In response to growing identity theft concerns, the IRS has embarked on a comprehensive
More informationBusiness Days For purposes of these disclosures, our business days are Monday through Friday, excluding holidays.
P.O. Box 330 Angwin, CA 94508 707.965.2483 707.965.0142 Fax www.silveradocu.com Silverado Online Home Banking, Bill Pay and Mobile Banking Electronic Funds Transfer Disclosure and Agreement This Silverado
More informationIdentity Theft. Help Your Students Avoid This Epidemic Sun Ow
Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution
More informationBank Secrecy Act OFAC FinCEN
Bank Secrecy Act OFAC FinCEN 2017 CREDIT UNION EMPLOYEE TRAINING Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer Identification Program Customer Due Diligence
More informationBest Practices for Handling Retrievals and Chargebacks. Lodging
Best Practices for Handling Retrievals and Chargebacks Lodging January 30, 2018 Table of Contents Authorization Processing... 3 Transaction Processing... 3 Proper Disclosure... 4 Deterring Fraud... 4 VISA
More informationMEDICAL IDENTITY THEFT Presented by:
MEDICAL IDENTITY THEFT Presented by: Tami Flemmer, Risk Management Director Melissa Hauer, Corporate Counsel Ernie Thurman, Security Coordinator October 8, 2014 Medical Identity Theft OVERVIEW OF PRESENTATION
More informationIdentity Theft: Help Your Students Avoid This Epidemic
Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity
More information2017 Cyber Security and Data Privacy Study
RESEARCH REPORT DECEMBER 2017 2017 Cyber Security and Data Privacy Study How does your company compare? TABLE OF CONTENTS 05 How does your company compare? 06 Key findings 08 Cyber security and data privacy
More informationCYBER AND INFORMATION SECURITY COVERAGE APPLICATION
NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT
More information